Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup_DigiSignerOne_x86.exe

Overview

General Information

Sample name:Setup_DigiSignerOne_x86.exe
Analysis ID:1544225
MD5:f719502fa0580f2cfa1a6b799c4bd28d
SHA1:63449f28a29129c23b16c7496c5748b2c1c1eb3f
SHA256:4a6f4f683ba2d306c83c8690488332ef95f9682b1f129aed07d3512131a76dc9
Infos:

Detection

Havoc
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Havoc
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Setup_DigiSignerOne_x86.exe (PID: 3852 cmdline: "C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe" MD5: F719502FA0580F2CFA1A6B799C4BD28D)
    • Setup_DigiSignerOne_x86.tmp (PID: 5252 cmdline: "C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp" /SL5="$203D4,33657605,58368,C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe" MD5: B94E2647AD7D4E5AC3FEA70870F1DD05)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
HavocFirst released in October 2022, the Havoc C2 Framework is a flexible post-exploitation framework written in Golang, C++, and Qt, with agents called 'Demons' written in C and ASM, created by @C5pider. Designed to support red team engagements and adversary emulation, it offers a robust set of capabilities tailored for offensive security operations. The framework, which is under active development, utilizes HTTP(s) and SMB as communication protocols for its implants. Havoc can generate implants, known as Demons, in several formats including EXE, DLL, and Shellcode. A notable feature of Havoc is its ability to bypass EDR by employing advanced evasion techniques such as sleep obfuscation, return address stack spoofing, and indirect syscalls. This capability enhances its effectiveness in evading detection and circumventing security measures.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.havoc
No configs have been found
SourceRuleDescriptionAuthorStrings
Setup_DigiSignerOne_x86.exeJoeSecurity_Havoc_1Yara detected HavocJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: Setup_DigiSignerOne_x86.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: Setup_DigiSignerOne_x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: f:\mydev\inno-download-plugin\ansi\idp.pdb source: Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380817518.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380227053.000000000018F000.00000004.00000010.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmp, idp.dll.2.dr
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00453238 FindFirstFileA,GetLastError,2_2_00453238
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00476F44 FindFirstFileA,FindNextFileA,FindClose,2_2_00476F44
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0049AF28 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,2_2_0049AF28
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004650D0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_004650D0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0046554C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_0046554C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00463B44 FindFirstFileA,FindNextFileA,FindClose,2_2_00463B44
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10003AF0 FtpSetCurrentDirectoryA,FtpFindFirstFileA,InternetFindNextFileA,InternetFindNextFileA,InternetCloseHandle,2_2_10003AF0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10002AA0 GetTickCount,GetTickCount,GetTickCount,InternetReadFile,_fwrite,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,2_2_10002AA0
    Source: Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380817518.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmp, idp.dll.2.drString found in binary or memory: http://bitbucket.org/mitrich_k/inno-download-plugin
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380817518.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380227053.000000000018F000.00000004.00000010.00020000.00000000.sdmp, idp.dll.2.drString found in binary or memory: http://mitrichsoftware.wordpress.comB
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: Setup_DigiSignerOne_x86.tmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000000.2124626293.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://www.innosetup.com/
    Source: Setup_DigiSignerOne_x86.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
    Source: Setup_DigiSignerOne_x86.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000000.2124626293.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000000.2124626293.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Setup_DigiSignerOne_x86.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00424014 NtdllDefWindowProc_A,2_2_00424014
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00412A68 NtdllDefWindowProc_A,2_2_00412A68
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0047AC34 NtdllDefWindowProc_A,2_2_0047AC34
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042FA00 NtdllDefWindowProc_A,2_2_0042FA00
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00457E24 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,2_2_00457E24
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042EDC4: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,2_2_0042EDC4
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00409920 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409920
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00455E14 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_00455E14
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_004088C00_2_004088C0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004908302_2_00490830
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004688B82_2_004688B8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00482CD82_2_00482CD8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004357B82_2_004357B8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004720902_2_00472090
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004521942_2_00452194
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0043E2402_2_0043E240
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0043083C2_2_0043083C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0046A9742_2_0046A974
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004449B82_2_004449B8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00434AB42_2_00434AB4
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00444F602_2_00444F60
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0048908C2_2_0048908C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004313C82_2_004313C8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004456582_2_00445658
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0045F9542_2_0045F954
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00445A642_2_00445A64
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0045BA042_2_0045BA04
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00489FEC2_2_00489FEC
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001B3122_2_1001B312
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_100253932_2_10025393
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001D3C62_2_1001D3C6
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_100195AB2_2_100195AB
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001D8992_2_1001D899
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_100258D52_2_100258D5
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001DC6D2_2_1001DC6D
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10025F992_2_10025F99
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001E0792_2_1001E079
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001A0D22_2_1001A0D2
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001E4992_2_1001E499
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_100189802_2_10018980
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10002AA02_2_10002AA0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10026C922_2_10026C92
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10024E512_2_10024E51
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00453B40 appears 97 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 10005410 appears 31 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 10018920 appears 42 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 004462C4 appears 45 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00407D84 appears 43 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 0040909C appears 45 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 0040596C appears 114 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 004587AC appears 84 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00403400 appears 62 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 004585A0 appears 124 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00406F54 appears 45 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00403494 appears 84 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00446594 appears 58 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 0040357C appears 34 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 004349CC appears 32 times
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: String function: 00403684 appears 233 times
    Source: Setup_DigiSignerOne_x86.exeStatic PE information: invalid certificate
    Source: Setup_DigiSignerOne_x86.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: Setup_DigiSignerOne_x86.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: Setup_DigiSignerOne_x86.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Setup_DigiSignerOne_x86.exe
    Source: Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs Setup_DigiSignerOne_x86.exe
    Source: Setup_DigiSignerOne_x86.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: classification engineClassification label: mal48.troj.winEXE@3/4@0/0
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00409920 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409920
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00455E14 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_00455E14
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0045663C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,2_2_0045663C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00456E68 CoCreateInstance,CoCreateInstance,SysFreeString,SysFreeString,2_2_00456E68
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_0040A10C FindResourceA,SizeofResource,LoadResource,LockResource,0_2_0040A10C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeFile created: C:\Users\user\AppData\Local\Temp\is-EFV01.tmpJump to behavior
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
    Source: Setup_DigiSignerOne_x86.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
    Source: Setup_DigiSignerOne_x86.exeString found in binary or memory: /LOADINF="filename"
    Source: Setup_DigiSignerOne_x86.exeString found in binary or memory: q-aDD
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeFile read: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe "C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe"
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeProcess created: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp "C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp" /SL5="$203D4,33657605,58368,C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe"
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeProcess created: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp "C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp" /SL5="$203D4,33657605,58368,C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe" Jump to behavior
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpWindow found: window name: TSelectLanguageFormJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Setup_DigiSignerOne_x86.exeStatic file information: File size 33922936 > 1048576
    Source: Setup_DigiSignerOne_x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: f:\mydev\inno-download-plugin\ansi\idp.pdb source: Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380817518.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380227053.000000000018F000.00000004.00000010.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmp, idp.dll.2.dr
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00450A28 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00450A28
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00406A50 push 00406A8Dh; ret 0_2_00406A85
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_004093EC push 0040941Fh; ret 0_2_00409417
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_004085B8 push ecx; mov dword ptr [esp], eax0_2_004085BD
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00409DDC push 00409E19h; ret 2_2_00409E11
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0041A0B8 push ecx; mov dword ptr [esp], ecx2_2_0041A0BD
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00452194 push ecx; mov dword ptr [esp], eax2_2_00452199
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004062CC push ecx; mov dword ptr [esp], eax2_2_004062CD
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0040A2DF push ds; ret 2_2_0040A2E0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004605AC push ecx; mov dword ptr [esp], ecx2_2_004605B0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00458848 push 00458880h; ret 2_2_00458878
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00410970 push ecx; mov dword ptr [esp], edx2_2_00410975
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00412DB8 push 00412E1Bh; ret 2_2_00412E13
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0040D2C8 push ecx; mov dword ptr [esp], edx2_2_0040D2CA
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0040546D push eax; ret 2_2_004054A9
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0040553D push 00405749h; ret 2_2_00405741
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004055BE push 00405749h; ret 2_2_00405741
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0040563B push 00405749h; ret 2_2_00405741
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004056A0 push 00405749h; ret 2_2_00405741
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0040F828 push ecx; mov dword ptr [esp], edx2_2_0040F82A
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00443930 push ecx; mov dword ptr [esp], ecx2_2_00443934
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00487AF0 push ecx; mov dword ptr [esp], ecx2_2_00487AF5
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00459B60 push 00459BA4h; ret 2_2_00459B9C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00497B18 push ecx; mov dword ptr [esp], ecx2_2_00497B1D
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00479C7C push ecx; mov dword ptr [esp], edx2_2_00479C7D
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00451FD0 push 00452003h; ret 2_2_00451FFB
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10016695 push ecx; ret 2_2_100166A8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpFile created: C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeFile created: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpFile created: C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\idp.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042409C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,2_2_0042409C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042409C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,2_2_0042409C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00422CEC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,2_2_00422CEC
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0041815E IsIconic,SetWindowPos,2_2_0041815E
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00418160 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,2_2_00418160
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042466C IsIconic,SetActiveWindow,SetFocus,2_2_0042466C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00424624 IsIconic,SetActiveWindow,2_2_00424624
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00418814 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,2_2_00418814
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042F75C IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,2_2_0042F75C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00417A28 IsIconic,GetCapture,2_2_00417A28
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00485CFC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,2_2_00485CFC
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0041F5A8 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_0041F5A8
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\idp.dllJump to dropped file
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5926
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00453238 FindFirstFileA,GetLastError,2_2_00453238
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00476F44 FindFirstFileA,FindNextFileA,FindClose,2_2_00476F44
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0049AF28 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,2_2_0049AF28
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_004650D0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_004650D0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0046554C SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,2_2_0046554C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00463B44 FindFirstFileA,FindNextFileA,FindClose,2_2_00463B44
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10003AF0 FtpSetCurrentDirectoryA,FtpFindFirstFileA,InternetFindNextFileA,InternetFindNextFileA,InternetCloseHandle,2_2_10003AF0
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_0040A050 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_0040A050
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeAPI call chain: ExitProcess graph end nodegraph_0-6946
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpAPI call chain: ExitProcess graph end nodegraph_2-73641
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_100140F3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_100140F3
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00450A28 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00450A28
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001F23F GetProcessHeap,___initmbctable,GetModuleFileNameA,_parse_cmdline,__malloc_crt,_parse_cmdline,2_2_1001F23F
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10017458 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_10017458
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001F575 SetUnhandledExceptionFilter,__encode_pointer,2_2_1001F575
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001F597 __decode_pointer,SetUnhandledExceptionFilter,2_2_1001F597
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_100140F3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_100140F3
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_1001449E _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_1001449E
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0047A678 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,2_2_0047A678
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042F294 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,2_2_0042F294
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_0042E52C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,2_2_0042E52C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_10023C59 cpuid 2_2_10023C59
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: GetLocaleInfoA,0_2_00405694
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: GetLocaleInfoA,0_2_004056E0
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,2_2_004089F8
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,2_2_00408A44
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,2_2_1001D1E3
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,2_2_1001CCC9
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,2_2_1001D083
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_1001D142
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_1001D1A7
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,2_2_10023622
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,_xtoa_s@20,2_2_10023849
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,__alloca_probe_16,_malloc,GetLocaleInfoA,MultiByteToWideChar,__freea,2_2_1002391B
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoW_stat,2_2_10023A56
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,2_2_10023A91
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,2_2_10023BCE
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,2_2_1001BF7D
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,2_2_1002032C
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,2_2_1001C5D9
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoA,2_2_10020612
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,2_2_1001C82A
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,2_2_10016C3A
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _LcidFromHexString,GetLocaleInfoA,2_2_1001CDAB
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,2_2_1001CE41
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: _LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,2_2_1001CEB3
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00458E58 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,2_2_00458E58
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
    Source: C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmpCode function: 2_2_00455DCC GetUserNameA,2_2_00455DCC
    Source: C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exeCode function: 0_2_00404654 GetModuleHandleA,GetVersion,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDEPPolicy,0_2_00404654

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Setup_DigiSignerOne_x86.exe, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Setup_DigiSignerOne_x86.exe, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts2
    Native API
    Boot or Logon Initialization Scripts1
    Access Token Manipulation
    1
    Access Token Manipulation
    LSASS Memory2
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
    Process Injection
    2
    Process Injection
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    NTDS1
    Account Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets3
    System Owner/User Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Setup_DigiSignerOne_x86.exe0%ReversingLabs
    Setup_DigiSignerOne_x86.exe1%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\_isetup\_setup64.tmp0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\idp.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp3%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.innosetup.com/0%URL Reputationsafe
    http://www.remobjects.com/psU0%URL Reputationsafe
    http://www.remobjects.com/psU0%URL Reputationsafe
    http://www.remobjects.com/ps0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.innosetup.com/Setup_DigiSignerOne_x86.tmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000000.2124626293.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Setup_DigiSignerOne_x86.tmp.0.drfalse
    • URL Reputation: safe
    unknown
    http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetup_DigiSignerOne_x86.exefalse
      unknown
      http://www.remobjects.com/psUSetup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000000.2124626293.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Setup_DigiSignerOne_x86.tmp.0.drfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://bitbucket.org/mitrich_k/inno-download-pluginSetup_DigiSignerOne_x86.tmp, 00000002.00000002.3380817518.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmp, idp.dll.2.drfalse
        unknown
        http://www.remobjects.com/psSetup_DigiSignerOne_x86.exe, 00000000.00000003.2123662923.0000000002390000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.exe, 00000000.00000003.2124145029.0000000002090000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000000.2124626293.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Setup_DigiSignerOne_x86.tmp.0.drfalse
        • URL Reputation: safe
        unknown
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSetup_DigiSignerOne_x86.exefalse
          unknown
          http://mitrichsoftware.wordpress.comBSetup_DigiSignerOne_x86.tmp, 00000002.00000002.3380817518.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmp, Setup_DigiSignerOne_x86.tmp, 00000002.00000002.3380227053.000000000018F000.00000004.00000010.00020000.00000000.sdmp, idp.dll.2.drfalse
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1544225
            Start date and time:2024-10-29 04:11:38 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 20s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Setup_DigiSignerOne_x86.exe
            Detection:MAL
            Classification:mal48.troj.winEXE@3/4@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 95%
            • Number of executed functions: 117
            • Number of non-executed functions: 225
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\idp.dll66BF743BABAD7405D2426B25BF8D1BB493F6D9048B55E.exeGet hashmaliciousRaccoon Stealer v2, RedLine, SmokeLoader, Socelars, onlyLoggerBrowse
              wXPMoK0v34.exeGet hashmaliciousCrypto Miner, Diablo Miner, GMiner, Njrat, XmrigBrowse
                wXPMoK0v34.exeGet hashmaliciousCrypto Miner, Diablo Miner, GMiner, Njrat, XmrigBrowse
                  273F433BA1CEBFAD830E52490A04CA744351FC4624928.exeGet hashmaliciousPrivateLoader, RedLine, SocelarsBrowse
                    https://files.jalinga.com/builds/releases/jalinga_studio.4.0.2040.0.exeGet hashmaliciousUnknownBrowse
                      B07BE8360DD11E81F6830AE467BEC71CB6058523B3594.exeGet hashmaliciousNymaim, RedLine, Socelars, onlyLoggerBrowse
                        DvuGZ73eK1.exeGet hashmaliciousFabookie, Nymaim, RedLine, SmokeLoader, Socelars, onlyLoggerBrowse
                          https://innov8site.com/kcs/pub/speid_setup_10_head_11-07-2022-4-00-PM_signed.exeGet hashmaliciousUnknownBrowse
                            https://innov8site.com/kcs/pub/speid_setup_10_head_11-07-2022-4-00-PM_signed.exeGet hashmaliciousUnknownBrowse
                              0CC82EBA0F92824807ACFEC362E96C2933CB894E9A220.exeGet hashmaliciousNymaim, Raccoon, RedLine, Socelars, onlyLoggerBrowse
                                C:\Users\user\AppData\Local\Temp\is-98MUO.tmp\_isetup\_setup64.tmpXS_Trade_AI-newest_release_.exeGet hashmaliciousLummaCBrowse
                                  Reminder.exeGet hashmaliciousAmadeyBrowse
                                    Reminder.exeGet hashmaliciousAmadeyBrowse
                                      Reminder.exeGet hashmaliciousAmadeyBrowse
                                        yM3BrI8G1EGet hashmaliciousUnknownBrowse
                                          MDE_File_Sample_7046d0b264f80a016ec10158377c7e76c395cffb.zipGet hashmaliciousXmrigBrowse
                                            Reminder.exeGet hashmaliciousAmadeyBrowse
                                              Reminder.exeGet hashmaliciousAmadeyBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  https://s3.us-east-2.amazonaws.com/revealedgceconomies/vdiq197yvi/ImgBurn_822881.exe?Get hashmaliciousUnknownBrowse
                                                    Process:C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp
                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):6144
                                                    Entropy (8bit):4.720366600008286
                                                    Encrypted:false
                                                    SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                    MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                    SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                    SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                    SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: XS_Trade_AI-newest_release_.exe, Detection: malicious, Browse
                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                    • Filename: yM3BrI8G1E, Detection: malicious, Browse
                                                    • Filename: MDE_File_Sample_7046d0b264f80a016ec10158377c7e76c395cffb.zip, Detection: malicious, Browse
                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                    • Filename: Reminder.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: , Detection: malicious, Browse
                                                    Reputation:high, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):221184
                                                    Entropy (8bit):6.433227377923997
                                                    Encrypted:false
                                                    SSDEEP:3072:3kdYM0KYqpvmSM0IKNDe/zmNDNRpGFRMlCP7mYYY5Qt1reJbTg/knAD:UsKFrM7CNocNNreJb0/F
                                                    MD5:B37377D34C8262A90FF95A9A92B65ED8
                                                    SHA1:FAEEF415BD0BC2A08CF9FE1E987007BF28E7218D
                                                    SHA-256:E5A0AD2E37DDE043A0DD4AD7634961FF3F0D70E87D2DB49761EB4C1F468BB02F
                                                    SHA-512:69D8DA5B45D9B4B996D32328D3402FA37A3D710564D47C474BF9E15C1E45BC15B2858DBAB446E6BAEC0C099D99007FF1099E9C4E66CFD1597F28C420BB50FDCC
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: 66BF743BABAD7405D2426B25BF8D1BB493F6D9048B55E.exe, Detection: malicious, Browse
                                                    • Filename: wXPMoK0v34.exe, Detection: malicious, Browse
                                                    • Filename: wXPMoK0v34.exe, Detection: malicious, Browse
                                                    • Filename: 273F433BA1CEBFAD830E52490A04CA744351FC4624928.exe, Detection: malicious, Browse
                                                    • Filename: , Detection: malicious, Browse
                                                    • Filename: B07BE8360DD11E81F6830AE467BEC71CB6058523B3594.exe, Detection: malicious, Browse
                                                    • Filename: DvuGZ73eK1.exe, Detection: malicious, Browse
                                                    • Filename: , Detection: malicious, Browse
                                                    • Filename: , Detection: malicious, Browse
                                                    • Filename: 0CC82EBA0F92824807ACFEC362E96C2933CB894E9A220.exe, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;...;...;....B.......B.......B.........2...;.......B..7....B..:....B..:....B..:...Rich;...........PE..L.....W...........!................ea..............................................@.......................................0...d....@.......................P......p..................................@............................................text...y}.......................... ..`.rdata..Jl.......p..................@..@.data...`9....... ..................@....rsrc........@....... ..............@..@.reloc...+...P...0...0..............@..B................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp
                                                    File Type:PC bitmap, Windows 3.x format, 40 x 33 x 24, image size 3962, resolution 11811 x 11811 px/m, cbSize 4016, bits offset 54
                                                    Category:dropped
                                                    Size (bytes):4016
                                                    Entropy (8bit):4.162987726623242
                                                    Encrypted:false
                                                    SSDEEP:48:XOjDD6IQs0ganRAwa5dDkKEUSs+Daymn51rOXxYSziPk6QBn:ejrQjgaRfidDkKAs+DaymvrOXGQBn
                                                    MD5:ED546799773B5C9DFDEEF22A5F847B4D
                                                    SHA1:B19108C9B3F5113E022D7B0D0314E90B74EE0096
                                                    SHA-256:1E5FCFEA56F8EEB6889B2A748BC3946BA8D550D78C2D7902F7FBEEE207F163A9
                                                    SHA-512:68DDCDF3288ED61C76A76C1CB217E55917ECB995F4567FF42B63E63AF1DEC7F931029AE2DD176F24FB138A52F2FDD7BA75036DA6C431E4420781A4218C1A9E57
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:BM........6...(...(...!...........z...#...#......................................................................................................................................................................................................................................................................................................xm.]O.L=.M>.^Q.zo.............................................................................................RE.%.....!..1!.=..=..0 . .....&..XK...............................................................................VI....$..<-.@1.?0.?0.?0.?0.?0.?0.@1.<,.!.....^Q......................................................................%.....?0.A2.?0.?0.?0.?0.?0.?0.?0.?0.?0.?0.A2.>/....'....................................................................*..@1.<-.<-.<-.<-.<-.<-.<-.<-.<-.=..?0.?0.?0.?0.C4.).................................................................3#.8).'..'..'..'..'..'..'..'..'..'..$.....#..9*.B3.?0.C4.+........................
                                                    Process:C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):723944
                                                    Entropy (8bit):6.530436054106211
                                                    Encrypted:false
                                                    SSDEEP:12288:kqIRz+f+ui8TrPO37fzH4A63RRwDFtuXUZERmhrNh4dT9TaC+IGNbDtQPuFyxyRB:JIZg+uiirPO37fzH4A6haDbcUZEbdT9A
                                                    MD5:B94E2647AD7D4E5AC3FEA70870F1DD05
                                                    SHA1:EC37C4E5A750B3AAFEFDAFD8B18EDF9CA8EA29A1
                                                    SHA-256:83ABBE5AAB75D0E15D099F5BB3BACBF154BFD673B5A93F7762070DD123E19911
                                                    SHA-512:344C67842161430F1F0C9875685EAC5F1E45EE9ED1528BFD0A00AE920087CFC19D4D8A33C54D6955D84EC250D24A239D97B330DBC7BD69650D2132D7DFEE297F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Reputation:low
                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................,.............@.................................o.....@......@..............................2&...........................................................@......................................................CODE....p........................... ..`DATA....D...........................@...BSS......................................idata..2&.......(..................@....tls.........0...........................rdata.......@......................@..P.reloc.. ....P......................@..P.rsrc...............................@..P....................................@..P........................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.99992284931637
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 98.86%
                                                    • Inno Setup installer (109748/4) 1.08%
                                                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    File name:Setup_DigiSignerOne_x86.exe
                                                    File size:33'922'936 bytes
                                                    MD5:f719502fa0580f2cfa1a6b799c4bd28d
                                                    SHA1:63449f28a29129c23b16c7496c5748b2c1c1eb3f
                                                    SHA256:4a6f4f683ba2d306c83c8690488332ef95f9682b1f129aed07d3512131a76dc9
                                                    SHA512:8f99bf1c2c942fc9f4d0a3e8d46f34e5c6227e8a704ccadf1a108a6a55906ec7303a8c9a093efa09d85802eb50f1a28b6d3cd752ab589e65f80aeb6607b9280c
                                                    SSDEEP:786432:E2eyVvYtzISiojT5PgcZQU059nXLAh7WRinvhyMQA9ieYDkVd:947imQU055XEh7KgQs/YQVd
                                                    TLSH:D7773362902F5AD3E054FAFD3E4ABD724BB7FECF3AE8912AC52815E1159B027744C610
                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                    Icon Hash:2d2e3797b32b2b99
                                                    Entrypoint:0x40aad0
                                                    Entrypoint Section:CODE
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:1
                                                    OS Version Minor:0
                                                    File Version Major:1
                                                    File Version Minor:0
                                                    Subsystem Version Major:1
                                                    Subsystem Version Minor:0
                                                    Import Hash:2fb819a19fe4dee5c03e8c6a79342f79
                                                    Signature Valid:false
                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                    Signature Validation Error:A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file
                                                    Error Number:-2146762495
                                                    Not Before, Not After
                                                    • 13/12/2023 01:00:00 13/12/2026 00:59:59
                                                    Subject Chain
                                                    • CN=DigiSign SA, O=DigiSign SA, L=Bucuresti, C=RO, SERIALNUMBER=J40/8069/2005, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RO
                                                    Version:3
                                                    Thumbprint MD5:A9A7C1378F94F4D1126AAE61B71F4883
                                                    Thumbprint SHA-1:E6919509374FB0BFF0E6A7CB70D6243EFC290A7E
                                                    Thumbprint SHA-256:FCCFBA3B2589EF0CDF9FD20795AD565C185A03F0F4575BE421EAC7B771496E66
                                                    Serial:0D683014108874A2056550C00B18D543
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    add esp, FFFFFFC4h
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    xor eax, eax
                                                    mov dword ptr [ebp-10h], eax
                                                    mov dword ptr [ebp-24h], eax
                                                    call 00007F418CFF155Bh
                                                    call 00007F418CFF2762h
                                                    call 00007F418CFF2AC9h
                                                    call 00007F418CFF2F1Ch
                                                    call 00007F418CFF4EBBh
                                                    call 00007F418CFF7852h
                                                    call 00007F418CFF79B9h
                                                    xor eax, eax
                                                    push ebp
                                                    push 0040B1A1h
                                                    push dword ptr fs:[eax]
                                                    mov dword ptr fs:[eax], esp
                                                    xor edx, edx
                                                    push ebp
                                                    push 0040B16Ah
                                                    push dword ptr fs:[edx]
                                                    mov dword ptr fs:[edx], esp
                                                    mov eax, dword ptr [0040D014h]
                                                    call 00007F418CFF848Bh
                                                    call 00007F418CFF8076h
                                                    cmp byte ptr [0040C234h], 00000000h
                                                    je 00007F418CFF8F6Eh
                                                    call 00007F418CFF8588h
                                                    xor eax, eax
                                                    call 00007F418CFF2251h
                                                    lea edx, dword ptr [ebp-10h]
                                                    xor eax, eax
                                                    call 00007F418CFF54CBh
                                                    mov edx, dword ptr [ebp-10h]
                                                    mov eax, 0040DE30h
                                                    call 00007F418CFF15F2h
                                                    push 00000002h
                                                    push 00000000h
                                                    push 00000001h
                                                    mov ecx, dword ptr [0040DE30h]
                                                    mov dl, 01h
                                                    mov eax, 00407840h
                                                    call 00007F418CFF5D86h
                                                    mov dword ptr [0040DE34h], eax
                                                    xor edx, edx
                                                    push ebp
                                                    push 0040B122h
                                                    push dword ptr fs:[edx]
                                                    mov dword ptr fs:[edx], esp
                                                    call 00007F418CFF84E6h
                                                    mov dword ptr [0040DE3Ch], eax
                                                    mov eax, dword ptr [0040DE3Ch]
                                                    cmp dword ptr [eax+0Ch], 00000000h
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xe0000x97c.idata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x2c00.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x2058d900x11e8
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x100000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    CODE0x10000xa2080xa40049513e676dadfb3919c4b137dd7c6d66False0.5959413109756098data6.6016742350943245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    DATA0xc0000x2500x4000a7b48e75f6b6ef4a087528fee0d185cFalse0.30859375data2.771347682604831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    BSS0xd0000xe940x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .idata0xe0000x97c0xa00df5f31e62e05c787fd29eed7071bf556False0.41796875data4.486076246232586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .tls0xf0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rdata0x100000x180x20014dfa4128117e7f94fe2f8d7dea374a0False0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    .reloc0x110000x9200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    .rsrc0x120000x2c000x2c0042d669c3f3a7e7ef3ecc53fc09de0cafFalse0.3352272727272727data4.6025143205091394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x123540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                    RT_ICON0x1247c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                    RT_ICON0x129e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                    RT_ICON0x12ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                    RT_STRING0x135740x2f2data0.35543766578249336
                                                    RT_STRING0x138680x30cdata0.3871794871794872
                                                    RT_STRING0x13b740x2cedata0.42618384401114207
                                                    RT_STRING0x13e440x68data0.75
                                                    RT_STRING0x13eac0xb4data0.6277777777777778
                                                    RT_STRING0x13f600xaedata0.5344827586206896
                                                    RT_RCDATA0x140100x2cdata1.2045454545454546
                                                    RT_GROUP_ICON0x1403c0x3edataEnglishUnited States0.8387096774193549
                                                    RT_VERSION0x1407c0x4f4dataEnglishUnited States0.2894321766561514
                                                    RT_MANIFEST0x145700x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                    DLLImport
                                                    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                    user32.dllMessageBoxA
                                                    oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                    kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetUserDefaultLangID, GetSystemInfo, GetSystemDirectoryA, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                    user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                    comctl32.dllInitCommonControls
                                                    advapi32.dllAdjustTokenPrivileges
                                                    Language of compilation systemCountry where language is spokenMap
                                                    DutchNetherlands
                                                    EnglishUnited States
                                                    No network behavior found

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:23:12:27
                                                    Start date:28/10/2024
                                                    Path:C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe"
                                                    Imagebase:0x400000
                                                    File size:33'922'936 bytes
                                                    MD5 hash:F719502FA0580F2CFA1A6B799C4BD28D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:2
                                                    Start time:23:12:28
                                                    Start date:28/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-EFV01.tmp\Setup_DigiSignerOne_x86.tmp" /SL5="$203D4,33657605,58368,C:\Users\user\Desktop\Setup_DigiSignerOne_x86.exe"
                                                    Imagebase:0x400000
                                                    File size:723'944 bytes
                                                    MD5 hash:B94E2647AD7D4E5AC3FEA70870F1DD05
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 3%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:22%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:8%
                                                      Total number of Nodes:1571
                                                      Total number of Limit Nodes:16
                                                      execution_graph 6776 408344 6777 40836c VirtualFree 6776->6777 6778 408351 6777->6778 6789 402b48 RaiseException 6790 40294a 6791 402952 6790->6791 6792 403554 4 API calls 6791->6792 6793 402967 6791->6793 6792->6791 6794 403f4a 6795 403f53 6794->6795 6796 403f5c 6794->6796 6798 403f07 6795->6798 6801 403f09 6798->6801 6800 403f3c 6800->6796 6802 403154 4 API calls 6801->6802 6804 403e9c 6801->6804 6808 403f3d 6801->6808 6821 403e9c 6801->6821 6802->6801 6803 403ef2 6807 402674 4 API calls 6803->6807 6804->6800 6804->6803 6810 403ea9 6804->6810 6812 403e8e 6804->6812 6805 403ecf 6805->6796 6807->6805 6808->6796 6810->6805 6811 402674 4 API calls 6810->6811 6811->6805 6813 403e4c 6812->6813 6814 403e67 6813->6814 6815 403e62 6813->6815 6816 403e7b 6813->6816 6819 403e78 6814->6819 6820 402674 4 API calls 6814->6820 6817 403cc8 4 API calls 6815->6817 6818 402674 4 API calls 6816->6818 6817->6814 6818->6819 6819->6803 6819->6810 6820->6819 6822 403ed7 6821->6822 6824 403ea9 6821->6824 6823 403ef2 6822->6823 6826 403e8e 4 API calls 6822->6826 6827 402674 4 API calls 6823->6827 6825 403ecf 6824->6825 6829 402674 4 API calls 6824->6829 6825->6801 6828 403ee6 6826->6828 6827->6825 6828->6823 6828->6824 6829->6825 6413 403a52 6414 403a5a WriteFile 6413->6414 6416 403a74 6413->6416 6415 403a78 GetLastError 6414->6415 6414->6416 6415->6416 6417 402654 6418 403154 4 API calls 6417->6418 6419 402614 6418->6419 6420 402632 6419->6420 6421 403154 4 API calls 6419->6421 6420->6420 6421->6420 6422 409258 6423 40927c 6422->6423 6424 409134 18 API calls 6423->6424 6425 409285 6424->6425 6834 405f5c 6835 405f64 6834->6835 6836 405f6c 6834->6836 6837 405f73 6835->6837 6838 405f6a 6835->6838 6839 405dc8 19 API calls 6837->6839 6841 405ed4 6838->6841 6839->6836 6842 405edc 6841->6842 6843 405ef6 6842->6843 6844 403154 4 API calls 6842->6844 6845 405f12 6843->6845 6846 405efb 6843->6846 6844->6842 6847 403154 4 API calls 6845->6847 6848 405dc8 19 API calls 6846->6848 6849 405f17 6847->6849 6851 405f0e 6848->6851 6850 405e38 33 API calls 6849->6850 6850->6851 6852 403154 4 API calls 6851->6852 6853 405f40 6852->6853 6854 403154 4 API calls 6853->6854 6855 405f4e 6854->6855 6855->6836 6426 402e64 6427 402e69 6426->6427 6428 402e7a RtlUnwind 6427->6428 6429 402e5e 6427->6429 6430 402e9d 6428->6430 6856 40b16f 6865 409bd4 6856->6865 6859 402f24 5 API calls 6860 40b179 6859->6860 6861 403198 4 API calls 6860->6861 6862 40b198 6861->6862 6863 403198 4 API calls 6862->6863 6864 40b1a0 6863->6864 6874 405b34 6865->6874 6867 409c1d 6870 403198 4 API calls 6867->6870 6868 409bef 6868->6867 6880 4076c0 6868->6880 6871 409c32 6870->6871 6871->6859 6872 409c0d 6873 409c15 MessageBoxA 6872->6873 6873->6867 6875 403154 4 API calls 6874->6875 6876 405b39 6875->6876 6877 405b51 6876->6877 6878 403154 4 API calls 6876->6878 6877->6868 6879 405b47 6878->6879 6879->6868 6881 405b34 4 API calls 6880->6881 6882 4076cf 6881->6882 6883 4076e3 6882->6883 6884 4076d5 6882->6884 6887 4076f3 6883->6887 6889 4076ff 6883->6889 6885 40322c 4 API calls 6884->6885 6886 4076e1 6885->6886 6886->6872 6891 407684 6887->6891 6898 4032b8 6889->6898 6892 40322c 4 API calls 6891->6892 6893 407693 6892->6893 6894 4076b0 6893->6894 6895 406dd8 CharPrevA 6893->6895 6894->6886 6896 40769f 6895->6896 6896->6894 6897 4032fc 18 API calls 6896->6897 6897->6894 6899 403278 18 API calls 6898->6899 6900 4032c2 6899->6900 6900->6886 6224 407a78 SetFilePointer 6225 407aab 6224->6225 6226 407a9b GetLastError 6224->6226 6226->6225 6227 407aa4 6226->6227 6228 407940 35 API calls 6227->6228 6228->6225 6905 40af7a 6906 40afaa 6905->6906 6907 40afb4 CreateWindowExA SetWindowLongA 6906->6907 6908 40561c 33 API calls 6907->6908 6909 40b037 6908->6909 6910 4032fc 18 API calls 6909->6910 6911 40b045 6910->6911 6912 4032fc 18 API calls 6911->6912 6913 40b052 6912->6913 6914 407004 19 API calls 6913->6914 6915 40b05e 6914->6915 6916 4032fc 18 API calls 6915->6916 6917 40b067 6916->6917 6918 409ec4 43 API calls 6917->6918 6919 40b079 6918->6919 6920 409da4 19 API calls 6919->6920 6921 40b08c 6919->6921 6920->6921 6922 40b0c5 6921->6922 6923 4099b0 9 API calls 6921->6923 6924 40b0de 6922->6924 6927 40b0d8 RemoveDirectoryA 6922->6927 6923->6922 6925 40b0f2 6924->6925 6926 40b0e7 DestroyWindow 6924->6926 6928 40b11a 6925->6928 6929 40357c 4 API calls 6925->6929 6926->6925 6927->6924 6930 40b110 6929->6930 6931 4025ac 4 API calls 6930->6931 6931->6928 6932 407b7c WriteFile 6933 407ba3 6932->6933 6934 407b9c 6932->6934 6936 407bb4 6933->6936 6937 4078a0 34 API calls 6933->6937 6935 407940 35 API calls 6934->6935 6935->6933 6937->6936 6938 403f7d 6939 403fa2 6938->6939 6942 403f84 6938->6942 6941 403e8e 4 API calls 6939->6941 6939->6942 6940 403f8c 6941->6942 6942->6940 6943 402674 4 API calls 6942->6943 6944 403fca 6943->6944 6945 403d02 6947 403d12 6945->6947 6946 403ddf ExitProcess 6947->6946 6948 403db8 6947->6948 6951 403dea 6947->6951 6954 403da4 6947->6954 6955 403d8f MessageBoxA 6947->6955 6949 403cc8 4 API calls 6948->6949 6950 403dc2 6949->6950 6952 403cc8 4 API calls 6950->6952 6953 403dcc 6952->6953 6965 4019dc 6953->6965 6961 403fe4 6954->6961 6955->6948 6957 403dd1 6957->6946 6957->6951 6962 403fe8 6961->6962 6963 403f07 4 API calls 6962->6963 6964 404006 6963->6964 6966 401abb 6965->6966 6967 4019ed 6965->6967 6966->6957 6968 401a04 RtlEnterCriticalSection 6967->6968 6969 401a0e LocalFree 6967->6969 6968->6969 6970 401a41 6969->6970 6971 401a2f VirtualFree 6970->6971 6972 401a49 6970->6972 6971->6970 6973 401a70 LocalFree 6972->6973 6974 401a87 6972->6974 6973->6973 6973->6974 6975 401aa9 RtlDeleteCriticalSection 6974->6975 6976 401a9f RtlLeaveCriticalSection 6974->6976 6975->6957 6976->6975 6977 406b04 IsDBCSLeadByte 6978 406b1c 6977->6978 6439 404206 6440 4041cc 6439->6440 6441 40420a 6439->6441 6442 404282 6441->6442 6443 403154 4 API calls 6441->6443 6444 404323 6443->6444 5884 40ad07 5885 409fc0 18 API calls 5884->5885 5886 40ad0c 5885->5886 5887 40ad11 5886->5887 5962 402f24 5886->5962 5921 409e14 5887->5921 5890 40ad69 5926 4026c4 GetSystemTime 5890->5926 5892 40ad16 5892->5890 5967 40928c 5892->5967 5893 40ad6e 5927 409808 5893->5927 5897 4031e8 18 API calls 5899 40ad83 5897->5899 5898 40ad45 5901 40ad4d MessageBoxA 5898->5901 5945 406db0 5899->5945 5901->5890 5903 40ad5a 5901->5903 5970 405cec 5903->5970 5907 406ac0 19 API calls 5908 40adb1 5907->5908 5909 403340 18 API calls 5908->5909 5910 40adbf 5909->5910 5911 4031e8 18 API calls 5910->5911 5912 40adcf 5911->5912 5913 407994 37 API calls 5912->5913 5914 40ae0e 5913->5914 5915 402594 18 API calls 5914->5915 5916 40ae2e 5915->5916 5917 407edc 19 API calls 5916->5917 5918 40ae70 5917->5918 5919 40816c 35 API calls 5918->5919 5920 40ae97 5919->5920 5974 409a14 5921->5974 5926->5893 5930 409828 5927->5930 5931 40984d CreateDirectoryA 5930->5931 5936 40928c 18 API calls 5930->5936 5941 407738 19 API calls 5930->5941 5944 405d18 18 API calls 5930->5944 6052 4071a8 5930->6052 6075 4096fc 5930->6075 6094 40511c 5930->6094 6097 40925c 5930->6097 5932 4098c5 5931->5932 5933 409857 GetLastError 5931->5933 5934 40322c 4 API calls 5932->5934 5933->5930 5935 4098cf 5934->5935 5937 4031b8 4 API calls 5935->5937 5936->5930 5939 4098e9 5937->5939 5940 4031b8 4 API calls 5939->5940 5942 4098f6 5940->5942 5941->5930 5942->5897 5944->5930 6210 406ca8 5945->6210 5948 403454 18 API calls 5949 406dd2 5948->5949 5950 406b48 5949->5950 6215 406d6c 5950->6215 5953 406b86 5955 403454 18 API calls 5953->5955 5954 406b78 5956 403340 18 API calls 5954->5956 5957 406b99 5955->5957 5958 406b84 5956->5958 5959 403340 18 API calls 5957->5959 5960 403198 4 API calls 5958->5960 5959->5958 5961 406bbb 5960->5961 5961->5907 5963 403154 4 API calls 5962->5963 5964 402f29 5963->5964 6221 402bcc 5964->6221 5966 402f51 5966->5966 5968 40925c 18 API calls 5967->5968 5969 4092a8 5968->5969 5969->5898 5971 405cf1 5970->5971 5972 405dc8 19 API calls 5971->5972 5973 405d03 5972->5973 5973->5973 5981 409a33 5974->5981 5975 409a68 5977 409a75 GetUserDefaultLangID 5975->5977 5982 409a6a 5975->5982 5976 409a6c 5992 4074d8 GetModuleHandleA GetProcAddress 5976->5992 5977->5982 5980 409a47 5986 409da4 5980->5986 5981->5975 5981->5976 5981->5980 5982->5980 5983 409aa3 GetACP 5982->5983 5984 409ac7 5982->5984 5983->5980 5983->5982 5984->5980 5985 409aed GetACP 5984->5985 5985->5980 5985->5984 5987 409de6 5986->5987 5988 409dac 5986->5988 5987->5892 5988->5987 5989 403420 18 API calls 5988->5989 5990 409de0 5989->5990 6036 409334 5990->6036 5993 407512 5992->5993 5994 40751b 5992->5994 6002 403198 4 API calls 5993->6002 5995 407524 5994->5995 5996 40755c 5994->5996 6013 40741c 5995->6013 5997 40741c RegOpenKeyExA 5996->5997 5999 407575 5997->5999 6001 407592 5999->6001 6003 407410 20 API calls 5999->6003 6000 40753d 6000->6001 6016 407410 6000->6016 6004 40322c 4 API calls 6001->6004 6007 4075d4 6002->6007 6008 407589 RegCloseKey 6003->6008 6009 40759f 6004->6009 6010 403198 4 API calls 6007->6010 6008->6001 6011 4032fc 18 API calls 6009->6011 6012 4075dc 6010->6012 6011->5993 6012->5982 6014 407427 6013->6014 6015 40742d RegOpenKeyExA 6013->6015 6014->6015 6015->6000 6019 4072c4 6016->6019 6020 4072ea RegQueryValueExA 6019->6020 6021 40730d 6020->6021 6026 40732f 6020->6026 6023 407327 6021->6023 6021->6026 6027 403278 18 API calls 6021->6027 6028 403420 18 API calls 6021->6028 6022 403198 4 API calls 6024 4073fb RegCloseKey 6022->6024 6025 403198 4 API calls 6023->6025 6024->6001 6025->6026 6026->6022 6027->6021 6029 407364 RegQueryValueExA 6028->6029 6029->6020 6030 407380 6029->6030 6030->6026 6031 4034f0 18 API calls 6030->6031 6032 4073c2 6031->6032 6033 4073d4 6032->6033 6035 403420 18 API calls 6032->6035 6034 4031e8 18 API calls 6033->6034 6034->6026 6035->6033 6037 409342 6036->6037 6039 40935a 6037->6039 6049 4092cc 6037->6049 6040 4092cc 18 API calls 6039->6040 6041 40937e 6039->6041 6040->6041 6042 407dcc InterlockedExchange 6041->6042 6043 409399 6042->6043 6044 4092cc 18 API calls 6043->6044 6046 4093ac 6043->6046 6044->6046 6045 4092cc 18 API calls 6045->6046 6046->6045 6047 403278 18 API calls 6046->6047 6048 4093db 6046->6048 6047->6046 6048->5987 6050 405d18 18 API calls 6049->6050 6051 4092dd 6050->6051 6051->6039 6101 406ee0 6052->6101 6055 4071da 6057 406ee0 19 API calls 6055->6057 6059 407226 6055->6059 6058 4071ea 6057->6058 6060 4071f6 6058->6060 6062 406ebc 21 API calls 6058->6062 6109 406d10 6059->6109 6060->6059 6065 406ee0 19 API calls 6060->6065 6072 40721b 6060->6072 6062->6060 6067 40720f 6065->6067 6066 406ac0 19 API calls 6068 40723b 6066->6068 6070 406ebc 21 API calls 6067->6070 6067->6072 6069 40322c 4 API calls 6068->6069 6071 407245 6069->6071 6070->6072 6073 4031b8 4 API calls 6071->6073 6072->6059 6121 407150 GetWindowsDirectoryA 6072->6121 6074 40725f 6073->6074 6074->5930 6076 40971c 6075->6076 6077 406ac0 19 API calls 6076->6077 6078 409735 6077->6078 6079 40322c 4 API calls 6078->6079 6080 409740 6079->6080 6081 406e00 20 API calls 6080->6081 6083 4033b4 18 API calls 6080->6083 6084 40928c 18 API calls 6080->6084 6086 405d18 18 API calls 6080->6086 6087 4097bc 6080->6087 6162 409688 6080->6162 6170 4094e8 6080->6170 6081->6080 6083->6080 6084->6080 6086->6080 6088 40322c 4 API calls 6087->6088 6089 4097c7 6088->6089 6090 4031b8 4 API calls 6089->6090 6091 4097e1 6090->6091 6092 403198 4 API calls 6091->6092 6093 4097e9 6092->6093 6093->5930 6095 405630 33 API calls 6094->6095 6096 40513a 6095->6096 6096->5930 6098 40927c 6097->6098 6198 409134 6098->6198 6102 4034f0 18 API calls 6101->6102 6103 406ef3 6102->6103 6104 406f0a GetEnvironmentVariableA 6103->6104 6108 406f1d 6103->6108 6124 4072a0 6103->6124 6104->6103 6105 406f16 6104->6105 6106 403198 4 API calls 6105->6106 6106->6108 6108->6055 6118 406ebc 6108->6118 6110 403414 6109->6110 6111 406d33 GetFullPathNameA 6110->6111 6112 406d56 6111->6112 6113 406d3f 6111->6113 6114 40322c 4 API calls 6112->6114 6113->6112 6115 406d47 6113->6115 6116 406d54 6114->6116 6117 403278 18 API calls 6115->6117 6116->6066 6117->6116 6128 406e64 6118->6128 6122 405268 18 API calls 6121->6122 6123 407171 6122->6123 6123->6059 6125 4072ae 6124->6125 6126 4034f0 18 API calls 6125->6126 6127 4072bc 6126->6127 6127->6103 6135 406e00 6128->6135 6130 406e86 6131 406e8e GetFileAttributesA 6130->6131 6132 406ea3 6131->6132 6133 403198 4 API calls 6132->6133 6134 406eab 6133->6134 6134->6055 6145 406bcc 6135->6145 6137 406e38 6140 406e43 6137->6140 6141 406e4e 6137->6141 6139 406e11 6139->6137 6152 406df8 CharPrevA 6139->6152 6143 40322c 4 API calls 6140->6143 6153 403454 6141->6153 6144 406e4c 6143->6144 6144->6130 6149 406bdd 6145->6149 6146 406c41 6147 406b08 IsDBCSLeadByte 6146->6147 6148 406c3c 6146->6148 6147->6148 6148->6139 6149->6146 6150 406bfb 6149->6150 6150->6148 6160 406b08 IsDBCSLeadByte 6150->6160 6152->6139 6154 403486 6153->6154 6155 403459 6153->6155 6156 403198 4 API calls 6154->6156 6155->6154 6158 40346d 6155->6158 6157 40347c 6156->6157 6157->6144 6159 403278 18 API calls 6158->6159 6159->6157 6161 406b1c 6160->6161 6161->6150 6163 403198 4 API calls 6162->6163 6166 4096a9 6163->6166 6167 4096d6 6166->6167 6179 4032a8 6166->6179 6182 403494 6166->6182 6168 403198 4 API calls 6167->6168 6169 4096eb 6168->6169 6169->6080 6186 409424 6170->6186 6172 4094fe 6173 409502 6172->6173 6192 406ed0 6172->6192 6173->6080 6176 409535 6195 409460 6176->6195 6180 403278 18 API calls 6179->6180 6181 4032b5 6180->6181 6181->6166 6183 403498 6182->6183 6185 4034c3 6182->6185 6184 4034f0 18 API calls 6183->6184 6184->6185 6185->6166 6187 409432 6186->6187 6188 40942e 6186->6188 6189 409454 SetLastError 6187->6189 6190 40943b Wow64DisableWow64FsRedirection 6187->6190 6188->6172 6191 40944f 6189->6191 6190->6191 6191->6172 6193 406e64 21 API calls 6192->6193 6194 406eda GetLastError 6193->6194 6194->6176 6196 409465 Wow64RevertWow64FsRedirection 6195->6196 6197 40946f 6195->6197 6196->6197 6197->6080 6199 403198 4 API calls 6198->6199 6209 409165 6198->6209 6199->6209 6200 4031b8 4 API calls 6202 40921d 6200->6202 6201 40917c 6203 4032c4 18 API calls 6201->6203 6202->5930 6204 409186 6203->6204 6206 4032fc 18 API calls 6204->6206 6205 403278 18 API calls 6205->6209 6207 409190 6206->6207 6207->6200 6208 4032fc 18 API calls 6208->6209 6209->6201 6209->6205 6209->6207 6209->6208 6211 406bcc IsDBCSLeadByte 6210->6211 6213 406cbd 6211->6213 6212 406d07 6212->5948 6213->6212 6214 406b08 IsDBCSLeadByte 6213->6214 6214->6213 6216 406d7b 6215->6216 6217 406ca8 IsDBCSLeadByte 6216->6217 6219 406d86 6217->6219 6218 406b72 6218->5953 6218->5954 6219->6218 6220 406b08 IsDBCSLeadByte 6219->6220 6220->6219 6222 402bd5 RaiseException 6221->6222 6223 402be6 6221->6223 6222->6223 6223->5966 6445 402c08 6448 402c82 6445->6448 6449 402c19 6445->6449 6446 402c56 RtlUnwind 6447 403154 4 API calls 6446->6447 6447->6448 6449->6446 6449->6448 6452 402b28 6449->6452 6453 402b31 RaiseException 6452->6453 6454 402b47 6452->6454 6453->6454 6454->6446 6455 403018 6456 403070 6455->6456 6457 403025 6455->6457 6458 40302a RtlUnwind 6457->6458 6459 40304e 6458->6459 6461 402f78 6459->6461 6462 402be8 6459->6462 6463 402bf1 RaiseException 6462->6463 6464 402c04 6462->6464 6463->6464 6464->6456 6991 40b127 6993 40b099 6991->6993 6992 40b0c5 6995 40b0de 6992->6995 6998 40b0d8 RemoveDirectoryA 6992->6998 6993->6992 6994 4099b0 9 API calls 6993->6994 6994->6992 6996 40b0f2 6995->6996 6997 40b0e7 DestroyWindow 6995->6997 6999 40b11a 6996->6999 7000 40357c 4 API calls 6996->7000 6997->6996 6998->6995 7001 40b110 7000->7001 7002 4025ac 4 API calls 7001->7002 7002->6999 6477 403a28 ReadFile 6478 403a46 6477->6478 6479 403a49 GetLastError 6477->6479 6480 40602a 6481 40602c 6480->6481 6482 406068 6481->6482 6483 406062 6481->6483 6484 40607f 6481->6484 6485 405dc8 19 API calls 6482->6485 6483->6482 6486 4060d4 6483->6486 6489 405164 19 API calls 6484->6489 6487 40607b 6485->6487 6488 405e38 33 API calls 6486->6488 6491 403198 4 API calls 6487->6491 6488->6487 6490 4060a8 6489->6490 6492 405e38 33 API calls 6490->6492 6493 40610e 6491->6493 6492->6487 6494 40462b 6495 404638 SetErrorMode 6494->6495 7003 40b12c 7004 40b135 7003->7004 7007 40b160 7003->7007 7013 409920 7004->7013 7006 40b13a 7006->7007 7011 40b158 MessageBoxA 7006->7011 7008 403198 4 API calls 7007->7008 7009 40b198 7008->7009 7010 403198 4 API calls 7009->7010 7012 40b1a0 7010->7012 7011->7007 7014 409987 ExitWindowsEx 7013->7014 7015 40992c GetCurrentProcess OpenProcessToken 7013->7015 7017 40993e 7014->7017 7016 409942 LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 7015->7016 7015->7017 7016->7014 7016->7017 7017->7006 7022 403932 7023 403924 7022->7023 7026 40374c 7023->7026 7025 40392c 7027 403766 7026->7027 7028 403759 7026->7028 7027->7025 7028->7027 7029 403779 VariantClear 7028->7029 7029->7025 6510 409e36 6511 409e38 6510->6511 6512 409e5a 6511->6512 6513 409e76 CallWindowProcA 6511->6513 6513->6512 6518 409e38 6519 409e5a 6518->6519 6521 409e47 6518->6521 6520 409e76 CallWindowProcA 6520->6519 6521->6519 6521->6520 6522 4090c4 6523 4090cb 6522->6523 6524 403198 4 API calls 6523->6524 6534 409165 6524->6534 6525 409190 6526 4031b8 4 API calls 6525->6526 6528 40921d 6526->6528 6527 40917c 6529 4032c4 18 API calls 6527->6529 6530 409186 6529->6530 6532 4032fc 18 API calls 6530->6532 6531 403278 18 API calls 6531->6534 6532->6525 6533 4032fc 18 API calls 6533->6534 6534->6525 6534->6527 6534->6531 6534->6533 6275 4074cb 6276 4074bc SetErrorMode 6275->6276 6535 402ccc 6538 402cfe 6535->6538 6539 402cdd 6535->6539 6536 402d88 RtlUnwind 6537 403154 4 API calls 6536->6537 6537->6538 6539->6536 6539->6538 6540 402b28 RaiseException 6539->6540 6541 402d7f 6540->6541 6541->6536 7040 403fcd 7041 403f07 4 API calls 7040->7041 7042 403fd6 7041->7042 7043 403e9c 4 API calls 7042->7043 7044 403fe2 7043->7044 5129 40aad0 5172 4030dc 5129->5172 5131 40aae6 5175 4042e8 5131->5175 5133 40aaeb 5178 404654 GetModuleHandleA GetVersion 5133->5178 5137 40aaf5 5275 406a50 5137->5275 5139 40aafa 5284 409558 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5139->5284 5146 40ab3d 5312 4070b4 5146->5312 5158 40abe8 5352 407954 5158->5352 5160 40abaa 5160->5158 5392 409fc0 5160->5392 5161 40ac0e 5162 40ac29 5161->5162 5163 409fc0 18 API calls 5161->5163 5356 407edc 5162->5356 5163->5162 5165 40ac4e 5366 408fbc 5165->5366 5169 40accd 5170 408fbc 35 API calls 5171 40ac94 5170->5171 5171->5169 5171->5170 5402 403094 5172->5402 5174 4030e1 GetModuleHandleA GetCommandLineA 5174->5131 5177 404323 5175->5177 5403 403154 5175->5403 5177->5133 5179 4046a5 5178->5179 5180 404685 GetProcAddress 5178->5180 5182 4048d2 GetProcAddress 5179->5182 5183 4046ad GetProcAddress 5179->5183 5180->5179 5181 404696 5180->5181 5181->5179 5184 4048e1 5182->5184 5185 4048e8 GetProcAddress 5182->5185 5186 4046bc 5183->5186 5184->5185 5188 4048f7 SetProcessDEPPolicy 5185->5188 5189 4048fb 5185->5189 5420 4045a0 GetSystemDirectoryA 5186->5420 5188->5189 5416 403198 5189->5416 5191 4031e8 18 API calls 5194 4046d8 5191->5194 5194->5182 5195 40470b 5194->5195 5423 4032fc 5194->5423 5437 40322c 5195->5437 5199 4032fc 18 API calls 5200 404726 5199->5200 5441 4045cc SetErrorMode 5200->5441 5203 40322c 4 API calls 5204 40473c 5203->5204 5205 4032fc 18 API calls 5204->5205 5206 404749 5205->5206 5207 4045cc 2 API calls 5206->5207 5208 404751 5207->5208 5209 40322c 4 API calls 5208->5209 5210 40475f 5209->5210 5211 4032fc 18 API calls 5210->5211 5212 40476c 5211->5212 5213 4045cc 2 API calls 5212->5213 5214 404774 5213->5214 5215 40322c 4 API calls 5214->5215 5216 404782 5215->5216 5217 4032fc 18 API calls 5216->5217 5218 40478f 5217->5218 5219 4045cc 2 API calls 5218->5219 5220 404797 5219->5220 5221 40322c 4 API calls 5220->5221 5222 4047a5 5221->5222 5223 4032fc 18 API calls 5222->5223 5224 4047b2 5223->5224 5225 4045cc 2 API calls 5224->5225 5226 4047ba 5225->5226 5227 40322c 4 API calls 5226->5227 5228 4047c8 5227->5228 5229 4032fc 18 API calls 5228->5229 5230 4047d5 5229->5230 5231 4045cc 2 API calls 5230->5231 5232 4047dd 5231->5232 5233 40322c 4 API calls 5232->5233 5234 4047eb 5233->5234 5235 4032fc 18 API calls 5234->5235 5236 4047f8 5235->5236 5237 4045cc 2 API calls 5236->5237 5238 404800 5237->5238 5239 40322c 4 API calls 5238->5239 5240 40480e 5239->5240 5241 4032fc 18 API calls 5240->5241 5242 40481b 5241->5242 5243 4045cc 2 API calls 5242->5243 5244 404823 5243->5244 5245 40322c 4 API calls 5244->5245 5246 404831 5245->5246 5247 4032fc 18 API calls 5246->5247 5248 40483e 5247->5248 5249 4045cc 2 API calls 5248->5249 5250 404846 5249->5250 5251 40322c 4 API calls 5250->5251 5252 404854 5251->5252 5253 4032fc 18 API calls 5252->5253 5254 404861 5253->5254 5255 4045cc 2 API calls 5254->5255 5256 404869 5255->5256 5257 40322c 4 API calls 5256->5257 5258 404877 5257->5258 5259 4032fc 18 API calls 5258->5259 5260 404884 5259->5260 5261 4045cc 2 API calls 5260->5261 5262 40488c 5261->5262 5263 40322c 4 API calls 5262->5263 5264 40489a 5263->5264 5265 4032fc 18 API calls 5264->5265 5266 4048a7 5265->5266 5267 4045cc 2 API calls 5266->5267 5268 4048af 5267->5268 5269 40322c 4 API calls 5268->5269 5270 4048bd 5269->5270 5271 4032fc 18 API calls 5270->5271 5272 4048ca 5271->5272 5273 4045cc 2 API calls 5272->5273 5273->5182 5274 404aac 6FBE1CD0 5274->5137 5547 406130 5275->5547 5285 4095ad 5284->5285 5653 40717c GetSystemDirectoryA 5285->5653 5289 4095d4 5290 4032fc 18 API calls 5289->5290 5291 4095e1 5290->5291 5666 407454 SetErrorMode 5291->5666 5296 4031b8 4 API calls 5297 409615 5296->5297 5298 40a050 GetSystemInfo VirtualQuery 5297->5298 5299 40a104 5298->5299 5302 40a07a 5298->5302 5304 409c40 5299->5304 5300 40a0e5 VirtualQuery 5300->5299 5300->5302 5301 40a0a4 VirtualProtect 5301->5302 5302->5299 5302->5300 5302->5301 5303 40a0d3 VirtualProtect 5302->5303 5303->5300 5698 407058 GetCommandLineA 5304->5698 5306 409d28 5308 4031b8 4 API calls 5306->5308 5307 4070b4 20 API calls 5311 409c5d 5307->5311 5309 409d42 5308->5309 5309->5146 5382 40a160 5309->5382 5310 403454 18 API calls 5310->5311 5311->5306 5311->5307 5311->5310 5313 4070db GetModuleFileNameA 5312->5313 5314 4070ff GetCommandLineA 5312->5314 5315 403278 18 API calls 5313->5315 5316 407104 5314->5316 5317 4070fd 5315->5317 5318 407109 5316->5318 5319 406f78 18 API calls 5316->5319 5322 407111 5316->5322 5320 40712c 5317->5320 5321 403198 4 API calls 5318->5321 5319->5316 5323 403198 4 API calls 5320->5323 5321->5322 5324 40322c 4 API calls 5322->5324 5325 407141 5323->5325 5324->5320 5326 4031e8 5325->5326 5327 4031ec 5326->5327 5330 4031fc 5326->5330 5329 403254 18 API calls 5327->5329 5327->5330 5328 403228 5332 407994 5328->5332 5329->5330 5330->5328 5331 4025ac 4 API calls 5330->5331 5331->5328 5333 40799e 5332->5333 5719 407a2a 5333->5719 5722 407a2c 5333->5722 5334 4079ca 5335 4079de 5334->5335 5725 407940 GetLastError 5334->5725 5339 40a10c FindResourceA 5335->5339 5340 40a121 5339->5340 5341 40a126 SizeofResource 5339->5341 5342 409fc0 18 API calls 5340->5342 5343 40a133 5341->5343 5344 40a138 LoadResource 5341->5344 5342->5341 5345 409fc0 18 API calls 5343->5345 5346 40a146 5344->5346 5347 40a14b LockResource 5344->5347 5345->5344 5348 409fc0 18 API calls 5346->5348 5349 40a157 5347->5349 5350 40a15c 5347->5350 5348->5347 5351 409fc0 18 API calls 5349->5351 5350->5160 5389 407dcc 5350->5389 5351->5350 5353 407968 5352->5353 5354 407978 5353->5354 5355 4078a0 34 API calls 5353->5355 5354->5161 5355->5354 5357 407ee9 5356->5357 5358 405d18 18 API calls 5357->5358 5359 407f3d 5357->5359 5358->5359 5360 407dcc InterlockedExchange 5359->5360 5361 407f4f 5360->5361 5362 405d18 18 API calls 5361->5362 5363 407f65 5361->5363 5362->5363 5364 407fa8 5363->5364 5365 405d18 18 API calls 5363->5365 5364->5165 5365->5364 5370 408fed 5366->5370 5373 409036 5366->5373 5367 409081 5824 40816c 5367->5824 5369 40816c 35 API calls 5369->5373 5371 4034f0 18 API calls 5370->5371 5370->5373 5376 403420 18 API calls 5370->5376 5378 4031e8 18 API calls 5370->5378 5381 40816c 35 API calls 5370->5381 5371->5370 5372 409098 5375 4031b8 4 API calls 5372->5375 5373->5367 5373->5369 5374 4034f0 18 API calls 5373->5374 5379 403420 18 API calls 5373->5379 5380 4031e8 18 API calls 5373->5380 5374->5373 5377 4090b2 5375->5377 5376->5370 5399 4050a8 5377->5399 5378->5370 5379->5373 5380->5373 5381->5370 5383 40322c 4 API calls 5382->5383 5384 40a183 5383->5384 5385 40a192 MessageBoxA 5384->5385 5386 40a1a7 5385->5386 5387 403198 4 API calls 5386->5387 5388 40a1af 5387->5388 5388->5146 5846 407d78 5389->5846 5393 409fe1 5392->5393 5394 409fc9 5392->5394 5396 405d18 18 API calls 5393->5396 5395 405d18 18 API calls 5394->5395 5397 409fdb 5395->5397 5398 409ff2 5396->5398 5397->5158 5398->5158 5400 402594 18 API calls 5399->5400 5401 4050b3 5400->5401 5401->5171 5402->5174 5404 403164 5403->5404 5405 40318c TlsGetValue 5403->5405 5404->5177 5406 403196 5405->5406 5407 40316f 5405->5407 5406->5177 5411 40310c 5407->5411 5409 403174 TlsGetValue 5410 403184 5409->5410 5410->5177 5412 403120 LocalAlloc 5411->5412 5413 403116 5411->5413 5414 40313e TlsSetValue 5412->5414 5415 403132 5412->5415 5413->5412 5414->5415 5415->5409 5417 4031b7 5416->5417 5418 40319e 5416->5418 5417->5274 5418->5417 5445 4025ac 5418->5445 5449 40458c 5420->5449 5424 403300 5423->5424 5425 40333f 5423->5425 5426 4031e8 5424->5426 5427 40330a 5424->5427 5425->5195 5433 403254 18 API calls 5426->5433 5434 4031fc 5426->5434 5428 403334 5427->5428 5429 40331d 5427->5429 5430 4034f0 18 API calls 5428->5430 5532 4034f0 5429->5532 5436 403322 5430->5436 5431 403228 5431->5195 5433->5434 5434->5431 5435 4025ac 4 API calls 5434->5435 5435->5431 5436->5195 5439 403230 5437->5439 5438 403252 5438->5199 5439->5438 5440 4025ac 4 API calls 5439->5440 5440->5438 5545 403414 5441->5545 5444 40461e 5444->5203 5446 4025ba 5445->5446 5447 4025b0 5445->5447 5446->5417 5446->5446 5447->5446 5448 403154 4 API calls 5447->5448 5448->5446 5452 4032c4 5449->5452 5455 403278 5452->5455 5454 403288 5456 403198 4 API calls 5454->5456 5458 403254 5455->5458 5457 4032a0 5456->5457 5457->5191 5459 403274 5458->5459 5460 403258 5458->5460 5459->5454 5463 402594 5460->5463 5462 403261 5462->5454 5464 402598 5463->5464 5466 4025a2 5463->5466 5469 401fd4 5464->5469 5465 40259e 5465->5466 5467 403154 4 API calls 5465->5467 5466->5462 5466->5466 5467->5466 5470 401fe8 5469->5470 5471 401fed 5469->5471 5480 401918 RtlInitializeCriticalSection 5470->5480 5472 402012 RtlEnterCriticalSection 5471->5472 5474 40201c 5471->5474 5479 401ff1 5471->5479 5472->5474 5474->5479 5487 401ee0 5474->5487 5477 402147 5477->5465 5478 40213d RtlLeaveCriticalSection 5478->5477 5479->5465 5481 40193c RtlEnterCriticalSection 5480->5481 5482 401946 5480->5482 5481->5482 5483 401964 LocalAlloc 5482->5483 5484 40197e 5483->5484 5485 4019c3 RtlLeaveCriticalSection 5484->5485 5486 4019cd 5484->5486 5485->5486 5486->5471 5490 401ef0 5487->5490 5488 401f40 5488->5477 5488->5478 5489 401f1c 5489->5488 5498 401d00 5489->5498 5490->5488 5490->5489 5493 401e58 5490->5493 5502 4016d8 5493->5502 5496 401e75 5496->5490 5499 401d4e 5498->5499 5500 401d1e 5498->5500 5499->5500 5519 401c68 5499->5519 5500->5488 5505 4016f4 5502->5505 5503 401430 LocalAlloc VirtualAlloc VirtualFree 5503->5505 5504 4016fe 5506 4015c4 VirtualAlloc 5504->5506 5505->5503 5505->5504 5507 40175b 5505->5507 5508 40132c LocalAlloc 5505->5508 5510 40174f 5505->5510 5509 40170a 5506->5509 5507->5496 5512 401dcc 5507->5512 5508->5505 5509->5507 5511 40150c VirtualFree 5510->5511 5511->5507 5513 401d80 9 API calls 5512->5513 5514 401de0 5513->5514 5515 40132c LocalAlloc 5514->5515 5516 401df0 5515->5516 5517 401b44 9 API calls 5516->5517 5518 401df8 5516->5518 5517->5518 5518->5496 5520 401c7a 5519->5520 5521 401c9d 5520->5521 5522 401caf 5520->5522 5523 40188c LocalAlloc VirtualFree VirtualFree 5521->5523 5524 40188c LocalAlloc VirtualFree VirtualFree 5522->5524 5525 401cad 5523->5525 5524->5525 5526 401cc5 5525->5526 5527 401b44 9 API calls 5525->5527 5526->5500 5528 401cd4 5527->5528 5529 401cee 5528->5529 5530 401b98 9 API calls 5528->5530 5531 4013a0 LocalAlloc 5529->5531 5530->5529 5531->5526 5533 4034fd 5532->5533 5540 40352d 5532->5540 5534 403526 5533->5534 5537 403509 5533->5537 5538 403254 18 API calls 5534->5538 5535 403198 4 API calls 5536 403517 5535->5536 5536->5436 5541 4025c4 5537->5541 5538->5540 5540->5535 5542 4025ca 5541->5542 5543 4025dc 5542->5543 5544 403154 4 API calls 5542->5544 5543->5536 5544->5543 5546 403418 LoadLibraryA 5545->5546 5546->5444 5619 405dc8 5547->5619 5550 405708 GetSystemDefaultLCID 5554 40573e 5550->5554 5551 405694 19 API calls 5551->5554 5552 4031e8 18 API calls 5552->5554 5553 405164 19 API calls 5553->5554 5554->5551 5554->5552 5554->5553 5558 4057a0 5554->5558 5555 4031e8 18 API calls 5555->5558 5556 405164 19 API calls 5556->5558 5557 405694 19 API calls 5557->5558 5558->5555 5558->5556 5558->5557 5559 405823 5558->5559 5635 4031b8 5559->5635 5562 40584c GetSystemDefaultLCID 5639 405694 GetLocaleInfoA 5562->5639 5565 4031e8 18 API calls 5566 40588c 5565->5566 5567 405694 19 API calls 5566->5567 5568 4058a1 5567->5568 5569 405694 19 API calls 5568->5569 5570 4058c5 5569->5570 5645 4056e0 GetLocaleInfoA 5570->5645 5573 4056e0 GetLocaleInfoA 5574 4058f5 5573->5574 5575 405694 19 API calls 5574->5575 5576 40590f 5575->5576 5577 4056e0 GetLocaleInfoA 5576->5577 5578 40592c 5577->5578 5579 405694 19 API calls 5578->5579 5580 405946 5579->5580 5581 4031e8 18 API calls 5580->5581 5582 405953 5581->5582 5583 405694 19 API calls 5582->5583 5584 405968 5583->5584 5585 4031e8 18 API calls 5584->5585 5586 405975 5585->5586 5587 4056e0 GetLocaleInfoA 5586->5587 5588 405983 5587->5588 5589 405694 19 API calls 5588->5589 5590 40599d 5589->5590 5591 4031e8 18 API calls 5590->5591 5592 4059aa 5591->5592 5593 405694 19 API calls 5592->5593 5594 4059bf 5593->5594 5595 4031e8 18 API calls 5594->5595 5596 4059cc 5595->5596 5597 405694 19 API calls 5596->5597 5598 4059e1 5597->5598 5599 4059fe 5598->5599 5600 4059ef 5598->5600 5602 40322c 4 API calls 5599->5602 5601 40322c 4 API calls 5600->5601 5603 4059fc 5601->5603 5602->5603 5604 405694 19 API calls 5603->5604 5605 405a20 5604->5605 5606 405a3d 5605->5606 5607 405a2e 5605->5607 5609 403198 4 API calls 5606->5609 5608 40322c 4 API calls 5607->5608 5610 405a3b 5608->5610 5609->5610 5647 4033b4 5610->5647 5612 405a5f 5613 4033b4 18 API calls 5612->5613 5614 405a79 5613->5614 5615 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5614->5615 5616 405a93 5615->5616 5617 40617c GetVersionExA 5616->5617 5618 406193 5617->5618 5618->5139 5620 405dd4 5619->5620 5627 405164 LoadStringA 5620->5627 5623 4031e8 18 API calls 5624 405e05 5623->5624 5625 403198 4 API calls 5624->5625 5626 405e1a 5625->5626 5626->5550 5630 403278 5627->5630 5631 403254 18 API calls 5630->5631 5632 403288 5631->5632 5633 403198 4 API calls 5632->5633 5634 4032a0 5633->5634 5634->5623 5636 4031be 5635->5636 5637 4031e3 5636->5637 5638 4025ac 4 API calls 5636->5638 5637->5562 5638->5636 5640 4056bb 5639->5640 5641 4056cd 5639->5641 5642 403278 18 API calls 5640->5642 5643 40322c 4 API calls 5641->5643 5644 4056cb 5642->5644 5643->5644 5644->5565 5646 4056fc 5645->5646 5646->5573 5648 4033bc 5647->5648 5649 403254 18 API calls 5648->5649 5650 4033cf 5649->5650 5651 4031e8 18 API calls 5650->5651 5652 4033f7 5651->5652 5674 405268 5653->5674 5656 406ac0 5657 406aca 5656->5657 5658 406aed 5656->5658 5677 406dd8 5657->5677 5659 40322c 4 API calls 5658->5659 5661 406af6 5659->5661 5661->5289 5662 406ad1 5662->5658 5663 406adc 5662->5663 5682 403340 5663->5682 5665 406aea 5665->5289 5667 403414 5666->5667 5668 40748c LoadLibraryA 5667->5668 5669 4074a2 5668->5669 5670 407738 FormatMessageA 5669->5670 5671 40775e 5670->5671 5672 403278 18 API calls 5671->5672 5673 40777b 5672->5673 5673->5296 5675 4032c4 18 API calls 5674->5675 5676 405277 5675->5676 5676->5656 5678 406de3 5677->5678 5679 406ddf 5677->5679 5697 406df8 CharPrevA 5678->5697 5679->5662 5681 406df4 5681->5662 5683 403344 5682->5683 5684 4033a5 5682->5684 5685 4031e8 5683->5685 5686 40334c 5683->5686 5687 4031fc 5685->5687 5689 403254 18 API calls 5685->5689 5686->5684 5690 4031e8 18 API calls 5686->5690 5692 40335b 5686->5692 5688 403228 5687->5688 5693 4025ac 4 API calls 5687->5693 5688->5665 5689->5687 5690->5692 5691 403254 18 API calls 5694 403375 5691->5694 5692->5691 5693->5688 5695 4031e8 18 API calls 5694->5695 5696 4033a1 5695->5696 5696->5665 5697->5681 5705 406f78 5698->5705 5700 40707b 5701 40708d 5700->5701 5702 406f78 18 API calls 5700->5702 5703 403198 4 API calls 5701->5703 5702->5700 5704 4070a2 5703->5704 5704->5311 5706 406fa4 5705->5706 5707 403278 18 API calls 5706->5707 5708 406fb1 5707->5708 5715 403420 5708->5715 5710 406fb9 5711 4031e8 18 API calls 5710->5711 5712 406fd1 5711->5712 5713 403198 4 API calls 5712->5713 5714 406ff3 5713->5714 5714->5700 5716 403426 5715->5716 5718 403437 5715->5718 5717 403254 18 API calls 5716->5717 5716->5718 5717->5718 5718->5710 5720 407a2c 5719->5720 5721 407a6b CreateFileA 5720->5721 5721->5334 5723 403414 5722->5723 5724 407a6b CreateFileA 5723->5724 5724->5334 5728 4078a0 5725->5728 5729 407738 19 API calls 5728->5729 5730 4078c8 5729->5730 5731 4078e8 5730->5731 5737 40561c 5730->5737 5740 405d18 5731->5740 5734 4078f7 5735 403198 4 API calls 5734->5735 5736 407914 5735->5736 5736->5335 5744 405630 5737->5744 5741 405d1f 5740->5741 5742 4031e8 18 API calls 5741->5742 5743 405d37 5742->5743 5743->5734 5745 40564d 5744->5745 5752 4052e0 5745->5752 5748 405679 5750 403278 18 API calls 5748->5750 5751 40562b 5750->5751 5751->5731 5754 4052fb 5752->5754 5753 40530d 5753->5748 5757 40506c 5753->5757 5754->5753 5760 405402 5754->5760 5767 4052d4 5754->5767 5758 405dc8 19 API calls 5757->5758 5759 40507d 5758->5759 5759->5748 5761 405413 5760->5761 5763 405461 5760->5763 5761->5763 5764 4054e7 5761->5764 5766 40547f 5763->5766 5770 40527c 5763->5770 5764->5766 5774 4052c0 5764->5774 5766->5754 5768 403198 4 API calls 5767->5768 5769 4052de 5768->5769 5769->5754 5771 40528a 5770->5771 5777 405084 5771->5777 5773 4052b8 5773->5763 5790 4039a4 5774->5790 5780 405e38 5777->5780 5779 40509d 5779->5773 5781 405e46 5780->5781 5782 405164 19 API calls 5781->5782 5783 405e70 5782->5783 5784 40561c 33 API calls 5783->5784 5785 405e7e 5784->5785 5786 4031e8 18 API calls 5785->5786 5787 405e89 5786->5787 5788 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5787->5788 5789 405ea3 5788->5789 5789->5779 5791 4039ab 5790->5791 5796 4038b4 5791->5796 5793 4039cb 5794 403198 4 API calls 5793->5794 5795 4039d2 5794->5795 5795->5766 5797 4038d5 5796->5797 5798 4038c8 5796->5798 5800 403934 5797->5800 5801 4038db 5797->5801 5799 403780 6 API calls 5798->5799 5814 4038d0 5799->5814 5802 403993 5800->5802 5803 40393b 5800->5803 5804 4038e1 5801->5804 5805 4038ee 5801->5805 5806 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5802->5806 5807 403941 5803->5807 5808 40394b 5803->5808 5809 403894 6 API calls 5804->5809 5810 403894 6 API calls 5805->5810 5806->5814 5812 403864 23 API calls 5807->5812 5813 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5808->5813 5809->5814 5811 4038fc 5810->5811 5815 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5811->5815 5812->5814 5816 40395d 5813->5816 5814->5793 5817 403917 5815->5817 5818 403864 23 API calls 5816->5818 5820 40374c VariantClear 5817->5820 5819 403976 5818->5819 5821 40374c VariantClear 5819->5821 5822 40392c 5820->5822 5823 40398b 5821->5823 5822->5793 5823->5793 5825 408187 5824->5825 5826 40817c 5824->5826 5830 408110 5825->5830 5826->5372 5829 405d18 18 API calls 5829->5826 5831 408163 5830->5831 5832 408124 5830->5832 5831->5826 5831->5829 5832->5831 5834 408060 5832->5834 5835 40806b 5834->5835 5838 40807c 5834->5838 5836 405d18 18 API calls 5835->5836 5836->5838 5837 407954 34 API calls 5839 408090 5837->5839 5838->5837 5840 407954 34 API calls 5839->5840 5841 4080b1 5840->5841 5842 407dcc InterlockedExchange 5841->5842 5843 4080c6 5842->5843 5844 4080dc 5843->5844 5845 405d18 18 API calls 5843->5845 5844->5832 5845->5844 5847 407d8a 5846->5847 5848 407d9b 5846->5848 5849 407d8f InterlockedExchange 5847->5849 5848->5160 5849->5848 6542 4024d0 6543 4024e4 6542->6543 6547 4024e9 6542->6547 6544 401918 4 API calls 6543->6544 6544->6547 6545 402518 6557 402300 6545->6557 6546 40250e RtlEnterCriticalSection 6546->6545 6547->6545 6547->6546 6549 4024ed 6547->6549 6551 402525 6553 402581 6551->6553 6554 402577 RtlLeaveCriticalSection 6551->6554 6552 401fd4 14 API calls 6555 402531 6552->6555 6554->6553 6555->6551 6567 40215c 6555->6567 6558 402314 6557->6558 6559 402335 6558->6559 6565 4023b8 6558->6565 6560 402344 6559->6560 6581 401b74 6559->6581 6560->6551 6560->6552 6562 402455 6562->6560 6566 401d00 9 API calls 6562->6566 6565->6560 6565->6562 6584 401d80 6565->6584 6588 401e84 6565->6588 6566->6560 6568 40217a 6567->6568 6569 402175 6567->6569 6571 4021ab RtlEnterCriticalSection 6568->6571 6572 40217e 6568->6572 6579 4021b5 6568->6579 6570 401918 4 API calls 6569->6570 6570->6568 6571->6579 6572->6551 6573 4021c1 6575 4022e3 RtlLeaveCriticalSection 6573->6575 6576 4022ed 6573->6576 6574 402244 6574->6572 6577 401d80 7 API calls 6574->6577 6575->6576 6576->6551 6577->6572 6578 402270 6578->6573 6580 401d00 7 API calls 6578->6580 6579->6573 6579->6574 6579->6578 6580->6573 6582 40215c 9 API calls 6581->6582 6583 401b95 6582->6583 6583->6560 6585 401d92 6584->6585 6586 401d89 6584->6586 6585->6565 6586->6585 6587 401b74 9 API calls 6586->6587 6587->6585 6593 401768 6588->6593 6590 401e99 6591 401dcc 9 API calls 6590->6591 6592 401ea6 6590->6592 6591->6592 6592->6565 6595 401787 6593->6595 6594 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6594->6595 6595->6594 6596 40183b 6595->6596 6597 40132c LocalAlloc 6595->6597 6599 401821 6595->6599 6602 4017d6 6595->6602 6600 4017e7 6596->6600 6608 4015c4 6596->6608 6597->6595 6601 40150c VirtualFree 6599->6601 6600->6590 6601->6600 6604 40150c 6602->6604 6605 40153b 6604->6605 6606 401594 6605->6606 6607 401568 VirtualFree 6605->6607 6606->6600 6607->6605 6609 40160a 6608->6609 6610 40163a 6609->6610 6611 401626 VirtualAlloc 6609->6611 6610->6600 6611->6609 6611->6610 6612 4028d2 6615 4028da 6612->6615 6613 403554 4 API calls 6613->6615 6614 4028ef 6616 4025ac 4 API calls 6614->6616 6615->6613 6615->6614 6617 4028f4 6616->6617 6618 4094d2 6619 4094c4 6618->6619 6620 409460 Wow64RevertWow64FsRedirection 6619->6620 6621 4094cc 6620->6621 7045 4019d3 7046 4019ba 7045->7046 7047 4019c3 RtlLeaveCriticalSection 7046->7047 7048 4019cd 7046->7048 7047->7048 6622 4094d4 SetLastError 6623 4094dd 6622->6623 5875 407bd6 5877 407bd8 5875->5877 5876 407b90 WriteFile 5878 407ba3 5876->5878 5879 407b9c 5876->5879 5877->5876 5883 407c94 5877->5883 5881 407bb4 5878->5881 5882 4078a0 34 API calls 5878->5882 5880 407940 35 API calls 5879->5880 5880->5878 5882->5881 5850 407ae0 ReadFile 5851 407b00 5850->5851 5852 407b17 5850->5852 5853 407b10 5851->5853 5854 407b06 GetLastError 5851->5854 5855 407940 35 API calls 5853->5855 5854->5852 5854->5853 5855->5852 7052 4075e2 7053 4075cc 7052->7053 7054 403198 4 API calls 7053->7054 7055 4075d4 7054->7055 7056 403198 4 API calls 7055->7056 7057 4075dc 7056->7057 7058 4093e4 7061 4092b0 7058->7061 7062 4092b9 7061->7062 7063 403198 4 API calls 7062->7063 7064 4092c7 7062->7064 7063->7062 7065 4055e8 7066 4055fb 7065->7066 7067 4052e0 33 API calls 7066->7067 7068 40560f 7067->7068 7069 402be9 RaiseException 7070 402c04 7069->7070 6624 40acec 6625 40ad11 6624->6625 6626 409e14 29 API calls 6625->6626 6629 40ad16 6626->6629 6627 40ad69 6658 4026c4 GetSystemTime 6627->6658 6629->6627 6632 40928c 18 API calls 6629->6632 6630 40ad6e 6631 409808 46 API calls 6630->6631 6633 40ad76 6631->6633 6635 40ad45 6632->6635 6634 4031e8 18 API calls 6633->6634 6636 40ad83 6634->6636 6638 40ad4d MessageBoxA 6635->6638 6637 406db0 19 API calls 6636->6637 6639 40ad90 6637->6639 6638->6627 6640 40ad5a 6638->6640 6641 406b48 19 API calls 6639->6641 6642 405cec 19 API calls 6640->6642 6643 40ada0 6641->6643 6642->6627 6644 406ac0 19 API calls 6643->6644 6645 40adb1 6644->6645 6646 403340 18 API calls 6645->6646 6647 40adbf 6646->6647 6648 4031e8 18 API calls 6647->6648 6649 40adcf 6648->6649 6650 407994 37 API calls 6649->6650 6651 40ae0e 6650->6651 6652 402594 18 API calls 6651->6652 6653 40ae2e 6652->6653 6654 407edc 19 API calls 6653->6654 6655 40ae70 6654->6655 6656 40816c 35 API calls 6655->6656 6657 40ae97 6656->6657 6658->6630 6663 402af2 6664 402afe 6663->6664 6667 402ed0 6664->6667 6668 403154 4 API calls 6667->6668 6670 402ee0 6668->6670 6669 402b03 6670->6669 6672 402b0c 6670->6672 6673 402b25 6672->6673 6674 402b15 RaiseException 6672->6674 6673->6669 6674->6673 7081 402dfa 7082 402e26 7081->7082 7083 402e0d 7081->7083 7085 402ba4 7083->7085 7086 402bc9 7085->7086 7087 402bad 7085->7087 7086->7082 7088 402bb5 RaiseException 7087->7088 7088->7086 6277 4079fc 6278 407a08 CloseHandle 6277->6278 6279 407a11 6277->6279 6278->6279 6685 403a80 CloseHandle 6686 403a90 6685->6686 6687 403a91 GetLastError 6685->6687 6688 404283 6689 4042c3 6688->6689 6690 403154 4 API calls 6689->6690 6691 404323 6690->6691 7089 404185 7090 4041ff 7089->7090 7091 4041cc 7090->7091 7092 403154 4 API calls 7090->7092 7093 404323 7092->7093 6692 403e87 6693 403e4c 6692->6693 6694 403e62 6693->6694 6695 403e7b 6693->6695 6697 403e67 6693->6697 6701 403cc8 6694->6701 6698 402674 4 API calls 6695->6698 6699 403e78 6697->6699 6705 402674 6697->6705 6698->6699 6703 403cd6 6701->6703 6702 403ceb 6702->6697 6703->6702 6704 402674 4 API calls 6703->6704 6704->6702 6706 403154 4 API calls 6705->6706 6707 40267a 6706->6707 6707->6699 6229 408488 6230 40849a 6229->6230 6232 4084a1 6229->6232 6240 4083c4 6230->6240 6233 4084c9 6232->6233 6234 4084cb 6232->6234 6238 4084d5 6232->6238 6254 4082e0 6233->6254 6251 408230 6234->6251 6235 408502 6237 408230 33 API calls 6237->6235 6238->6235 6238->6237 6241 4083d9 6240->6241 6242 408230 33 API calls 6241->6242 6243 4083e8 6241->6243 6242->6243 6244 408422 6243->6244 6246 408230 33 API calls 6243->6246 6245 408436 6244->6245 6247 408230 33 API calls 6244->6247 6250 408462 6245->6250 6261 40836c 6245->6261 6246->6244 6247->6245 6250->6232 6264 405d4c 6251->6264 6253 408252 6253->6238 6255 40561c 33 API calls 6254->6255 6256 40830b 6255->6256 6272 408298 6256->6272 6258 408313 6259 403198 4 API calls 6258->6259 6260 408328 6259->6260 6260->6238 6262 40837b VirtualFree 6261->6262 6263 40838d VirtualAlloc 6261->6263 6262->6263 6263->6250 6265 405d58 6264->6265 6266 40561c 33 API calls 6265->6266 6267 405d85 6266->6267 6268 4031e8 18 API calls 6267->6268 6269 405d90 6268->6269 6270 403198 4 API calls 6269->6270 6271 405da5 6270->6271 6271->6253 6273 405d4c 33 API calls 6272->6273 6274 4082ba 6273->6274 6274->6258 6280 40af8d 6281 40af90 SetLastError 6280->6281 6312 409b20 GetLastError 6281->6312 6284 40afaa 6286 40afb4 CreateWindowExA SetWindowLongA 6284->6286 6285 402f24 5 API calls 6285->6284 6287 40561c 33 API calls 6286->6287 6288 40b037 6287->6288 6289 4032fc 18 API calls 6288->6289 6290 40b045 6289->6290 6291 4032fc 18 API calls 6290->6291 6292 40b052 6291->6292 6325 407004 GetCommandLineA 6292->6325 6295 4032fc 18 API calls 6296 40b067 6295->6296 6332 409ec4 6296->6332 6299 409da4 19 API calls 6300 40b08c 6299->6300 6301 40b0c5 6300->6301 6302 40b0ac 6300->6302 6304 40b0de 6301->6304 6307 40b0d8 RemoveDirectoryA 6301->6307 6348 4099b0 6302->6348 6305 40b0f2 6304->6305 6306 40b0e7 DestroyWindow 6304->6306 6308 40b11a 6305->6308 6356 40357c 6305->6356 6306->6305 6307->6304 6310 40b110 6311 4025ac 4 API calls 6310->6311 6311->6308 6313 40511c 33 API calls 6312->6313 6314 409b67 6313->6314 6315 407738 19 API calls 6314->6315 6316 409b77 6315->6316 6317 40925c 18 API calls 6316->6317 6318 409b8c 6317->6318 6319 405d18 18 API calls 6318->6319 6320 409b9b 6319->6320 6321 4031b8 4 API calls 6320->6321 6322 409bba 6321->6322 6323 403198 4 API calls 6322->6323 6324 409bc2 6323->6324 6324->6284 6324->6285 6326 406f78 18 API calls 6325->6326 6327 407029 6326->6327 6328 4032c4 18 API calls 6327->6328 6329 407032 6328->6329 6330 403198 4 API calls 6329->6330 6331 407047 6330->6331 6331->6295 6333 4033b4 18 API calls 6332->6333 6334 409eff 6333->6334 6335 409f31 CreateProcessA 6334->6335 6336 409f44 CloseHandle 6335->6336 6337 409f3d 6335->6337 6339 409f4d 6336->6339 6338 409b20 35 API calls 6337->6338 6338->6336 6369 409e98 6339->6369 6342 409f69 6343 409e98 3 API calls 6342->6343 6344 409f6e GetExitCodeProcess CloseHandle 6343->6344 6345 409f8e 6344->6345 6346 403198 4 API calls 6345->6346 6347 409f96 6346->6347 6347->6299 6347->6300 6349 409a0a 6348->6349 6351 4099c3 6348->6351 6349->6301 6350 4099cb Sleep 6350->6351 6351->6349 6351->6350 6352 4099db Sleep 6351->6352 6354 4099f2 GetLastError 6351->6354 6373 409470 6351->6373 6352->6351 6354->6349 6355 4099fc GetLastError 6354->6355 6355->6349 6355->6351 6357 403591 6356->6357 6358 4035a0 6356->6358 6359 4035b6 6357->6359 6362 4035d0 6357->6362 6363 40359b 6357->6363 6360 4035b1 6358->6360 6361 4035b8 6358->6361 6359->6310 6364 403198 4 API calls 6360->6364 6365 4031b8 4 API calls 6361->6365 6362->6359 6366 40357c 4 API calls 6362->6366 6363->6358 6368 4035ec 6363->6368 6364->6359 6365->6359 6366->6362 6368->6359 6381 403554 6368->6381 6370 409eac PeekMessageA 6369->6370 6371 409ea0 TranslateMessage DispatchMessageA 6370->6371 6372 409ebe MsgWaitForMultipleObjects 6370->6372 6371->6370 6372->6339 6372->6342 6374 409424 2 API calls 6373->6374 6375 409486 6374->6375 6376 40948a 6375->6376 6377 4094a6 DeleteFileA GetLastError 6375->6377 6376->6351 6378 4094c4 6377->6378 6379 409460 Wow64RevertWow64FsRedirection 6378->6379 6380 4094cc 6379->6380 6380->6351 6382 403566 6381->6382 6384 403578 6382->6384 6385 403604 6382->6385 6384->6368 6386 40357c 6385->6386 6389 4035d0 6386->6389 6390 40359b 6386->6390 6393 4035a0 6386->6393 6395 4035b6 6386->6395 6387 4035b1 6391 403198 4 API calls 6387->6391 6388 4035b8 6392 4031b8 4 API calls 6388->6392 6389->6395 6396 40357c 4 API calls 6389->6396 6390->6393 6394 4035ec 6390->6394 6391->6395 6392->6395 6393->6387 6393->6388 6394->6395 6397 403554 4 API calls 6394->6397 6395->6382 6396->6389 6397->6394 7098 403991 7099 403983 7098->7099 7100 40374c VariantClear 7099->7100 7101 40398b 7100->7101 6708 403e95 6709 403e4c 6708->6709 6710 403e67 6709->6710 6711 403e62 6709->6711 6712 403e7b 6709->6712 6715 403e78 6710->6715 6716 402674 4 API calls 6710->6716 6713 403cc8 4 API calls 6711->6713 6714 402674 4 API calls 6712->6714 6713->6710 6714->6715 6716->6715 6717 403a97 6718 403aac 6717->6718 6719 403bbc GetStdHandle 6718->6719 6720 403b0e CreateFileA 6718->6720 6730 403ab2 6718->6730 6721 403c17 GetLastError 6719->6721 6725 403bba 6719->6725 6720->6721 6722 403b2c 6720->6722 6721->6730 6724 403b3b GetFileSize 6722->6724 6722->6725 6724->6721 6726 403b4e SetFilePointer 6724->6726 6727 403be7 GetFileType 6725->6727 6725->6730 6726->6721 6731 403b6a ReadFile 6726->6731 6729 403c02 CloseHandle 6727->6729 6727->6730 6729->6730 6731->6721 6732 403b8c 6731->6732 6732->6725 6733 403b9f SetFilePointer 6732->6733 6733->6721 6734 403bb0 SetEndOfFile 6733->6734 6734->6721 6734->6725 6747 402caa 6748 403154 4 API calls 6747->6748 6749 402caf 6748->6749 6750 4028ac 6751 402594 18 API calls 6750->6751 6752 4028b6 6751->6752 6753 407aae GetFileSize 6754 407ada 6753->6754 6755 407aca GetLastError 6753->6755 6755->6754 6756 407ad3 6755->6756 6757 407940 35 API calls 6756->6757 6757->6754 5861 40aeb6 5862 40aedb 5861->5862 5863 407dcc InterlockedExchange 5862->5863 5864 40af05 5863->5864 5865 40af15 5864->5865 5866 409fc0 18 API calls 5864->5866 5871 407b60 SetEndOfFile 5865->5871 5866->5865 5868 40af31 5869 4025ac 4 API calls 5868->5869 5870 40af68 5869->5870 5872 407b70 5871->5872 5873 407b77 5871->5873 5874 407940 35 API calls 5872->5874 5873->5868 5874->5873 6768 401ab9 6769 401a96 6768->6769 6770 401aa9 RtlDeleteCriticalSection 6769->6770 6771 401a9f RtlLeaveCriticalSection 6769->6771 6771->6770

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,00404911,?,?,?,?,00000000,?,0040AAF0), ref: 0040466F
                                                      • GetVersion.KERNEL32(kernel32.dll,00000000,00404911,?,?,?,?,00000000,?,0040AAF0), ref: 00404676
                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0040468B
                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 004046B3
                                                      • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004048D8
                                                      • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004048EE
                                                      • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,kernel32.dll,00000000,00404911,?,?,?,?,00000000,?,0040AAF0), ref: 004048F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModulePolicyProcessVersion
                                                      • String ID: SetDefaultDllDirectories$SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$apphelp.dll$clbcatq.dll$comres.dll$cryptbase.dll$dwmapi.dll$kernel32.dll$ntmarta.dll$oleacc.dll$profapi.dll$propsys.dll$setupapi.dll$userenv.dll$uxtheme.dll$version.dll
                                                      • API String ID: 3297890031-1119018034
                                                      • Opcode ID: cc6ab64b48d02d140d73cec505fdc132eff82ff6553fc21a046d343f04ece132
                                                      • Instruction ID: 8135fb14ee81180893b1f543c3a29e932c16cf19254b5bff3906bd7e71ea8aa3
                                                      • Opcode Fuzzy Hash: cc6ab64b48d02d140d73cec505fdc132eff82ff6553fc21a046d343f04ece132
                                                      • Instruction Fuzzy Hash: 9D611270600159AFDB00FBF6DA8398E77A89F80305B2045BBA604772D6D778EF059B5D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 234 40a050-40a074 GetSystemInfo VirtualQuery 235 40a104-40a10b 234->235 236 40a07a 234->236 237 40a0f9-40a0fe 236->237 237->235 238 40a07c-40a083 237->238 239 40a0e5-40a0f7 VirtualQuery 238->239 240 40a085-40a089 238->240 239->235 239->237 240->239 241 40a08b-40a093 240->241 242 40a0a4-40a0b5 VirtualProtect 241->242 243 40a095-40a098 241->243 245 40a0b7 242->245 246 40a0b9-40a0bb 242->246 243->242 244 40a09a-40a09d 243->244 244->242 248 40a09f-40a0a2 244->248 245->246 247 40a0ca-40a0cd 246->247 249 40a0bd-40a0c6 call 40a048 247->249 250 40a0cf-40a0d1 247->250 248->242 248->246 249->247 250->239 252 40a0d3-40a0e0 VirtualProtect 250->252 252->239
                                                      APIs
                                                      • GetSystemInfo.KERNEL32(?), ref: 0040A062
                                                      • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 0040A06D
                                                      • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 0040A0AE
                                                      • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 0040A0E0
                                                      • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 0040A0F0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ProtectQuery$InfoSystem
                                                      • String ID:
                                                      • API String ID: 2441996862-0
                                                      • Opcode ID: e53a58f787b0994d942b1301a25b776e5790cc469dae4f0c0141b44a09a1105d
                                                      • Instruction ID: d22f8a83843956dcd0f1bd3c30f31cd8ee5be065fb893754064b45e2edc0d12d
                                                      • Opcode Fuzzy Hash: e53a58f787b0994d942b1301a25b776e5790cc469dae4f0c0141b44a09a1105d
                                                      • Instruction Fuzzy Hash: 8921AEB12003086BD630DE998D85E6BB3D8DF85354F04483AF685E33C2D77DE864966A
                                                      APIs
                                                      • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,0040575F,?,00000000,0040583E), ref: 004056B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 1c8cef5e7bc5498290c3f938cca84698e8f49793df951a569bfd97285a3601f8
                                                      • Instruction ID: 16534491fad4532095b25154bcfa4eb159586e841354a195c3175f568a425c49
                                                      • Opcode Fuzzy Hash: 1c8cef5e7bc5498290c3f938cca84698e8f49793df951a569bfd97285a3601f8
                                                      • Instruction Fuzzy Hash: 4DE0D87170021827D710A9699C86EFB725CE758310F4006BFB908E73C2EDB59E8046ED

                                                      Control-flow Graph

                                                      APIs
                                                      • SetLastError.KERNEL32 ref: 0040AF99
                                                        • Part of subcall function 00409B20: GetLastError.KERNEL32(00000000,00409BC3,?,0040C244,?,02071DF0), ref: 00409B44
                                                      • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AFD6
                                                      • SetWindowLongA.USER32(000203D4,000000FC,00409E38), ref: 0040AFED
                                                      • RemoveDirectoryA.KERNEL32(00000000,0040B12C,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040B0D9
                                                      • DestroyWindow.USER32(000203D4,0040B12C,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040B0ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                      • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                      • API String ID: 3757039580-3001827809
                                                      • Opcode ID: 779aa3cc042d1ecda5eecd5a957243857221684a4f0e841bdcf92309e10b5571
                                                      • Instruction ID: e11106d591c480187276ddc099787e7d0131364ad6526c401ab361da32b03a0a
                                                      • Opcode Fuzzy Hash: 779aa3cc042d1ecda5eecd5a957243857221684a4f0e841bdcf92309e10b5571
                                                      • Instruction Fuzzy Hash: AB412F70E006049BD711EBE9EE86B6937A4EB58304F10417BF114BB2E2C7B89C05CB9D

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409616,?,?,?,?,00000000,00000000,?,0040AB04), ref: 0040957A
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409580
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409616,?,?,?,?,00000000,00000000,?,0040AB04), ref: 00409594
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040959A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                      • API String ID: 1646373207-2130885113
                                                      • Opcode ID: a877c76c9fc41a234e825ecf500836d7dc2a3ebdee614a9ba8f5c15843239161
                                                      • Instruction ID: a26a6a73124c26f393fcd3150f7a0ae21a729c0721f3e308dc05a8b68c4216e4
                                                      • Opcode Fuzzy Hash: a877c76c9fc41a234e825ecf500836d7dc2a3ebdee614a9ba8f5c15843239161
                                                      • Instruction Fuzzy Hash: AD119170908244BEDB00FBA6CD02B497BA8DB85704F20447BB500762D3CA7D5D08DA2D

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AFD6
                                                      • SetWindowLongA.USER32(000203D4,000000FC,00409E38), ref: 0040AFED
                                                        • Part of subcall function 00407004: GetCommandLineA.KERNEL32(00000000,00407048,?,?,?,?,00000000,?,0040B05E,?), ref: 0040701C
                                                        • Part of subcall function 00409EC4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409FBC,02071DF0,00409FB0,00000000,00409F97), ref: 00409F34
                                                        • Part of subcall function 00409EC4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409FBC,02071DF0,00409FB0,00000000), ref: 00409F48
                                                        • Part of subcall function 00409EC4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F61
                                                        • Part of subcall function 00409EC4: GetExitCodeProcess.KERNEL32(?,0040C244), ref: 00409F73
                                                        • Part of subcall function 00409EC4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409FBC,02071DF0,00409FB0), ref: 00409F7C
                                                      • RemoveDirectoryA.KERNEL32(00000000,0040B12C,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040B0D9
                                                      • DestroyWindow.USER32(000203D4,0040B12C,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040B0ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                      • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                      • API String ID: 3586484885-3001827809
                                                      • Opcode ID: 2e3aa86d138e90c5b86658206792da66739f20ef7896738f1a5b938c9a18691c
                                                      • Instruction ID: 2c50bf805cbcaae07aef26e9318175051bf4a01897437c95b2245b611fc910e4
                                                      • Opcode Fuzzy Hash: 2e3aa86d138e90c5b86658206792da66739f20ef7896738f1a5b938c9a18691c
                                                      • Instruction Fuzzy Hash: A6413B71A106049FD710EBE9EE96B6937E4EB58304F10427AF514BB2E1D7B89C04CB9C

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409FBC,02071DF0,00409FB0,00000000,00409F97), ref: 00409F34
                                                      • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409FBC,02071DF0,00409FB0,00000000), ref: 00409F48
                                                      • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409F61
                                                      • GetExitCodeProcess.KERNEL32(?,0040C244), ref: 00409F73
                                                      • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409FBC,02071DF0,00409FB0), ref: 00409F7C
                                                        • Part of subcall function 00409B20: GetLastError.KERNEL32(00000000,00409BC3,?,0040C244,?,02071DF0), ref: 00409B44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                      • String ID: D
                                                      • API String ID: 3356880605-2746444292
                                                      • Opcode ID: 38633e948b603c813f450b03e218898c53e69348259ca8204e0d5802e89edcbc
                                                      • Instruction ID: 5612ed86ad08d4bddb5d15266d7073179e0372755be9feb1331a68d3317c9ad6
                                                      • Opcode Fuzzy Hash: 38633e948b603c813f450b03e218898c53e69348259ca8204e0d5802e89edcbc
                                                      • Instruction Fuzzy Hash: 57114FB16442096EDB00EBE6CC52F9FB7ACEF49718F50007BB604F72C6DA789D048669

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 218 401918-40193a RtlInitializeCriticalSection 219 401946-40197c call 4012dc * 3 LocalAlloc 218->219 220 40193c-401941 RtlEnterCriticalSection 218->220 227 4019ad-4019c1 219->227 228 40197e 219->228 220->219 232 4019c3-4019c8 RtlLeaveCriticalSection 227->232 233 4019cd 227->233 229 401983-401995 228->229 229->229 231 401997-4019a6 229->231 231->227 232->233
                                                      APIs
                                                      • RtlInitializeCriticalSection.KERNEL32(0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                      • RtlEnterCriticalSection.KERNEL32(0040D41C,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                      • LocalAlloc.KERNEL32(00000000,00000FF8,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                      • RtlLeaveCriticalSection.KERNEL32(0040D41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                      • String ID: |SC
                                                      • API String ID: 730355536-3706279579
                                                      • Opcode ID: 8414f493d6facd55d67710fc415b07d88c3ef9d9c2abb5a5bebd487d02bb0f40
                                                      • Instruction ID: ca3d82fa79822ebb621977d4c6345e30539334a4bf25a92a69ec079a2ec9ab95
                                                      • Opcode Fuzzy Hash: 8414f493d6facd55d67710fc415b07d88c3ef9d9c2abb5a5bebd487d02bb0f40
                                                      • Instruction Fuzzy Hash: F20192B4E442405EE715ABFA9A56B253BA4D789704F1080BFF044F72F2C67C6458C75D

                                                      Control-flow Graph

                                                      APIs
                                                      • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040AD50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: .tmp$xz@
                                                      • API String ID: 2030045667-184514067
                                                      • Opcode ID: 73bde8918a24a77bea396c0e21e9449f08e0d1092fa56e2cd179e8c652837428
                                                      • Instruction ID: cd6e40cb12cf75a94289ddc930eeb34ae46a26edf5cb602d02798e23291f977e
                                                      • Opcode Fuzzy Hash: 73bde8918a24a77bea396c0e21e9449f08e0d1092fa56e2cd179e8c652837428
                                                      • Instruction Fuzzy Hash: B641C574B006009FD301EFA5DE92A6A77A5EB59704B10443BF800BB7E1CA79AC14CBAD

                                                      Control-flow Graph

                                                      APIs
                                                      • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040AD50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: .tmp$xz@
                                                      • API String ID: 2030045667-184514067
                                                      • Opcode ID: 245864c1a257ed0c967638b67db9bb329bbae4f50c3bb27b4eac2111c384816e
                                                      • Instruction ID: 53719d66007282c5495c6098f99a266dc5e357c3cd51cf55fd0a3e0a4036c937
                                                      • Opcode Fuzzy Hash: 245864c1a257ed0c967638b67db9bb329bbae4f50c3bb27b4eac2111c384816e
                                                      • Instruction Fuzzy Hash: B441C974B006009FC701EFA5DE92A5A77A5EB59704B10443BF800BB3E1CBB9AC04CBAD

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,004098F7,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040984E
                                                      • GetLastError.KERNEL32(00000000,00000000,?,00000000,004098F7,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409857
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID: .tmp
                                                      • API String ID: 1375471231-2986845003
                                                      • Opcode ID: 960547cf70513a17951bf964015fc0181e1b4ea2f4ac03f8a12b0497a0fc638c
                                                      • Instruction ID: 99036c105fdce8595ace9a271e3c35a9b263f9a60d6b8e91bf220d2a738da6a3
                                                      • Opcode Fuzzy Hash: 960547cf70513a17951bf964015fc0181e1b4ea2f4ac03f8a12b0497a0fc638c
                                                      • Instruction Fuzzy Hash: 9F216775A10208ABDB00FFA5C8529DFB7B8EF84304F50457BE501B7382DA7C9E058BA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 444 401fd4-401fe6 445 401fe8 call 401918 444->445 446 401ffb-402010 444->446 452 401fed-401fef 445->452 447 402012-402017 RtlEnterCriticalSection 446->447 448 40201c-402025 446->448 447->448 450 402027 448->450 451 40202c-402032 448->451 450->451 453 402038-40203c 451->453 454 4020cb-4020d1 451->454 452->446 455 401ff1-401ff6 452->455 459 402041-402050 453->459 460 40203e 453->460 457 4020d3-4020e0 454->457 458 40211d-40211f call 401ee0 454->458 456 40214f-402158 455->456 461 4020e2-4020ea 457->461 462 4020ef-40211b call 402f54 457->462 468 402124-40213b 458->468 459->454 463 402052-402060 459->463 460->459 461->462 462->456 466 402062-402066 463->466 467 40207c-402080 463->467 470 402068 466->470 471 40206b-40207a 466->471 473 402082 467->473 474 402085-4020a0 467->474 475 402147 468->475 476 40213d-402142 RtlLeaveCriticalSection 468->476 470->471 477 4020a2-4020c6 call 402f54 471->477 473->474 474->477 476->475 477->456
                                                      APIs
                                                      • RtlEnterCriticalSection.KERNEL32(0040D41C,00000000,00402148), ref: 00402017
                                                        • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                        • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040D41C,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                        • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040D41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                        • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040D41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                      • String ID:
                                                      • API String ID: 296031713-0
                                                      • Opcode ID: f63e8093b7c21695f3c5f0f727b66ad92d47f8bd02e6a7dbcfb51ec74dbfdd03
                                                      • Instruction ID: 72c497f3d878e3d6a4a9583ee00a9bb41c235ef620702b970aaba137d6b92855
                                                      • Opcode Fuzzy Hash: f63e8093b7c21695f3c5f0f727b66ad92d47f8bd02e6a7dbcfb51ec74dbfdd03
                                                      • Instruction Fuzzy Hash: 2341C2B2E007019FD710CFA9DE8561A7BA0EB58314B15817BD549B73E1D378A849CB48

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 480 407454-4074a7 SetErrorMode call 403414 LoadLibraryA
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00008000), ref: 0040745E
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,004074A8,?,00000000,004074C6,?,00008000), ref: 0040748D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLibraryLoadMode
                                                      • String ID:
                                                      • API String ID: 2987862817-0
                                                      • Opcode ID: d48a79d8ee70c80f60c93aacfed67c0ad6e199761e735f170a71233113bd88e2
                                                      • Instruction ID: a630936203178071a9ee71a4306d19d7bf0886e547c0eed2c6a3f5d1fd0b17c9
                                                      • Opcode Fuzzy Hash: d48a79d8ee70c80f60c93aacfed67c0ad6e199761e735f170a71233113bd88e2
                                                      • Instruction Fuzzy Hash: B9F08270A14704BEDB125F768C5282ABEACEB49B1475388B6F900A26D2E53C5820C569

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 484 407ae0-407afe ReadFile 485 407b00-407b04 484->485 486 407b17-407b1e 484->486 487 407b10-407b12 call 407940 485->487 488 407b06-407b0e GetLastError 485->488 487->486 488->486 488->487
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407AF7
                                                      • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407B06
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastRead
                                                      • String ID:
                                                      • API String ID: 1948546556-0
                                                      • Opcode ID: 5c17caa541fddce76649cc04805944c392fc8533b1365d2e374aefba6a6f009b
                                                      • Instruction ID: e6678645df70ceda1296de0698669a3f17118b423087409050d1bdfb176b5629
                                                      • Opcode Fuzzy Hash: 5c17caa541fddce76649cc04805944c392fc8533b1365d2e374aefba6a6f009b
                                                      • Instruction Fuzzy Hash: 33E092B17081106AEB20A65E9884F6767ECCBC5368F04457BF608DB286D678EC008377

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 490 407b20-407b45 SetFilePointer 491 407b57-407b5c 490->491 492 407b47-407b4e GetLastError 490->492 492->491 493 407b50-407b52 call 407940 492->493 493->491
                                                      APIs
                                                      • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00407B3F
                                                      • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407B47
                                                        • Part of subcall function 00407940: GetLastError.KERNEL32(xz@,004079DE,?,?,020703AC,?,0040AB73,00000001,00000000,00000002,00000000,0040B16A,?,00000000,0040B1A1), ref: 00407943
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$FilePointer
                                                      • String ID:
                                                      • API String ID: 1156039329-0
                                                      • Opcode ID: 5d72a474d6866116df7c50e7d91214adeba9db5fc19ecb02cee2fd0cbf9ab777
                                                      • Instruction ID: e41e806bfeb234626b87b501edff7cf6b7d3219fcc40cd55b05b53632260e4a9
                                                      • Opcode Fuzzy Hash: 5d72a474d6866116df7c50e7d91214adeba9db5fc19ecb02cee2fd0cbf9ab777
                                                      • Instruction Fuzzy Hash: BDE092767082005BD610E55EC881F9B33DCDFC5368F004137B658EB1D1DA75A8008366
                                                      APIs
                                                      • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 00407A8F
                                                      • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407A9B
                                                        • Part of subcall function 00407940: GetLastError.KERNEL32(xz@,004079DE,?,?,020703AC,?,0040AB73,00000001,00000000,00000002,00000000,0040B16A,?,00000000,0040B1A1), ref: 00407943
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$FilePointer
                                                      • String ID:
                                                      • API String ID: 1156039329-0
                                                      • Opcode ID: 376b7221faa1d9c8226b04aa14be382687234a7c39477bd240d3c8d17531cd0a
                                                      • Instruction ID: 5d7889b2766bb560f48239758183442fe2ff1acd2572488175a49b0c159bb46e
                                                      • Opcode Fuzzy Hash: 376b7221faa1d9c8226b04aa14be382687234a7c39477bd240d3c8d17531cd0a
                                                      • Instruction Fuzzy Hash: 57E04FB16002109FEB20EEB98981B5673D89F44364F048576E614DF2C6D378DC008B66
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Virtual$AllocFree
                                                      • String ID:
                                                      • API String ID: 2087232378-0
                                                      • Opcode ID: 316f7b9c70f66dec2db539bfa6b5d1d13d5c84c791c458a80c61312b1b31133c
                                                      • Instruction ID: 66c3474f10fe082fedccbde799efe3bb5b58ff080b56d2e089ed954f0af67306
                                                      • Opcode Fuzzy Hash: 316f7b9c70f66dec2db539bfa6b5d1d13d5c84c791c458a80c61312b1b31133c
                                                      • Instruction Fuzzy Hash: DAF02772B0032017DB2069AA0CC1B536AC59F85B90F1540BBFA4CFF3F9D2B98C0442A9
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00407B93
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: dc8f9862481319be3bdbd5661d3fcc7de93382422b7ff2ce1cd8379c78404356
                                                      • Instruction ID: 1ffe8940fb0bba7a1c466ab1a63027f62bf18732910125c6c2e91df4c90979d7
                                                      • Opcode Fuzzy Hash: dc8f9862481319be3bdbd5661d3fcc7de93382422b7ff2ce1cd8379c78404356
                                                      • Instruction Fuzzy Hash: 7351B12084E2910FDB125B7459A85A13FA1FF5331532A52FBC4D2AB1E3D27CA847835F
                                                      APIs
                                                      • GetSystemDefaultLCID.KERNEL32(00000000,0040583E), ref: 00405727
                                                        • Part of subcall function 00405164: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00405181
                                                        • Part of subcall function 00405694: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,0040575F,?,00000000,0040583E), ref: 004056B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DefaultInfoLoadLocaleStringSystem
                                                      • String ID:
                                                      • API String ID: 1658689577-0
                                                      • Opcode ID: 9ba8296990a72112227324fa3ee9fcc0b1e9336ed56d3b895413b02212f8560e
                                                      • Instruction ID: c7d7bdc64998b5a50f072f8a8ba779086e7d05f386a85bc6535a333606642bb6
                                                      • Opcode Fuzzy Hash: 9ba8296990a72112227324fa3ee9fcc0b1e9336ed56d3b895413b02212f8560e
                                                      • Instruction Fuzzy Hash: 05315075E00509ABCF00DF95C8819EEB379FF84304F548977E815BB285E739AE068B94
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407A6C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: d70932e6098281890bada4fb0cb49f00060c997d215399a4c6e17c77cbc25981
                                                      • Instruction ID: 042ae40820150c0b4851109f40d588701a9899a67d40570aa5757512981d293a
                                                      • Opcode Fuzzy Hash: d70932e6098281890bada4fb0cb49f00060c997d215399a4c6e17c77cbc25981
                                                      • Instruction Fuzzy Hash: 6FE0ED753442586EE340DAED6D81FA677DC974A714F008132B998DB382D4719D118BA8
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00406EAC,?,?,?,?,00000000,?,00406EC1,0040721B,00000000,00407260,?,?,?), ref: 00406E8F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 24e4b9a91e1daf3bf67ed32386f94fc4a36e54d9486d967fbff76b5f6006ff24
                                                      • Instruction ID: 7ab40f028fd3c5f14a353e55118c7c81c89abefc65ec3810316971f178424404
                                                      • Opcode Fuzzy Hash: 24e4b9a91e1daf3bf67ed32386f94fc4a36e54d9486d967fbff76b5f6006ff24
                                                      • Instruction Fuzzy Hash: 21E06D35204704BFD701EEA2DD52A5ABBACDB89B04BA24476F501A6682D6796E1084A8
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407A6C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 9c11b2a4cf94016adbe46f41987ce67f399dd20175b5552a4b2bfc50b96cd780
                                                      • Instruction ID: 8ced2eed2e357b00b36525f681a949bcf9e14530d7ff6951507f50c56b932d1f
                                                      • Opcode Fuzzy Hash: 9c11b2a4cf94016adbe46f41987ce67f399dd20175b5552a4b2bfc50b96cd780
                                                      • Instruction Fuzzy Hash: 95E0ED753442586EE240DAED6D81F96779C974A714F008122B998DB382D4719D118BA8
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00407B93
                                                        • Part of subcall function 00407940: GetLastError.KERNEL32(xz@,004079DE,?,?,020703AC,?,0040AB73,00000001,00000000,00000002,00000000,0040B16A,?,00000000,0040B1A1), ref: 00407943
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID:
                                                      • API String ID: 442123175-0
                                                      • Opcode ID: c995ec0617991e2e94a6585707192c72dfa586fe6c201feb7b9ef6767feef1e5
                                                      • Instruction ID: 9cacba7c6654c632647ec303d4b17c56949909c1fcff6adca1bc3dcca5067dcb
                                                      • Opcode Fuzzy Hash: c995ec0617991e2e94a6585707192c72dfa586fe6c201feb7b9ef6767feef1e5
                                                      • Instruction Fuzzy Hash: 52E0ED726081106BEB10E65A9984E9777ECDFC5364F00407BB648DB241D578AC058676
                                                      APIs
                                                      • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004095FB,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 00407757
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FormatMessage
                                                      • String ID:
                                                      • API String ID: 1306739567-0
                                                      • Opcode ID: ae2211e31bb54872ca0cc89886dd4699aa21f9c9d48a8aafd9a4e38039cc465e
                                                      • Instruction ID: 444c138c93f6580368b8f7bf76726c6abc5f79d38e46f5c5344eab39dd4d6646
                                                      • Opcode Fuzzy Hash: ae2211e31bb54872ca0cc89886dd4699aa21f9c9d48a8aafd9a4e38039cc465e
                                                      • Instruction Fuzzy Hash: 20E0D8A1B8830126F62426144C87F77110E43C0740F60403A7B04EF3D2D6FEB909429F
                                                      APIs
                                                      • SetEndOfFile.KERNEL32(?,02090000,0040AF31,00000000), ref: 00407B67
                                                        • Part of subcall function 00407940: GetLastError.KERNEL32(xz@,004079DE,?,?,020703AC,?,0040AB73,00000001,00000000,00000002,00000000,0040B16A,?,00000000,0040B1A1), ref: 00407943
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLast
                                                      • String ID:
                                                      • API String ID: 734332943-0
                                                      • Opcode ID: 1909adfb068d84a4c7c509a03c933fc32f464db51ef0452f103150ab7bc1f699
                                                      • Instruction ID: 97af4fe43c66ae010506ec3d7cd84cb65660405db9abbaf149828d557edbb573
                                                      • Opcode Fuzzy Hash: 1909adfb068d84a4c7c509a03c933fc32f464db51ef0452f103150ab7bc1f699
                                                      • Instruction Fuzzy Hash: F3C04CB160410057DB00A6AE85C1E1672D85A4825830040B6B604DB257D678E8108719
                                                      APIs
                                                      • SetErrorMode.KERNEL32(?,004074CD), ref: 004074C0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: b2df83a3f7eadccbe6543f05c1e4b9f9d7ac47d1857bfd650161f3857d5c0035
                                                      • Instruction ID: 2360f01ce0fe84dc83243c5f87e7f13f8f92df382308918f1fe84dd18a5cd7c9
                                                      • Opcode Fuzzy Hash: b2df83a3f7eadccbe6543f05c1e4b9f9d7ac47d1857bfd650161f3857d5c0035
                                                      • Instruction Fuzzy Hash: C8B09B76F1C2006DE705DAD5745153877D4D7C47103A14877F114D25C0D53C94108519
                                                      APIs
                                                      • SetErrorMode.KERNEL32(?,004074CD), ref: 004074C0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: eeeb51977643a1c07891125f237145a2d5169de148269e7e0dcbc59e3a378873
                                                      • Instruction ID: d86a438f0f99301b82867e6a10fbdb03c4267dfb17041a1f22e3924364c889c4
                                                      • Opcode Fuzzy Hash: eeeb51977643a1c07891125f237145a2d5169de148269e7e0dcbc59e3a378873
                                                      • Instruction Fuzzy Hash: 55A002A9D08104BACE10EAE58CD5A7D77A86A883047D048AA7215B2181C53DE911963B
                                                      APIs
                                                      • CharPrevA.USER32(?,?,00406DF4,?,00406AD1,?,?,004095D4,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409616), ref: 00406DFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CharPrev
                                                      • String ID:
                                                      • API String ID: 122130370-0
                                                      • Opcode ID: 1f54fb0d7342efd56636b4bf43ce0ada456b4309ba7930a48c32b3046dc9142d
                                                      • Instruction ID: 95ac89871b9e49aa2ffc5daef894b278f4bc9d8aafa7dca88aae54a0e9e7edad
                                                      • Opcode Fuzzy Hash: 1f54fb0d7342efd56636b4bf43ce0ada456b4309ba7930a48c32b3046dc9142d
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00408454
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 3554af80b116e35b21060cbbc6df44ef5282ed17f45008ec87b0ebbddb4e439e
                                                      • Instruction ID: f6409c4485ca7bd338f5543af8cc2530bb3769743075a02b7f3240cefa60082b
                                                      • Opcode Fuzzy Hash: 3554af80b116e35b21060cbbc6df44ef5282ed17f45008ec87b0ebbddb4e439e
                                                      • Instruction Fuzzy Hash: 3E1181716006059BDB00EF69C981B4B7794EF84359F04847EF998AB2C6DF38DC058B6A
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 51bc12226ee049d6fe29a1ee76e74a4f55284af631c21770742f8cdc5b2db1cc
                                                      • Instruction ID: d2bd3e7102ef9204b91f8816383c595cec19663beeae75bd92b4ab4675e4226e
                                                      • Opcode Fuzzy Hash: 51bc12226ee049d6fe29a1ee76e74a4f55284af631c21770742f8cdc5b2db1cc
                                                      • Instruction Fuzzy Hash: E401F772A042104BC310AF28DDC092A77D4DB84324F19497ED985B73A1D23B7C0587A8
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 066f784fd68329df4130f6e67c5a0e1de43b19e02d9a5afc60124be3f7097d47
                                                      • Instruction ID: 317b5c03ede138d5cd26287ffab94a369f1a3233cb4abf22224d679caf67fd96
                                                      • Opcode Fuzzy Hash: 066f784fd68329df4130f6e67c5a0e1de43b19e02d9a5afc60124be3f7097d47
                                                      • Instruction Fuzzy Hash: 30D05E91B00A6007E215E6BE598864A92D85F88685B08847AF644E73D1D67CAD018389
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00408351), ref: 00408383
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: da78ddfa397c9e2cdf4956a2ea141b2947b48037f15e72f78cdce16bc7675b7a
                                                      • Instruction ID: c3f7fe7f71c209b7548f3f70eea4568eea5cceda8148a565dbcaceff9471b988
                                                      • Opcode Fuzzy Hash: da78ddfa397c9e2cdf4956a2ea141b2947b48037f15e72f78cdce16bc7675b7a
                                                      • Instruction Fuzzy Hash: 9CD002B1755304AFDB90EEB94DC5B0237D87B48700F14457A6E44EB2C6E775D8108B14
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000028), ref: 0040992F
                                                      • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00409935
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040994E
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00409975
                                                      • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040997A
                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 0040998B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                      • String ID: SeShutdownPrivilege
                                                      • API String ID: 107509674-3733053543
                                                      • Opcode ID: 179ed9162b652ccf15c6d14b836035b236f42e51fdbed839cad4311b1fc8396b
                                                      • Instruction ID: 69b49e6867c4070d7a8a5f136f8c55bc3de077f0d280c98028d7d6ae56364c3e
                                                      • Opcode Fuzzy Hash: 179ed9162b652ccf15c6d14b836035b236f42e51fdbed839cad4311b1fc8396b
                                                      • Instruction Fuzzy Hash: 21F062F068430275E610ABB68C07F6B61885BC0B48F50193EBA55F52C3D7BCD804866F
                                                      APIs
                                                      • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 0040A116
                                                      • SizeofResource.KERNEL32(00000000,00000000,?,0040AB8B,00000000,0040B122,?,00000001,00000000,00000002,00000000,0040B16A,?,00000000,0040B1A1), ref: 0040A129
                                                      • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040AB8B,00000000,0040B122,?,00000001,00000000,00000002,00000000,0040B16A,?,00000000), ref: 0040A13B
                                                      • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040AB8B,00000000,0040B122,?,00000001,00000000,00000002,00000000,0040B16A), ref: 0040A14C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID:
                                                      • API String ID: 3473537107-0
                                                      • Opcode ID: 6d1e58e0e179c15565de9e5b9098d59155bd11748cd142999f7bb8aa7b6e98b6
                                                      • Instruction ID: 8b92cee28785ce20b64f8d9370ff96c2b68540d1e256e0df05e6767f26cc4d74
                                                      • Opcode Fuzzy Hash: 6d1e58e0e179c15565de9e5b9098d59155bd11748cd142999f7bb8aa7b6e98b6
                                                      • Instruction Fuzzy Hash: 10E07EE035830265EA103AFA0DC3B2A00484B6474DF05403FB700B92C7DDBCDC1591AE
                                                      APIs
                                                      • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004058E2,?,?,?,00000000,00405A94), ref: 004056F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: c7e217b6e51c096be6b931cb56113e619872b2713a6c7d1a918660c486d4d873
                                                      • Instruction ID: d144edb85d9c502d4ea0939edf991ab5ce3f28f90927345f3a95d007e4e99129
                                                      • Opcode Fuzzy Hash: c7e217b6e51c096be6b931cb56113e619872b2713a6c7d1a918660c486d4d873
                                                      • Instruction Fuzzy Hash: DCD0A7AA31E250BAE310519B2D85EBB4BDCCBC57B4F14443FFA48D7242D2248C06A7B6
                                                      APIs
                                                      • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: SystemTime
                                                      • String ID:
                                                      • API String ID: 2656138-0
                                                      • Opcode ID: 9ed56ef6959dd8920af8b6d924cbc2bc4732ada3ba303b98172f22f33df6bd3d
                                                      • Instruction ID: 8398a6df79db6557de4560d78939933842e781e1ed99b38cfbf2fd723ed8f470
                                                      • Opcode Fuzzy Hash: 9ed56ef6959dd8920af8b6d924cbc2bc4732ada3ba303b98172f22f33df6bd3d
                                                      • Instruction Fuzzy Hash: 3BE04F21E0010A42C704ABA5CD435FDF7AEAB95604F044172A418E92E0F631C252C748
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                      • Instruction ID: 3b27ac6c5e0f9a5810868b706c98a54019571903b6d877547466b603179570a7
                                                      • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                      • Instruction Fuzzy Hash: 9E32D674E04219DFCB14CF99CA80A9DBBB2BF88314F24816AD855B7385DB34AE42CF55
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,004075DD,?,00000000,00409DF0), ref: 00407501
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407507
                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,004075DD,?,00000000,00409DF0), ref: 00407555
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressCloseHandleModuleProc
                                                      • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                      • API String ID: 4190037839-2401316094
                                                      • Opcode ID: 0178f007b2e9ce97110c2286f944ebc52b58938adea7bd75e582725685aec29c
                                                      • Instruction ID: 86f2a6ba799f7653865fc0e2ce0ef1955b98c5cb30eb2cc475413799582f5e83
                                                      • Opcode Fuzzy Hash: 0178f007b2e9ce97110c2286f944ebc52b58938adea7bd75e582725685aec29c
                                                      • Instruction Fuzzy Hash: 27215570E48205BBDB00EAA5CC55BDF77A8AB44354F50887BA501F76C1DB7CBA04865E
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                      • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                      • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                      • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                      • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                      • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                      • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                      • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                      • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                      • String ID:
                                                      • API String ID: 1694776339-0
                                                      • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                      • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                      • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                      • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                      APIs
                                                      • RtlEnterCriticalSection.KERNEL32(0040D41C,00000000,00401AB4), ref: 00401A09
                                                      • LocalFree.KERNEL32(00433D88,00000000,00401AB4), ref: 00401A1B
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00433D88,00000000,00401AB4), ref: 00401A3A
                                                      • LocalFree.KERNEL32(00434D88,?,00000000,00008000,00433D88,00000000,00401AB4), ref: 00401A79
                                                      • RtlLeaveCriticalSection.KERNEL32(0040D41C,00401ABB), ref: 00401AA4
                                                      • RtlDeleteCriticalSection.KERNEL32(0040D41C,00401ABB), ref: 00401AAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                      • String ID: |SC
                                                      • API String ID: 3782394904-3706279579
                                                      • Opcode ID: 11cd0e1b4d10db7b8e02ae656c4499af271f9fd0eb7f0a46b5c3575f739066d3
                                                      • Instruction ID: 2a1e8c518b16d72ac75c21d19d034316e64e92064156904d4596c6339aa50fda
                                                      • Opcode Fuzzy Hash: 11cd0e1b4d10db7b8e02ae656c4499af271f9fd0eb7f0a46b5c3575f739066d3
                                                      • Instruction Fuzzy Hash: 65114274B422805ADB11EBE99EC6F5276689785708F44407FF448B62F2C67CA848CB6D
                                                      APIs
                                                      • GetSystemDefaultLCID.KERNEL32(00000000,00405A94,?,?,?,?,00000000,00000000,00000000,?,00406A73,00000000,00406A86), ref: 00405866
                                                        • Part of subcall function 00405694: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040D4C0,00000001,?,0040575F,?,00000000,0040583E), ref: 004056B2
                                                        • Part of subcall function 004056E0: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004058E2,?,?,?,00000000,00405A94), ref: 004056F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale$DefaultSystem
                                                      • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                      • API String ID: 1044490935-665933166
                                                      • Opcode ID: 5a553179c7555abcfcf22225c6a629e87a34c3027ea7095babbe5e1ef45f2de3
                                                      • Instruction ID: 6fbfddc16810fcf353c8d16d6476d0df8e1e1129542ac215d571de96c8bf2126
                                                      • Opcode Fuzzy Hash: 5a553179c7555abcfcf22225c6a629e87a34c3027ea7095babbe5e1ef45f2de3
                                                      • Instruction Fuzzy Hash: A8512034B005486BDB00EBA59891A8F7769DB98304F50D87BB505BB3C6DA3DDE098F5C
                                                      APIs
                                                      • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                      • ExitProcess.KERNEL32 ref: 00403DE5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ExitMessageProcess
                                                      • String ID: Error$Runtime error at 00000000$9@
                                                      • API String ID: 1220098344-1503883590
                                                      • Opcode ID: 06c1af3a807ed13e53e556f1551eab319716f56e5b0a099a7904d38b73613604
                                                      • Instruction ID: 19c161ad1fd1f445befe0ff666437f64548d8e35ccd3b0abec794ae5707e41c3
                                                      • Opcode Fuzzy Hash: 06c1af3a807ed13e53e556f1551eab319716f56e5b0a099a7904d38b73613604
                                                      • Instruction Fuzzy Hash: 0421C834E152418AE714EFE59A817153E989B5930DF04817BD504B73E3C67C9A4EC36E
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                      • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                      • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocString
                                                      • String ID:
                                                      • API String ID: 262959230-0
                                                      • Opcode ID: a67f2483392f3a9295a6f421ec51b00ba0520a603cf3575c2b5e933881db78c1
                                                      • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                      • Opcode Fuzzy Hash: a67f2483392f3a9295a6f421ec51b00ba0520a603cf3575c2b5e933881db78c1
                                                      • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                      APIs
                                                      • RtlUnwind.KERNEL32(?,0040303C,00000000,00000000), ref: 00403037
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Unwind
                                                      • String ID: a@$,`@
                                                      • API String ID: 3419175465-3299659662
                                                      • Opcode ID: 74c36dcaebc9beb569fc9a652e38c4b91acfc0ad3c1c730ca21132f2aeeaf1ad
                                                      • Instruction ID: e18fd8dce0ff00c2f0e26d0eabb8ee8c5bb09bfe6675b42a72717897def5721e
                                                      • Opcode Fuzzy Hash: 74c36dcaebc9beb569fc9a652e38c4b91acfc0ad3c1c730ca21132f2aeeaf1ad
                                                      • Instruction Fuzzy Hash: 951182352042029BD724DE18CA89B2777B5AB44744F24C13AA404AB3DAC77CDC81A769
                                                      APIs
                                                      • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 0040A195
                                                      Strings
                                                      • Setup, xrefs: 0040A185
                                                      • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 0040A179
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                      • API String ID: 2030045667-3271211647
                                                      • Opcode ID: 2fcb4469882f519d07bdc4c54c2b2bf709aeffd752a3b32377c5605777b8a92b
                                                      • Instruction ID: 75c34cc78b7437cb0ca87fafc7654258806437370cb031ed823535619a0dd887
                                                      • Opcode Fuzzy Hash: 2fcb4469882f519d07bdc4c54c2b2bf709aeffd752a3b32377c5605777b8a92b
                                                      • Instruction Fuzzy Hash: 8BE0E5302043087EE301EA629C03F5A7BACE7CAB04F600477F900B55C1C6786E10842D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000,0040AAE6), ref: 004030E3
                                                      • GetCommandLineA.KERNEL32(00000000,0040AAE6), ref: 004030EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CommandHandleLineModule
                                                      • String ID: U1hd.@
                                                      • API String ID: 2123368496-2904493091
                                                      • Opcode ID: 4ac654993ecb6f0c10b1cacd39e13426f3fb1ace3b4aa0046ecf3c9b516135ec
                                                      • Instruction ID: daea45a2aa12e23edc1a75ca5ccfa9dec32d0aab9986280789c112b27ba3568a
                                                      • Opcode Fuzzy Hash: 4ac654993ecb6f0c10b1cacd39e13426f3fb1ace3b4aa0046ecf3c9b516135ec
                                                      • Instruction Fuzzy Hash: 3AC0027894134055D764AFF69E497047594A74930DF40443FA20C7A1F1D67C460A6BDD
                                                      APIs
                                                      • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040B0C5,000000FA,00000032,0040B12C), ref: 004099CF
                                                      • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040B0C5,000000FA,00000032,0040B12C), ref: 004099DF
                                                      • GetLastError.KERNEL32(?,?,?,0000000D,?,0040B0C5,000000FA,00000032,0040B12C), ref: 004099F2
                                                      • GetLastError.KERNEL32(?,?,?,0000000D,?,0040B0C5,000000FA,00000032,0040B12C), ref: 004099FC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.3380259838.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.3380241123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380278836.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.3380294230.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastSleep
                                                      • String ID:
                                                      • API String ID: 1458359878-0
                                                      • Opcode ID: c7bd6a21121ddb9efccb4cc95de40b345340be1ee537211c691cca6293df28a9
                                                      • Instruction ID: eb7512966d821cc35779f37d74516ce45850f6d6c39c5245c2e713911e3afcfa
                                                      • Opcode Fuzzy Hash: c7bd6a21121ddb9efccb4cc95de40b345340be1ee537211c691cca6293df28a9
                                                      • Instruction Fuzzy Hash: F9F0BBB27012986BCB24A5AE8C86A6FB348EAD1358710403FF504F7393D439DC0156A9

                                                      Execution Graph

                                                      Execution Coverage:7.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:6.1%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:103
                                                      execution_graph 69304 40d0c4 69307 4073a0 WriteFile 69304->69307 69308 4073bd 69307->69308 69309 402584 69310 402598 69309->69310 69311 4025ab 69309->69311 69339 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 69310->69339 69313 4025c2 RtlEnterCriticalSection 69311->69313 69314 4025cc 69311->69314 69313->69314 69325 4023b4 13 API calls 69314->69325 69315 40259d 69315->69311 69317 4025a1 69315->69317 69318 4025d5 69319 4025d9 69318->69319 69326 402088 69318->69326 69321 402635 69319->69321 69322 40262b RtlLeaveCriticalSection 69319->69322 69322->69321 69323 4025e5 69323->69319 69340 402210 9 API calls 69323->69340 69325->69318 69327 40209c 69326->69327 69328 4020af 69326->69328 69347 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 69327->69347 69330 4020c6 RtlEnterCriticalSection 69328->69330 69333 4020d0 69328->69333 69330->69333 69331 4020a1 69331->69328 69332 4020a5 69331->69332 69338 402106 69332->69338 69333->69338 69341 401f94 69333->69341 69336 4021f1 RtlLeaveCriticalSection 69337 4021fb 69336->69337 69337->69323 69338->69323 69339->69315 69340->69319 69344 401fa4 69341->69344 69342 401fd0 69346 401ff4 69342->69346 69353 401db4 69342->69353 69344->69342 69344->69346 69348 401f0c 69344->69348 69346->69336 69346->69337 69347->69331 69357 40178c 69348->69357 69351 401f29 69351->69344 69354 401e02 69353->69354 69355 401dd2 69353->69355 69354->69355 69385 401d1c 69354->69385 69355->69346 69358 4017a8 69357->69358 69360 4017b2 69358->69360 69364 401803 69358->69364 69366 40180f 69358->69366 69368 4014e4 69358->69368 69377 4013e0 LocalAlloc 69358->69377 69376 401678 VirtualAlloc 69360->69376 69363 4017be 69363->69366 69378 4015c0 VirtualFree 69364->69378 69366->69351 69367 401e80 9 API calls 69366->69367 69367->69351 69369 4014f3 VirtualAlloc 69368->69369 69371 401520 69369->69371 69372 401543 69369->69372 69379 401398 69371->69379 69372->69358 69375 401530 VirtualFree 69375->69372 69376->69363 69377->69358 69378->69366 69382 401340 69379->69382 69383 40134c LocalAlloc 69382->69383 69384 40135e 69382->69384 69383->69384 69384->69372 69384->69375 69386 401d2e 69385->69386 69387 401d51 69386->69387 69388 401d63 69386->69388 69398 401940 69387->69398 69389 401940 3 API calls 69388->69389 69391 401d61 69389->69391 69392 401d79 69391->69392 69408 401bf8 9 API calls 69391->69408 69392->69355 69394 401d88 69395 401da2 69394->69395 69409 401c4c 9 API calls 69394->69409 69410 401454 LocalAlloc 69395->69410 69399 401966 69398->69399 69407 4019bf 69398->69407 69411 40170c 69399->69411 69403 401983 69404 40199a 69403->69404 69416 4015c0 VirtualFree 69403->69416 69404->69407 69417 401454 LocalAlloc 69404->69417 69407->69391 69408->69394 69409->69395 69410->69392 69412 401743 69411->69412 69413 401783 69412->69413 69414 40175d VirtualFree 69412->69414 69415 4013e0 LocalAlloc 69413->69415 69414->69412 69415->69403 69416->69404 69417->69407 69418 413acc SetWindowLongA GetWindowLongA 69419 413b29 SetPropA SetPropA 69418->69419 69420 413b0b GetWindowLongA 69418->69420 69424 41f82c KiUserCallbackDispatcher 69419->69424 69420->69419 69421 413b1a SetWindowLongA 69420->69421 69421->69419 69422 413b79 69424->69422 69425 42488c PeekMessageA 69426 424930 69425->69426 69427 4248af 69425->69427 69427->69426 69437 42485c 69427->69437 69436 42491a TranslateMessage DispatchMessageA 69436->69426 69438 424884 69437->69438 69439 42486d 69437->69439 69438->69426 69441 4247a8 69438->69441 69439->69438 69456 425148 UnhookWindowsHookEx TerminateThread KillTimer IsWindowVisible ShowWindow 69439->69456 69442 4247f2 69441->69442 69443 4247b8 69441->69443 69442->69426 69445 4247f8 69442->69445 69443->69442 69444 4247df TranslateMDISysAccel 69443->69444 69444->69442 69446 424854 69445->69446 69447 42480d 69445->69447 69446->69426 69453 424784 69446->69453 69447->69446 69448 424815 GetCapture 69447->69448 69448->69446 69449 42481e 69448->69449 69450 424837 SendMessageA 69449->69450 69452 424830 69449->69452 69450->69446 69451 424852 69450->69451 69451->69446 69452->69450 69454 424797 IsDialogMessage 69453->69454 69455 4247a4 69453->69455 69454->69455 69455->69426 69455->69436 69456->69438 69457 1001568e 69485 100180a9 69457->69485 69461 1001585d 69462 10015703 69530 10017a34 66 API calls _memcpy_s 69462->69530 69464 10015713 69465 10015729 69464->69465 69466 1001571c 69464->69466 69479 10015726 69465->69479 69531 1001449e 10 API calls 3 library calls 69466->69531 69469 1001578c 69469->69479 69491 1001d1e3 69469->69491 69470 10015749 ___TypeMatch _strlen 69473 100157fd _memcpy_s 69470->69473 69490 10015389 66 API calls 4 library calls 69470->69490 69474 100157f8 _memcpy_s 69473->69474 69474->69473 69535 10017a34 66 API calls _memcpy_s 69474->69535 69477 10015835 69477->69479 69536 1001449e 10 API calls 3 library calls 69477->69536 69478 100157c2 69533 1001cbb6 66 API calls _memcpy_s 69478->69533 69479->69465 69537 100140f3 5 API calls __invoke_watson 69479->69537 69483 100157e5 69483->69473 69534 1001449e 10 API calls 3 library calls 69483->69534 69538 10018026 GetLastError 69485->69538 69487 100180af 69488 100156c0 69487->69488 69554 100184ae 66 API calls 3 library calls 69487->69554 69488->69462 69488->69470 69488->69479 69490->69469 69492 100180a9 __setmbcp 66 API calls 69491->69492 69496 1001d1ec 69492->69496 69493 1001d1fe GetUserDefaultLCID 69509 1001d277 69493->69509 69495 1001d229 69497 1001d280 69495->69497 69501 1001d239 69495->69501 69496->69493 69496->69495 69573 1001cc69 99 API calls _LangCountryEnumProc@4 69496->69573 69497->69493 69502 1001d28a _strlen 69497->69502 69500 1001d24a 69575 1001d1a7 EnumSystemLocalesA _GetPrimaryLen _strlen 69500->69575 69501->69500 69505 1001d243 69501->69505 69507 1001d290 EnumSystemLocalesA 69502->69507 69574 1001d142 EnumSystemLocalesA _GetPrimaryLen _strlen 69505->69574 69507->69509 69508 1001d248 69508->69509 69576 1001cc69 99 API calls _LangCountryEnumProc@4 69508->69576 69516 100157a1 69509->69516 69565 1001ccc9 69509->69565 69511 1001d307 IsValidCodePage 69513 1001d319 IsValidLocale 69511->69513 69511->69516 69512 1001d261 69512->69509 69515 1001d279 69512->69515 69517 1001d272 69512->69517 69514 1001d32c 69513->69514 69513->69516 69514->69516 69519 1001d381 GetLocaleInfoA 69514->69519 69520 1001d35c 69514->69520 69578 1001d1a7 EnumSystemLocalesA _GetPrimaryLen _strlen 69515->69578 69516->69479 69532 100154b2 66 API calls 3 library calls 69516->69532 69577 1001d142 EnumSystemLocalesA _GetPrimaryLen _strlen 69517->69577 69519->69516 69523 1001d392 GetLocaleInfoA 69519->69523 69579 10017a34 66 API calls _memcpy_s 69520->69579 69523->69516 69525 1001d3a6 69523->69525 69524 1001d369 69524->69523 69526 1001d370 69524->69526 69581 10023849 66 API calls _xtoa_s@20 69525->69581 69580 1001449e 10 API calls 3 library calls 69526->69580 69529 1001d37c 69529->69523 69530->69464 69531->69479 69532->69478 69533->69483 69534->69474 69535->69477 69536->69479 69537->69461 69555 10017ef2 TlsGetValue 69538->69555 69541 10018049 69542 1001809d SetLastError 69541->69542 69543 1001804f 69541->69543 69542->69487 69560 100173c5 66 API calls __calloc_impl 69543->69560 69545 1001805b 69545->69542 69561 10017e6b TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 69545->69561 69547 10018075 69548 10018094 69547->69548 69549 1001807c 69547->69549 69563 10014d9a 66 API calls 7 library calls 69548->69563 69562 10017f72 66 API calls 4 library calls 69549->69562 69552 10018084 GetCurrentThreadId 69552->69542 69553 1001809a 69553->69542 69554->69488 69556 10017f02 69555->69556 69557 10017f1b TlsGetValue 69555->69557 69564 10017e6b TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 69556->69564 69557->69541 69559 10017f0d TlsSetValue 69559->69557 69560->69545 69561->69547 69562->69552 69563->69553 69564->69559 69572 1001cce0 ___TypeMatch 69565->69572 69566 1001cd1c GetLocaleInfoA 69567 1001cd32 69566->69567 69568 1001cd29 69566->69568 69583 100140f3 5 API calls __invoke_watson 69567->69583 69582 100142c9 88 API calls _strtol 69568->69582 69570 1001cd3e 69570->69511 69570->69516 69572->69566 69572->69568 69573->69495 69574->69508 69575->69508 69576->69512 69577->69509 69578->69509 69579->69524 69580->69529 69581->69516 69582->69567 69583->69570 69584 482cd8 69585 482ce1 69584->69585 69586 482d0b 69585->69586 69587 482ced 69585->69587 69995 481580 24 API calls 69586->69995 69589 482d02 69587->69589 69993 481750 43 API calls 69587->69993 69994 481580 24 API calls 69589->69994 69592 482d46 69595 482d85 69592->69595 69997 4816e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 69592->69997 69593 482d09 69593->69592 69718 478dc4 69593->69718 69596 482da9 69595->69596 69599 482d9c 69595->69599 69600 482d9e 69595->69600 69602 482dbb 69596->69602 69603 482dc1 69596->69603 69598 482d78 69998 481750 43 API calls 69598->69998 69610 48172c 43 API calls 69599->69610 69999 4817c0 43 API calls 69600->69999 69604 482dbf 69602->69604 69751 48172c 69602->69751 69603->69604 69607 48172c 43 API calls 69603->69607 69756 47e8a8 69604->69756 69607->69604 69610->69596 69612 482de8 70081 4790d8 69718->70081 70736 481214 43 API calls 69751->70736 69753 481747 70737 409070 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 69753->70737 70738 42dd28 GetWindowsDirectoryA 69756->70738 69759 403450 4 API calls 69760 47e8d9 69759->69760 70741 42dd54 GetSystemDirectoryA 69760->70741 69763 403450 4 API calls 69764 47e8ee 69763->69764 70744 42dd80 69764->70744 69766 47e8f6 69767 403450 4 API calls 69766->69767 69768 47e903 69767->69768 69769 47e90c 69768->69769 69770 47e928 69768->69770 70778 42d698 69769->70778 69772 403400 4 API calls 69770->69772 69774 47e926 69772->69774 69776 47e96d 69774->69776 70786 42cd5c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 69774->70786 69775 403450 4 API calls 69775->69774 70748 47e730 69776->70748 69779 47e948 69781 403450 4 API calls 69779->69781 69783 47e955 69781->69783 69782 403450 4 API calls 69784 47e989 69782->69784 69783->69776 69786 403450 4 API calls 69783->69786 69785 47e9a7 69784->69785 69787 4035c0 4 API calls 69784->69787 69788 47e730 8 API calls 69785->69788 69786->69776 69787->69785 69789 47e9b6 69788->69789 69790 403450 4 API calls 69789->69790 69791 47e9c3 69790->69791 69792 47e9eb 69791->69792 69793 42c88c 5 API calls 69791->69793 69794 47ea52 69792->69794 69797 47e730 8 API calls 69792->69797 69795 47e9d9 69793->69795 69796 47eb18 69794->69796 69801 47ea72 SHGetKnownFolderPath 69794->69801 69800 4035c0 4 API calls 69795->69800 69798 47eb42 69796->69798 69799 47eb21 69796->69799 69802 47ea03 69797->69802 70759 42c88c 69798->70759 69803 42c88c 5 API calls 69799->69803 69800->69792 69805 47eac5 SHGetKnownFolderPath 69801->69805 69806 47ea8c 69801->69806 69807 403450 4 API calls 69802->69807 69808 47eb2e 69803->69808 69805->69796 69812 47eadf 69805->69812 70789 403ba4 7 API calls 69806->70789 69811 47ea10 69807->69811 69813 4035c0 4 API calls 69808->69813 69816 47ea23 69811->69816 70787 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 69811->70787 70790 403ba4 7 API calls 69812->70790 69815 47eaa7 CoTaskMemFree 69815->69612 69821 47e730 8 API calls 69816->69821 69820 47eafa CoTaskMemFree 69820->69612 69993->69589 69994->69593 69995->69593 69997->69598 69998->69595 69999->69596 70082 4790e2 70081->70082 70215 4985e8 70082->70215 70216 4985f1 70215->70216 70259 42063c 70216->70259 70218 498618 70260 42064c 70259->70260 70269 420778 70260->70269 70262 420664 70263 42075c 70262->70263 70277 40b408 70262->70277 70263->70218 70270 420782 70269->70270 70284 4200e0 70270->70284 70272 420798 70288 41ac28 70272->70288 70274 420833 70296 414754 70274->70296 70276 420844 70276->70262 70278 40b419 70277->70278 70285 4200e6 70284->70285 70300 415ddc 70285->70300 70287 4200fb 70287->70272 70289 41ac2f 70288->70289 70290 41a574 4 API calls 70289->70290 70291 41ac50 70290->70291 70336 41a8bc 70291->70336 70294 41aa74 4 API calls 70295 41ac86 70294->70295 70295->70274 70297 41475f 70296->70297 70299 414766 70296->70299 70340 414720 25 API calls 70297->70340 70299->70276 70301 415de6 70300->70301 70310 41476c 70301->70310 70305 415e07 70319 41aa74 70305->70319 70308 41ab3c 5 API calls 70309 415e2b 70308->70309 70309->70287 70311 414776 70310->70311 70323 4104c0 70311->70323 70316 41f854 70317 41f864 VirtualAlloc 70316->70317 70318 41f892 70316->70318 70317->70318 70318->70305 70320 41aa7a 70319->70320 70321 419fec 4 API calls 70320->70321 70322 415e19 70321->70322 70322->70308 70324 4104c7 70323->70324 70325 4104ea 70324->70325 70331 410658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 70324->70331 70327 41a574 70325->70327 70328 41a57a 70327->70328 70332 419fec 70328->70332 70330 4147a2 70330->70316 70331->70325 70333 419fff 70332->70333 70334 402648 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 70333->70334 70335 41a034 70333->70335 70334->70335 70335->70330 70337 41a8c2 70336->70337 70338 419fec 4 API calls 70337->70338 70339 41a8dd 70338->70339 70339->70294 70340->70299 70736->69753 70791 407974 70738->70791 70742 407974 4 API calls 70741->70742 70743 42dd75 70742->70743 70743->69763 70745 403400 4 API calls 70744->70745 70746 42dd90 GetModuleHandleA GetProcAddress 70745->70746 70747 42dda9 70746->70747 70747->69766 70749 42e2ac RegOpenKeyExA 70748->70749 70750 47e756 70749->70750 70751 47e77c 70750->70751 70752 47e75a 70750->70752 70754 403400 4 API calls 70751->70754 70753 42e1dc 6 API calls 70752->70753 70755 47e766 70753->70755 70756 47e783 70754->70756 70757 47e771 RegCloseKey 70755->70757 70758 403400 4 API calls 70755->70758 70756->69782 70757->70756 70758->70757 70760 42c896 70759->70760 70761 42c8b9 70759->70761 70800 42ce0c CharPrevA 70760->70800 70762 403494 4 API calls 70761->70762 70779 4038a4 4 API calls 70778->70779 70780 42d6ab 70779->70780 70781 42d6c2 GetEnvironmentVariableA 70780->70781 70785 42d6d5 70780->70785 70801 42e060 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 70780->70801 70781->70780 70782 42d6ce 70781->70782 70783 403400 4 API calls 70782->70783 70783->70785 70785->69775 70786->69779 70787->69816 70789->69815 70790->69820 70794 40352c 70791->70794 70797 4034e0 70794->70797 70795 4034bc 4 API calls 70796 4034f0 70795->70796 70798 403400 4 API calls 70796->70798 70797->70795 70799 403508 70798->70799 70799->69759 70801->70780 71135 4924d8 71136 49250a 71135->71136 71137 492502 71135->71137 71139 492521 71136->71139 71143 492537 71136->71143 71169 48f2d8 19 API calls 71137->71169 71152 4474e8 71139->71152 71144 4474e8 18 API calls 71143->71144 71151 492535 71143->71151 71145 492553 71144->71145 71170 47885c 190 API calls 71145->71170 71146 403400 4 API calls 71148 492581 71146->71148 71149 49255b 71171 447768 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 71149->71171 71151->71146 71153 4474f0 71152->71153 71172 436568 71153->71172 71155 44750f 71156 478744 71155->71156 71197 4786e4 71156->71197 71158 478771 71159 4787d0 71158->71159 71165 42cdbc 5 API calls 71158->71165 71167 4787af 71158->71167 71160 407d84 19 API calls 71159->71160 71161 4787ed 71160->71161 71228 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71161->71228 71163 4787ca 71164 403420 4 API calls 71163->71164 71166 47880f 71164->71166 71165->71158 71166->71151 71202 478520 71167->71202 71169->71136 71170->71149 71171->71151 71173 436574 71172->71173 71174 436596 71172->71174 71173->71174 71194 40909c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71173->71194 71175 436619 71174->71175 71177 436601 71174->71177 71178 4365f5 71174->71178 71179 4365e9 71174->71179 71180 4365dd 71174->71180 71181 43660d 71174->71181 71196 40909c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71175->71196 71187 403494 4 API calls 71177->71187 71186 40352c 4 API calls 71178->71186 71185 403510 4 API calls 71179->71185 71184 403510 4 API calls 71180->71184 71195 4040e8 18 API calls 71181->71195 71190 4365e6 71184->71190 71191 4365f2 71185->71191 71192 4365fe 71186->71192 71188 43660a 71187->71188 71188->71155 71189 436616 71189->71155 71190->71155 71191->71155 71192->71155 71193 43662a 71193->71155 71194->71174 71195->71189 71196->71193 71198 403494 4 API calls 71197->71198 71199 4786f3 71198->71199 71200 478734 71199->71200 71201 403800 4 API calls 71199->71201 71200->71158 71201->71199 71203 42c88c 5 API calls 71202->71203 71204 478553 71203->71204 71205 4035c0 4 API calls 71204->71205 71206 478560 71205->71206 71207 403494 4 API calls 71206->71207 71208 47856d 71207->71208 71209 40357c 4 API calls 71208->71209 71210 478578 71209->71210 71211 4585a0 24 API calls 71210->71211 71212 478580 71211->71212 71213 4785a4 71212->71213 71214 42cde4 5 API calls 71212->71214 71229 453754 71213->71229 71216 478599 71214->71216 71255 456a30 13 API calls 71216->71255 71217 4785bd 71233 46f1ec 71217->71233 71220 4785ea 71247 46f504 71220->71247 71223 47860e 71225 478629 SetFileTime 71223->71225 71224 47861c LocalFileTimeToFileTime 71224->71225 71226 402b58 DestroyWindow 71225->71226 71227 478652 71226->71227 71227->71163 71228->71163 71230 45375d 71229->71230 71256 450f04 71230->71256 71234 46f212 71233->71234 71235 46f208 71233->71235 71238 46f245 71234->71238 71297 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71234->71297 71296 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71235->71296 71245 46f301 71238->71245 71275 46ee58 71238->71275 71240 46f2aa 71241 46f2e0 71240->71241 71298 46ea70 25 API calls 71240->71298 71243 46f2f5 71241->71243 71299 46ea70 25 API calls 71241->71299 71243->71245 71300 46f06c 25 API calls 71243->71300 71245->71220 71248 46f50d 71247->71248 71248->71248 71249 46f541 71248->71249 71313 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71248->71313 71309 451104 SetEndOfFile 71249->71309 71252 46f67c 71252->71223 71252->71224 71253 46f578 71253->71252 71314 46ea70 25 API calls 71253->71314 71255->71213 71257 450f0e 71256->71257 71263 45379c 71257->71263 71271 450f9c 71257->71271 71258 450f3a 71259 450f4e 71258->71259 71274 450e8c 21 API calls 71258->71274 71259->71217 71264 452efc 2 API calls 71263->71264 71265 4537b6 71264->71265 71266 4537ba 71265->71266 71267 450f9c CreateFileA 71265->71267 71266->71258 71268 4537e4 GetLastError 71267->71268 71269 452f38 Wow64RevertWow64FsRedirection 71268->71269 71270 453804 71269->71270 71270->71258 71272 403738 71271->71272 71273 450fdb CreateFileA 71272->71273 71273->71258 71274->71259 71276 46ef4f 71275->71276 71277 46ee81 71275->71277 71278 403400 4 API calls 71276->71278 71301 42e814 71277->71301 71280 46ef67 71278->71280 71280->71240 71282 46eea7 71285 403494 4 API calls 71282->71285 71283 46ee99 71304 46ebb0 158 API calls 71283->71304 71286 46eea5 71285->71286 71287 450f04 26 API calls 71286->71287 71288 46eeca 71287->71288 71288->71276 71291 46eef5 71288->71291 71305 46ea70 25 API calls 71288->71305 71290 46ef13 71294 46ef32 71290->71294 71307 46ea70 25 API calls 71290->71307 71291->71290 71306 46ea70 25 API calls 71291->71306 71294->71276 71296->71234 71297->71238 71298->71241 71299->71243 71300->71245 71302 402b58 DestroyWindow 71301->71302 71303 42e821 71302->71303 71303->71282 71303->71283 71304->71286 71305->71291 71306->71290 71307->71294 71310 451114 71309->71310 71311 45111b 71309->71311 71315 450e8c 21 API calls 71310->71315 71311->71253 71313->71249 71314->71252 71315->71311 71316 435dd0 71317 435de5 71316->71317 71321 435dff 71317->71321 71322 4357b8 71317->71322 71336 435802 71322->71336 71338 4357e8 71322->71338 71323 403400 4 API calls 71324 435c07 71323->71324 71324->71321 71363 435c18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71324->71363 71325 447294 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71325->71338 71326 4359bc 71328 402b58 DestroyWindow 71326->71328 71327 43584a 71329 402b58 DestroyWindow 71327->71329 71328->71336 71329->71336 71330 4359ed 71331 402b58 DestroyWindow 71330->71331 71331->71336 71332 435a39 71333 402b58 DestroyWindow 71332->71333 71333->71336 71334 43588d 71335 402b58 DestroyWindow 71334->71335 71335->71336 71336->71323 71337 402648 4 API calls 71337->71338 71338->71325 71338->71326 71338->71327 71338->71330 71338->71332 71338->71334 71338->71336 71338->71337 71339 4358e8 71338->71339 71343 43595c 71338->71343 71344 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71338->71344 71345 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71338->71345 71347 435bce 71338->71347 71348 435a9d 71338->71348 71349 435ac1 71338->71349 71353 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71338->71353 71354 435b00 71338->71354 71356 435b31 71338->71356 71358 435b55 71338->71358 71360 435b94 71338->71360 71364 4348a0 71338->71364 71376 435064 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71338->71376 71377 432190 71338->71377 71340 402b58 DestroyWindow 71339->71340 71340->71336 71346 402b58 DestroyWindow 71343->71346 71344->71338 71345->71338 71346->71336 71350 402b58 DestroyWindow 71347->71350 71351 402b58 DestroyWindow 71348->71351 71352 402b58 DestroyWindow 71349->71352 71350->71336 71351->71336 71352->71336 71353->71338 71355 402b58 DestroyWindow 71354->71355 71355->71336 71357 402b58 DestroyWindow 71356->71357 71357->71336 71359 402b58 DestroyWindow 71358->71359 71359->71336 71361 402b58 DestroyWindow 71360->71361 71361->71336 71363->71321 71365 43495d 71364->71365 71366 4348cd 71364->71366 71408 434800 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71365->71408 71368 403494 4 API calls 71366->71368 71369 4348db 71368->71369 71370 403778 4 API calls 71369->71370 71374 4348fc 71370->71374 71371 403400 4 API calls 71372 4349ad 71371->71372 71372->71338 71373 43494f 71373->71371 71374->71373 71383 497570 71374->71383 71376->71338 71378 43219e 71377->71378 71381 4321b0 71377->71381 71483 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71378->71483 71380 4321d2 71380->71338 71381->71380 71484 432130 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71381->71484 71384 4975b0 71383->71384 71385 403494 4 API calls 71384->71385 71386 4975bb 71385->71386 71387 4037b8 4 API calls 71386->71387 71405 4975cd 71386->71405 71392 4975e6 71387->71392 71388 403400 4 API calls 71389 497780 71388->71389 71390 403420 4 API calls 71389->71390 71391 49778d 71390->71391 71391->71374 71393 403778 4 API calls 71392->71393 71392->71405 71394 497614 71393->71394 71395 4037b8 4 API calls 71394->71395 71396 497623 71395->71396 71397 403778 4 API calls 71396->71397 71396->71405 71398 497651 71397->71398 71399 4976ce 71398->71399 71409 42d1b4 71398->71409 71413 4804a8 71398->71413 71443 448e58 71399->71443 71400 497696 71402 403778 4 API calls 71400->71402 71403 4976be 71402->71403 71404 403634 4 API calls 71403->71404 71404->71399 71405->71388 71408->71373 71410 403738 71409->71410 71411 42d1be GetFileAttributesA 71410->71411 71412 42d1c9 71411->71412 71412->71400 71419 4804c6 71413->71419 71414 4804de 71415 403400 4 API calls 71414->71415 71416 4804e5 71415->71416 71422 403420 4 API calls 71416->71422 71417 48053a 71424 48061b 71417->71424 71425 48054d 71417->71425 71418 480518 71421 403400 4 API calls 71418->71421 71419->71414 71419->71417 71419->71418 71420 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71419->71420 71420->71419 71421->71416 71423 480649 71422->71423 71423->71400 71428 47e4a8 44 API calls 71424->71428 71426 480565 71425->71426 71427 480556 71425->71427 71430 403778 4 API calls 71426->71430 71429 403400 4 API calls 71427->71429 71431 480625 71428->71431 71429->71416 71440 48057a 71430->71440 71432 403450 4 API calls 71431->71432 71432->71416 71433 403494 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71433->71440 71434 403778 4 API calls 71434->71440 71435 4037b8 4 API calls 71435->71440 71436 47e4a8 44 API calls 71436->71440 71437 42c88c 5 API calls 71437->71440 71438 4035c0 4 API calls 71438->71440 71439 42d1b4 GetFileAttributesA 71439->71440 71440->71416 71440->71433 71440->71434 71440->71435 71440->71436 71440->71437 71440->71438 71440->71439 71441 478744 171 API calls 71440->71441 71442 403450 4 API calls 71440->71442 71441->71440 71442->71440 71444 448e80 71443->71444 71445 448ec3 71443->71445 71446 403494 4 API calls 71444->71446 71447 448edb 71445->71447 71455 448a1c 71445->71455 71448 448e8b 71446->71448 71450 403400 4 API calls 71447->71450 71452 4037b8 4 API calls 71448->71452 71451 448f11 71450->71451 71451->71405 71453 448ea7 71452->71453 71454 4037b8 4 API calls 71453->71454 71454->71445 71456 403494 4 API calls 71455->71456 71457 448a55 71456->71457 71458 4037b8 4 API calls 71457->71458 71459 448a67 71458->71459 71460 403778 4 API calls 71459->71460 71461 448a88 71460->71461 71462 4037b8 4 API calls 71461->71462 71463 448aa0 71462->71463 71464 403778 4 API calls 71463->71464 71465 448acb 71464->71465 71466 4037b8 4 API calls 71465->71466 71479 448ae3 71466->71479 71467 448b1b 71469 403420 4 API calls 71467->71469 71468 448bcc 71470 448bd4 GetProcAddress 71468->71470 71471 448c1b 71469->71471 71474 448be7 GetLastError 71470->71474 71475 448bff 71470->71475 71471->71447 71472 448b47 LoadLibraryExA 71472->71479 71473 448b59 LoadLibraryA 71473->71479 71474->71467 71475->71467 71476 448b65 GetLastError 71476->71467 71478 403450 4 API calls 71478->71479 71479->71467 71479->71468 71479->71472 71479->71473 71479->71476 71479->71478 71481 403b80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71479->71481 71482 43df78 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71479->71482 71481->71479 71482->71479 71483->71381 71484->71380 71485 416fd2 71486 41707a 71485->71486 71487 416fea 71485->71487 71504 4157ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71486->71504 71489 417004 SendMessageA 71487->71489 71490 416ff8 71487->71490 71500 417058 71489->71500 71491 417002 CallWindowProcA 71490->71491 71492 41701e 71490->71492 71491->71500 71501 41a4e8 GetSysColor 71492->71501 71495 417029 SetTextColor 71496 41703e 71495->71496 71502 41a4e8 GetSysColor 71496->71502 71498 417043 SetBkColor 71503 41ab70 GetSysColor CreateBrushIndirect 71498->71503 71501->71495 71502->71498 71503->71500 71504->71500 71505 416ad4 71506 416ae1 71505->71506 71507 416b3b 71505->71507 71512 4169e0 CreateWindowExA 71506->71512 71508 416ae8 SetPropA SetPropA 71508->71507 71509 416b1b 71508->71509 71510 416b2e SetWindowPos 71509->71510 71510->71507 71512->71508 71513 44b9dc 71514 44b9ea 71513->71514 71516 44ba09 71513->71516 71514->71516 71517 44b8c0 71514->71517 71518 44b8f3 71517->71518 71519 414f78 4 API calls 71518->71519 71522 44b906 71519->71522 71520 44b933 GetDC 71523 41a678 5 API calls 71520->71523 71521 40357c 4 API calls 71521->71520 71522->71520 71522->71521 71524 44b953 SelectObject 71523->71524 71525 44b964 71524->71525 71528 44b5f4 71525->71528 71527 44b978 ReleaseDC 71527->71516 71529 44b60b 71528->71529 71530 44b69e 71529->71530 71531 44b61e 71529->71531 71532 44b687 71529->71532 71530->71527 71531->71530 71534 402648 4 API calls 71531->71534 71533 44b697 DrawTextA 71532->71533 71533->71530 71535 44b62f 71534->71535 71536 44b64d MultiByteToWideChar DrawTextW 71535->71536 71537 402660 4 API calls 71536->71537 71538 44b67f 71537->71538 71538->71527 71539 42409c 71544 4240d2 71539->71544 71542 42417c 71545 424183 71542->71545 71546 4241b7 71542->71546 71543 42411d 71547 424123 71543->71547 71548 4241e0 71543->71548 71559 4240f3 71544->71559 71633 423ff8 71544->71633 71551 424441 71545->71551 71552 424189 71545->71552 71555 4241c2 71546->71555 71556 42452a IsIconic 71546->71556 71553 424155 71547->71553 71554 424128 71547->71554 71549 4241f2 71548->71549 71550 4241fb 71548->71550 71557 424208 71549->71557 71558 4241f9 71549->71558 71654 424624 11 API calls 71550->71654 71551->71559 71608 424467 IsWindowEnabled 71551->71608 71561 4243a3 SendMessageA 71552->71561 71562 424197 71552->71562 71553->71559 71583 42416e 71553->71583 71584 4242cf 71553->71584 71564 424286 71554->71564 71565 42412e 71554->71565 71566 424566 71555->71566 71567 4241cb 71555->71567 71556->71559 71563 42453e GetFocus 71556->71563 71655 42466c 11 API calls 71557->71655 71656 424014 NtdllDefWindowProc_A 71558->71656 71561->71559 71562->71559 71574 424150 71562->71574 71595 4243e6 71562->71595 71563->71559 71569 42454f 71563->71569 71660 424014 NtdllDefWindowProc_A 71564->71660 71570 424137 71565->71570 71571 4242ae PostMessageA 71565->71571 71672 424ce0 WinHelpA PostMessageA 71566->71672 71567->71574 71575 42457d 71567->71575 71671 41f484 GetCurrentThreadId EnumThreadWindows 71569->71671 71579 424140 71570->71579 71580 424335 71570->71580 71637 424014 NtdllDefWindowProc_A 71571->71637 71574->71559 71653 424014 NtdllDefWindowProc_A 71574->71653 71581 424586 71575->71581 71582 42459b 71575->71582 71587 424149 71579->71587 71588 42425e IsIconic 71579->71588 71589 42433e 71580->71589 71590 42436f 71580->71590 71673 424964 71581->71673 71679 4249bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 71582->71679 71583->71574 71592 42429b 71583->71592 71638 424014 NtdllDefWindowProc_A 71584->71638 71586 424556 71586->71559 71596 42455e SetFocus 71586->71596 71587->71574 71597 424221 71587->71597 71600 42427a 71588->71600 71601 42426e 71588->71601 71598 423fa4 5 API calls 71589->71598 71652 424014 NtdllDefWindowProc_A 71590->71652 71661 424608 71592->71661 71594 4242d5 71605 424313 71594->71605 71606 4242f1 71594->71606 71595->71559 71619 424408 IsWindowEnabled 71595->71619 71596->71559 71597->71559 71657 4230dc ShowWindow PostMessageA PostQuitMessage 71597->71657 71607 424346 71598->71607 71599 42457b 71599->71559 71659 424014 NtdllDefWindowProc_A 71600->71659 71658 424050 15 API calls 71601->71658 71645 423f14 71605->71645 71639 423fa4 71606->71639 71615 424358 71607->71615 71666 41f3e8 6 API calls 71607->71666 71608->71559 71616 424475 71608->71616 71611 424375 71617 42438d 71611->71617 71623 41f334 2 API calls 71611->71623 71667 424014 NtdllDefWindowProc_A 71615->71667 71626 42447c IsWindowVisible 71616->71626 71624 423f14 6 API calls 71617->71624 71619->71559 71625 424416 71619->71625 71623->71617 71624->71559 71668 4127a0 7 API calls 71625->71668 71626->71559 71628 42448a GetFocus 71626->71628 71629 418670 71628->71629 71630 42449f SetFocus 71629->71630 71669 4156d0 71630->71669 71634 424002 71633->71634 71635 42400d 71633->71635 71634->71635 71680 408bb0 GetSystemDefaultLCID 71634->71680 71635->71542 71635->71543 71637->71559 71638->71594 71640 423ff2 PostMessageA 71639->71640 71642 423fb3 71639->71642 71640->71559 71641 423fea 71743 40b668 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71641->71743 71642->71640 71642->71641 71644 423fde SetWindowPos 71642->71644 71644->71641 71644->71642 71646 423f9d PostMessageA 71645->71646 71647 423f24 71645->71647 71646->71559 71647->71646 71648 423f2a EnumWindows 71647->71648 71648->71646 71649 423f46 GetWindow GetWindowLongA 71648->71649 71744 423eac GetWindow 71648->71744 71650 423f65 71649->71650 71650->71646 71651 423f91 SetWindowPos 71650->71651 71651->71646 71651->71650 71652->71611 71653->71559 71654->71559 71655->71559 71656->71559 71657->71559 71658->71559 71659->71559 71660->71559 71747 41dfc0 71661->71747 71664 424620 71664->71559 71665 424614 LoadIconA 71665->71664 71666->71615 71667->71559 71668->71559 71670 4156eb SetFocus 71669->71670 71670->71559 71671->71586 71672->71599 71674 424970 71673->71674 71675 42498a 71673->71675 71676 424977 SendMessageA 71674->71676 71678 42499f 71674->71678 71677 402648 4 API calls 71675->71677 71676->71678 71677->71678 71678->71559 71679->71599 71735 4089f8 GetLocaleInfoA 71680->71735 71683 403450 4 API calls 71684 408bf0 71683->71684 71685 4089f8 5 API calls 71684->71685 71686 408c05 71685->71686 71687 4089f8 5 API calls 71686->71687 71688 408c29 71687->71688 71741 408a44 GetLocaleInfoA 71688->71741 71691 408a44 GetLocaleInfoA 71692 408c59 71691->71692 71693 4089f8 5 API calls 71692->71693 71694 408c73 71693->71694 71695 408a44 GetLocaleInfoA 71694->71695 71696 408c90 71695->71696 71697 4089f8 5 API calls 71696->71697 71698 408caa 71697->71698 71699 403450 4 API calls 71698->71699 71700 408cb7 71699->71700 71701 4089f8 5 API calls 71700->71701 71702 408ccc 71701->71702 71703 403450 4 API calls 71702->71703 71704 408cd9 71703->71704 71705 408a44 GetLocaleInfoA 71704->71705 71706 408ce7 71705->71706 71707 4089f8 5 API calls 71706->71707 71708 408d01 71707->71708 71709 403450 4 API calls 71708->71709 71710 408d0e 71709->71710 71711 4089f8 5 API calls 71710->71711 71712 408d23 71711->71712 71713 403450 4 API calls 71712->71713 71714 408d30 71713->71714 71715 4089f8 5 API calls 71714->71715 71716 408d45 71715->71716 71717 408d62 71716->71717 71718 408d53 71716->71718 71720 403494 4 API calls 71717->71720 71719 403494 4 API calls 71718->71719 71721 408d60 71719->71721 71720->71721 71722 4089f8 5 API calls 71721->71722 71723 408d84 71722->71723 71724 408da1 71723->71724 71725 408d92 71723->71725 71727 403400 4 API calls 71724->71727 71726 403494 4 API calls 71725->71726 71728 408d9f 71726->71728 71727->71728 71729 403634 4 API calls 71728->71729 71730 408dc3 71729->71730 71731 403634 4 API calls 71730->71731 71732 408ddd 71731->71732 71733 403420 4 API calls 71732->71733 71734 408df7 71733->71734 71734->71635 71736 408a31 71735->71736 71737 408a1f 71735->71737 71739 403494 4 API calls 71736->71739 71738 4034e0 4 API calls 71737->71738 71740 408a2f 71738->71740 71739->71740 71740->71683 71742 408a60 71741->71742 71742->71691 71743->71640 71745 423ecd GetWindowLongA 71744->71745 71746 423ed9 71744->71746 71745->71746 71750 41dfe4 71747->71750 71751 41dfca 71750->71751 71752 41dff1 71750->71752 71751->71664 71751->71665 71752->71751 71759 40cf10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 71752->71759 71754 41e00e 71754->71751 71755 41e028 71754->71755 71756 41e01b 71754->71756 71760 41c21c 11 API calls 71755->71760 71761 41b818 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 71756->71761 71759->71754 71760->71751 71761->71751 71762 10016165 71763 10016171 71762->71763 71764 1001616c 71762->71764 71768 1001606f 71763->71768 71776 1001f475 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 71764->71776 71767 10016182 71769 1001607b __calloc_impl 71768->71769 71771 10016118 __calloc_impl 71769->71771 71773 100160c8 ___DllMainCRTStartup 71769->71773 71777 10015e96 71769->71777 71771->71767 71772 10015e96 __CRT_INIT@12 158 API calls 71772->71771 71773->71771 71774 10015e96 __CRT_INIT@12 158 API calls 71773->71774 71775 100160f8 71773->71775 71774->71775 71775->71771 71775->71772 71776->71763 71778 10015fc0 71777->71778 71779 10015ea9 GetProcessHeap HeapAlloc 71777->71779 71781 10015fc6 71778->71781 71782 10015ffb 71778->71782 71780 10015ecd GetVersionExA 71779->71780 71795 10015ec6 71779->71795 71783 10015ee8 GetProcessHeap HeapFree 71780->71783 71784 10015edd GetProcessHeap HeapFree 71780->71784 71789 10015fe5 71781->71789 71781->71795 71849 1001873b 66 API calls _doexit 71781->71849 71785 10016000 71782->71785 71786 10016059 71782->71786 71787 10015f14 71783->71787 71784->71795 71788 10017ef2 ___set_flsgetvalue 6 API calls 71785->71788 71786->71795 71857 100181e2 77 API calls 2 library calls 71786->71857 71830 1001ab60 HeapCreate 71787->71830 71790 10016005 71788->71790 71789->71795 71850 1001ef80 67 API calls __setmbcp 71789->71850 71853 100173c5 66 API calls __calloc_impl 71790->71853 71795->71773 71796 10015f4a 71796->71795 71799 10015f53 71796->71799 71798 10016011 71798->71795 71854 10017e6b TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 71798->71854 71840 1001824b 77 API calls 6 library calls 71799->71840 71800 10015fef 71851 10017f35 69 API calls 2 library calls 71800->71851 71803 10015ff4 71852 1001abba VirtualFree HeapFree HeapFree HeapDestroy 71803->71852 71805 10015f58 __RTC_Initialize 71808 10015f6b GetCommandLineA 71805->71808 71822 10015f5c 71805->71822 71842 1001f2f8 75 API calls 3 library calls 71808->71842 71809 1001602f 71811 10016036 71809->71811 71812 1001604d 71809->71812 71855 10017f72 66 API calls 4 library calls 71811->71855 71856 10014d9a 66 API calls 7 library calls 71812->71856 71814 10015f7b 71843 1001ed40 71 API calls 3 library calls 71814->71843 71816 1001603d GetCurrentThreadId 71816->71795 71818 10015f85 71819 10015f89 71818->71819 71845 1001f23f 106 API calls 3 library calls 71818->71845 71844 10017f35 69 API calls 2 library calls 71819->71844 71841 1001abba VirtualFree HeapFree HeapFree HeapDestroy 71822->71841 71823 10015f95 71824 10015fa9 71823->71824 71846 1001efcc 105 API calls 6 library calls 71823->71846 71829 10015f61 71824->71829 71848 1001ef80 67 API calls __setmbcp 71824->71848 71827 10015f9e 71827->71824 71847 100185ca 73 API calls 4 library calls 71827->71847 71829->71795 71831 1001ab80 71830->71831 71832 1001ab83 71830->71832 71831->71796 71858 1001ab05 66 API calls 3 library calls 71832->71858 71834 1001ab88 71835 1001ab92 71834->71835 71836 1001abb6 71834->71836 71859 1001add5 HeapAlloc 71835->71859 71836->71796 71838 1001ab9c 71838->71836 71839 1001aba1 HeapDestroy 71838->71839 71839->71831 71840->71805 71841->71829 71842->71814 71843->71818 71844->71822 71845->71823 71846->71827 71847->71824 71848->71819 71849->71789 71850->71800 71851->71803 71852->71795 71853->71798 71854->71809 71855->71816 71856->71829 71857->71795 71858->71834 71859->71838 71860 49ba2c 71918 403344 71860->71918 71862 49ba3a 71921 4056a0 71862->71921 71864 49ba3f 71924 4063fc GetModuleHandleA GetVersion 71864->71924 71868 49ba49 72021 409ddc 71868->72021 71872 49ba53 72034 412db8 71872->72034 71874 49ba5d 72039 4194d0 GetVersion 71874->72039 72331 4032fc 71918->72331 71920 403349 GetModuleHandleA GetCommandLineA 71920->71862 71923 4056db 71921->71923 72332 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 71921->72332 71923->71864 71925 40644d 71924->71925 71926 40642d GetProcAddress 71924->71926 71928 406455 GetProcAddress 71925->71928 71929 40667a GetProcAddress 71925->71929 71926->71925 71927 40643e 71926->71927 71927->71925 71932 406464 71928->71932 71930 406690 GetProcAddress 71929->71930 71931 406689 71929->71931 71934 40669f SetProcessDEPPolicy 71930->71934 71936 4066a3 71930->71936 71931->71930 72333 406348 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetSystemDirectoryA 71932->72333 71934->71936 71935 406473 71937 403450 4 API calls 71935->71937 71938 403400 4 API calls 71936->71938 71940 406480 71937->71940 71939 4066b8 71938->71939 72020 406854 6FBE1CD0 71939->72020 71940->71929 71941 4064b3 71940->71941 71942 40357c 4 API calls 71940->71942 71943 403494 4 API calls 71941->71943 71942->71941 71944 4064c1 71943->71944 71945 40357c 4 API calls 71944->71945 71946 4064ce 71945->71946 72334 406374 SetErrorMode LoadLibraryA 71946->72334 71948 4064d6 71949 403494 4 API calls 71948->71949 71950 4064e4 71949->71950 71951 40357c 4 API calls 71950->71951 71952 4064f1 71951->71952 72335 406374 SetErrorMode LoadLibraryA 71952->72335 71954 4064f9 71955 403494 4 API calls 71954->71955 71956 406507 71955->71956 71957 40357c 4 API calls 71956->71957 71958 406514 71957->71958 72336 406374 SetErrorMode LoadLibraryA 71958->72336 71960 40651c 71961 403494 4 API calls 71960->71961 71962 40652a 71961->71962 71963 40357c 4 API calls 71962->71963 71964 406537 71963->71964 72337 406374 SetErrorMode LoadLibraryA 71964->72337 71966 40653f 71967 403494 4 API calls 71966->71967 71968 40654d 71967->71968 71969 40357c 4 API calls 71968->71969 71970 40655a 71969->71970 72338 406374 SetErrorMode LoadLibraryA 71970->72338 71972 406562 71973 403494 4 API calls 71972->71973 71974 406570 71973->71974 71975 40357c 4 API calls 71974->71975 71976 40657d 71975->71976 72339 406374 SetErrorMode LoadLibraryA 71976->72339 71978 406585 71979 403494 4 API calls 71978->71979 71980 406593 71979->71980 71981 40357c 4 API calls 71980->71981 71982 4065a0 71981->71982 72020->71868 72347 4094b4 72021->72347 72026 408bb0 7 API calls 72027 409dff 72026->72027 72362 409500 GetVersionExA 72027->72362 72030 410bf4 72031 410bfe 72030->72031 72032 410c3d GetCurrentThreadId 72031->72032 72033 410c58 72032->72033 72033->71872 72364 40b19c 72034->72364 72038 412de4 72038->71874 72376 41e2b4 8 API calls 72039->72376 72041 4194e9 72378 4193c8 GetCurrentProcessId 72041->72378 72331->71920 72332->71923 72333->71935 72334->71948 72335->71954 72336->71960 72337->71966 72338->71972 72339->71978 72348 40914c 5 API calls 72347->72348 72349 4094c5 72348->72349 72350 408a6c GetSystemDefaultLCID 72349->72350 72354 408aa2 72350->72354 72351 40727c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 72351->72354 72352 4089f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 72352->72354 72353 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 72353->72354 72354->72351 72354->72352 72354->72353 72358 408b04 72354->72358 72355 40727c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 72355->72358 72356 4089f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 72356->72358 72357 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 72357->72358 72358->72355 72358->72356 72358->72357 72359 408b87 72358->72359 72360 403420 4 API calls 72359->72360 72361 408ba1 72360->72361 72361->72026 72363 409517 72362->72363 72363->72030 72365 40b1a3 72364->72365 72366 40b1c2 72365->72366 72375 40b0d4 19 API calls 72365->72375 72368 41149c 72366->72368 72369 4114be 72368->72369 72370 40727c 5 API calls 72369->72370 72371 403450 4 API calls 72369->72371 72372 4114dd 72369->72372 72370->72369 72371->72369 72373 403400 4 API calls 72372->72373 72374 4114f2 72373->72374 72374->72038 72375->72365 72377 41e32e 72376->72377 72377->72041 72396 407d50 72378->72396 72381 407d50 19 API calls 72397 407d63 72396->72397 72398 407a48 19 API calls 72397->72398 72399 407d77 GlobalAddAtomA GetCurrentThreadId 72398->72399 72399->72381 73613 41f2e4 73614 41f2f3 IsWindowVisible 73613->73614 73615 41f329 73613->73615 73614->73615 73616 41f2fd IsWindowEnabled 73614->73616 73616->73615 73617 41f307 73616->73617 73618 402648 4 API calls 73617->73618 73619 41f311 EnableWindow 73618->73619 73619->73615 73620 10017ae8 73621 10017b95 73620->73621 73632 10017af6 73620->73632 73646 10018d92 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __decode_pointer 73621->73646 73623 10017b9b 73647 100179f0 66 API calls __getptd_noexit 73623->73647 73626 10017ba1 73629 10017b59 RtlAllocateHeap 73629->73632 73630 10017b0b 73630->73632 73639 10020fd7 66 API calls 2 library calls 73630->73639 73640 10020e37 66 API calls 7 library calls 73630->73640 73641 100184f8 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 73630->73641 73632->73629 73632->73630 73633 10017b80 73632->73633 73636 10017b7e 73632->73636 73638 10017b8c 73632->73638 73642 10017a99 66 API calls 4 library calls 73632->73642 73643 10018d92 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __decode_pointer 73632->73643 73644 100179f0 66 API calls __getptd_noexit 73633->73644 73645 100179f0 66 API calls __getptd_noexit 73636->73645 73639->73630 73640->73630 73642->73632 73643->73632 73644->73636 73645->73638 73646->73623 73647->73626 73648 41ffe8 73649 41fff1 73648->73649 73652 42028c 73649->73652 73651 41fffe 73653 42037e 73652->73653 73654 4202a3 73652->73654 73653->73651 73654->73653 73673 41fe4c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 73654->73673 73656 4202d9 73657 420303 73656->73657 73658 4202dd 73656->73658 73683 41fe4c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 73657->73683 73674 42002c 73658->73674 73661 420311 73663 420315 73661->73663 73664 42033b 73661->73664 73666 42002c 10 API calls 73663->73666 73667 42002c 10 API calls 73664->73667 73665 42002c 10 API calls 73668 420301 73665->73668 73669 420327 73666->73669 73670 42034d 73667->73670 73668->73651 73671 42002c 10 API calls 73669->73671 73672 42002c 10 API calls 73670->73672 73671->73668 73672->73668 73673->73656 73675 420047 73674->73675 73676 41fdcc 4 API calls 73675->73676 73677 42005d 73675->73677 73676->73677 73684 41fdcc 73677->73684 73679 4200a5 73680 4200c8 SetScrollInfo 73679->73680 73692 41ff2c 73680->73692 73683->73661 73685 418670 73684->73685 73686 41fde9 GetWindowLongA 73685->73686 73687 41fe26 73686->73687 73688 41fe06 73686->73688 73704 41fd58 GetWindowLongA GetSystemMetrics GetSystemMetrics 73687->73704 73703 41fd58 GetWindowLongA GetSystemMetrics GetSystemMetrics 73688->73703 73691 41fe12 73691->73679 73693 41ff3a 73692->73693 73694 41ff42 73692->73694 73693->73665 73695 41ff81 73694->73695 73696 41ff71 73694->73696 73702 41ff7f 73694->73702 73706 4182d8 IsWindowVisible ScrollWindow SetWindowPos 73695->73706 73705 4182d8 IsWindowVisible ScrollWindow SetWindowPos 73696->73705 73699 41ffc1 GetScrollPos 73699->73693 73700 41ffcc 73699->73700 73701 41ffdb SetScrollPos 73700->73701 73701->73693 73702->73699 73703->73691 73704->73691 73705->73702 73706->73702 73707 420a28 73708 420a3b 73707->73708 73728 415fc0 73708->73728 73710 420a76 73711 420b82 73710->73711 73712 420ae1 73710->73712 73721 420ad2 MulDiv 73710->73721 73715 420b99 73711->73715 73735 414b64 KiUserCallbackDispatcher 73711->73735 73733 420cd8 20 API calls 73712->73733 73714 420bb0 73718 420bd2 73714->73718 73737 4204f0 12 API calls 73714->73737 73715->73714 73736 414ba8 KiUserCallbackDispatcher 73715->73736 73719 420afa 73719->73711 73734 4204f0 12 API calls 73719->73734 73732 41a794 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 73721->73732 73724 420b17 73725 420b33 MulDiv 73724->73725 73726 420b56 73724->73726 73725->73726 73726->73711 73727 420b5f MulDiv 73726->73727 73727->73711 73729 415fd2 73728->73729 73738 414900 73729->73738 73731 415fea 73731->73710 73732->73712 73733->73719 73734->73724 73735->73715 73736->73714 73737->73718 73739 41491a 73738->73739 73742 4108e8 73739->73742 73741 414930 73741->73731 73745 40e134 73742->73745 73744 4108ee 73744->73741 73746 40e196 73745->73746 73747 40e147 73745->73747 73748 40e1a4 19 API calls 73746->73748 73756 40e1a4 73747->73756 73749 40e1a0 73748->73749 73749->73744 73753 40e179 73769 40dbb8 DestroyWindow 73753->73769 73755 40e18e 73755->73744 73757 40e1b4 73756->73757 73759 40e1ca 73757->73759 73770 40e52c 73757->73770 73786 40da70 73757->73786 73789 40e3dc 73759->73789 73762 40da70 5 API calls 73763 40e1d2 73762->73763 73763->73762 73764 40e23e 73763->73764 73792 40dff0 73763->73792 73766 40e3dc 5 API calls 73764->73766 73767 40e171 73766->73767 73768 40db0c DestroyWindow 73767->73768 73768->73753 73769->73755 73771 40edfc 5 API calls 73770->73771 73772 40e567 73771->73772 73773 403778 4 API calls 73772->73773 73774 40e61d 73772->73774 73859 40dc04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73772->73859 73860 40e510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73772->73860 73773->73772 73775 40e647 73774->73775 73776 40e638 73774->73776 73856 40beb4 73775->73856 73806 40e850 73776->73806 73781 40e645 73783 403400 4 API calls 73781->73783 73784 40e6ec 73783->73784 73784->73757 73787 40ee98 5 API calls 73786->73787 73788 40da7a 73787->73788 73788->73757 73893 40d94c 73789->73893 73793 40e3e4 5 API calls 73792->73793 73794 40e023 73793->73794 73795 40edfc 5 API calls 73794->73795 73796 40e02e 73795->73796 73797 40edfc 5 API calls 73796->73797 73798 40e039 73797->73798 73799 40e054 73798->73799 73800 40e04b 73798->73800 73805 40e051 73798->73805 73902 40de68 73799->73902 73905 40df58 19 API calls 73800->73905 73803 403420 4 API calls 73804 40e11f 73803->73804 73804->73763 73805->73803 73807 40e886 73806->73807 73808 40e87c 73806->73808 73810 40e9a1 73807->73810 73811 40e925 73807->73811 73812 40e986 73807->73812 73813 40ea06 73807->73813 73814 40e8c8 73807->73814 73815 40e969 73807->73815 73816 40e94b 73807->73816 73847 40e8f9 73807->73847 73849 40e8ec 73807->73849 73862 40d8d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73808->73862 73818 40dbf4 5 API calls 73810->73818 73870 40e2b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73811->73870 73875 40ed20 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73812->73875 73824 40dbf4 5 API calls 73813->73824 73863 40dbf4 73814->73863 73873 40ee38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73815->73873 73872 40e274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73816->73872 73827 40e9a9 73818->73827 73820 403400 4 API calls 73828 40ea7b 73820->73828 73831 40ea0e 73824->73831 73834 40e9b3 73827->73834 73835 40e9ad 73827->73835 73828->73781 73829 40e974 73874 40a1c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 73829->73874 73830 40e930 73871 40d900 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73830->73871 73838 40ea12 73831->73838 73839 40ea2b 73831->73839 73832 40e8f1 73868 40e368 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73832->73868 73833 40e8d4 73866 40e2b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73833->73866 73876 40ee98 73834->73876 73844 40e9b1 73835->73844 73848 40ee98 5 API calls 73835->73848 73840 40ee98 5 API calls 73838->73840 73882 40e2b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73839->73882 73840->73849 73844->73849 73880 40e2b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73844->73880 73846 40e8df 73867 40e6fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73846->73867 73847->73849 73869 40dca8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73847->73869 73852 40e9d4 73848->73852 73849->73820 73879 40dd30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73852->73879 73853 40e9f6 73881 40e764 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 73853->73881 73888 40be60 73856->73888 73859->73772 73860->73772 73861 40dc04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73861->73781 73862->73807 73864 40ee98 5 API calls 73863->73864 73865 40dbfe 73864->73865 73865->73832 73865->73833 73866->73846 73867->73849 73868->73847 73869->73849 73870->73830 73871->73849 73872->73849 73873->73829 73874->73849 73875->73849 73883 40dc10 73876->73883 73879->73844 73880->73853 73881->73849 73882->73849 73885 40dc1b 73883->73885 73884 40dc55 73884->73849 73885->73884 73887 40dc5c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73885->73887 73887->73885 73889 40be72 73888->73889 73890 40be97 73888->73890 73889->73890 73892 40bf14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 73889->73892 73890->73781 73890->73861 73892->73890 73894 40ee98 5 API calls 73893->73894 73895 40d959 73894->73895 73896 40d96c 73895->73896 73900 40ef9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73895->73900 73896->73763 73898 40d967 73901 40d8e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 73898->73901 73900->73898 73901->73896 73906 40b00c 19 API calls 73902->73906 73904 40de90 73904->73805 73905->73805 73906->73904 73907 441828 73908 441831 73907->73908 73913 4073cc SetFilePointer 73908->73913 73914 41cb6c 73908->73914 73919 4073d8 CloseHandle 73908->73919 73909 44184b 73913->73909 73915 40d0e0 21 API calls 73914->73915 73916 41cb83 73915->73916 73917 402b58 DestroyWindow 73916->73917 73918 41cbb3 73917->73918 73918->73909 73919->73909 73920 416eac 73921 416ed7 73920->73921 73922 416ebf 73920->73922 73928 416ed2 73921->73928 73945 416e20 PtInRect GetCapture 73921->73945 73923 416ec1 73922->73923 73924 416f2a 73922->73924 73929 416ef4 73923->73929 73930 416ec6 73923->73930 73937 415700 73924->73937 73927 415700 59 API calls 73935 416f61 73927->73935 73928->73927 73928->73935 73929->73928 73936 421f7c 6 API calls 73929->73936 73930->73928 73932 416f91 GetCapture 73930->73932 73932->73928 73933 416f33 73933->73935 73944 416d60 PtInRect 73933->73944 73936->73928 73939 41570d 73937->73939 73938 415771 73938->73933 73939->73938 73940 415773 73939->73940 73941 415768 73939->73941 73946 42501c 13 API calls 73940->73946 73941->73938 73947 4154ec 46 API calls 73941->73947 73944->73935 73945->73928 73946->73938 73947->73938 73948 422cec 73949 422d1c 73948->73949 73950 422cff 73948->73950 73952 422f31 73949->73952 73953 422d56 73949->73953 73959 422f8f 73949->73959 73950->73949 73951 40914c 5 API calls 73950->73951 73951->73949 73954 422f83 73952->73954 73955 422f79 73952->73955 73960 422dad 73953->73960 73988 423638 GetSystemMetrics 73953->73988 73954->73959 73964 422fc7 73954->73964 73965 422fa8 73954->73965 73991 4222bc 11 API calls 73955->73991 73956 422e59 73961 422e65 73956->73961 73962 422e9b 73956->73962 73957 422f0c 73966 422f26 ShowWindow 73957->73966 73960->73956 73960->73957 73970 422e6f SendMessageA 73961->73970 73971 422eb5 ShowWindow 73962->73971 73969 422fd1 GetActiveWindow 73964->73969 73968 422fbf SetWindowPos 73965->73968 73966->73959 73967 422df1 73989 423630 GetSystemMetrics 73967->73989 73968->73959 73975 422fdc 73969->73975 73987 422ffb 73969->73987 73972 418670 73970->73972 73974 418670 73971->73974 73976 422e93 ShowWindow 73972->73976 73979 422ed7 CallWindowProcA 73974->73979 73980 422fe4 IsIconic 73975->73980 73981 422eea SendMessageA 73976->73981 73977 423001 73983 423018 SetWindowPos SetActiveWindow 73977->73983 73978 423026 73984 423030 ShowWindow 73978->73984 73990 415154 73979->73990 73985 422fee 73980->73985 73980->73987 73981->73959 73983->73959 73984->73959 73992 41f484 GetCurrentThreadId EnumThreadWindows 73985->73992 73987->73977 73987->73978 73988->73967 73989->73960 73990->73981 73991->73954 73992->73987 73993 40d0b2 73996 407374 ReadFile 73993->73996 73997 407391 73996->73997 73998 482c3e 73999 4517dc 5 API calls 73998->73999 74000 482c52 73999->74000 74001 481c60 21 API calls 74000->74001 74002 482c76 74001->74002 74003 402b58 DestroyWindow 74002->74003 74004 482c8c 74003->74004 74005 422774 74006 422783 74005->74006 74011 421704 74006->74011 74010 4227a3 74012 421773 74011->74012 74020 421713 74011->74020 74015 421784 74012->74015 74036 412960 GetMenuItemCount GetMenuStringA GetMenuState 74012->74036 74014 4217b2 74018 421825 74014->74018 74024 4217cd 74014->74024 74015->74014 74017 42184a 74015->74017 74016 421823 74019 421876 74016->74019 74038 4222bc 11 API calls 74016->74038 74017->74016 74021 42185e SetMenu 74017->74021 74018->74016 74026 421839 74018->74026 74039 42164c 10 API calls 74019->74039 74020->74012 74035 4091bc 19 API calls 74020->74035 74021->74016 74024->74016 74029 4217f0 GetMenu 74024->74029 74025 42187d 74025->74010 74034 422678 10 API calls 74025->74034 74028 421842 SetMenu 74026->74028 74028->74016 74030 421813 74029->74030 74031 4217fa 74029->74031 74037 412960 GetMenuItemCount GetMenuStringA GetMenuState 74030->74037 74033 42180d SetMenu 74031->74033 74033->74030 74034->74010 74035->74020 74036->74015 74037->74016 74038->74019 74039->74025 74040 443b3c 74041 403494 4 API calls 74040->74041 74042 443b6c 74041->74042 74043 443b79 74042->74043 74044 4037b8 4 API calls 74042->74044 74045 403400 4 API calls 74043->74045 74047 443b9a 74044->74047 74046 443da9 74045->74046 74047->74043 74048 4320c0 4 API calls 74047->74048 74049 443c0d 74048->74049 74050 432190 4 API calls 74049->74050 74058 443c2d 74049->74058 74050->74049 74051 443c8a 74053 443ccc 74051->74053 74054 443cab 74051->74054 74052 443c70 74052->74051 74078 443ac0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74052->74078 74064 442824 74053->74064 74057 442824 5 API calls 74054->74057 74059 443cc8 74057->74059 74058->74052 74077 443ac0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74058->74077 74079 443b00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74059->74079 74062 443d8c 74080 443b10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DestroyWindow 74062->74080 74065 443802 74064->74065 74066 44285d 74064->74066 74068 403400 4 API calls 74065->74068 74067 403400 4 API calls 74066->74067 74069 442865 74067->74069 74070 443817 74068->74070 74071 4320c0 4 API calls 74069->74071 74070->74059 74072 442871 74071->74072 74073 4437f2 74072->74073 74081 441efc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74072->74081 74074 402b58 DestroyWindow 74073->74074 74075 4437fa 74074->74075 74075->74059 74077->74058 74078->74051 74079->74062 74080->74043 74081->74072 74082 490830 74083 490881 74082->74083 74084 4908ad 74083->74084 74085 490883 74083->74085 74088 4908bc 74084->74088 74089 4908e6 74084->74089 74086 4474e8 18 API calls 74085->74086 74087 490890 74086->74087 74771 453578 GetFileAttributesA Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection GetLastError 74087->74771 74091 4474e8 18 API calls 74088->74091 74096 49091f 74089->74096 74097 4908f5 74089->74097 74093 4908c9 74091->74093 74092 49089d 74772 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74092->74772 74773 453158 11 API calls 74093->74773 74104 49092e 74096->74104 74105 490993 74096->74105 74099 4474e8 18 API calls 74097->74099 74098 4908d6 74774 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74098->74774 74102 490902 74099->74102 74100 403420 4 API calls 74103 491f0b 74100->74103 74106 4531c8 11 API calls 74102->74106 74107 403420 4 API calls 74103->74107 74108 4474e8 18 API calls 74104->74108 74113 490a18 74105->74113 74114 4909a2 74105->74114 74109 49090f 74106->74109 74111 491f18 74107->74111 74112 49093d 74108->74112 74775 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74109->74775 74115 403400 4 API calls 74111->74115 74116 4474e8 18 API calls 74112->74116 74123 490a83 74113->74123 74124 490a27 74113->74124 74117 44748c 18 API calls 74114->74117 74118 491f20 74115->74118 74119 490954 74116->74119 74120 4909ae 74117->74120 74121 4474e8 18 API calls 74119->74121 74122 44748c 18 API calls 74120->74122 74125 490967 74121->74125 74126 4909bb 74122->74126 74132 490adf 74123->74132 74133 490a92 74123->74133 74127 4474e8 18 API calls 74124->74127 74128 4474e8 18 API calls 74125->74128 74129 4474e8 18 API calls 74126->74129 74130 490a36 74127->74130 74131 490978 74128->74131 74134 4909cb 74129->74134 74135 4474e8 18 API calls 74130->74135 74776 42d224 6 API calls 74131->74776 74145 490aee 74132->74145 74146 490b27 74132->74146 74137 4474e8 18 API calls 74133->74137 74138 4474e8 18 API calls 74134->74138 74139 490a49 74135->74139 74142 490aa1 74137->74142 74143 4909de 74138->74143 74144 4474e8 18 API calls 74139->74144 74140 490982 74777 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74140->74777 74147 4474e8 18 API calls 74142->74147 74148 4474e8 18 API calls 74143->74148 74149 490a5a 74144->74149 74151 4474e8 18 API calls 74145->74151 74160 490b36 74146->74160 74169 490b96 74146->74169 74152 490ab4 74147->74152 74153 4909ef 74148->74153 74780 447440 18 API calls 74149->74780 74156 490afd 74151->74156 74157 4474e8 18 API calls 74152->74157 74154 44748c 18 API calls 74153->74154 74158 4909ff 74154->74158 74155 490a6a 74781 42d3bc 6 API calls 74155->74781 74161 4474e8 18 API calls 74156->74161 74162 490ac5 74157->74162 74778 42d328 6 API calls 74158->74778 74166 4474e8 18 API calls 74160->74166 74167 490b0e 74161->74167 74783 42d46c GetPrivateProfileStringA GetProfileStringA lstrcmp 74162->74783 74165 490a73 74782 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74165->74782 74172 490b45 74166->74172 74785 42d4b8 GetPrivateProfileStringA GetProfileStringA 74167->74785 74168 490acf 74784 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74168->74784 74175 490c01 74169->74175 74176 490ba5 74169->74176 74170 490a08 74779 447768 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74170->74779 74179 4474e8 18 API calls 74172->74179 74186 490c6c 74175->74186 74187 490c10 74175->74187 74181 4474e8 18 API calls 74176->74181 74178 4908a8 74178->74100 74182 490b58 74179->74182 74180 490b17 74786 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74180->74786 74184 490bb4 74181->74184 74185 4474e8 18 API calls 74182->74185 74188 4474e8 18 API calls 74184->74188 74189 490b6b 74185->74189 74196 490c7b 74186->74196 74197 490cba 74186->74197 74190 4474e8 18 API calls 74187->74190 74191 490bc7 74188->74191 74192 4474e8 18 API calls 74189->74192 74193 490c1f 74190->74193 74194 4474e8 18 API calls 74191->74194 74195 490b7c 74192->74195 74198 4474e8 18 API calls 74193->74198 74199 490bd8 74194->74199 74787 42d528 WritePrivateProfileStringA WriteProfileStringA 74195->74787 74201 4474e8 18 API calls 74196->74201 74212 490cc9 74197->74212 74213 490cf4 74197->74213 74202 490c32 74198->74202 74203 44748c 18 API calls 74199->74203 74205 490c8a 74201->74205 74206 4474e8 18 API calls 74202->74206 74207 490be8 74203->74207 74204 490b86 74788 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74204->74788 74209 4474e8 18 API calls 74205->74209 74210 490c43 74206->74210 74789 42d598 21 API calls 74207->74789 74215 490c9b 74209->74215 74791 447440 18 API calls 74210->74791 74214 4474e8 18 API calls 74212->74214 74224 490d2c 74213->74224 74225 490d03 74213->74225 74218 490cd6 74214->74218 74219 4474e8 18 API calls 74215->74219 74217 490bf1 74790 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74217->74790 74222 4474e8 18 API calls 74218->74222 74223 490cab 74219->74223 74220 490c53 74792 42d5f8 21 API calls 74220->74792 74227 490ce6 74222->74227 74794 42d610 WritePrivateProfileStringA WriteProfileStringA 74223->74794 74234 490d3b 74224->74234 74235 490d54 74224->74235 74229 4474e8 18 API calls 74225->74229 74795 42d65c WritePrivateProfileStringA WriteProfileStringA 74227->74795 74232 490d10 74229->74232 74230 490c5c 74793 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74230->74793 74236 42d698 5 API calls 74232->74236 74237 42d7bc 5 API calls 74234->74237 74242 490d78 74235->74242 74243 490d63 74235->74243 74238 490d1b 74236->74238 74239 490d43 74237->74239 74796 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74238->74796 74797 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74239->74797 74246 490daa 74242->74246 74247 490d87 74242->74247 74244 42d880 5 API calls 74243->74244 74245 490d68 74244->74245 74798 447768 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74245->74798 74252 490db9 74246->74252 74253 490de2 74246->74253 74249 44748c 18 API calls 74247->74249 74250 490d91 74249->74250 74251 42d8dc 6 API calls 74250->74251 74254 490d99 74251->74254 74255 4474e8 18 API calls 74252->74255 74259 490e1a 74253->74259 74260 490df1 74253->74260 74799 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74254->74799 74257 490dc6 74255->74257 74258 42c88c 5 API calls 74257->74258 74261 490dd1 74258->74261 74265 490e29 74259->74265 74266 490e52 74259->74266 74262 4474e8 18 API calls 74260->74262 74800 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74261->74800 74264 490dfe 74262->74264 74801 42cff8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 74264->74801 74268 4474e8 18 API calls 74265->74268 74273 490e8a 74266->74273 74274 490e61 74266->74274 74270 490e36 74268->74270 74269 490e09 74802 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74269->74802 74272 42d050 6 API calls 74270->74272 74275 490e41 74272->74275 74279 490e99 74273->74279 74280 490ec2 74273->74280 74276 4474e8 18 API calls 74274->74276 74803 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74275->74803 74278 490e6e 74276->74278 74804 42d978 6 API calls 74278->74804 74282 4474e8 18 API calls 74279->74282 74287 490eff 74280->74287 74288 490ed1 74280->74288 74285 490ea6 74282->74285 74283 490e79 74805 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74283->74805 74806 42d9d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 74285->74806 74294 490f0e 74287->74294 74295 490f27 74287->74295 74289 4474e8 18 API calls 74288->74289 74291 490ede 74289->74291 74290 490eb1 74807 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74290->74807 74808 453330 8 API calls 74291->74808 74297 42dd28 5 API calls 74294->74297 74300 490f4f 74295->74300 74301 490f36 74295->74301 74296 490eee 74809 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74296->74809 74299 490f16 74297->74299 74810 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74299->74810 74306 490f5e 74300->74306 74307 490f77 74300->74307 74303 42dd54 5 API calls 74301->74303 74304 490f3e 74303->74304 74811 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74304->74811 74308 42dd80 6 API calls 74306->74308 74310 490fa4 74307->74310 74311 490f86 74307->74311 74309 490f66 74308->74309 74812 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74309->74812 74316 490fcc 74310->74316 74317 490fb3 74310->74317 74813 42de04 8 API calls 74311->74813 74314 490f93 74814 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74314->74814 74321 490fdb 74316->74321 74322 491033 74316->74322 74319 42dea8 10 API calls 74317->74319 74318 490f9f 74318->74178 74320 490fbb 74319->74320 74815 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74320->74815 74324 4474e8 18 API calls 74321->74324 74326 491042 74322->74326 74327 4910a7 74322->74327 74325 490fe8 74324->74325 74328 4474e8 18 API calls 74325->74328 74329 4474e8 18 API calls 74326->74329 74333 4910cb 74327->74333 74334 4910b6 74327->74334 74330 490ff7 74328->74330 74331 49104f 74329->74331 74332 4474e8 18 API calls 74330->74332 74818 447440 18 API calls 74331->74818 74336 49100a 74332->74336 74344 4910da 74333->74344 74345 49114e 74333->74345 74821 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74334->74821 74338 42e058 5 API calls 74336->74338 74337 49105b 74339 4474e8 18 API calls 74337->74339 74340 491016 74338->74340 74342 49106b 74339->74342 74816 447768 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74340->74816 74346 4474e8 18 API calls 74342->74346 74348 4474e8 18 API calls 74344->74348 74354 49115d 74345->74354 74355 49118f 74345->74355 74349 49107e 74346->74349 74347 491021 74817 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74347->74817 74351 4910e7 74348->74351 74352 42dfa0 5 API calls 74349->74352 74822 42ca98 7 API calls 74351->74822 74357 49108a 74352->74357 74356 4474e8 18 API calls 74354->74356 74366 49120c 74355->74366 74367 49119e 74355->74367 74361 49116a 74356->74361 74819 447768 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74357->74819 74358 4910f5 74359 4910f9 74358->74359 74360 49113e 74358->74360 74823 447440 18 API calls 74359->74823 74826 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74360->74826 74827 42da28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74361->74827 74379 49121f 74366->74379 74380 4912ae 74366->74380 74371 44748c 18 API calls 74367->74371 74368 491095 74820 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74368->74820 74369 491105 74373 4474e8 18 API calls 74369->74373 74370 491172 74828 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74370->74828 74375 4911a8 74371->74375 74376 491118 74373->74376 74378 4905a8 4 API calls 74375->74378 74824 453058 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection CopyFileA GetLastError 74376->74824 74377 49117d 74829 44783c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74377->74829 74384 4911b3 74378->74384 74381 44748c 18 API calls 74379->74381 74391 491309 74380->74391 74392 4912bd 74380->74392 74386 491229 74381->74386 74385 4474e8 18 API calls 74384->74385 74388 4911c2 74385->74388 74389 4905a8 4 API calls 74386->74389 74387 491128 74825 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74387->74825 74397 42e2ac RegOpenKeyExA 74388->74397 74393 491234 74389->74393 74399 491318 74391->74399 74400 491364 74391->74400 74394 44748c 18 API calls 74392->74394 74395 4474e8 18 API calls 74393->74395 74396 4912c7 74394->74396 74398 491243 74395->74398 74401 4905a8 4 API calls 74396->74401 74402 4911df 74397->74402 74410 42e2ac RegOpenKeyExA 74398->74410 74403 44748c 18 API calls 74399->74403 74411 491409 74400->74411 74412 491377 74400->74412 74404 4912d2 74401->74404 74405 4911fc 74402->74405 74406 4911e3 74402->74406 74407 491322 74403->74407 74408 4474e8 18 API calls 74404->74408 74831 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74405->74831 74830 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74406->74830 74414 4905a8 4 API calls 74407->74414 74415 4912e1 74408->74415 74417 491260 74410->74417 74424 491418 74411->74424 74425 491476 74411->74425 74418 44748c 18 API calls 74412->74418 74419 49132d 74414->74419 74835 42e350 10 API calls 74415->74835 74416 4911ee RegCloseKey 74416->74178 74420 49129e 74417->74420 74421 491264 74417->74421 74422 491381 74418->74422 74423 4474e8 18 API calls 74419->74423 74834 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74420->74834 74428 4474e8 18 API calls 74421->74428 74429 4905a8 4 API calls 74422->74429 74430 49133c 74423->74430 74431 44748c 18 API calls 74424->74431 74439 4914e3 74425->74439 74440 491485 74425->74440 74433 491273 74428->74433 74434 49138c 74429->74434 74837 42e4a4 6 API calls 74430->74837 74435 491422 74431->74435 74432 4912f6 74836 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74432->74836 74832 42e1f4 RegQueryValueExA RegEnumValueA 74433->74832 74437 4474e8 18 API calls 74434->74437 74441 4905a8 4 API calls 74435->74441 74442 49139b 74437->74442 74451 4915a5 74439->74451 74452 4914f6 74439->74452 74444 44748c 18 API calls 74440->74444 74457 49142d 74441->74457 74450 42e2ac RegOpenKeyExA 74442->74450 74443 491351 74838 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74443->74838 74448 49148f 74444->74448 74446 491285 74833 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74446->74833 74453 4905a8 4 API calls 74448->74453 74455 4913b8 74450->74455 74461 4915b8 74451->74461 74462 491667 74451->74462 74456 44748c 18 API calls 74452->74456 74470 49149a 74453->74470 74454 491290 RegCloseKey 74454->74178 74458 4913f9 74455->74458 74459 4913bc 74455->74459 74460 491500 74456->74460 74465 4474e8 18 API calls 74457->74465 74840 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74458->74840 74463 4474e8 18 API calls 74459->74463 74464 4905a8 4 API calls 74460->74464 74467 44748c 18 API calls 74461->74467 74475 49167a 74462->74475 74476 491744 74462->74476 74468 4913cb 74463->74468 74469 49150b 74464->74469 74471 491458 74465->74471 74472 4915c2 74467->74472 74478 4913d3 RegDeleteValueA 74468->74478 74473 4474e8 18 API calls 74469->74473 74480 4474e8 18 API calls 74470->74480 74841 49067c 9 API calls 74471->74841 74477 4905a8 4 API calls 74472->74477 74479 49151a 74473->74479 74761 44748c 74475->74761 74491 491851 74476->74491 74492 491757 74476->74492 74483 4915cd 74477->74483 74839 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74478->74839 74495 42e2ac RegOpenKeyExA 74479->74495 74485 4914c5 74480->74485 74481 491466 74842 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74481->74842 74488 4474e8 18 API calls 74483->74488 74843 49067c 9 API calls 74485->74843 74494 4915dc 74488->74494 74489 4913eb RegCloseKey 74489->74178 74507 491968 74491->74507 74508 491864 74491->74508 74498 44748c 18 API calls 74492->74498 74510 42e2ac RegOpenKeyExA 74494->74510 74500 491537 74495->74500 74496 4914d3 74844 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74496->74844 74503 491761 74498->74503 74501 49153b 74500->74501 74502 491595 74500->74502 74505 4474e8 18 API calls 74501->74505 74847 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74502->74847 74506 4905a8 4 API calls 74503->74506 74504 4474e8 18 API calls 74509 49169e 74504->74509 74512 49154a 74505->74512 74513 49176c 74506->74513 74525 491a49 74507->74525 74526 49197b 74507->74526 74514 44748c 18 API calls 74508->74514 74515 4915f9 74510->74515 74516 4474e8 18 API calls 74512->74516 74517 4474e8 18 API calls 74513->74517 74518 49186e 74514->74518 74519 4915fd 74515->74519 74520 491657 74515->74520 74521 49155b 74516->74521 74522 49177b 74517->74522 74523 4905a8 4 API calls 74518->74523 74528 4474e8 18 API calls 74519->74528 74851 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74520->74851 74540 42e2ac RegOpenKeyExA 74522->74540 74530 491879 74523->74530 74544 491a5c 74525->74544 74545 491b53 74525->74545 74532 44748c 18 API calls 74526->74532 74529 49160c 74528->74529 74533 4474e8 18 API calls 74529->74533 74534 4474e8 18 API calls 74530->74534 74537 491985 74532->74537 74538 49161d 74533->74538 74542 491888 74534->74542 74546 4905a8 4 API calls 74537->74546 74549 491798 74540->74549 74861 42e274 RegCreateKeyExA 74542->74861 74551 44748c 18 API calls 74544->74551 74562 491c27 74545->74562 74563 491b66 74545->74563 74547 491990 74546->74547 74553 4474e8 18 API calls 74547->74553 74555 491841 74549->74555 74556 4917a0 74549->74556 74552 491a66 74551->74552 74558 4905a8 4 API calls 74552->74558 74560 49199f 74553->74560 74860 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74555->74860 74565 4474e8 18 API calls 74556->74565 74570 491a71 74558->74570 74865 42e274 RegCreateKeyExA 74560->74865 74586 491c3a 74562->74586 74587 491d07 74562->74587 74572 44748c 18 API calls 74563->74572 74574 4917af 74565->74574 74567 4918ad 74575 491958 74567->74575 74576 4918b5 74567->74576 74578 4474e8 18 API calls 74570->74578 74581 491b70 74572->74581 74864 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74575->74864 74585 491a80 74578->74585 74592 4905a8 4 API calls 74581->74592 74869 42e274 RegCreateKeyExA 74585->74869 74598 44748c 18 API calls 74586->74598 74614 491d2b 74587->74614 74615 491d16 74587->74615 74601 491b7b 74592->74601 74605 491c44 74598->74605 74599 4919c4 74606 491a39 74599->74606 74607 4919c8 74599->74607 74609 4474e8 18 API calls 74601->74609 74617 4905a8 4 API calls 74605->74617 74620 491b8a 74609->74620 74640 491d3a 74614->74640 74641 491d4f 74614->74641 74623 42e748 20 API calls 74615->74623 74625 491c4f 74617->74625 74629 491d1b 74623->74629 74632 4474e8 18 API calls 74625->74632 74882 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74629->74882 74639 491c5e 74632->74639 74883 42e754 20 API calls 74640->74883 74657 491d5e 74641->74657 74658 491d83 74641->74658 74648 491d3f 74884 4475c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 74648->74884 74664 4474e8 18 API calls 74657->74664 74671 491da8 74658->74671 74672 491d92 74658->74672 74667 491d6b 74664->74667 74885 42e7ac GetDC EnumFontsA ReleaseDC 74667->74885 74702 491de0 74671->74702 74703 491db7 74671->74703 74887 42e8a8 11 API calls 74672->74887 74689 491d97 74706 4474e8 18 API calls 74703->74706 74762 447490 74761->74762 74899 43648c 74762->74899 74764 4474aa 74765 4905a8 74764->74765 74766 4905b9 74765->74766 74768 4905d1 74766->74768 74913 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74766->74913 74769 4905d9 74768->74769 74914 453b40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74768->74914 74769->74504 74771->74092 74772->74178 74773->74098 74774->74178 74775->74178 74776->74140 74777->74178 74778->74170 74779->74178 74780->74155 74781->74165 74782->74178 74783->74168 74784->74178 74785->74180 74786->74178 74787->74204 74788->74178 74789->74217 74790->74178 74791->74220 74792->74230 74793->74178 74794->74178 74795->74178 74796->74178 74797->74178 74798->74178 74799->74178 74800->74178 74801->74269 74802->74178 74803->74178 74804->74283 74805->74178 74806->74290 74807->74178 74808->74296 74809->74178 74810->74178 74811->74178 74812->74178 74813->74314 74814->74318 74815->74178 74816->74347 74817->74178 74818->74337 74819->74368 74820->74178 74821->74178 74822->74358 74823->74369 74824->74387 74825->74318 74826->74178 74827->74370 74828->74377 74829->74178 74830->74416 74831->74178 74832->74446 74833->74454 74834->74178 74835->74432 74836->74178 74837->74443 74838->74178 74839->74489 74840->74178 74841->74481 74842->74318 74843->74496 74844->74318 74847->74178 74851->74178 74860->74178 74861->74567 74864->74178 74865->74599 74882->74178 74883->74648 74884->74178 74887->74689 74900 436495 74899->74900 74902 4364b7 74899->74902 74900->74902 74910 40909c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74900->74910 74901 436536 74912 40909c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 74901->74912 74902->74901 74903 43650a 74902->74903 74904 43652d 74902->74904 74903->74764 74911 403f90 18 API calls 74904->74911 74908 436547 74908->74764 74909 436534 74909->74764 74910->74902 74911->74909 74912->74908 74913->74768 74914->74769 74915 42e87f SetErrorMode 74916 478d78 74917 478d93 74916->74917 74918 478d9b CallWindowProcW 74916->74918 74917->74918 74919 478dac CallWindowProcW 74917->74919 74920 478dbb 74918->74920 74919->74920
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ADDBACKSLASH$ADDPERIOD$ADDQUOTES$CHARLENGTH$CONVERTPERCENTSTR$DELETEINIENTRY$DELETEINISECTION$DIREXISTS$FILECOPY$FILEEXISTS$FILEORDIREXISTS$FONTEXISTS$GETCMDTAIL$GETENV$GETINIBOOL$GETINIINT$GETINISTRING$GETSHORTNAME$GETSYSNATIVEDIR$GETSYSTEMDIR$GETSYSWOW64DIR$GETTEMPDIR$GETUILANGUAGE$GETWINDIR$INIKEYEXISTS$ISADMINLOGGEDON$ISINISECTIONEMPTY$ISPOWERUSERLOGGEDON$ISWILDCARD$PARAMCOUNT$PARAMSTR$REGDELETEKEYIFEMPTY$REGDELETEKEYINCLUDINGSUBKEYS$REGDELETEVALUE$REGGETSUBKEYNAMES$REGGETVALUENAMES$REGKEYEXISTS$REGQUERYBINARYVALUE$REGQUERYDWORDVALUE$REGQUERYMULTISTRINGVALUE$REGQUERYSTRINGVALUE$REGVALUEEXISTS$REGWRITEBINARYVALUE$REGWRITEDWORDVALUE$REGWRITEEXPANDSTRINGVALUE$REGWRITEMULTISTRINGVALUE$REGWRITESTRINGVALUE$REMOVEBACKSLASH$REMOVEBACKSLASHUNLESSROOT$REMOVEQUOTES$SETINIBOOL$SETINIINT$SETINISTRING$SETNTFSCOMPRESSION$STRINGCHANGE$STRINGCHANGEEX$USINGWINNT$WILDCARDMATCH
                                                      • API String ID: 0-2995905506
                                                      • Opcode ID: 47379c65e18803ed89a8cb35dcf6b416a7c6d2a64b8f1ea418acd2a03b84abc0
                                                      • Instruction ID: 531e8d64222ffae2c249fa443d2387929f23501f78df198fe4c1f2eaeed2c77d
                                                      • Opcode Fuzzy Hash: 47379c65e18803ed89a8cb35dcf6b416a7c6d2a64b8f1ea418acd2a03b84abc0
                                                      • Instruction Fuzzy Hash: 8FD25270B041055BDF10EB79CD829AEBAA5AF48314F50943FB802AB796DF3CDD068799

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1388 42e52c-42e53d 1389 42e548-42e56d AllocateAndInitializeSid 1388->1389 1390 42e53f-42e543 1388->1390 1391 42e717-42e71f 1389->1391 1392 42e573-42e590 GetVersion 1389->1392 1390->1391 1393 42e592-42e5a7 GetModuleHandleA GetProcAddress 1392->1393 1394 42e5a9-42e5ab 1392->1394 1393->1394 1395 42e5d2-42e5ec GetCurrentThread OpenThreadToken 1394->1395 1396 42e5ad-42e5bb CheckTokenMembership 1394->1396 1399 42e623-42e64b GetTokenInformation 1395->1399 1400 42e5ee-42e5f8 GetLastError 1395->1400 1397 42e5c1-42e5cd 1396->1397 1398 42e6f9-42e70f FreeSid 1396->1398 1397->1398 1401 42e666-42e68a call 402648 GetTokenInformation 1399->1401 1402 42e64d-42e655 GetLastError 1399->1402 1403 42e604-42e617 GetCurrentProcess OpenProcessToken 1400->1403 1404 42e5fa-42e5ff call 4031bc 1400->1404 1415 42e698-42e6a0 1401->1415 1416 42e68c-42e696 call 4031bc * 2 1401->1416 1402->1401 1406 42e657-42e661 call 4031bc * 2 1402->1406 1403->1399 1405 42e619-42e61e call 4031bc 1403->1405 1404->1391 1405->1391 1406->1391 1418 42e6a2-42e6a3 1415->1418 1419 42e6d3-42e6f1 call 402660 CloseHandle 1415->1419 1416->1391 1422 42e6a5-42e6b8 EqualSid 1418->1422 1426 42e6ba-42e6c7 1422->1426 1427 42e6cf-42e6d1 1422->1427 1426->1427 1430 42e6c9-42e6cd 1426->1430 1427->1419 1427->1422 1430->1419
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(0049C788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E566
                                                      • GetVersion.KERNEL32(00000000,0042E710,?,0049C788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E583
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E710,?,0049C788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E59C
                                                      • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E5A2
                                                      • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E710,?,0049C788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E5B7
                                                      • FreeSid.ADVAPI32(00000000,0042E717,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E70A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                      • String ID: CheckTokenMembership$advapi32.dll
                                                      • API String ID: 2252812187-1888249752
                                                      • Opcode ID: 00703ec5bc4e6a7ae9ebf93987a9797f0e4118df6b513f3cea44931636ca7d1c
                                                      • Instruction ID: bd7b6b299922f244852f5898a9d4d4a5ef1c154b8f3e5ea1adaf5ad24a825e41
                                                      • Opcode Fuzzy Hash: 00703ec5bc4e6a7ae9ebf93987a9797f0e4118df6b513f3cea44931636ca7d1c
                                                      • Instruction Fuzzy Hash: 36519471B44315AEEB11EAE69C42B7F77ACDB19304F94047BB500EB282D57CDD048B69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1431 450a28-450a4d 1432 450b20-450b44 call 403420 1431->1432 1433 450a53-450a60 GetVersion 1431->1433 1433->1432 1435 450a66-450aa0 call 4509f8 call 42c88c call 40357c call 403738 LoadLibraryA 1433->1435 1435->1432 1445 450aa2-450b1b GetProcAddress * 6 1435->1445 1445->1432
                                                      APIs
                                                      • GetVersion.KERNEL32(00000000,00450B45,?,?,?,?,00000000,00000000,?,00482E33), ref: 00450A53
                                                        • Part of subcall function 004509F8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00450A10
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,00450B45,?,?,?,?,00000000,00000000,?,00482E33), ref: 00450A8F
                                                      • GetProcAddress.KERNEL32(6EA40000,RmStartSession), ref: 00450AAD
                                                      • GetProcAddress.KERNEL32(6EA40000,RmRegisterResources), ref: 00450AC2
                                                      • GetProcAddress.KERNEL32(6EA40000,RmGetList), ref: 00450AD7
                                                      • GetProcAddress.KERNEL32(6EA40000,RmShutdown), ref: 00450AEC
                                                      • GetProcAddress.KERNEL32(6EA40000,RmRestart), ref: 00450B01
                                                      • GetProcAddress.KERNEL32(6EA40000,RmEndSession), ref: 00450B16
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$DirectoryLibraryLoadSystemVersion
                                                      • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                      • API String ID: 2754715182-3419246398
                                                      • Opcode ID: 69ff123684ebd81fb8406be45396341c47124d95e1b8311954c188464bf28ffd
                                                      • Instruction ID: 2841e6775defb51719e30d1654eee8915289afef741f041a49b247766738df14
                                                      • Opcode Fuzzy Hash: 69ff123684ebd81fb8406be45396341c47124d95e1b8311954c188464bf28ffd
                                                      • Instruction Fuzzy Hash: 8F212EB4510204BFE710FBE2DC86B6E77E8E714759F540537B840A71A2E678A949CB1C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1612 42409c-4240d0 1613 4240d2-4240d3 1612->1613 1614 424104-42411b call 423ff8 1612->1614 1616 4240d5-4240f1 call 40b6dc 1613->1616 1619 42417c-424181 1614->1619 1620 42411d 1614->1620 1637 4240f3-4240fb 1616->1637 1638 424100-424102 1616->1638 1622 424183 1619->1622 1623 4241b7-4241bc 1619->1623 1624 424123-424126 1620->1624 1625 4241e0-4241f0 1620->1625 1629 424441-424449 1622->1629 1630 424189-424191 1622->1630 1633 4241c2-4241c5 1623->1633 1634 42452a-424538 IsIconic 1623->1634 1631 424155-424158 1624->1631 1632 424128 1624->1632 1626 4241f2-4241f7 1625->1626 1627 4241fb-424203 call 424624 1625->1627 1635 424208-424210 call 42466c 1626->1635 1636 4241f9-42421c call 424014 1626->1636 1642 4245e2-4245ea 1627->1642 1629->1642 1648 42444f-42445a call 418670 1629->1648 1640 4243a3-4243ca SendMessageA 1630->1640 1641 424197-42419c 1630->1641 1649 424239-424240 1631->1649 1650 42415e-42415f 1631->1650 1644 424286-424296 call 424014 1632->1644 1645 42412e-424131 1632->1645 1646 424566-42457b call 424ce0 1633->1646 1647 4241cb-4241cc 1633->1647 1634->1642 1643 42453e-424549 GetFocus 1634->1643 1635->1642 1636->1642 1652 424601-424607 1637->1652 1638->1614 1638->1616 1640->1642 1663 4241a2-4241a3 1641->1663 1664 4244da-4244e5 1641->1664 1642->1652 1643->1642 1655 42454f-424558 call 41f484 1643->1655 1644->1642 1656 424137-42413a 1645->1656 1657 4242ae-4242c4 PostMessageA call 424014 1645->1657 1646->1642 1666 4241d2-4241d5 1647->1666 1667 42457d-424584 1647->1667 1648->1642 1699 424460-42446f call 418670 IsWindowEnabled 1648->1699 1649->1642 1660 424246-42424d 1649->1660 1661 424165-424168 1650->1661 1662 4243cf-4243d6 1650->1662 1655->1642 1712 42455e-424564 SetFocus 1655->1712 1673 424140-424143 1656->1673 1674 424335-42433c 1656->1674 1689 4242c9-4242ca 1657->1689 1660->1642 1679 424253-424259 1660->1679 1680 42416e-424171 1661->1680 1681 4242cf-4242ef call 424014 1661->1681 1662->1642 1669 4243dc-4243e1 call 404e54 1662->1669 1682 424502-42450d 1663->1682 1683 4241a9-4241ac 1663->1683 1664->1642 1685 4244eb-4244fd 1664->1685 1686 4245b0-4245b7 1666->1686 1687 4241db 1666->1687 1676 424586-424599 call 424964 1667->1676 1677 42459b-4245ae call 4249bc 1667->1677 1669->1642 1694 424149-42414a 1673->1694 1695 42425e-42426c IsIconic 1673->1695 1696 42433e-424351 call 423fa4 1674->1696 1697 42436f-424380 call 424014 1674->1697 1676->1642 1677->1642 1679->1642 1700 424177 1680->1700 1701 42429b-4242a9 call 424608 1680->1701 1727 424313-424330 call 423f14 PostMessageA 1681->1727 1728 4242f1-42430e call 423fa4 PostMessageA 1681->1728 1682->1642 1688 424513-424525 1682->1688 1705 4241b2 1683->1705 1706 4243e6-4243ee 1683->1706 1685->1642 1703 4245ca-4245d9 1686->1703 1704 4245b9-4245c8 1686->1704 1707 4245db-4245dc call 424014 1687->1707 1688->1642 1689->1642 1713 424150 1694->1713 1714 424221-424229 1694->1714 1720 42427a-424281 call 424014 1695->1720 1721 42426e-424275 call 424050 1695->1721 1741 424363-42436a call 424014 1696->1741 1742 424353-42435d call 41f3e8 1696->1742 1746 424382-424388 call 41f334 1697->1746 1747 424396-42439e call 423f14 1697->1747 1699->1642 1743 424475-424484 call 418670 IsWindowVisible 1699->1743 1700->1707 1701->1642 1703->1642 1704->1642 1705->1707 1706->1642 1711 4243f4-4243fb 1706->1711 1736 4245e1 1707->1736 1711->1642 1729 424401-424410 call 418670 IsWindowEnabled 1711->1729 1712->1642 1713->1707 1714->1642 1730 42422f-424234 call 4230dc 1714->1730 1720->1642 1721->1642 1727->1642 1728->1642 1729->1642 1757 424416-42442c call 4127a0 1729->1757 1730->1642 1736->1642 1741->1642 1742->1741 1743->1642 1764 42448a-4244d5 GetFocus call 418670 SetFocus call 4156d0 SetFocus 1743->1764 1761 42438d-424390 1746->1761 1747->1642 1757->1642 1767 424432-42443c 1757->1767 1761->1747 1764->1642 1767->1642
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 886bf65537a03716d8ce79b5c17bbfcd13e2fd4527009e8f92f9ab5e14d3b16d
                                                      • Instruction ID: 825bfe9503c2e42b9fb69ea357955289e6132b3f8b751ff356745ab72a8b0ef1
                                                      • Opcode Fuzzy Hash: 886bf65537a03716d8ce79b5c17bbfcd13e2fd4527009e8f92f9ab5e14d3b16d
                                                      • Instruction Fuzzy Hash: F0E18C34700124EFD710DB69E585A5EB7B4FB88304FA440A6FA85EB356C738EE81DB19

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1771 422cec-422cfd 1772 422d21-422d40 1771->1772 1773 422cff-422d09 1771->1773 1775 423036-42304d 1772->1775 1776 422d46-422d50 1772->1776 1773->1772 1774 422d0b-422d1c call 40914c call 40311c 1773->1774 1774->1772 1778 422f31-422f77 call 402c00 1776->1778 1779 422d56-422d9b call 402c00 1776->1779 1788 422f83-422f8d 1778->1788 1789 422f79-422f7e call 4222bc 1778->1789 1790 422da1-422dab 1779->1790 1791 422e3f-422e53 1779->1791 1795 422f8f-422f97 call 416b40 1788->1795 1796 422f9c-422fa6 1788->1796 1789->1788 1797 422de7-422dfb call 423638 1790->1797 1798 422dad-422dc4 call 414b4c 1790->1798 1792 422e59-422e63 1791->1792 1793 422f0c-422f2c call 418670 ShowWindow 1791->1793 1800 422e65-422e99 call 418670 SendMessageA call 418670 ShowWindow 1792->1800 1801 422e9b-422ee5 call 418670 ShowWindow call 418670 CallWindowProcA call 415154 1792->1801 1793->1775 1795->1775 1805 422fc7-422fda call 418670 GetActiveWindow 1796->1805 1806 422fa8-422fc5 call 418670 SetWindowPos 1796->1806 1820 422e00-422e14 call 423630 1797->1820 1821 422dfd 1797->1821 1815 422dc6 1798->1815 1816 422dc9-422de0 call 414b90 1798->1816 1840 422eea-422f07 SendMessageA 1800->1840 1801->1840 1824 422fdc-422fec call 418670 IsIconic 1805->1824 1825 422ffd-422fff 1805->1825 1806->1775 1815->1816 1837 422de2-422de5 1816->1837 1838 422e19-422e1b 1816->1838 1820->1838 1841 422e16 1820->1841 1821->1820 1824->1825 1846 422fee-422ffb call 418670 call 41f484 1824->1846 1833 423001-423024 call 418670 SetWindowPos SetActiveWindow 1825->1833 1834 423026-423031 call 418670 ShowWindow 1825->1834 1833->1775 1834->1775 1837->1838 1847 422e1f-422e21 1838->1847 1848 422e1d 1838->1848 1840->1775 1841->1838 1846->1825 1849 422e23 1847->1849 1850 422e25-422e3a 1847->1850 1848->1847 1849->1850 1850->1791
                                                      APIs
                                                      • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422E84
                                                      • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,0042304E), ref: 00422E94
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MessageSendShowWindow
                                                      • String ID:
                                                      • API String ID: 1631623395-0
                                                      • Opcode ID: fee8d02af05d41bac173c1050129a49de0b4046ad33b8f8baa5915edb3818267
                                                      • Instruction ID: 26a98208f56e96a8b9863cf96f01cb8393c818091eec428a2aa80c5483449fd4
                                                      • Opcode Fuzzy Hash: fee8d02af05d41bac173c1050129a49de0b4046ad33b8f8baa5915edb3818267
                                                      • Instruction Fuzzy Hash: 82915270B04254EFD711DFA9DA86F9E77F4AB04304F5600BAF504AB392C779AE40AB58
                                                      APIs
                                                        • Part of subcall function 004988F0: MulDiv.KERNEL32(?,?,00000006), ref: 00498967
                                                        • Part of subcall function 004988F0: MulDiv.KERNEL32(?,?,0000000D), ref: 0049897C
                                                        • Part of subcall function 00498738: GetWindowRect.USER32(00000000), ref: 0049874E
                                                      • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00468CC8
                                                        • Part of subcall function 004989BC: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 004989C6
                                                        • Part of subcall function 0042F1C8: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042F224
                                                        • Part of subcall function 0042F1C8: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042F241
                                                        • Part of subcall function 00498688: GetDC.USER32(00000000), ref: 004986AA
                                                        • Part of subcall function 00498688: SelectObject.GDI32(?,00000000), ref: 004986D0
                                                        • Part of subcall function 00498688: ReleaseDC.USER32(00000000,?), ref: 00498721
                                                        • Part of subcall function 004989AC: MulDiv.KERNEL32(0000004B,?,00000006), ref: 004989B6
                                                      • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,023189C8,0231A964,?,?,0231A994,?,?,0231A9F0,?), ref: 0046996B
                                                      • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046997C
                                                      • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00469994
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Menu$Append$AddressAutoBitmapCompleteLoadObjectProcRectReleaseSelectSystemWindow
                                                      • String ID: $(Default)$STOPIMAGE
                                                      • API String ID: 2472569012-770201673
                                                      • Opcode ID: 8946f81524f9d19275f7abce38fb92794786ad1c9579238aa5d491563488633e
                                                      • Instruction ID: f09852cb7729e2bbd5cbdd1f7d0006831e648923f53a2056fc505b03d658ebd5
                                                      • Opcode Fuzzy Hash: 8946f81524f9d19275f7abce38fb92794786ad1c9579238aa5d491563488633e
                                                      • Instruction Fuzzy Hash: E5F2C7386005148FCB00EB69D8D9F9977F5BF89304F1542BAE5049B36AD778AC4ACB4A
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,0045329B,?,?,-00000001,00000000), ref: 00453275
                                                      • GetLastError.KERNEL32(00000000,?,00000000,0045329B,?,?,-00000001,00000000), ref: 0045327D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileFindFirstLast
                                                      • String ID:
                                                      • API String ID: 873889042-0
                                                      • Opcode ID: eb4a1247d762527b0f95a072588846a86ffca63a133cb8b0ffbf18bb37ace285
                                                      • Instruction ID: 01611b9c15ef78b160da910fd5818d9ac2674b067f1b6166a22c9a12ef003207
                                                      • Opcode Fuzzy Hash: eb4a1247d762527b0f95a072588846a86ffca63a133cb8b0ffbf18bb37ace285
                                                      • Instruction Fuzzy Hash: CAF02D72A04704AB8B10DF76AC0149EF7BCEB8637672046BBFC14E3692DB794F058558
                                                      APIs
                                                      • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049E4C4,00000001,?,00408AC3,?,00000000,00408BA2), ref: 00408A16
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 6517a6df1027816fea4addc753f432335232e8d46b8be6dc802d5a2abbf08fa6
                                                      • Instruction ID: 256e1aeba2a9af0ec73989512e647111dc5dc60b4a8a7c740aeb84942aea65fa
                                                      • Opcode Fuzzy Hash: 6517a6df1027816fea4addc753f432335232e8d46b8be6dc802d5a2abbf08fa6
                                                      • Instruction Fuzzy Hash: 61E0683170021457C311A91A8C82AFBB34CDB18354F40427FBD44E73C2EDB89E4146EC
                                                      APIs
                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004245E1,?,00000000,004245EC), ref: 0042403E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID:
                                                      • API String ID: 4255912815-0
                                                      • Opcode ID: 3c6509642d3bb9f27e5e83e23d7c94f2c76b3e04732c449b11ab7c6176b5423f
                                                      • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                      • Opcode Fuzzy Hash: 3c6509642d3bb9f27e5e83e23d7c94f2c76b3e04732c449b11ab7c6176b5423f
                                                      • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,004066B9,?,?,?,?,00000000,?,0049BA44), ref: 00406417
                                                      • GetVersion.KERNEL32(kernel32.dll,00000000,004066B9,?,?,?,?,00000000,?,0049BA44), ref: 0040641E
                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00406433
                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040645B
                                                      • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406680
                                                      • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406696
                                                      • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,kernel32.dll,00000000,004066B9,?,?,?,?,00000000,?,0049BA44), ref: 004066A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModulePolicyProcessVersion
                                                      • String ID: SetDefaultDllDirectories$SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$apphelp.dll$clbcatq.dll$comres.dll$cryptbase.dll$dwmapi.dll$kernel32.dll$ntmarta.dll$oleacc.dll$profapi.dll$propsys.dll$setupapi.dll$userenv.dll$uxtheme.dll$version.dll
                                                      • API String ID: 3297890031-1119018034
                                                      • Opcode ID: aa2224054af9e2cdb85ff1d97acc07dc748637bf55eb8aa36b25b3eca2d85656
                                                      • Instruction ID: 7e21cf5f117f2e3abcec30b6674fd8076a5a40f26409e7412662737288cf0c05
                                                      • Opcode Fuzzy Hash: aa2224054af9e2cdb85ff1d97acc07dc748637bf55eb8aa36b25b3eca2d85656
                                                      • Instruction Fuzzy Hash: 5C612030A00009EBDB01FBAAD982D8D7BB89B45749B214077A405772F6DB3CEF199B5D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1446 485e3c-485e61 GetModuleHandleA GetProcAddress 1447 485ec8-485ecd GetSystemInfo 1446->1447 1448 485e63-485e79 GetNativeSystemInfo GetProcAddress 1446->1448 1449 485ed2-485edb 1447->1449 1448->1449 1450 485e7b-485e86 GetCurrentProcess 1448->1450 1451 485edd-485ee1 1449->1451 1452 485ef1-485ef8 1449->1452 1450->1449 1459 485e88-485e8c 1450->1459 1453 485efa-485f01 1451->1453 1454 485ee3-485ee7 1451->1454 1455 485f1c-485f21 1452->1455 1453->1455 1457 485ee9-485eed 1454->1457 1458 485f03-485f0a 1454->1458 1461 485f0c-485f13 1457->1461 1462 485eef-485f15 1457->1462 1458->1455 1459->1449 1460 485e8e-485e95 call 452ef4 1459->1460 1460->1449 1466 485e97-485ea4 GetProcAddress 1460->1466 1461->1455 1462->1455 1466->1449 1467 485ea6-485ebd GetModuleHandleA GetProcAddress 1466->1467 1467->1449 1468 485ebf-485ec6 1467->1468 1468->1449
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00485E4D
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00485E5A
                                                      • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00485E68
                                                      • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00485E70
                                                      • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00485E7C
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00485E9D
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00485EB0
                                                      • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00485EB6
                                                      • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00485ECD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                      • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                      • API String ID: 2230631259-2623177817
                                                      • Opcode ID: 9d291c22a71a0cf1a9fee4c4184e10d43f1fae15fdb33576c9d22a7be2dcaa12
                                                      • Instruction ID: 52726a1ce108b2e1205f78178c8bd3673f5dc6952592f7a0a7a67ab458256f91
                                                      • Opcode Fuzzy Hash: 9d291c22a71a0cf1a9fee4c4184e10d43f1fae15fdb33576c9d22a7be2dcaa12
                                                      • Instruction Fuzzy Hash: FD118465148F8195DE1273794C8A77F2A888B10718F2C0C3B7B847A6D2DBBC8D85972F

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1469 46a2f8-46a330 call 47e4a8 1472 46a336-46a346 call 47af98 1469->1472 1473 46a512-46a52c call 403420 1469->1473 1478 46a34b-46a390 call 407d84 call 403738 call 42e2ac 1472->1478 1484 46a395-46a397 1478->1484 1485 46a39d-46a3b2 1484->1485 1486 46a508-46a50c 1484->1486 1487 46a3c7-46a3ce 1485->1487 1488 46a3b4-46a3c2 call 42e1dc 1485->1488 1486->1473 1486->1478 1490 46a3d0-46a3f2 call 42e1dc call 42e1f4 1487->1490 1491 46a3fb-46a402 1487->1491 1488->1487 1490->1491 1509 46a3f4 1490->1509 1493 46a404-46a429 call 42e1dc * 2 1491->1493 1494 46a45b-46a462 1491->1494 1516 46a42b-46a434 call 4319e8 1493->1516 1517 46a439-46a44b call 42e1dc 1493->1517 1496 46a464-46a476 call 42e1dc 1494->1496 1497 46a4a8-46a4af 1494->1497 1510 46a486-46a498 call 42e1dc 1496->1510 1511 46a478-46a481 call 4319e8 1496->1511 1502 46a4b1-46a4e5 call 42e1dc * 3 1497->1502 1503 46a4ea-46a500 RegCloseKey 1497->1503 1502->1503 1509->1491 1510->1497 1523 46a49a-46a4a3 call 4319e8 1510->1523 1511->1510 1516->1517 1517->1494 1525 46a44d-46a456 call 4319e8 1517->1525 1523->1497 1525->1494
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(?,0046A512,?,?,00000001,00000000,00000000,0046A52D,?,00000000,00000000,?), ref: 0046A4FB
                                                      Strings
                                                      • Inno Setup: Setup Type, xrefs: 0046A40A
                                                      • Inno Setup: User Info: Name, xrefs: 0046A4B7
                                                      • Inno Setup: User Info: Organization, xrefs: 0046A4CA
                                                      • Inno Setup: Icon Group, xrefs: 0046A3D6
                                                      • Inno Setup: Selected Components, xrefs: 0046A41A
                                                      • Inno Setup: No Icons, xrefs: 0046A3E3
                                                      • Inno Setup: Selected Tasks, xrefs: 0046A467
                                                      • Inno Setup: Deselected Tasks, xrefs: 0046A489
                                                      • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0046A357
                                                      • Inno Setup: User Info: Serial, xrefs: 0046A4DD
                                                      • Inno Setup: Deselected Components, xrefs: 0046A43C
                                                      • Inno Setup: App Path, xrefs: 0046A3BA
                                                      • %s\%s_is1, xrefs: 0046A375
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                      • API String ID: 47109696-1093091907
                                                      • Opcode ID: 55465f8b1ecb84598e1fa3f417a1a599462ef7b6c0253ef331ed16acccad8cce
                                                      • Instruction ID: bc3733d3a6311be72aa26145a3a6b26ae63bc40f30ab818c77ebdc0ae002d22e
                                                      • Opcode Fuzzy Hash: 55465f8b1ecb84598e1fa3f417a1a599462ef7b6c0253ef331ed16acccad8cce
                                                      • Instruction Fuzzy Hash: 2F518170600A049FCB11DB65D952BEEB7B4EF49304F5084BAE841B7391E738AE15CF5A

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0042DD28: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,004545B0,00000000,00454862,?,?,00000000,0049E62C,00000004,00000000,00000000,00000000,?,0049B229), ref: 0042DD3B
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                        • Part of subcall function 0042DD80: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00454356,00000000,004543F9,?,?,00000000,00000000,00000000,00000000,00000000,?,004547E9,00000000), ref: 0042DD9A
                                                        • Part of subcall function 0042DD80: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042DDA0
                                                      • SHGetKnownFolderPath.SHELL32(0049CD48,00008000,00000000,?,00000000,0047EB7C), ref: 0047EA82
                                                      • CoTaskMemFree.OLE32(?,0047EAC5), ref: 0047EAB8
                                                        • Part of subcall function 0042D698: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DECE,00000000,0042DF60,?,?,?,0049E62C,00000000,00000000), ref: 0042D6C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                      • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                      • API String ID: 3771764029-544719455
                                                      • Opcode ID: f8969b8c83ddcc016eba2be8046c2e4320b88b0f19ff27ae1324c962e61ddc41
                                                      • Instruction ID: 78e7a351989074df20a48af568640fcf9ae091c764a67f88943fd453c39c20c9
                                                      • Opcode Fuzzy Hash: f8969b8c83ddcc016eba2be8046c2e4320b88b0f19ff27ae1324c962e61ddc41
                                                      • Instruction Fuzzy Hash: D4616034610104DFDB10EBA6D84269E7F69EB48319F60C6BBE404E7395C73CAE49CA9D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1855 47f0b4-47f106 call 42dd54 call 42c88c call 4035c0 call 452db0 1864 47f123-47f12a 1855->1864 1865 47f108-47f10f 1855->1865 1868 47f135-47f137 1864->1868 1869 47f12c-47f133 1864->1869 1866 47f111-47f118 1865->1866 1867 47f139 1865->1867 1866->1864 1870 47f11a-47f121 1866->1870 1871 47f13b-47f13d 1867->1871 1868->1871 1869->1867 1869->1868 1870->1864 1870->1867 1872 47f13f-47f164 call 42c88c call 4035c0 call 47ed78 1871->1872 1873 47f169-47f1af call 42dd54 call 42c88c call 40357c call 42e824 * 2 1871->1873 1872->1873 1889 47f1d6-47f1f0 GetProcAddress 1873->1889 1890 47f1b1-47f1d1 call 407d84 call 453b40 1873->1890 1892 47f1f2-47f1f7 call 453b40 1889->1892 1893 47f1fc-47f21e call 403420 call 403400 1889->1893 1890->1889 1892->1893
                                                      APIs
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                      • GetProcAddress.KERNEL32(74A90000,SHGetFolderPathA), ref: 0047F1E1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryProcSystem
                                                      • String ID: 2$Failed to get address of SHGetFolderPath function$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                      • API String ID: 996212319-3422985891
                                                      • Opcode ID: bc52ae8ca97decd057a22e62308b2ca98b91365db34e2635b6964e716f063628
                                                      • Instruction ID: 162927b5a2cba69edd54960eab9b72e157ae6c4c2e5edd016ae03b58ced20ba2
                                                      • Opcode Fuzzy Hash: bc52ae8ca97decd057a22e62308b2ca98b91365db34e2635b6964e716f063628
                                                      • Instruction Fuzzy Hash: C1413034A0020ADFCB10EFA5D9819EEB7B5EF44309F90847BE518A7252D7389E09CB59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1901 423d04-423d0e 1902 423e37-423e3b 1901->1902 1903 423d14-423d36 call 41f854 GetClassInfoA 1901->1903 1906 423d67-423d70 GetSystemMetrics 1903->1906 1907 423d38-423d4f RegisterClassA 1903->1907 1908 423d72 1906->1908 1909 423d75-423d7f GetSystemMetrics 1906->1909 1907->1906 1910 423d51-423d62 call 40914c call 40311c 1907->1910 1908->1909 1912 423d81 1909->1912 1913 423d84-423de0 call 403738 call 406300 call 403400 call 423adc SetWindowLongA 1909->1913 1910->1906 1912->1913 1924 423de2-423df5 call 424608 SendMessageA 1913->1924 1925 423dfa-423e28 GetSystemMenu DeleteMenu * 2 1913->1925 1924->1925 1925->1902 1927 423e2a-423e32 DeleteMenu 1925->1927 1927->1902
                                                      APIs
                                                        • Part of subcall function 0041F854: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041F234,?,00423D1F,0042409C,0041F234), ref: 0041F872
                                                      • GetClassInfoA.USER32(00400000,00423B0C), ref: 00423D2F
                                                      • RegisterClassA.USER32(0049C630), ref: 00423D47
                                                      • GetSystemMetrics.USER32(00000000), ref: 00423D69
                                                      • GetSystemMetrics.USER32(00000001), ref: 00423D78
                                                      • SetWindowLongA.USER32(004108F0,000000FC,00423B1C), ref: 00423DD4
                                                      • SendMessageA.USER32(004108F0,00000080,00000001,00000000), ref: 00423DF5
                                                      • GetSystemMenu.USER32(004108F0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042409C,0041F234), ref: 00423E00
                                                      • DeleteMenu.USER32(00000000,0000F030,00000000,004108F0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042409C,0041F234), ref: 00423E0F
                                                      • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004108F0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423E1C
                                                      • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004108F0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423E32
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                      • String ID:
                                                      • API String ID: 183575631-0
                                                      • Opcode ID: aeea6ed96da726cf0390846aab0a070c3404cae578d0716d11b5eb43d210982e
                                                      • Instruction ID: 3c08988f126546789c3863b6090fce38962bc241f8b01a8198fec2671c318d21
                                                      • Opcode Fuzzy Hash: aeea6ed96da726cf0390846aab0a070c3404cae578d0716d11b5eb43d210982e
                                                      • Instruction Fuzzy Hash: B73173B17402506AEB10AF69EC82F6736989714709F60017BFA44EE2D7D6BDED00876D

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453A86,?,?,?,?,00000000,00000000,?,0049BA8A), ref: 004539EA
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004539F0
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453A86,?,?,?,?,00000000,00000000,?,0049BA8A), ref: 00453A04
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453A0A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                      • API String ID: 1646373207-2130885113
                                                      • Opcode ID: 1e37e0ab1df9e757d704b947a29f50b329146a292bd817b3065b294340fa9558
                                                      • Instruction ID: 18891d3ceb8887e2f5320c13b89f4eae329e81661ad9de64afed935a1ef9114c
                                                      • Opcode Fuzzy Hash: 1e37e0ab1df9e757d704b947a29f50b329146a292bd817b3065b294340fa9558
                                                      • Instruction Fuzzy Hash: EA119130644255BEEB00EF72D802B5E77A8D74479AF60447BF88066292D67C9E4C8A2D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2594 468610-4686ba call 414aac call 414acc call 414aac call 414acc SHGetFileInfo 2603 4686ef-4686fa call 47af78 2594->2603 2604 4686bc-4686c3 2594->2604 2609 4686fc-468741 call 42c88c call 40357c call 403738 ExtractIconA call 46854c 2603->2609 2610 46874b-46875e call 47f570 2603->2610 2604->2603 2605 4686c5-4686ea ExtractIconA call 46854c 2604->2605 2605->2603 2632 468746 2609->2632 2615 468760-46876a call 47f570 2610->2615 2616 46876f-468773 2610->2616 2615->2616 2619 468775-468798 call 403738 SHGetFileInfo 2616->2619 2620 4687cd-468801 call 403400 * 2 2616->2620 2619->2620 2628 46879a-4687a1 2619->2628 2628->2620 2631 4687a3-4687c8 ExtractIconA call 46854c 2628->2631 2631->2620 2632->2620
                                                      APIs
                                                      • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004686B3
                                                      • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004686D9
                                                        • Part of subcall function 0046854C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004685E7
                                                        • Part of subcall function 0046854C: DestroyCursor.USER32(00000000), ref: 004685FD
                                                      • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00468730
                                                      • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00468791
                                                      • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004687B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                      • String ID: c:\directory$shell32.dll
                                                      • API String ID: 3376378930-1375355148
                                                      • Opcode ID: 7a772aa265c91b1f74206593db125e0d1db5563dad8a39a26a2e33cb98cd9a9c
                                                      • Instruction ID: 811d36ee9d093b3b0276aa4c13663b10f9457e770bee0cd4c871c76846c3392c
                                                      • Opcode Fuzzy Hash: 7a772aa265c91b1f74206593db125e0d1db5563dad8a39a26a2e33cb98cd9a9c
                                                      • Instruction Fuzzy Hash: D2515070600244AFD710EF55CC8AFDAB7E8AB48305F5082BAF4049B751DA799E81CA59

                                                      Control-flow Graph

                                                      APIs
                                                      • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430E28
                                                      • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430E37
                                                      • GetCurrentThreadId.KERNEL32 ref: 00430E51
                                                      • GlobalAddAtomA.KERNEL32(00000000), ref: 00430E72
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                      • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                      • API String ID: 4130936913-2943970505
                                                      • Opcode ID: 18e0ea013f721cf9d0855e1711e424e1ec4dc69dbdb3ee4d586f10aea4099809
                                                      • Instruction ID: 010e98d13399693fc9d497d8664f6f2789eb24ebecb377ca83b09cc51ba55008
                                                      • Opcode Fuzzy Hash: 18e0ea013f721cf9d0855e1711e424e1ec4dc69dbdb3ee4d586f10aea4099809
                                                      • Instruction Fuzzy Hash: 58F082B09483408ED300EB768842B1E7BE4AB58718F404A3FB498A62A1D77A9910CB1F

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2639 4232e0-4232fb call 414570 2642 42331e-42332f call 40914c call 40311c 2639->2642 2643 4232fd-423304 2639->2643 2648 423334-42333b GetCapture 2642->2648 2643->2642 2644 423306-423310 2643->2644 2644->2642 2646 423312-42331c 2644->2646 2646->2642 2646->2648 2650 42334e-42339e ReleaseCapture GetActiveWindow call 423824 call 41f334 2648->2650 2651 42333d-423349 GetCapture SendMessageA 2648->2651 2655 4233a3-4233e6 call 423294 call 418670 SendMessageA 2650->2655 2651->2650 2660 4233ec-4233f9 call 42494c 2655->2660 2663 42340a-423414 2660->2663 2664 4233fb-423408 2660->2664 2665 42341e-423429 2663->2665 2666 423416-423419 call 4231e4 2663->2666 2664->2665 2665->2660 2668 42342b-423456 call 418670 SendMessageA call 418670 GetActiveWindow 2665->2668 2666->2665 2673 423458-42345a 2668->2673 2674 42345d-423472 call 42328c 2668->2674 2673->2674
                                                      APIs
                                                      • GetCapture.USER32 ref: 00423334
                                                      • GetCapture.USER32 ref: 00423343
                                                      • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00423349
                                                      • ReleaseCapture.USER32 ref: 0042334E
                                                      • GetActiveWindow.USER32 ref: 0042335D
                                                      • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 004233DC
                                                      • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00423440
                                                      • GetActiveWindow.USER32 ref: 0042344F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CaptureMessageSend$ActiveWindow$Release
                                                      • String ID:
                                                      • API String ID: 862346643-0
                                                      • Opcode ID: f69812db9b2b79ec794c9b8766cda1920263d90c5a2084de5f9108f08cb6d884
                                                      • Instruction ID: 18bdd7e577e3521af934e8bbd68e58ee55e38e107d312ae6febd14bbc8fb8244
                                                      • Opcode Fuzzy Hash: f69812db9b2b79ec794c9b8766cda1920263d90c5a2084de5f9108f08cb6d884
                                                      • Instruction Fuzzy Hash: 07414D30B00254AFDB10EF6AD982B9E77F1AF04704F5440BAE440AB2A2DB7D9F40CB58
                                                      APIs
                                                      • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00478E1D
                                                      • SetWindowLongW.USER32(00000000,000000FC,00478D78), ref: 00478E44
                                                      • GetACP.KERNEL32(00000000,0047905C,?,00000000,00479086), ref: 00478E81
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00478EC7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ClassInfoLongMessageSendWindow
                                                      • String ID: COMBOBOX$Inno Setup: Language
                                                      • API String ID: 3391662889-4234151509
                                                      • Opcode ID: 64aed83d7cd5fc135e30750f8cb7816a0e0a0640c1f8587c76686a23d2846c44
                                                      • Instruction ID: 9a1e1fbd3c649eeeadcf20bc1b1a007eb45d24132bb8eba9a2a930841c17950d
                                                      • Opcode Fuzzy Hash: 64aed83d7cd5fc135e30750f8cb7816a0e0a0640c1f8587c76686a23d2846c44
                                                      • Instruction Fuzzy Hash: 64814E34A40605DFC710DF69C889AAAB7F5FB49304F1081BAE808DB762DB78AD45CB59
                                                      APIs
                                                      • LoadIconA.USER32(00400000,MAINICON), ref: 00423BAC
                                                      • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00419476,00000000,?,?,?,00000001), ref: 00423BD9
                                                      • OemToCharA.USER32(?,?), ref: 00423BEC
                                                      • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00419476,00000000,?,?,?,00000001), ref: 00423C2C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Char$FileIconLoadLowerModuleName
                                                      • String ID: 2$MAINICON
                                                      • API String ID: 3935243913-3181700818
                                                      • Opcode ID: 1f82f7cb80c34b9ff5c46231264fdecee05270e1fe5ff3a7350c32b1cef790c9
                                                      • Instruction ID: 9510fd107b4d1d478bc251de40ec4f21bd31917ac71a3749b9d0f73c54ce2f3c
                                                      • Opcode Fuzzy Hash: 1f82f7cb80c34b9ff5c46231264fdecee05270e1fe5ff3a7350c32b1cef790c9
                                                      • Instruction Fuzzy Hash: 1031C271A042549EDB10EF69D8C47C67BE8AF14308F4441BAE844DB293D7BEDA88CB55
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32(00000000), ref: 004193CD
                                                      • GlobalAddAtomA.KERNEL32(00000000), ref: 004193EE
                                                      • GetCurrentThreadId.KERNEL32 ref: 00419409
                                                      • GlobalAddAtomA.KERNEL32(00000000), ref: 0041942A
                                                        • Part of subcall function 00423558: GetDC.USER32(00000000), ref: 004235AE
                                                        • Part of subcall function 00423558: EnumFontsA.GDI32(00000000,00000000,004234F8,004108F0,00000000,?,?,00000000,?,00419463,00000000,?,?,?,00000001), ref: 004235C1
                                                        • Part of subcall function 00423558: GetDeviceCaps.GDI32(00000000,0000005A), ref: 004235C9
                                                        • Part of subcall function 00423558: ReleaseDC.USER32(00000000,00000000), ref: 004235D4
                                                        • Part of subcall function 00423B1C: LoadIconA.USER32(00400000,MAINICON), ref: 00423BAC
                                                        • Part of subcall function 00423B1C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00419476,00000000,?,?,?,00000001), ref: 00423BD9
                                                        • Part of subcall function 00423B1C: OemToCharA.USER32(?,?), ref: 00423BEC
                                                        • Part of subcall function 00423B1C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00419476,00000000,?,?,?,00000001), ref: 00423C2C
                                                        • Part of subcall function 0041F5A8: GetVersion.KERNEL32(?,00419480,00000000,?,?,?,00000001), ref: 0041F5B6
                                                        • Part of subcall function 0041F5A8: SetErrorMode.KERNEL32(00008000,?,00419480,00000000,?,?,?,00000001), ref: 0041F5D2
                                                        • Part of subcall function 0041F5A8: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419480,00000000,?,?,?,00000001), ref: 0041F5DE
                                                        • Part of subcall function 0041F5A8: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419480,00000000,?,?,?,00000001), ref: 0041F5EC
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F61C
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F645
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F65A
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F66F
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F684
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F699
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F6AE
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F6C3
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F6D8
                                                        • Part of subcall function 0041F5A8: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F6ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                      • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                      • API String ID: 316262546-2767913252
                                                      • Opcode ID: 01010ffcc25770325181b3a7c3472aaf3562720f676c53cb12d5d492de89c379
                                                      • Instruction ID: 70937e91f797630ba3b8911ce9801afdb7ec3901755c8c3c4a5a11a92c11164f
                                                      • Opcode Fuzzy Hash: 01010ffcc25770325181b3a7c3472aaf3562720f676c53cb12d5d492de89c379
                                                      • Instruction Fuzzy Hash: 92111A706182409AC300FF76D94279E3BE09B64309F80953FF449A72A2DB3DAD458B5F
                                                      APIs
                                                      • SetWindowLongA.USER32(?,000000FC,?), ref: 00413AF4
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 00413AFF
                                                      • GetWindowLongA.USER32(?,000000F4), ref: 00413B11
                                                      • SetWindowLongA.USER32(?,000000F4,?), ref: 00413B24
                                                      • SetPropA.USER32(?,00000000,00000000), ref: 00413B3B
                                                      • SetPropA.USER32(?,00000000,00000000), ref: 00413B52
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$Prop
                                                      • String ID:
                                                      • API String ID: 3887896539-0
                                                      • Opcode ID: 7ce4dc3fc8e6c19e22986d13dd13120370638c3e9722ee2c323b47d3b17dffc8
                                                      • Instruction ID: ae8f1583d3b1519aebe57cde2a9c9bb5e562c2388428f51edfa5c09d84851558
                                                      • Opcode Fuzzy Hash: 7ce4dc3fc8e6c19e22986d13dd13120370638c3e9722ee2c323b47d3b17dffc8
                                                      • Instruction Fuzzy Hash: 8B11FC75500204BFCB00DFD9DC84E9A3BE8EB19364F104266B918DB2A2D738E990CB94
                                                      APIs
                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047EF26,?,?,00000000,0049E62C,00000000,00000000,?,0049B3BD,00000000,0049B566,?,00000000), ref: 0047EE63
                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,0047EF26,?,?,00000000,0049E62C,00000000,00000000,?,0049B3BD,00000000,0049B566,?,00000000), ref: 0047EE6C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                      • API String ID: 1375471231-2952887711
                                                      • Opcode ID: 5f75c24b460723fcdfba9950ec6282d6ab576ec79b10eebf27e30941102b1c05
                                                      • Instruction ID: 86bef283ce988d733661aa3151468cc82572962b3dbe771d766a2fd360a5d677
                                                      • Opcode Fuzzy Hash: 5f75c24b460723fcdfba9950ec6282d6ab576ec79b10eebf27e30941102b1c05
                                                      • Instruction Fuzzy Hash: C6415674A001099BCB11FFA2D881ADEB7B9FF48305F50457BE404B7792DB38AE058B98
                                                      APIs
                                                      • EnumWindows.USER32(00423EAC), ref: 00423F38
                                                      • GetWindow.USER32(?,00000003), ref: 00423F4D
                                                      • GetWindowLongA.USER32(?,000000EC), ref: 00423F5C
                                                      • SetWindowPos.USER32(00000000,EB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042463B,?,?,00424203), ref: 00423F92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$EnumLongWindows
                                                      • String ID: EB
                                                      • API String ID: 4191631535-4058845024
                                                      • Opcode ID: 7748721dd5b0c1bbec3d319649027a89b4350bc13e845d744e86a3b3b16a9e4e
                                                      • Instruction ID: d60c47438ca5cb8406b8c3c26f1ac59805b97d32456ef5cb908caaf585e7f615
                                                      • Opcode Fuzzy Hash: 7748721dd5b0c1bbec3d319649027a89b4350bc13e845d744e86a3b3b16a9e4e
                                                      • Instruction Fuzzy Hash: E5115E71B04610AFDB109F28E989F5677F4EB08719F61066AF9649B2E2C378DC40CB58
                                                      APIs
                                                      • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448C1C), ref: 00448B48
                                                      • GetLastError.KERNEL32(00000000,?,?,00000000,00448C1C), ref: 00448B6F
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448BD6
                                                      • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00448C1C), ref: 00448BF1
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$AddressLibraryLoadProc
                                                      • String ID:
                                                      • API String ID: 1866314245-0
                                                      • Opcode ID: 63cc74ccd02df5d1501b917637fd563c114fed944347ce56eb0fb2cf20442c69
                                                      • Instruction ID: 86cd10a4b754a346bbb6b93b1800c6189756eba4f25aae068f18fd67d3000257
                                                      • Opcode Fuzzy Hash: 63cc74ccd02df5d1501b917637fd563c114fed944347ce56eb0fb2cf20442c69
                                                      • Instruction Fuzzy Hash: B35146B0A001459FDB00EF95C481AAFB7F8EF45315F10817EE414BB396CA789E458B59
                                                      APIs
                                                      • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042F241
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                        • Part of subcall function 0042E824: SetErrorMode.KERNEL32(00008000), ref: 0042E82E
                                                        • Part of subcall function 0042E824: LoadLibraryA.KERNEL32(00000000,00000000,0042E878,?,00000000,0042E896,?,00008000), ref: 0042E85D
                                                      • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042F224
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                      • String ID: SHAutoComplete$shlwapi.dll
                                                      • API String ID: 395431579-1506664499
                                                      • Opcode ID: 10e85ac42e3d5d72963f54dd94e2667e767766e27aca82d6749a6d4de36c3baa
                                                      • Instruction ID: 6fa00d493cbbc8796123fe1d0635de5045be30c1a8ceda1a87749c26dfdb7117
                                                      • Opcode Fuzzy Hash: 10e85ac42e3d5d72963f54dd94e2667e767766e27aca82d6749a6d4de36c3baa
                                                      • Instruction Fuzzy Hash: 6501C434700758FBE711DB62EC42B5A7AF8DB56704FD000B7B00062691C6BA9D48862D
                                                      APIs
                                                      • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00482145,?,00000000,00000000,?,?,00483497,?,?,00000000), ref: 00481FF2
                                                      • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00482145,?,00000000,00000000,?,?,00483497,?,?), ref: 00481FFF
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00482118,?,?,?,?,00000000,00482145,?,00000000,00000000,?,?,00483497), ref: 004820F4
                                                      • FindClose.KERNEL32(000000FF,0048211F,00482118,?,?,?,?,00000000,00482145,?,00000000,00000000,?,?,00483497,?), ref: 00482112
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileNext
                                                      • String ID:
                                                      • API String ID: 2066263336-0
                                                      • Opcode ID: bdfb6e2b1c87897b3a9af8a5dc7d12f2e58d8891e161b502f6e8fba4fadf01fa
                                                      • Instruction ID: 08b9d9e684fed8dea23f8f184a6a28fa9329586f58159be8e4499552dc0984e9
                                                      • Opcode Fuzzy Hash: bdfb6e2b1c87897b3a9af8a5dc7d12f2e58d8891e161b502f6e8fba4fadf01fa
                                                      • Instruction Fuzzy Hash: A8518F70A00648AFCB11EFA5CD45ADEB7B8EB49315F1084AAA908F7351D7389F85CF54
                                                      APIs
                                                      • GetMenu.USER32(00000000), ref: 004217F1
                                                      • SetMenu.USER32(00000000,00000000), ref: 0042180E
                                                      • SetMenu.USER32(00000000,00000000), ref: 00421843
                                                      • SetMenu.USER32(00000000,00000000), ref: 0042185F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Menu
                                                      • String ID:
                                                      • API String ID: 3711407533-0
                                                      • Opcode ID: 4f4a6720c0d4240df17a752d101e3e079c79ea095c8752a38fea6d697220fe84
                                                      • Instruction ID: cda4d875d1f608ccb0f244f9e48059a425efb766f93e731c33a2d40a56ce0a72
                                                      • Opcode Fuzzy Hash: 4f4a6720c0d4240df17a752d101e3e079c79ea095c8752a38fea6d697220fe84
                                                      • Instruction Fuzzy Hash: 4641B230B002604BDB20BE3A98857DB36959FA1708F48047FB8408F3A7CA7DCC8587AD
                                                      APIs
                                                      • SendMessageA.USER32(?,?,?,?), ref: 00417014
                                                      • SetTextColor.GDI32(?,00000000), ref: 0041702E
                                                      • SetBkColor.GDI32(?,00000000), ref: 00417048
                                                      • CallWindowProcA.USER32(?,?,?,?,?), ref: 00417070
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Color$CallMessageProcSendTextWindow
                                                      • String ID:
                                                      • API String ID: 601730667-0
                                                      • Opcode ID: 9e3e2694ee45dac8d31a23f67f82d5f08d8b2d5533639d352c95bf2745043790
                                                      • Instruction ID: 80572e548b46958a0d24f1498dfa195ce4484893cdd9813db9ff7b95e026d91f
                                                      • Opcode Fuzzy Hash: 9e3e2694ee45dac8d31a23f67f82d5f08d8b2d5533639d352c95bf2745043790
                                                      • Instruction Fuzzy Hash: A71151B5604700AFD710EE6ECD84E8B77EDDF49310B14882BB599DB612C62CEC418B79
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 004235AE
                                                      • EnumFontsA.GDI32(00000000,00000000,004234F8,004108F0,00000000,?,?,00000000,?,00419463,00000000,?,?,?,00000001), ref: 004235C1
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004235C9
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004235D4
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CapsDeviceEnumFontsRelease
                                                      • String ID:
                                                      • API String ID: 2698912916-0
                                                      • Opcode ID: e97f28f260114bd4b50ee825155fd8757a5a43882207122cecfc92cdae6cf7ce
                                                      • Instruction ID: e37963186075478de4bf5b94465d182e7684c730ebf482ac601e72b604436184
                                                      • Opcode Fuzzy Hash: e97f28f260114bd4b50ee825155fd8757a5a43882207122cecfc92cdae6cf7ce
                                                      • Instruction Fuzzy Hash: B301D2A17043006AE700BF795D82B9B37649F00309F04467BF808AF3C2D67E9805476E
                                                      APIs
                                                        • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049BA3A), ref: 0040334B
                                                        • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049BA3A), ref: 00403356
                                                        • Part of subcall function 004063FC: GetModuleHandleA.KERNEL32(kernel32.dll,00000000,004066B9,?,?,?,?,00000000,?,0049BA44), ref: 00406417
                                                        • Part of subcall function 004063FC: GetVersion.KERNEL32(kernel32.dll,00000000,004066B9,?,?,?,?,00000000,?,0049BA44), ref: 0040641E
                                                        • Part of subcall function 004063FC: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00406433
                                                        • Part of subcall function 004063FC: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040645B
                                                        • Part of subcall function 00406854: 6FBE1CD0.COMCTL32(0049BA49), ref: 00406854
                                                        • Part of subcall function 00410BF4: GetCurrentThreadId.KERNEL32 ref: 00410C42
                                                        • Part of subcall function 004194D0: GetVersion.KERNEL32(0049BA62), ref: 004194D0
                                                        • Part of subcall function 0044FDB0: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049BA76), ref: 0044FDEB
                                                        • Part of subcall function 0044FDB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044FDF1
                                                        • Part of subcall function 0045027C: GetVersionExA.KERNEL32(0049E794,0049BA7B), ref: 0045028B
                                                        • Part of subcall function 004539C8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453A86,?,?,?,?,00000000,00000000,?,0049BA8A), ref: 004539EA
                                                        • Part of subcall function 004539C8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004539F0
                                                        • Part of subcall function 004539C8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453A86,?,?,?,?,00000000,00000000,?,0049BA8A), ref: 00453A04
                                                        • Part of subcall function 004539C8: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453A0A
                                                        • Part of subcall function 004578E4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 0045793E
                                                        • Part of subcall function 00465A14: LoadLibraryA.KERNEL32(00000000,SHPathPrepareForWriteA,00000000,00465A8A,?,?,?,?,00000000,00000000,?,0049BA9E), ref: 00465A5F
                                                        • Part of subcall function 00465A14: GetProcAddress.KERNEL32(00000000,00000000), ref: 00465A65
                                                        • Part of subcall function 0046E39C: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046E3E7
                                                        • Part of subcall function 0047AD94: GetModuleHandleA.KERNEL32(kernel32.dll,?,0049BAA8), ref: 0047AD9A
                                                        • Part of subcall function 0047AD94: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047ADA7
                                                        • Part of subcall function 0047AD94: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047ADB7
                                                        • Part of subcall function 004863AC: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 004864DF
                                                        • Part of subcall function 00498A20: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00498A39
                                                      • SetErrorMode.KERNEL32(00000001,00000000,0049BAF0), ref: 0049BAC2
                                                        • Part of subcall function 0049B7EC: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0049BACC,00000001,00000000,0049BAF0), ref: 0049B7F6
                                                        • Part of subcall function 0049B7EC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0049B7FC
                                                        • Part of subcall function 00424964: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424983
                                                        • Part of subcall function 00424754: SetWindowTextA.USER32(?,00000000), ref: 0042476C
                                                      • ShowWindow.USER32(?,00000005,00000000,0049BAF0), ref: 0049BB23
                                                        • Part of subcall function 00484988: SetActiveWindow.USER32(?), ref: 00484A36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule$VersionWindow$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                                                      • String ID: Setup
                                                      • API String ID: 56708735-3839654196
                                                      • Opcode ID: 2217903e9f2865072847906a57765d3fb0d568c696a06ecb9b42a467f31b905f
                                                      • Instruction ID: 45436910a3e38556774c512443cf6fe356218821253e756f5799c0333a1408c1
                                                      • Opcode Fuzzy Hash: 2217903e9f2865072847906a57765d3fb0d568c696a06ecb9b42a467f31b905f
                                                      • Instruction Fuzzy Hash: 5F31D2752046009EC601BBB7F95391D3BA8EB99708BA2443FF804D6663DF3D6814CA7E
                                                      APIs
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,00478653,?,00000000,00478664,?,00000000,004786AD), ref: 00478624
                                                      • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,00478653,?,00000000,00478664,?,00000000,004786AD), ref: 00478638
                                                      Strings
                                                      • Extracting temporary file: , xrefs: 00478560
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileTime$Local
                                                      • String ID: Extracting temporary file:
                                                      • API String ID: 791338737-4171118009
                                                      • Opcode ID: 9a443946346554f5f699f38ec1ba9ea7c8e6c3b6831cef0b8485c7e82be0b504
                                                      • Instruction ID: 383de906be10c9968b5e8a45eec8df85735b502e1e4fcc0ad11d623c1d954b10
                                                      • Opcode Fuzzy Hash: 9a443946346554f5f699f38ec1ba9ea7c8e6c3b6831cef0b8485c7e82be0b504
                                                      • Instruction Fuzzy Hash: FA41A670A00249AFCB01DFA5CC92EDFBBB8EB09304F51847AF914A7291D7789905CB58
                                                      APIs
                                                        • Part of subcall function 00485E3C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00485E4D
                                                        • Part of subcall function 00485E3C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00485E5A
                                                        • Part of subcall function 00485E3C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00485E68
                                                        • Part of subcall function 00485E3C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00485E70
                                                        • Part of subcall function 00485E3C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00485E7C
                                                        • Part of subcall function 00485E3C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00485E9D
                                                        • Part of subcall function 00485E3C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00485EB0
                                                        • Part of subcall function 00485E3C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00485EB6
                                                        • Part of subcall function 00486178: GetVersionExA.KERNEL32(?,004863E2,00000000,00486504,?,?,?,?,00000000,00000000,?,0049BAAD), ref: 00486186
                                                        • Part of subcall function 00486178: GetVersionExA.KERNEL32(0000009C,?,004863E2,00000000,00486504,?,?,?,?,00000000,00000000,?,0049BAAD), ref: 004861D8
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                        • Part of subcall function 0042E824: SetErrorMode.KERNEL32(00008000), ref: 0042E82E
                                                        • Part of subcall function 0042E824: LoadLibraryA.KERNEL32(00000000,00000000,0042E878,?,00000000,0042E896,?,00008000), ref: 0042E85D
                                                      • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 004864DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModuleSystemVersion$CurrentDirectoryErrorInfoLibraryLoadModeNativeProcess
                                                      • String ID: SHGetKnownFolderPath$shell32.dll
                                                      • API String ID: 1303913335-2936008475
                                                      • Opcode ID: 908d6e67ee5bab08ebaef87692d62277a9194b68cfc666c248f8018bed7f5e16
                                                      • Instruction ID: 0a3b8753df86b64a0abe51da698ff3945e27f94a4f66e9c257dfb1cfa232dc74
                                                      • Opcode Fuzzy Hash: 908d6e67ee5bab08ebaef87692d62277a9194b68cfc666c248f8018bed7f5e16
                                                      • Instruction Fuzzy Hash: 2A315EB06002019EC740FFBA999674A3BA4DB5430CB91897BF400FB3D2D77DA8099B5E
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(?,0047B0F2,?,?,00000001,00000000,00000000,0047B10D), ref: 0047B0DB
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047B066
                                                      • %s\%s_is1, xrefs: 0047B084
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                      • API String ID: 47109696-1598650737
                                                      • Opcode ID: 065378d35833d496f10a5c42d9e6932571d79af8682fa40a96d658d7fa4ed314
                                                      • Instruction ID: 72e7e3a815698905cf2a8865a6f5f2f162ab337690929d3c45f1fbd164993866
                                                      • Opcode Fuzzy Hash: 065378d35833d496f10a5c42d9e6932571d79af8682fa40a96d658d7fa4ed314
                                                      • Instruction Fuzzy Hash: 46214370B042545FDB01DF66C8527DEBBE8EB49704F90847AE408E7381D77899018B95
                                                      APIs
                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045430F,?,?,00000000,0049E62C,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00454266
                                                      • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045430F,?,?,00000000,0049E62C,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045426F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID: .tmp
                                                      • API String ID: 1375471231-2986845003
                                                      • Opcode ID: a088e9ad1ac8c859f830a6b38babd2e41a4a9b8bfeab7a1983125dd9a2918e27
                                                      • Instruction ID: 415d91b16f05740ba1416afe7bf5adb9ba5615b539517dd81add0c9acb6d8760
                                                      • Opcode Fuzzy Hash: a088e9ad1ac8c859f830a6b38babd2e41a4a9b8bfeab7a1983125dd9a2918e27
                                                      • Instruction Fuzzy Hash: C9216775A002189BDB01EFA1C8429DFB7B8EB84309F50457BFC01BB342D63C9E458B65
                                                      APIs
                                                        • Part of subcall function 00457874: CoInitialize.OLE32(00000000), ref: 0045787A
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                        • Part of subcall function 0042E824: SetErrorMode.KERNEL32(00008000), ref: 0042E82E
                                                        • Part of subcall function 0042E824: LoadLibraryA.KERNEL32(00000000,00000000,0042E878,?,00000000,0042E896,?,00008000), ref: 0042E85D
                                                      • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 0045793E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryErrorInitializeLibraryLoadModeProcSystem
                                                      • String ID: SHCreateItemFromParsingName$shell32.dll
                                                      • API String ID: 1013667774-2320870614
                                                      • Opcode ID: 77c59d3b40fdf16789a6f1b6c398cc8a4dcbb3a6b410720b7a14e3a082a16fe9
                                                      • Instruction ID: 883c9a478e7d65875247b88054ead2603694175a92ab65d05d339cd7b334e9d1
                                                      • Opcode Fuzzy Hash: 77c59d3b40fdf16789a6f1b6c398cc8a4dcbb3a6b410720b7a14e3a082a16fe9
                                                      • Instruction Fuzzy Hash: F7F03670604608ABE700EBA6E842F5D77ACDB45759F604077B800B2692D67CAE08C96D
                                                      APIs
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                        • Part of subcall function 0042E824: SetErrorMode.KERNEL32(00008000), ref: 0042E82E
                                                        • Part of subcall function 0042E824: LoadLibraryA.KERNEL32(00000000,00000000,0042E878,?,00000000,0042E896,?,00008000), ref: 0042E85D
                                                      • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046E3E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryErrorLibraryLoadModeProcSystem
                                                      • String ID: SHPathPrepareForWriteA$shell32.dll
                                                      • API String ID: 2552568031-2683653824
                                                      • Opcode ID: 3f0d3514a23c37851456d116febb2af5c8ca922eb4f10ed87c397e76bc5b7ffd
                                                      • Instruction ID: 1520e6e4c9beca3123f98d7cbe6aabbef4d784ad694bed30d21e1b99286f75d0
                                                      • Opcode Fuzzy Hash: 3f0d3514a23c37851456d116febb2af5c8ca922eb4f10ed87c397e76bc5b7ffd
                                                      • Instruction Fuzzy Hash: 48F04434604618BBDB00EB63DC42F5E7BECD745754FA14076F400A6591EA78AE048969
                                                      APIs
                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047EB66,00000000,0047EB7C), ref: 0047E876
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID: RegisteredOrganization$RegisteredOwner
                                                      • API String ID: 3535843008-1113070880
                                                      • Opcode ID: 5252ed743ca1506dfec4bf7763c13d87116031bf2e865ad439b10f43f09a7791
                                                      • Instruction ID: 7230bcb305953dbfdc536c8ede0a4f62da6dd01636a6d4693cd9d102c919f290
                                                      • Opcode Fuzzy Hash: 5252ed743ca1506dfec4bf7763c13d87116031bf2e865ad439b10f43f09a7791
                                                      • Instruction Fuzzy Hash: F7F0B430B04104AFEB04E6A6ED82BEB379DC715308F2095BBE505DB392D678ED05979E
                                                      APIs
                                                      • GetSystemMenu.USER32(00000000,00000000,00000000,00484171), ref: 00484109
                                                      • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0048411A
                                                      • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00484132
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Menu$Append$System
                                                      • String ID:
                                                      • API String ID: 1489644407-0
                                                      • Opcode ID: dc8b36ddd18fed80e840ee8cbe9b889ef4cf18149991e537b86b896238235e1c
                                                      • Instruction ID: ab56d251ed543ba42b2362adab02e381b7ffec43a0f0b9b6508873944b2238f1
                                                      • Opcode Fuzzy Hash: dc8b36ddd18fed80e840ee8cbe9b889ef4cf18149991e537b86b896238235e1c
                                                      • Instruction Fuzzy Hash: DD3104707043455AD711FB369C86BAF3A549BA2308F50493FF900AB3D3DA7C9849879D
                                                      APIs
                                                      • 751C1520.VERSION(00000000,?,?,?,?), ref: 00452D08
                                                      • 751C1500.VERSION(00000000,?,00000000,?,00000000,00452D83,?,00000000,?,?,?,?), ref: 00452D35
                                                      • 751C1540.VERSION(?,00452DAC,?,?,00000000,?,00000000,?,00000000,00452D83,?,00000000,?,?,?,?), ref: 00452D4F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: C1500C1520C1540
                                                      • String ID:
                                                      • API String ID: 1315064709-0
                                                      • Opcode ID: 0b168feaf9c1533958fb5e02aa9a5501c5ad47ec3a54fa228dfedbb3323d7179
                                                      • Instruction ID: ddd73f9b83f47df12750701182fb86573bb1adbd0e7288047a879799487d3de5
                                                      • Opcode Fuzzy Hash: 0b168feaf9c1533958fb5e02aa9a5501c5ad47ec3a54fa228dfedbb3323d7179
                                                      • Instruction Fuzzy Hash: EE216871A005086FD701DAA98D41DAFB7FCDB46711F554477FC04E3242D6799E08C769
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0044B935
                                                      • SelectObject.GDI32(?,00000000), ref: 0044B958
                                                      • ReleaseDC.USER32(00000000,?), ref: 0044B98B
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ObjectReleaseSelect
                                                      • String ID:
                                                      • API String ID: 1831053106-0
                                                      • Opcode ID: e4822f2f27a90c0759968424fd043719417fa313c55766f7b6e2e713107b7c51
                                                      • Instruction ID: 5f6416779418d586cf190573f7bf4a7bb4d400156242e88c08e8c7aea5cbb268
                                                      • Opcode Fuzzy Hash: e4822f2f27a90c0759968424fd043719417fa313c55766f7b6e2e713107b7c51
                                                      • Instruction Fuzzy Hash: C62177B0E04308AFEB11DFA5C881B9EBBB8EB49304F5184BAF500A7291D77CD940CB59
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B680,?,004849A3,?,?), ref: 0044B652
                                                      • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B665
                                                      • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B699
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DrawText$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 65125430-0
                                                      • Opcode ID: 63c04f90603744f798e42aba6243c37eae4be5ab149869f7acaebc15ddea55e3
                                                      • Instruction ID: 1ea4d790d63f24178cbae964d575408221d26853f0f73c11de666758b6730ab2
                                                      • Opcode Fuzzy Hash: 63c04f90603744f798e42aba6243c37eae4be5ab149869f7acaebc15ddea55e3
                                                      • Instruction Fuzzy Hash: D111B6B27046047FE710DAAA9C82D6FB7ECDB49724F10457AF504E7290DA399E018A69
                                                      APIs
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004248A2
                                                      • TranslateMessage.USER32(?), ref: 0042491F
                                                      • DispatchMessageA.USER32(?), ref: 00424929
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message$DispatchPeekTranslate
                                                      • String ID:
                                                      • API String ID: 4217535847-0
                                                      • Opcode ID: 217a056534c9592df3de3b745a25b010ee0154ab168cb63c5ecf066f178eda2d
                                                      • Instruction ID: 2fd165f6649a427b3319829ae0df7e0e74220d275175f78bf4976128ec8e280a
                                                      • Opcode Fuzzy Hash: 217a056534c9592df3de3b745a25b010ee0154ab168cb63c5ecf066f178eda2d
                                                      • Instruction Fuzzy Hash: 9711C4703053605ADA20E634A9417ABB7C4CFC3704F82481EF9D987392D37D9D89879A
                                                      APIs
                                                      • SetPropA.USER32(00000000,00000000), ref: 00416AFA
                                                      • SetPropA.USER32(00000000,00000000), ref: 00416B0F
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 00416B36
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Prop$Window
                                                      • String ID:
                                                      • API String ID: 3363284559-0
                                                      • Opcode ID: d713cafafaca0930c04d6cb39f3c322ae331ae37b9587890123c67b5c3bff97d
                                                      • Instruction ID: f49ac21c72ec4198518a05967b53ec16f1ca927682628d76ec8ffae5e4f9a687
                                                      • Opcode Fuzzy Hash: d713cafafaca0930c04d6cb39f3c322ae331ae37b9587890123c67b5c3bff97d
                                                      • Instruction Fuzzy Hash: 75F0B271741220AFD710AB9A8C85FA633DCAB19715F160176BD09EF286C678DC41C7A8
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0041F2F4
                                                      • IsWindowEnabled.USER32(?), ref: 0041F2FE
                                                      • EnableWindow.USER32(?,00000000), ref: 0041F324
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableEnabledVisible
                                                      • String ID:
                                                      • API String ID: 3234591441-0
                                                      • Opcode ID: 75da7560ddbcbd352d2b263d7a30c73b5df1f70394dc16e5d6cfb5f5cdd4f04a
                                                      • Instruction ID: 461c9e3a5a3bf819d65056d8b2c697f5f692a305fcbbe48695acf38c0ff2848d
                                                      • Opcode Fuzzy Hash: 75da7560ddbcbd352d2b263d7a30c73b5df1f70394dc16e5d6cfb5f5cdd4f04a
                                                      • Instruction Fuzzy Hash: E1E0EDB4101204AAE710AB76DCC1A56779CFB54354F818437AC159B293DA3DE8459A78
                                                      APIs
                                                      • SetActiveWindow.USER32(?), ref: 00484A36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ActiveWindow
                                                      • String ID: InitializeWizard
                                                      • API String ID: 2558294473-2356795471
                                                      • Opcode ID: 63f8521eac833f62b5623e19a9cfdc6d6819e24bf70f1f364691b0772a1e9880
                                                      • Instruction ID: 9663d0bfca85fd8d9c68d73251753a4714549ba788b257aa0fdf1999294ad1b6
                                                      • Opcode Fuzzy Hash: 63f8521eac833f62b5623e19a9cfdc6d6819e24bf70f1f364691b0772a1e9880
                                                      • Instruction Fuzzy Hash: D9116D30644144DFD304FB2AFC46A5A77E8E765718F61843BE404CB7A2EA39EC048B6D
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047E97C,00000000,0047EB7C), ref: 0047E775
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047E745
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion
                                                      • API String ID: 47109696-1019749484
                                                      • Opcode ID: ca07cc273c2b46f61372ca569078a001357472d08ce3e20ae14c980e0cb804ec
                                                      • Instruction ID: a9f283cd3a80185a7eeae6af9f057f4917a41fcfe10abca868fc5e90a7391123
                                                      • Opcode Fuzzy Hash: ca07cc273c2b46f61372ca569078a001357472d08ce3e20ae14c980e0cb804ec
                                                      • Instruction Fuzzy Hash: 7CF082357042146BDA04A65F5C42BAEA79D8B88758F2041BBF908DB342DAB99E0203AD
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      Strings
                                                      • System\CurrentControlSet\Control\Windows, xrefs: 0042E2C6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID: System\CurrentControlSet\Control\Windows
                                                      • API String ID: 71445658-1109719901
                                                      • Opcode ID: ed255555a649cb1171c21319c526f46fc311307b4f4854cf2574364da4ece07e
                                                      • Instruction ID: 56e59db3f123c5f73e455ef79faaa31902e81261c81f50e50b595f428ef93046
                                                      • Opcode Fuzzy Hash: ed255555a649cb1171c21319c526f46fc311307b4f4854cf2574364da4ece07e
                                                      • Instruction Fuzzy Hash: 6FD0C772510128BBD701DA89DC41EFB775DDB15760F40401BFD1497141C2B4EC5197F4
                                                      APIs
                                                      • GetACP.KERNEL32(?,?,00000001,00000000,00480997,?,-0000001A,0048289A,-00000010,?,00000004,0000001C,00000000,00482C37,?,0045E3F8), ref: 0048072E
                                                        • Part of subcall function 0042E7AC: GetDC.USER32(00000000), ref: 0042E7BB
                                                        • Part of subcall function 0042E7AC: EnumFontsA.GDI32(?,00000000,0042E798,00000000,00000000,0042E804,?,00000000,00000000,?,00000001,00000000,00000002,00000000,0048361D), ref: 0042E7E6
                                                        • Part of subcall function 0042E7AC: ReleaseDC.USER32(00000000,?), ref: 0042E7FE
                                                      • SendNotifyMessageA.USER32(000203D4,00000496,00002711,-00000001), ref: 004808FE
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: EnumFontsMessageNotifyReleaseSend
                                                      • String ID:
                                                      • API String ID: 2649214853-0
                                                      • Opcode ID: 1709ff10a59be4cecabd083e4b30542a8388fbd88fe320f99732743ee2b207fe
                                                      • Instruction ID: d9213170d9bb76dc80c92ed06a2bbf1e51aab055aabe148a8f981411f3335874
                                                      • Opcode Fuzzy Hash: 1709ff10a59be4cecabd083e4b30542a8388fbd88fe320f99732743ee2b207fe
                                                      • Instruction Fuzzy Hash: 925185746101049BDB50FF26D88165E77A9BB54309B50893BE8049B367CB3CED4ECB9D
                                                      APIs
                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042E1C8), ref: 0042E0CC
                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042E1C8), ref: 0042E13C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: 84705cc745a76f35316d583d44dda58a4a0f4931e2014e09282529c66a3fa9aa
                                                      • Instruction ID: ac779da0cea268326c2a6d460357836690a2c7bc48c0bb75f71a4d6dd427c8e5
                                                      • Opcode Fuzzy Hash: 84705cc745a76f35316d583d44dda58a4a0f4931e2014e09282529c66a3fa9aa
                                                      • Instruction Fuzzy Hash: F6415D71E00129ABDB11DE92D881BBFB7B9AB00704F94447AE804F7281D738AE44CBA5
                                                      APIs
                                                      • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040B282
                                                      • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B3DF,00000000,0040B3F7,?,?,?,00000000), ref: 0040B293
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindFree
                                                      • String ID:
                                                      • API String ID: 4097029671-0
                                                      • Opcode ID: 56b5692d0589e69d78817d1186c68a61f8e6556489325b11d82404695b0d2b2e
                                                      • Instruction ID: 695c6acfda2bd8b41d5000065fdd751145cb6e9c132907bad199632a3a3e20ef
                                                      • Opcode Fuzzy Hash: 56b5692d0589e69d78817d1186c68a61f8e6556489325b11d82404695b0d2b2e
                                                      • Instruction Fuzzy Hash: 9701F7717003046FD700EF66DC52D1A77ADDB49758711807BF500EB2D0D6799C01D66D
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 0041F383
                                                      • EnumThreadWindows.USER32(00000000,0041F2E4,00000000), ref: 0041F389
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Thread$CurrentEnumWindows
                                                      • String ID:
                                                      • API String ID: 2396873506-0
                                                      • Opcode ID: 8784a61061ea2f72866c7836b43b9cd2818a747c771340166bb5f43570082ce4
                                                      • Instruction ID: 69490fc5d8632824c24a89202964c68dfb33a06c8812e8dd8cc51cc2245d12bd
                                                      • Opcode Fuzzy Hash: 8784a61061ea2f72866c7836b43b9cd2818a747c771340166bb5f43570082ce4
                                                      • Instruction Fuzzy Hash: E7016D75A04608BFD701CF76EC5195ABBF8E789720B62C877E804D3790E7386811DE18
                                                      APIs
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 004236D9
                                                      • LoadCursorA.USER32(00000000,00000000), ref: 00423703
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CursorLoad
                                                      • String ID:
                                                      • API String ID: 3238433803-0
                                                      • Opcode ID: 435632a159b4ee3f4de27f3f53cb37f8d356402f2aecc44b66926b1db8d28f8a
                                                      • Instruction ID: 38849c99451a314d8fe435546c8a0ff0f6ed66ecc1deebef06b1f4ec46e3768a
                                                      • Opcode Fuzzy Hash: 435632a159b4ee3f4de27f3f53cb37f8d356402f2aecc44b66926b1db8d28f8a
                                                      • Instruction Fuzzy Hash: 5FF0A7617041206BD620593E6CC1D2A76AC8B81B35F61033BFA2BD73D1C66E6D41416D
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00008000), ref: 0042E82E
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,0042E878,?,00000000,0042E896,?,00008000), ref: 0042E85D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLibraryLoadMode
                                                      • String ID:
                                                      • API String ID: 2987862817-0
                                                      • Opcode ID: 1a6091ce078db88393fc002325d20e82ca7bdc15aaa61f0720148644d5cbec67
                                                      • Instruction ID: d8a4edba93e6b3564287fdd291ee362a4641d771db482aeeea55453c97403edd
                                                      • Opcode Fuzzy Hash: 1a6091ce078db88393fc002325d20e82ca7bdc15aaa61f0720148644d5cbec67
                                                      • Instruction Fuzzy Hash: 49F08270B14744BEDB116F779C6282BBBECE749B1079249B6F800A3691E63C88108928
                                                      APIs
                                                      • CallWindowProcW.USER32(6FBA27E0,?,?,?,?), ref: 00478DA5
                                                      • CallWindowProcW.USER32(FFFF0401,?,?,?,?), ref: 00478DB6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CallProcWindow
                                                      • String ID:
                                                      • API String ID: 2714655100-0
                                                      • Opcode ID: ce7ea350cd2d8a29d4756030a0e2150e6ff414cb3a27e593d77670a1272721e0
                                                      • Instruction ID: ec977eba15decb799f6fff92ffb6f57cd97eebcf4dd56cd6945e1ca0977ddd56
                                                      • Opcode Fuzzy Hash: ce7ea350cd2d8a29d4756030a0e2150e6ff414cb3a27e593d77670a1272721e0
                                                      • Instruction Fuzzy Hash: A7F01CB21002146BDA109A69DD8DCA77B6CEF99260704862BBD18D7291D578AD008678
                                                      APIs
                                                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,10015F4A,00000001,?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C), ref: 1001AB71
                                                      • HeapDestroy.KERNEL32(?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C,10016182,?), ref: 1001ABA7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Heap$CreateDestroy
                                                      • String ID:
                                                      • API String ID: 3296620671-0
                                                      • Opcode ID: d51d877cb5c1f0d5ea29e2820df05733b799c51debb12d39d135f094c57ed51b
                                                      • Instruction ID: a13ca330b9ee1e04be8b377651445f9444b7b3be721a7336b046ddea287adc12
                                                      • Opcode Fuzzy Hash: d51d877cb5c1f0d5ea29e2820df05733b799c51debb12d39d135f094c57ed51b
                                                      • Instruction Fuzzy Hash: 1FE06D35A583A29EFB01EB319DD975636E9E7492D6F118825F801CE0A2E7B5C4C19B00
                                                      APIs
                                                      • SHGetKnownFolderPath.SHELL32(0049CD58,00008000,00000000,?), ref: 0047EAD5
                                                      • CoTaskMemFree.OLE32(?,0047EB18), ref: 0047EB0B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeKnownPathTask
                                                      • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                      • API String ID: 969438705-544719455
                                                      • Opcode ID: dcdb464d46d000a45e9e512131e32681938e3456e18d581bde74e904f3b66734
                                                      • Instruction ID: 165899f7cf3a7d3cc2084f0fc85f54689cbe0ef7c4de0502b74dd13bf0a7d919
                                                      • Opcode Fuzzy Hash: dcdb464d46d000a45e9e512131e32681938e3456e18d581bde74e904f3b66734
                                                      • Instruction Fuzzy Hash: C9E06D31340640AEEB11CA629C12B597BA8EB89B14BA184B3F500E6694D679AE009A58
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Virtual$AllocFree
                                                      • String ID:
                                                      • API String ID: 2087232378-0
                                                      • Opcode ID: b520bc60e33c723c5354926e54c9cb4ec67acca134fd7c558003b77a2e03234b
                                                      • Instruction ID: 9ed38fc533d8e4e5af650f240f956f2e356275670cbb68eb90ec247bb51ad9a4
                                                      • Opcode Fuzzy Hash: b520bc60e33c723c5354926e54c9cb4ec67acca134fd7c558003b77a2e03234b
                                                      • Instruction Fuzzy Hash: 27F0A772B0073067EB60596A4C81F5359C49FC5794F154076FD0DFF3E9D6B58C0142A9
                                                      APIs
                                                      • GetSystemDefaultLCID.KERNEL32(00000000,00408BA2), ref: 00408A8B
                                                        • Part of subcall function 0040727C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00407299
                                                        • Part of subcall function 004089F8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049E4C4,00000001,?,00408AC3,?,00000000,00408BA2), ref: 00408A16
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DefaultInfoLoadLocaleStringSystem
                                                      • String ID:
                                                      • API String ID: 1658689577-0
                                                      • Opcode ID: e3bde22edff9b95fb01644fc2752e12edfd564b8e42cb00d732a26da313984e4
                                                      • Instruction ID: 1a1ee965da3d5e477180f9d3e1b3e31d3a1d40cbd97d3d5e52e02950362564b9
                                                      • Opcode Fuzzy Hash: e3bde22edff9b95fb01644fc2752e12edfd564b8e42cb00d732a26da313984e4
                                                      • Instruction Fuzzy Hash: A7314F75E001099BCF00EB95C8819EEB779EF84314F51857BE814BB286E738AE458B99
                                                      APIs
                                                      • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 004200C9
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoScroll
                                                      • String ID:
                                                      • API String ID: 629608716-0
                                                      • Opcode ID: 4038a9721f8deaf5412c4e17f668d42a633933aac620105991029e29eea6c581
                                                      • Instruction ID: fb0b6b32162d284d5e4e4472e465846aa9f3b1678ed1a2f027c040ff7edaf6c0
                                                      • Opcode Fuzzy Hash: 4038a9721f8deaf5412c4e17f668d42a633933aac620105991029e29eea6c581
                                                      • Instruction Fuzzy Hash: 4E214FB1604755AFD340DF39A44076ABBE4BB48314F04892EE098C3341E779E995CBD6
                                                      APIs
                                                      • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416A15
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: 66225c5018934712ca213f7cbc9da523afb779e1f1452fe3fdaea1241b34de43
                                                      • Instruction ID: 5ef094d12f7d71e5830b73219e88c414bb2d46ce683ba0b40c209d6d3be90de3
                                                      • Opcode Fuzzy Hash: 66225c5018934712ca213f7cbc9da523afb779e1f1452fe3fdaea1241b34de43
                                                      • Instruction Fuzzy Hash: 26F025B2200510AFDB84CF9CD9C0F9373ECEB0C210B0881A6FA08CF24AD261EC108BB1
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00414E7F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                      • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                      • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                      • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450FDC
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 3d1f2366c55396597a1dc151834003a825219e09de8a822373c262138b7a9d60
                                                      • Instruction ID: 0bb8bc98a2ce5191ccdfd632eb20aa7c5cb2b99e9b0e2766e1f3384ce1d09118
                                                      • Opcode Fuzzy Hash: 3d1f2366c55396597a1dc151834003a825219e09de8a822373c262138b7a9d60
                                                      • Instruction Fuzzy Hash: 28E092B13401483ED340DFAC7C81F9237CC931A314F008033B948D7241C4619D118BA8
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,0042D1A4,?,00000001,?,?,00000000,?,0042D1F6,00000000,004531FD,00000000,0045321E,?,00000000), ref: 0042D187
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: a944933b7e94ac2da4548c012b878e77f53d3e7fac6ad7ed32738dad81323317
                                                      • Instruction ID: 90f30b3d4511ddb26d4e54eb5cb5bde7ef97429f4a5987d97ea56347c6c51953
                                                      • Opcode Fuzzy Hash: a944933b7e94ac2da4548c012b878e77f53d3e7fac6ad7ed32738dad81323317
                                                      • Instruction Fuzzy Hash: C0E09B71704344BFD701FF62DC53E5ABBECDB49714BA14476B404D7691D5785E10C468
                                                      APIs
                                                      • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453A6B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED77
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FormatMessage
                                                      • String ID:
                                                      • API String ID: 1306739567-0
                                                      • Opcode ID: 1828867668d4f08c7f2c42ac7f7c8b165bd44dc6f1d36d1d73a42743962ef3e6
                                                      • Instruction ID: e79f09bbc4d4bb3d85d444e79d719d693aec0fec5ee663d6819558c24f001612
                                                      • Opcode Fuzzy Hash: 1828867668d4f08c7f2c42ac7f7c8b165bd44dc6f1d36d1d73a42743962ef3e6
                                                      • Instruction Fuzzy Hash: F1E0206179471226F23515566C43B77160E43C0704F94403A7F40DD3D3D6AE9906425E
                                                      APIs
                                                      • CreateWindowExA.USER32(00000000,00423B0C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042409C), ref: 00406329
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: 8af83935ca987eeebb979c0a6a94b74e9f9155cd6b79be10dcadafa6e5b8a04f
                                                      • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                      • Opcode Fuzzy Hash: 8af83935ca987eeebb979c0a6a94b74e9f9155cd6b79be10dcadafa6e5b8a04f
                                                      • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(00498852,?,00498874,?,?,00000000,00498852,?,?), ref: 00414B2B
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                      • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                      • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                      • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407388
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: eaef3e41fac1cbfa854ddb341d31900aa063179008544f75f8bc420d4d627cb5
                                                      • Instruction ID: 51cff3a49c81a4b9db3197a4d20e141758e459673e55ef7a77d81eb6c57d9f36
                                                      • Opcode Fuzzy Hash: eaef3e41fac1cbfa854ddb341d31900aa063179008544f75f8bc420d4d627cb5
                                                      • Instruction Fuzzy Hash: 3DD012723082106AE220955A9C84DAB5BDCCBCA774F11063ABA58D6181D6308C018675
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,00000001,00000001,00000000,00000003,00000080,00000000,?,0040AB64,0040D148,?,00000000,?), ref: 00407346
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 92f9b60985cfab35338e5fbfe108bac6fc5448739c65cd2808a9ec2adf1778af
                                                      • Instruction ID: 4c738d89b53f352080375c7194437b9ec9fb3d9619a7651bf31662f65e46d5c4
                                                      • Opcode Fuzzy Hash: 92f9b60985cfab35338e5fbfe108bac6fc5448739c65cd2808a9ec2adf1778af
                                                      • Instruction Fuzzy Hash: E1E017A23D0A1876E620AADCACC3F56128CC718759F048032F600EF2D1D6AC9E1087A8
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004073B4
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 803a6739d4a2560f638b2739305ab39b64de9ba4a7bf4e405682762548192292
                                                      • Instruction ID: 517e21fc39e357fcc75414f86969db1bfc0739985e912eef881c3d4632b4c6ac
                                                      • Opcode Fuzzy Hash: 803a6739d4a2560f638b2739305ab39b64de9ba4a7bf4e405682762548192292
                                                      • Instruction Fuzzy Hash: 74D012723181506AE220A55A5C44EAB6EDCCBC5770F10063AB958D21C1D6309C01C675
                                                      APIs
                                                        • Part of subcall function 00423A88: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 00423A9D
                                                      • ShowWindow.USER32(004108F0,00000009,?,00000000,0041F234,00423DCA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042409C), ref: 00423AF7
                                                        • Part of subcall function 00423AB8: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423AD4
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$ShowWindow
                                                      • String ID:
                                                      • API String ID: 3202724764-0
                                                      • Opcode ID: 6c97eab4d5f35d9e0c4c492f0780e1f33e5a1e11612eb1c0cb2b18762b4c2d00
                                                      • Instruction ID: a4d1e59934daad15499cd62f29d800d7a8388f589a5efdc182870931650505b7
                                                      • Opcode Fuzzy Hash: 6c97eab4d5f35d9e0c4c492f0780e1f33e5a1e11612eb1c0cb2b18762b4c2d00
                                                      • Instruction Fuzzy Hash: 81D05B127411702102107A7B2405A8B45AC4D9225B384047BB48097303D95D4D0552A8
                                                      APIs
                                                      • SetWindowTextA.USER32(?,00000000), ref: 0042476C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: TextWindow
                                                      • String ID:
                                                      • API String ID: 530164218-0
                                                      • Opcode ID: 805f3cc7500933323b9257a6a261a55e12d82397c97f56fe04234c9d564d4e6f
                                                      • Instruction ID: 9eeed77ebbf23638ebb637759628e88e4fff7ef3ebed755505968d13fb2e7b10
                                                      • Opcode Fuzzy Hash: 805f3cc7500933323b9257a6a261a55e12d82397c97f56fe04234c9d564d4e6f
                                                      • Instruction Fuzzy Hash: 44D05EE2B011702BCB01BAAD54C4AC667CC8B8925AB1940BBF904EF257C738CE408398
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00451DA3,00000000), ref: 0042D1BF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: edecd2973abb1a87aacb4b7103d0c28639b492f0686a1453dc354fd5429015d1
                                                      • Instruction ID: de8bff456184001464f3abbdb54ffbc0c147f56bb2634b1a4235557a7056eb2a
                                                      • Opcode Fuzzy Hash: edecd2973abb1a87aacb4b7103d0c28639b492f0686a1453dc354fd5429015d1
                                                      • Instruction Fuzzy Hash: 81C08CE0712210169E10A5BD2CC652B02C84A5833A3A40A37B429E66E2D23D88662029
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040AB64,0040D110,?,00000000,?), ref: 0040736D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 3d8f170739f3a34673bd151ee70ad601a415bf6ca4d09768124c2509aaf33128
                                                      • Instruction ID: a78e408fffc15bc8d0ee8a54c686fbaa4e2694f5c3f88f37cecd524e454749ad
                                                      • Opcode Fuzzy Hash: 3d8f170739f3a34673bd151ee70ad601a415bf6ca4d09768124c2509aaf33128
                                                      • Instruction Fuzzy Hash: ADC048B13C130032F93025A61C87F1604889714B1AE60943AB740BE1C2D8E9A818016C
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(?,?,?,00000000), ref: 0041F840
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
                                                      • Instruction ID: 48f25c4fc7afed193c39a16cc91a0304f94a1296cd048c63733264e3b5f0309e
                                                      • Opcode Fuzzy Hash: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
                                                      • Instruction Fuzzy Hash: D2D0C932100108AFDB018E94AC018677B69EB48210B148815FD0485221D633E831AA91
                                                      APIs
                                                      • SetEndOfFile.KERNEL32(?,?,0045CBD2,00000000,0045CD5D,?,00000000,00000002,00000002), ref: 0045110B
                                                        • Part of subcall function 00450E8C: GetLastError.KERNEL32(00450CA8,00450F4E,?,00000000,?,0049ACB0,00000001,00000000,00000002,00000000,0049AE11,?,?,00000005,00000000,0049AE45), ref: 00450E8F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLast
                                                      • String ID:
                                                      • API String ID: 734332943-0
                                                      • Opcode ID: 2f66420dfdec2ee722637dd7a077e757eb137bea55ce6f4fccac44aeccfb3de3
                                                      • Instruction ID: b009645766b32297bd0322e78edf4af2955e4b8d8b267255ddd48f13edbe2cec
                                                      • Opcode Fuzzy Hash: 2f66420dfdec2ee722637dd7a077e757eb137bea55ce6f4fccac44aeccfb3de3
                                                      • Instruction Fuzzy Hash: 66C04C65300500478F10A6AE89C2A0763E85F4D30631045A6B904DF217D668D8048A18
                                                      APIs
                                                      • SetErrorMode.KERNEL32(?,0042E89D), ref: 0042E890
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 3f5ca8107a421579e24e876ed9f2491131596575bec673942313541f3fe4ade1
                                                      • Instruction ID: 8695c582b33247a37f73f24666a6b5554d32f9d966171ece6814e81b39e17e84
                                                      • Opcode Fuzzy Hash: 3f5ca8107a421579e24e876ed9f2491131596575bec673942313541f3fe4ade1
                                                      • Instruction Fuzzy Hash: 49B09B76F0C6005DF705DAD5745552D67D4D7C57203E14977F150D35C0D53C5800491C
                                                      APIs
                                                      • SetFilePointer.KERNEL32(?,?,00000000), ref: 004073D1
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 7a518271ff9bda85f12b8806651da4c0f96d2c6471cc860e16869bce2b9c9d07
                                                      • Instruction ID: 8ab35750f3efd4d99fa83ee5673b62d8a6256d966d57501d01fbbdede9c777f2
                                                      • Opcode Fuzzy Hash: 7a518271ff9bda85f12b8806651da4c0f96d2c6471cc860e16869bce2b9c9d07
                                                      • Instruction Fuzzy Hash: 459002D465160138F81462614C5BF3B001CD7C0B14FD0465D3100A50C254AC6C000879
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DestroyWindow
                                                      • String ID:
                                                      • API String ID: 3375834691-0
                                                      • Opcode ID: 9d6690cf9d3310b1ea67583473288d09d9a8b553081644455fd58860a5b2f519
                                                      • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                      • Opcode Fuzzy Hash: 9d6690cf9d3310b1ea67583473288d09d9a8b553081644455fd58860a5b2f519
                                                      • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041F234,?,00423D1F,0042409C,0041F234), ref: 0041F872
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: e9b0f0e9299e17d878422f97f99b00588243c29834ad84fb5cccc8c64114728c
                                                      • Instruction ID: f08fc093bd3761fae95f56252c9cb4b1dce7b9a4e026fad3115f2fcf1a938b7c
                                                      • Opcode Fuzzy Hash: e9b0f0e9299e17d878422f97f99b00588243c29834ad84fb5cccc8c64114728c
                                                      • Instruction Fuzzy Hash: CC115A746007059BDB10EF1AC880B82FBE4EFA9350F10C53AE9588F385D774E849CBA9
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,00401973), ref: 00401766
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 11f6be92898c399badff9446a2108036f08e0859c2581f6b6d69b6d4b53dce9c
                                                      • Instruction ID: 4f728963ec5fa8eda03367237536c92bed861ff5ff18aa36a9f69eb769fc07b0
                                                      • Opcode Fuzzy Hash: 11f6be92898c399badff9446a2108036f08e0859c2581f6b6d69b6d4b53dce9c
                                                      • Instruction Fuzzy Hash: 9301FC766442148FC310DE29DCC0E2677E8D794378F15453EDA85673A1D37A6C0187D9
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,00453805), ref: 004537E7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID:
                                                      • API String ID: 1452528299-0
                                                      • Opcode ID: 544b47dc5bc5d2f2413b2081e143b2f92e92cc70b3939a84da48f96d0e7136c3
                                                      • Instruction ID: cb4131d2e651d1d846aaeffdd441063052296316b0d396e6bd3d8335f5975378
                                                      • Opcode Fuzzy Hash: 544b47dc5bc5d2f2413b2081e143b2f92e92cc70b3939a84da48f96d0e7136c3
                                                      • Instruction Fuzzy Hash: BA012076A04208AF8711DF69AC014EEFBF8EB4D7617208677FC54D3382D7744E0596A4
                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000000,00000644,?,0049E450,004013A3,?,?,00401443,?,?,?,00000000,00004003,00401983), ref: 00401353
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AllocLocal
                                                      • String ID:
                                                      • API String ID: 3494564517-0
                                                      • Opcode ID: 5712d2456a5c70657260606722268c90ba5ea6029e9afae63aaa89408be14ea2
                                                      • Instruction ID: ffebfc31ce5e110c1853f263bec794d38bcb1f4ca44e5b50064370e0b14d6dc8
                                                      • Opcode Fuzzy Hash: 5712d2456a5c70657260606722268c90ba5ea6029e9afae63aaa89408be14ea2
                                                      • Instruction Fuzzy Hash: DEF05E717012018FE724CF29D880656B7E1EBA9365F20807EE5C5D77A0D3358C418B54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 99a8de520c349483bc7265182cdae8011696cadbde20a5663af8d01783707c2e
                                                      • Instruction ID: 6160d783662a008e1f799edb03f3d460fe671c60c73369e1be62f9e55b6485aa
                                                      • Opcode Fuzzy Hash: 99a8de520c349483bc7265182cdae8011696cadbde20a5663af8d01783707c2e
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ___getlocaleinfo
                                                      • String ID:
                                                      • API String ID: 1937885557-0
                                                      • Opcode ID: 44f8d5532b0f190aaf4ab8506964c8f87fb22b21aeb3a983cc09d0452eea174f
                                                      • Instruction ID: 457d633a20f517a02ccbbc8f910d71abe7744b258feb1cd2265b7f28e46a98cd
                                                      • Opcode Fuzzy Hash: 44f8d5532b0f190aaf4ab8506964c8f87fb22b21aeb3a983cc09d0452eea174f
                                                      • Instruction Fuzzy Hash: A0E1D3B290020EBEFF11CAF1DC45DFFB7BEEB44744F04092AB255D2142EA75AA159B60
                                                      APIs
                                                      • GetVersion.KERNEL32(?,00419480,00000000,?,?,?,00000001), ref: 0041F5B6
                                                      • SetErrorMode.KERNEL32(00008000,?,00419480,00000000,?,?,?,00000001), ref: 0041F5D2
                                                      • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419480,00000000,?,?,?,00000001), ref: 0041F5DE
                                                      • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419480,00000000,?,?,?,00000001), ref: 0041F5EC
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F61C
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F645
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F65A
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F66F
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F684
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F699
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F6AE
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F6C3
                                                      • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F6D8
                                                      • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F6ED
                                                      • FreeLibrary.KERNEL32(00000001,?,00419480,00000000,?,?,?,00000001), ref: 0041F6FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                      • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                      • API String ID: 2323315520-3614243559
                                                      • Opcode ID: 6fb1055e458234a7f9b902a9421b4c6cec01f5c74ead6a35fd10c6f040d197fa
                                                      • Instruction ID: ada4b9d978a757ba6954df3af716d105719faea7ce3d9b9d26d7a4626bcf7c8a
                                                      • Opcode Fuzzy Hash: 6fb1055e458234a7f9b902a9421b4c6cec01f5c74ead6a35fd10c6f040d197fa
                                                      • Instruction Fuzzy Hash: 093112B1600610BBD710EBB1ACC6A653294F76C724795097BF144D71A2E77CA84A8F1C
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00458EBF
                                                      • QueryPerformanceCounter.KERNEL32(022F3858,00000000,00459152,?,?,022F3858,00000000,?,0045984E,?,022F3858,00000000), ref: 00458EC8
                                                      • GetSystemTimeAsFileTime.KERNEL32(022F3858,022F3858), ref: 00458ED2
                                                      • GetCurrentProcessId.KERNEL32(?,022F3858,00000000,00459152,?,?,022F3858,00000000,?,0045984E,?,022F3858,00000000), ref: 00458EDB
                                                      • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458F51
                                                      • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,022F3858,022F3858), ref: 00458F5F
                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,0049CB28,00000003,00000000,00000000,00000000,0045910E), ref: 00458FA7
                                                      • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,004590FD,?,00000000,C0000000,00000000,0049CB28,00000003,00000000,00000000,00000000,0045910E), ref: 00458FE0
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                      • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00459089
                                                      • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 004590BF
                                                      • CloseHandle.KERNEL32(000000FF,00459104,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004590F7
                                                        • Part of subcall function 00453C98: GetLastError.KERNEL32(00000000,0045482D,00000005,00000000,00454862,?,?,00000000,0049E62C,00000004,00000000,00000000,00000000,?,0049B229,00000000), ref: 00453C9B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                      • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                      • API String ID: 770386003-3271284199
                                                      • Opcode ID: 778ac167b205d419b8cdb1545af7bb0663bda7c35fe02ff7340d7fbbc52b6182
                                                      • Instruction ID: 040c0b68ca5c8794fa0f134b015e2131507262e67e069d6a1689acc5a442bbd1
                                                      • Opcode Fuzzy Hash: 778ac167b205d419b8cdb1545af7bb0663bda7c35fe02ff7340d7fbbc52b6182
                                                      • Instruction Fuzzy Hash: 9C710170A00754AEDB11DF65CC45B9EB7F8AB05705F1084AAF908FB282DB785944CF69
                                                      APIs
                                                        • Part of subcall function 10004B30: std::_String_base::_Xlen.LIBCPMT ref: 10004B7F
                                                        • Part of subcall function 10004B30: _memcpy_s.LIBCMT ref: 10004BEA
                                                      • GetTickCount.KERNEL32 ref: 10002E50
                                                      • GetTickCount.KERNEL32 ref: 10002E5C
                                                      • InternetReadFile.WININET(?,?,?,?), ref: 10002F39
                                                      • _fwrite.LIBCMT ref: 10002F67
                                                      • GetTickCount.KERNEL32 ref: 10002F75
                                                      • GetTickCount.KERNEL32 ref: 10002FCF
                                                      • GetTickCount.KERNEL32 ref: 10002FF0
                                                      • GetTickCount.KERNEL32 ref: 10003008
                                                        • Part of subcall function 10005410: std::_String_base::_Xlen.LIBCPMT ref: 10005469
                                                        • Part of subcall function 10005410: _memcpy_s.LIBCMT ref: 100054B1
                                                        • Part of subcall function 10010450: GetWindowLongA.USER32(?,000000F0), ref: 10010454
                                                        • Part of subcall function 10010450: SetWindowLongA.USER32(?,000000F0,00000000), ref: 1001046A
                                                        • Part of subcall function 10010450: SendMessageA.USER32(?,0000040A,00000001,0000001E), ref: 1001047A
                                                        • Part of subcall function 10003340: GetTickCount.KERNEL32 ref: 10003357
                                                        • Part of subcall function 100034D0: GetTickCount.KERNEL32 ref: 100034D9
                                                        • Part of subcall function 100035C0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 100035DF
                                                        • Part of subcall function 100035C0: TranslateMessage.USER32(?), ref: 100035F4
                                                        • Part of subcall function 100035C0: DispatchMessageA.USER32(?), ref: 100035F7
                                                        • Part of subcall function 100035C0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 10003602
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CountTick$Message$LongPeekString_base::_WindowXlen_memcpy_sstd::_$DispatchFileInternetReadSendTranslate_fwrite
                                                      • String ID: Cannot connect$Cannot create file$Connecting...$Download complete$Download failed$Downloading...$FileProgressBar
                                                      • API String ID: 3515732370-3550608020
                                                      • Opcode ID: 1e3ae09d4bdcea0fa17985ec82cd69570f3ba5ea2f8165b31817899fc3386900
                                                      • Instruction ID: 14689875b6b30455679291f07289f33e21ede9343fe2b772b1452d63b4c43b44
                                                      • Opcode Fuzzy Hash: 1e3ae09d4bdcea0fa17985ec82cd69570f3ba5ea2f8165b31817899fc3386900
                                                      • Instruction Fuzzy Hash: 3022D571D00254ABEB04DFA8C881B9EBBB9EF44340F14816DF8096B286DB75BD45CBD2
                                                      APIs
                                                      • CoCreateInstance.OLE32(0049CA78,00000000,00000001,0049C774,?,00000000,00457213), ref: 00456EAE
                                                      • CoCreateInstance.OLE32(0049C764,00000000,00000001,0049C774,?,00000000,00457213), ref: 00456ED4
                                                      • SysFreeString.OLEAUT32(00000000), ref: 0045708B
                                                      Strings
                                                      • CoCreateInstance, xrefs: 00456EDF
                                                      • IPersistFile::Save, xrefs: 00457192
                                                      • {pf32}\, xrefs: 00456F4E
                                                      • %ProgramFiles(x86)%\, xrefs: 00456F5E
                                                      • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004570FA
                                                      • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 00456FED
                                                      • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00457134
                                                      • IPropertyStore::Commit, xrefs: 00457113
                                                      • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 00457021
                                                      • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00457070
                                                      • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 004570C2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance$FreeString
                                                      • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                      • API String ID: 308859552-2363233914
                                                      • Opcode ID: 1a04e3ad86ed443edbec985671ef4627b21a6ac01ec9052fef93741c1d993dd6
                                                      • Instruction ID: 2e1e526739867e50670bceb89507c71339c1b21d6ee211b494412a744f46fea4
                                                      • Opcode Fuzzy Hash: 1a04e3ad86ed443edbec985671ef4627b21a6ac01ec9052fef93741c1d993dd6
                                                      • Instruction Fuzzy Hash: 3DB13C71A04104AFDB10DFA9D885B9E7BF8AF09306F1440A6F804E7362DB38DD49CB69
                                                      APIs
                                                        • Part of subcall function 0047A4E4: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,022F7A28,?,?,?,022F7A28,0047A6A8,00000000,0047A7C6,?,?,?,?), ref: 0047A4FD
                                                        • Part of subcall function 0047A4E4: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047A503
                                                        • Part of subcall function 0047A4E4: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,022F7A28,?,?,?,022F7A28,0047A6A8,00000000,0047A7C6,?,?,?,?), ref: 0047A516
                                                        • Part of subcall function 0047A4E4: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,022F7A28,?,?,?,022F7A28), ref: 0047A540
                                                        • Part of subcall function 0047A4E4: CloseHandle.KERNEL32(00000000,?,?,?,022F7A28,0047A6A8,00000000,0047A7C6,?,?,?,?), ref: 0047A55E
                                                        • Part of subcall function 0047A5BC: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,0047A64E,?,?,?,022F7A28,?,0047A6B0,00000000,0047A7C6,?,?,?,?), ref: 0047A5EC
                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 0047A700
                                                      • GetLastError.KERNEL32(00000000,0047A7C6,?,?,?,?), ref: 0047A709
                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0047A756
                                                      • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0047A77A
                                                      • CloseHandle.KERNEL32(00000000,0047A7AB,00000000,00000000,000000FF,000000FF,00000000,0047A7A4,?,00000000,0047A7C6,?,?,?,?), ref: 0047A79E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                      • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                      • API String ID: 883996979-221126205
                                                      • Opcode ID: 3263b303b0c7ec245f52f16ada52d980e86b871b141d71ef7354d9bffc785b3f
                                                      • Instruction ID: 0d6525aa7dba4a670bafe224496e1c5a7b1f34ed0ce7a0cdec9df710ef63790c
                                                      • Opcode Fuzzy Hash: 3263b303b0c7ec245f52f16ada52d980e86b871b141d71ef7354d9bffc785b3f
                                                      • Instruction Fuzzy Hash: 15315871900204AFDB15EFA5C842ADEB7B8EF84318F50843BF518E7282D77C99158B5A
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 00418823
                                                      • GetWindowPlacement.USER32(?,0000002C), ref: 00418840
                                                      • GetWindowRect.USER32(?), ref: 0041885C
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 0041886A
                                                      • GetWindowLongA.USER32(?,000000F8), ref: 0041887F
                                                      • ScreenToClient.USER32(00000000), ref: 00418888
                                                      • ScreenToClient.USER32(00000000,?), ref: 00418893
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                      • String ID: ,
                                                      • API String ID: 2266315723-3772416878
                                                      • Opcode ID: dac5a07ef4df856ef257039b4bd7ee432e64e833f517036103e80ee43864890f
                                                      • Instruction ID: 4677e2b8f0f91e01fbb11cd2367981c379ed87121ba2a99f8ef1be567d42c28b
                                                      • Opcode Fuzzy Hash: dac5a07ef4df856ef257039b4bd7ee432e64e833f517036103e80ee43864890f
                                                      • Instruction Fuzzy Hash: 5A11E971505201AFDB00EF69C885F9B77E8AF49314F140A7EB958DB296D738D900CB69
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 0042F784
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 0042F798
                                                      • GetWindowLongA.USER32(?,000000EC), ref: 0042F7AF
                                                      • GetActiveWindow.USER32 ref: 0042F7B8
                                                      • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F7E5
                                                      • SetActiveWindow.USER32(?,0042F915,00000000,?), ref: 0042F806
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveLong$IconicMessage
                                                      • String ID:
                                                      • API String ID: 1633107849-0
                                                      • Opcode ID: 59304190847aac26e0075f57bafe87f7c31a57b7a7a7829f8250f9d0c6767a26
                                                      • Instruction ID: 13cdee708698089d3899b8003c30923a51aeb8c8037ba69dea4574f539849007
                                                      • Opcode Fuzzy Hash: 59304190847aac26e0075f57bafe87f7c31a57b7a7a7829f8250f9d0c6767a26
                                                      • Instruction Fuzzy Hash: C6319371A00614AFDB01EFB6DC52D5EBBF8EB09304B9144BAF804E3292D7389D15CB18
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000028), ref: 00455E23
                                                      • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00455E29
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455E42
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455E69
                                                      • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455E6E
                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00455E7F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                      • String ID: SeShutdownPrivilege
                                                      • API String ID: 107509674-3733053543
                                                      • Opcode ID: f3ce414a9ae8b0176eb463264ebd8cf1f04669fa35e8fb9271cfad6052cd7978
                                                      • Instruction ID: 6597e5a33764c8e3d598d3dac94519450192e65d962eb3d098ce792c7942ec46
                                                      • Opcode Fuzzy Hash: f3ce414a9ae8b0176eb463264ebd8cf1f04669fa35e8fb9271cfad6052cd7978
                                                      • Instruction Fuzzy Hash: 08F06270294B02B9E620A7718C17F3B31CC9B40B59F54092ABD05EA1C3E7BCD6088A7A
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,0049B066,?,?,00000000,0049E62C,?,0049B1F0,00000000,0049B244,?,?,00000000,0049E62C), ref: 0049AF7F
                                                      • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049B002
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,0049B03E,?,00000000,?,00000000,0049B066,?,?,00000000,0049E62C,?,0049B1F0,00000000), ref: 0049B01A
                                                      • FindClose.KERNEL32(000000FF,0049B045,0049B03E,?,00000000,?,00000000,0049B066,?,?,00000000,0049E62C,?,0049B1F0,00000000,0049B244), ref: 0049B038
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirstNext
                                                      • String ID: isRS-$isRS-???.tmp
                                                      • API String ID: 134685335-3422211394
                                                      • Opcode ID: fe521ce0720771f481fb67ad3d7465d0146b5a5166c0e578d16b25d4081f1daf
                                                      • Instruction ID: 04bf727f3197cccd33fd944652b66e3324626472502a6d6b0206edec7ebcaf7d
                                                      • Opcode Fuzzy Hash: fe521ce0720771f481fb67ad3d7465d0146b5a5166c0e578d16b25d4081f1daf
                                                      • Instruction Fuzzy Hash: 49316471901618ABDF10EF65DD41ADFBBBCDB49304F5044B7A818A32A1E7389F45CE98
                                                      APIs
                                                      • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457EA1
                                                      • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457EC8
                                                      • SetForegroundWindow.USER32(?), ref: 00457ED9
                                                      • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,004581B1,?,00000000,004581ED), ref: 0045819C
                                                      Strings
                                                      • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045801C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                      • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                      • API String ID: 2236967946-3182603685
                                                      • Opcode ID: f0d9271b3600f25c345f7473f4edd4a9770fb5d51f0c8beac7dd56fb421c1a46
                                                      • Instruction ID: 1e470f9c67850fe58258b166e2de1343f71499e9040d68aaec82a8138f7570a6
                                                      • Opcode Fuzzy Hash: f0d9271b3600f25c345f7473f4edd4a9770fb5d51f0c8beac7dd56fb421c1a46
                                                      • Instruction Fuzzy Hash: D491FE34704604EFDB15CF55DD51F5ABBF9EB88704F2184BAE804A7792CA38AE09CB58
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,0045677B), ref: 0045666C
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00456672
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                      • API String ID: 1646373207-3712701948
                                                      • Opcode ID: a26a4e61d10e36191c5b55e3e1f91ca85e589b1de8ffa63c09561c8afc3ad412
                                                      • Instruction ID: b3c638b06f07771193fa82c07f29861e578aec67d60b7d75356f70af58752f0b
                                                      • Opcode Fuzzy Hash: a26a4e61d10e36191c5b55e3e1f91ca85e589b1de8ffa63c09561c8afc3ad412
                                                      • Instruction Fuzzy Hash: 84418271A00249AFCF01EFA5C8829EEB7B8EF4C305F51456AF804F7252D6785E098B68
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,004770AE,?,?,0049F1E4,00000000), ref: 00476F9D
                                                      • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004770AE,?,?,0049F1E4,00000000), ref: 0047707A
                                                      • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004770AE,?,?,0049F1E4,00000000), ref: 00477088
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID: unins$unins???.*
                                                      • API String ID: 3541575487-1009660736
                                                      • Opcode ID: cdf374b0c86a18aa50ba211f1e372957818ceb5cf0ca2b7e465b76b6baca31cc
                                                      • Instruction ID: b3651197dbd027c67a28626735fb33018e03d09d0edc3c1e02fba50c739ea7b0
                                                      • Opcode Fuzzy Hash: cdf374b0c86a18aa50ba211f1e372957818ceb5cf0ca2b7e465b76b6baca31cc
                                                      • Instruction Fuzzy Hash: C6313E70A04148AFCB10EB65CD81ADEB7BDEB45344F91C0F6A40CA72A2DB79DF458B58
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 0041819F
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 004181BD
                                                      • GetWindowPlacement.USER32(?,0000002C), ref: 004181F3
                                                      • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 0041821A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Placement$Iconic
                                                      • String ID: ,
                                                      • API String ID: 568898626-3772416878
                                                      • Opcode ID: 94c27d96dae92190053cdadbd09ad202be2508a7be7ad0d7a8ed44e722cc964a
                                                      • Instruction ID: 3dd2bdadd829011ee7f0b750d59610fe616def585f77d2d2d1cec2b35816d924
                                                      • Opcode Fuzzy Hash: 94c27d96dae92190053cdadbd09ad202be2508a7be7ad0d7a8ed44e722cc964a
                                                      • Instruction Fuzzy Hash: 02215172600204ABCF00EFA9CCC1EDA77A8AF49314F55456AFD18EF246CB78D844CB68
                                                      APIs
                                                        • Part of subcall function 10012E30: InternetCrackUrlA.WININET(00000004,00000000,00000000,000000F4), ref: 10012FA8
                                                      • FtpSetCurrentDirectoryA.WININET(?,?), ref: 10003C1F
                                                      • FtpFindFirstFileA.WININET(?,?,?,00000000,00000000), ref: 10003C5F
                                                      • InternetFindNextFileA.WININET(?,?), ref: 10003E88
                                                        • Part of subcall function 10005320: std::_String_base::_Xlen.LIBCPMT ref: 10005355
                                                        • Part of subcall function 10005320: std::_String_base::_Xlen.LIBCPMT ref: 1000536C
                                                        • Part of subcall function 10005320: _memcpy_s.LIBCMT ref: 100053DF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileFindInternetString_base::_Xlenstd::_$CrackCurrentDirectoryFirstNext_memcpy_s
                                                      • String ID:
                                                      • API String ID: 3415815666-0
                                                      • Opcode ID: 63a4b9dbb4699b7e5643fa31236d464c7708f1daae40cfe230320836ce58fe97
                                                      • Instruction ID: 33bd8a9f75b0fd2f600ad8ea2a3b3fba2523996b1ded2731e6a00319637509c5
                                                      • Opcode Fuzzy Hash: 63a4b9dbb4699b7e5643fa31236d464c7708f1daae40cfe230320836ce58fe97
                                                      • Instruction Fuzzy Hash: 8C62C7B14083809FE720DF28C841B9BBBE8EF85344F514A5DF59947296DB31E949CBA3
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001,00000000,0046528D), ref: 00465101
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,00465260,?,00000001,00000000,0046528D), ref: 00465190
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00465242,?,00000000,?,00000000,00465260,?,00000001,00000000,0046528D), ref: 00465222
                                                      • FindClose.KERNEL32(000000FF,00465249,00465242,?,00000000,?,00000000,00465260,?,00000001,00000000,0046528D), ref: 0046523C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseErrorFirstModeNext
                                                      • String ID:
                                                      • API String ID: 4011626565-0
                                                      • Opcode ID: 78e051bc9a5b3275d56530c4d73a473f7fa706c3420aea37e8f65fd325510d73
                                                      • Instruction ID: 440dca86ff91bcf92ec396117f9ee2e7eb4a9bd4f86bd55e8ffce81b2904001c
                                                      • Opcode Fuzzy Hash: 78e051bc9a5b3275d56530c4d73a473f7fa706c3420aea37e8f65fd325510d73
                                                      • Instruction Fuzzy Hash: 6B41A230A04A589FDB10EF65DC55ADEB7B8EB89309F4044FAF404E7381E63C9E488E59
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001,00000000,00465733), ref: 004655C1
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,004656FE,?,00000001,00000000,00465733), ref: 00465607
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,004656E0,?,00000000,?,00000000,004656FE,?,00000001,00000000,00465733), ref: 004656BC
                                                      • FindClose.KERNEL32(000000FF,004656E7,004656E0,?,00000000,?,00000000,004656FE,?,00000001,00000000,00465733), ref: 004656DA
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseErrorFirstModeNext
                                                      • String ID:
                                                      • API String ID: 4011626565-0
                                                      • Opcode ID: 6483b4de62b7bd3e62c13a203bac68441579369ff222681ede31a7829b514187
                                                      • Instruction ID: 5fa7a0e481a84f03f33422116c22c7c15fd1db6c0b7bd2f560a0f02907c35907
                                                      • Opcode Fuzzy Hash: 6483b4de62b7bd3e62c13a203bac68441579369ff222681ede31a7829b514187
                                                      • Instruction Fuzzy Hash: 82417335A00A18DFCB10EFA5CC85ADEB7B9EB88305F4044AAF804E7341E6389E44CE59
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 10017604
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 10017619
                                                      • UnhandledExceptionFilter.KERNEL32(10029C80), ref: 10017624
                                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 10017640
                                                      • TerminateProcess.KERNEL32(00000000), ref: 10017647
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                      • String ID:
                                                      • API String ID: 2579439406-0
                                                      • Opcode ID: f64aada8c6b2405166993955ac8c3e480f0a17a7403cd4dd766f4695cc831951
                                                      • Instruction ID: 366666a27f9b082e75efa7794b9baa7a4b97cf6223522bf1e4b33ca186309502
                                                      • Opcode Fuzzy Hash: f64aada8c6b2405166993955ac8c3e480f0a17a7403cd4dd766f4695cc831951
                                                      • Instruction Fuzzy Hash: 5B21EEB88052289FE302CF68DDC56D4BBB4FB0C351F10841AEA099F662E7B05982CF55
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453717,00000000,00453738), ref: 0042EDE6
                                                      • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042EE11
                                                      • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453717,00000000,00453738), ref: 0042EE1E
                                                      • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453717,00000000,00453738), ref: 0042EE26
                                                      • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00453717,00000000,00453738), ref: 0042EE2C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 1177325624-0
                                                      • Opcode ID: bac512edfbbbabf362f6dfab870019f28d9faeb2075b71a466509b5389b59c8a
                                                      • Instruction ID: 70587ef730fcdfb329c4590a56e67438f12b0fd4b2c9556a93668e86dd7922da
                                                      • Opcode Fuzzy Hash: bac512edfbbbabf362f6dfab870019f28d9faeb2075b71a466509b5389b59c8a
                                                      • Instruction Fuzzy Hash: 9CF090723917203AF620B17AAC86F7F428CCB89B68F50423AF714FF1D1D9A85D0955AD
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 00485D3A
                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 00485D58
                                                      • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049F0AC,00485216,0048524A,00000000,0048526A,?,?,?,0049F0AC), ref: 00485D7A
                                                      • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049F0AC,00485216,0048524A,00000000,0048526A,?,?,?,0049F0AC), ref: 00485D8E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$IconicLong
                                                      • String ID:
                                                      • API String ID: 2754861897-0
                                                      • Opcode ID: 4c308d3b12315672c07ac890770fdfbe74c8bd42f6d9c93706204eed776ff039
                                                      • Instruction ID: 5af26d4b23032c42014cdd6a7ba96e1f526e5740e281828ed4b475e411d83285
                                                      • Opcode Fuzzy Hash: 4c308d3b12315672c07ac890770fdfbe74c8bd42f6d9c93706204eed776ff039
                                                      • Instruction Fuzzy Hash: 60011A716056409AEB10BB7A9C4DB5A33DD5B14304F19887BBC00DF2A3CA6DDC859B6C
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,00463C18), ref: 00463B9C
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00463BF8,?,00000000,?,00000000,00463C18), ref: 00463BD8
                                                      • FindClose.KERNEL32(000000FF,00463BFF,00463BF8,?,00000000,?,00000000,00463C18), ref: 00463BF2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: e5119b90939d9d572c268ad8b82d55229f907c842cf6c422454299bb1c9d4779
                                                      • Instruction ID: a0cce92d96e660be0b97b7f28cec8121132c3377f259b36877ec83f4fdc062c8
                                                      • Opcode Fuzzy Hash: e5119b90939d9d572c268ad8b82d55229f907c842cf6c422454299bb1c9d4779
                                                      • Instruction Fuzzy Hash: 4C21D8315046886EDB11DF66CC41ADEBBACDB49705F5084FBF808E3661E638DF44CA5A
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 00424674
                                                      • SetActiveWindow.USER32(?,?,?,?,0046E2FF), ref: 00424681
                                                        • Part of subcall function 00423ADC: ShowWindow.USER32(004108F0,00000009,?,00000000,0041F234,00423DCA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042409C), ref: 00423AF7
                                                        • Part of subcall function 00423FA4: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022F25AC,0042469A,?,?,?,?,0046E2FF), ref: 00423FDF
                                                      • SetFocus.USER32(00000000,?,?,?,?,0046E2FF), ref: 004246AE
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveFocusIconicShow
                                                      • String ID:
                                                      • API String ID: 649377781-0
                                                      • Opcode ID: 6fb5541612255947ef2c91b9d7674ffacd1557a8c948e8d6abd3677b7be11a69
                                                      • Instruction ID: 41fac251e040b5459bea7d3bbf68ddb82a9bf8d4fdffabeb223ec960e46dc8d5
                                                      • Opcode Fuzzy Hash: 6fb5541612255947ef2c91b9d7674ffacd1557a8c948e8d6abd3677b7be11a69
                                                      • Instruction Fuzzy Hash: FCF0D0717001108BDB40FFAAE9C5B9632A4AF49704B55057BBC05DF35BC67CDC458768
                                                      APIs
                                                      • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 0042F2A1
                                                      • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000001), ref: 0042F2B1
                                                      • CreateMutexA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0042F2D9
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DescriptorSecurity$CreateDaclInitializeMutex
                                                      • String ID:
                                                      • API String ID: 3525989157-0
                                                      • Opcode ID: 2c808e9d1d2103421bc27e7a9199af7a8a7f53dda2cfff6e3100d803d15f4299
                                                      • Instruction ID: b330794617a7040f76ad0da05c7b1ee5a1856395dd3e8d048ce20caf316d4231
                                                      • Opcode Fuzzy Hash: 2c808e9d1d2103421bc27e7a9199af7a8a7f53dda2cfff6e3100d803d15f4299
                                                      • Instruction Fuzzy Hash: 18E0C0B16443007EE200EE758C82F5F76DCDB48714F00483AB654DB1C1E679D9489B96
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 0041819F
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 004181BD
                                                      • GetWindowPlacement.USER32(?,0000002C), ref: 004181F3
                                                      • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 0041821A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Placement$Iconic
                                                      • String ID:
                                                      • API String ID: 568898626-0
                                                      • Opcode ID: 93123499588309d436321f36bfa17b4aada1e27efe65d07a76ab247a868ec15b
                                                      • Instruction ID: c40958ec65a3081d6570449c7fa77bc67a6f73258cf3a653cafff2f251148837
                                                      • Opcode Fuzzy Hash: 93123499588309d436321f36bfa17b4aada1e27efe65d07a76ab247a868ec15b
                                                      • Instruction Fuzzy Hash: DE018F72240204BBDF10EE69DCC1EEB3398AB55364F15416AFD08DF242DA38EC8187A8
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CaptureIconic
                                                      • String ID:
                                                      • API String ID: 2277910766-0
                                                      • Opcode ID: e2b62a8e16e158399129b422c839338f97e6c3ad2ac0daa3b8d535a8f81942d9
                                                      • Instruction ID: 4baae68772761491d2023ced8ce828277fc49fe1aa00b8ecf1210e993849b5ad
                                                      • Opcode Fuzzy Hash: e2b62a8e16e158399129b422c839338f97e6c3ad2ac0daa3b8d535a8f81942d9
                                                      • Instruction Fuzzy Hash: AFF0317134460287DB20E66AC885ABF62B99F48395F14443BE515C7356EA6CDD848358
                                                      APIs
                                                      • IsIconic.USER32(?), ref: 0042462B
                                                        • Part of subcall function 00423F14: EnumWindows.USER32(00423EAC), ref: 00423F38
                                                        • Part of subcall function 00423F14: GetWindow.USER32(?,00000003), ref: 00423F4D
                                                        • Part of subcall function 00423F14: GetWindowLongA.USER32(?,000000EC), ref: 00423F5C
                                                        • Part of subcall function 00423F14: SetWindowPos.USER32(00000000,EB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042463B,?,?,00424203), ref: 00423F92
                                                      • SetActiveWindow.USER32(?,?,?,00424203,00000000,004245EC), ref: 0042463F
                                                        • Part of subcall function 00423ADC: ShowWindow.USER32(004108F0,00000009,?,00000000,0041F234,00423DCA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,0042409C), ref: 00423AF7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveEnumIconicLongShowWindows
                                                      • String ID:
                                                      • API String ID: 2671590913-0
                                                      • Opcode ID: 79a778728c02cc4edaf90c7f9b948427ca67b0e60320da5664268fec259b68fe
                                                      • Instruction ID: d3e93a58e57438a951a07f29fe0797b16f8422c20572e0da7720cbe2ca5f63be
                                                      • Opcode Fuzzy Hash: 79a778728c02cc4edaf90c7f9b948427ca67b0e60320da5664268fec259b68fe
                                                      • Instruction Fuzzy Hash: B4E01A60700100C7EF00EFAAE8C4F8662A4BF88304F95017ABC48CF24BD67CDC448724
                                                      APIs
                                                      • __decode_pointer.LIBCMT ref: 1001F5A5
                                                        • Part of subcall function 10017E6B: TlsGetValue.KERNEL32(?,10017F0D), ref: 10017E78
                                                        • Part of subcall function 10017E6B: TlsGetValue.KERNEL32(00000007), ref: 10017E8F
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 1001F5AC
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Value$ExceptionFilterUnhandled__decode_pointer
                                                      • String ID:
                                                      • API String ID: 1958600898-0
                                                      • Opcode ID: 956e7dc8681365c089192800ddefb62323125870afe30df241c50bcffd2c447a
                                                      • Instruction ID: 63a62b57154db4244e5e3e7d4dd870a5920f28e733c98ec8365df5da6056edf0
                                                      • Opcode Fuzzy Hash: 956e7dc8681365c089192800ddefb62323125870afe30df241c50bcffd2c447a
                                                      • Instruction Fuzzy Hash: 76C08C644092C10EEF0AC3B458CC30D7A80A715402FA0088AE1848C163C86880CEC221
                                                      APIs
                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412C65), ref: 00412C53
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID:
                                                      • API String ID: 4255912815-0
                                                      • Opcode ID: 76210ea955b4234c29723da591833cea603cabc76a58ce7e5be2657fdfd9ecd6
                                                      • Instruction ID: b726886feaa3cfb0c3c92f2e05cced8293b81fa2aba97a9fc1f2d8d784250eff
                                                      • Opcode Fuzzy Hash: 76210ea955b4234c29723da591833cea603cabc76a58ce7e5be2657fdfd9ecd6
                                                      • Instruction Fuzzy Hash: BD51F7317086058FC714DF6AD680A9AF3E5FFA8304B20866BD844C7365E7B8AD91C749
                                                      APIs
                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0047AD82
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID:
                                                      • API String ID: 4255912815-0
                                                      • Opcode ID: ac3a0e397c45ef836a8712edbd6479a7937f26d08489729a49ce9afc46fadd63
                                                      • Instruction ID: 72cb5964904ea9acb86450fde6e950c62e8bde0ebf735d0adfbf9209324b5543
                                                      • Opcode Fuzzy Hash: ac3a0e397c45ef836a8712edbd6479a7937f26d08489729a49ce9afc46fadd63
                                                      • Instruction Fuzzy Hash: C6415B75604104EFCB20CF59C2908AEB7F6EB88311B74C992E849DB751D338EE51DB96
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID:
                                                      • API String ID: 2645101109-0
                                                      • Opcode ID: 065d5d2aa7b724ed6289c5adcb70c30f8e9a1dde2e28f2192dd81213443c68fe
                                                      • Instruction ID: 85d927fa64bde7e0f6bd0e56391a747b52e91616c2131cbf33e1fd207173554c
                                                      • Opcode Fuzzy Hash: 065d5d2aa7b724ed6289c5adcb70c30f8e9a1dde2e28f2192dd81213443c68fe
                                                      • Instruction Fuzzy Hash: 91D0C2B230460063C700BA68DC825AA358D8B84305F00483E7CC5DA2C3EABDDA4C5696
                                                      APIs
                                                      • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042FA1C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: NtdllProc_Window
                                                      • String ID:
                                                      • API String ID: 4255912815-0
                                                      • Opcode ID: 9c092c28255bcc30e80686d9f5dffef4909b4cfadbe587d4d40091b81cadcf9b
                                                      • Instruction ID: e991843b48109e052d0f5957ab47f1130dd67dcde68d8ed9d112e108350b7662
                                                      • Opcode Fuzzy Hash: 9c092c28255bcc30e80686d9f5dffef4909b4cfadbe587d4d40091b81cadcf9b
                                                      • Instruction Fuzzy Hash: 02D05E7131010C6B9B00DE98E840C6B33AC9B88700BA08829F908C7201C634ED1097A8
                                                      APIs
                                                        • Part of subcall function 0044BB38: GetVersionExA.KERNEL32(00000094), ref: 0044BB55
                                                        • Part of subcall function 0044BB8C: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044BBA4
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,0044BF9F,?,?,?,?,00000000,00000000,?,0044FDE1,0049BA76), ref: 0044BC1E
                                                      • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044BC36
                                                      • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044BC48
                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044BC5A
                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044BC6C
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BC7E
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BC90
                                                      • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044BCA2
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044BCB4
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044BCC6
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044BCD8
                                                      • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044BCEA
                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044BCFC
                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044BD0E
                                                      • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044BD20
                                                      • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044BD32
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044BD44
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044BD56
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044BD68
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044BD7A
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044BD8C
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044BD9E
                                                      • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044BDB0
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044BDC2
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044BDD4
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044BDE6
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044BDF8
                                                      • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044BE0A
                                                      • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044BE1C
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044BE2E
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044BE40
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044BE52
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044BE64
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044BE76
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044BE88
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044BE9A
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044BEAC
                                                      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044BEBE
                                                      • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044BED0
                                                      • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044BEE2
                                                      • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044BEF4
                                                      • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044BF06
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044BF18
                                                      • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044BF2A
                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044BF3C
                                                      • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044BF4E
                                                      • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044BF60
                                                      • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044BF72
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$DirectoryLibraryLoadSystemVersion
                                                      • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                      • API String ID: 2754715182-2910565190
                                                      • Opcode ID: 67b95b5371f249a8e9232e37dcb11037f6e4e7b41a9552869577b47b5d37a655
                                                      • Instruction ID: ecd7112d65f411c7eccfc6eab1653a3c74b71e6b2ad24da097032ecd241f34bd
                                                      • Opcode Fuzzy Hash: 67b95b5371f249a8e9232e37dcb11037f6e4e7b41a9552869577b47b5d37a655
                                                      • Instruction Fuzzy Hash: 3AA14DB0A41710EBEB40EFF6DCC6A2A37A8EB15B1475405BBB440EF295D6789C048F5E
                                                      APIs
                                                      • Sleep.KERNEL32(00000000,00000000,004957E1,?,?,?,?,00000000,00000000,00000000), ref: 0049532C
                                                      • FindWindowA.USER32(00000000,00000000), ref: 0049535D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FindSleepWindow
                                                      • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                      • API String ID: 3078808852-3310373309
                                                      • Opcode ID: f8848a1a84b024abead4a61a3e9036c19501452696533f8aaac553cb32939556
                                                      • Instruction ID: 81b0b0a091168c97ae0ef179256dddc1b1175ea621cc4e7edfbae85d46dbfd27
                                                      • Opcode Fuzzy Hash: f8848a1a84b024abead4a61a3e9036c19501452696533f8aaac553cb32939556
                                                      • Instruction Fuzzy Hash: BEC17364B04A006BDB11BA7E8C8252F5D999F98704B21D97FB406EB78BCE3CDD0A435D
                                                      APIs
                                                      • SendMessageA.USER32(?,00000030,?,00000001), ref: 10007782
                                                      • GetDlgItem.USER32(?,000003EC), ref: 10007793
                                                      • SendMessageA.USER32(00000000,?,000003EC,00000030), ref: 1000779A
                                                      • GetDlgItem.USER32(?,000003ED), ref: 100077AB
                                                      • SendMessageA.USER32(00000000,?,000003ED,00000030), ref: 100077B2
                                                      • GetDlgItem.USER32(00000000,000003E9), ref: 100077C3
                                                      • SendMessageA.USER32(00000000,?,00000001), ref: 100077CA
                                                      • GetDlgItem.USER32(?,00000005), ref: 100077D8
                                                      • SendMessageA.USER32(00000000,?,00000005,00000030), ref: 100077DF
                                                      • GetDlgItem.USER32(?,00000004), ref: 100077ED
                                                      • SendMessageA.USER32(00000000,?,00000004,00000030), ref: 100077F4
                                                      • GetDlgItem.USER32(00000000,00000003), ref: 10007802
                                                      • SendMessageA.USER32(00000000,?,00000001), ref: 10007809
                                                      • SetWindowTextA.USER32(?,-00000004), ref: 1000785C
                                                      • GetDlgItem.USER32(?,00000004), ref: 100078BA
                                                      • SetWindowTextA.USER32(00000000), ref: 100078C1
                                                      • GetDlgItem.USER32(?,00000005), ref: 1000791F
                                                      • SetWindowTextA.USER32(00000000), ref: 10007926
                                                      • GetDlgItem.USER32(?,00000003), ref: 10007984
                                                      • SetWindowTextA.USER32(00000000), ref: 1000798B
                                                      • GetDlgItem.USER32(?,000003EC), ref: 10007A27
                                                      • SetWindowTextA.USER32(00000000), ref: 10007A2E
                                                      • GetDlgItem.USER32(?,000003ED), ref: 10007AE0
                                                      • SetWindowTextA.USER32(00000000), ref: 10007AE7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Item$MessageSend$TextWindow
                                                      • String ID: Cancel$Download failed$Ignore$Retry$The following files were not downloaded:
                                                      • API String ID: 2645603783-2260887806
                                                      • Opcode ID: bf020de531ff841d831f778a24686d13b9d6e729cae5f44960efe0365974c649
                                                      • Instruction ID: fc4a234e96a817ade233887837cee60500aee3dd11a4ef03af4566e99fc04ec6
                                                      • Opcode Fuzzy Hash: bf020de531ff841d831f778a24686d13b9d6e729cae5f44960efe0365974c649
                                                      • Instruction Fuzzy Hash: 1BC1DEB1914340ABE710DF64CC8AF5BBBA9FF84740F60491DF6885B281CB75E946CB92
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,10015F58,?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C,10016182,?), ref: 10018251
                                                      • __mtterm.LIBCMT ref: 1001825D
                                                        • Part of subcall function 10017F35: __decode_pointer.LIBCMT ref: 10017F46
                                                        • Part of subcall function 10017F35: TlsFree.KERNEL32(00000028,10015FF4,?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C,10016182,?), ref: 10017F60
                                                        • Part of subcall function 10017F35: DeleteCriticalSection.KERNEL32(00000000,00000000,?,00000001,10015FF4,?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C), ref: 1001AC92
                                                        • Part of subcall function 10017F35: DeleteCriticalSection.KERNEL32(00000028,?,00000001,10015FF4,?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C,10016182), ref: 1001ACBC
                                                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 10018273
                                                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 10018280
                                                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 1001828D
                                                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 1001829A
                                                      • TlsAlloc.KERNEL32(?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C,10016182,?), ref: 100182EA
                                                      • TlsSetValue.KERNEL32(00000000,?,?,00000001,?,?,100160C8,00000001,?,?,1002CA38,0000000C,10016182,?), ref: 10018305
                                                      • __init_pointers.LIBCMT ref: 1001830F
                                                      • __encode_pointer.LIBCMT ref: 1001831A
                                                      • __encode_pointer.LIBCMT ref: 1001832A
                                                      • __encode_pointer.LIBCMT ref: 1001833A
                                                      • __encode_pointer.LIBCMT ref: 1001834A
                                                      • __decode_pointer.LIBCMT ref: 1001836B
                                                      • __calloc_crt.LIBCMT ref: 10018384
                                                      • __decode_pointer.LIBCMT ref: 1001839E
                                                      • GetCurrentThreadId.KERNEL32 ref: 100183B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc__encode_pointer$__decode_pointer$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                                      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                      • API String ID: 4287529916-3819984048
                                                      • Opcode ID: 091d674f583d12cc8edc3d4086fca9ec23260268bdba0042e7b9fa39495d3bfe
                                                      • Instruction ID: b59bc52e39c4c573ced7285281f8372ab40e3c3dc34f4e0855858f899626d077
                                                      • Opcode Fuzzy Hash: 091d674f583d12cc8edc3d4086fca9ec23260268bdba0042e7b9fa39495d3bfe
                                                      • Instruction Fuzzy Hash: 583153398046219EEB12EF759C895D63AF0FB4A790B21096BF4159E2F2DB31D681CB90
                                                      APIs
                                                        • Part of subcall function 100130C0: InternetConnectA.WININET(?,?,?,?,?,?,?,00000000), ref: 100131C9
                                                      • FtpOpenFileA.WININET(?,00000000,80000000,80000002,00000000), ref: 10013308
                                                      • HttpOpenRequestA.WININET(?,HEAD,00000000,00000000,00000000,?,84400000,00000000), ref: 1001340D
                                                      • HttpSendRequestA.WININET(?,00000000,00000000,00000000,00000000), ref: 10013432
                                                      • GetLastError.KERNEL32(?,?,?,?,?), ref: 10013440
                                                      • GetDesktopWindow.USER32 ref: 10013474
                                                      • InternetErrorDlg.WININET(00000000,?,00000000,00000007,00000000), ref: 10013487
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorHttpInternetOpenRequest$ConnectDesktopFileLastSendWindow
                                                      • String ID: 407$Download cancelled$HEAD
                                                      • API String ID: 2567109029-88966343
                                                      • Opcode ID: db613ec7a51ded2032a35e11870998995a7572edcbba8e55971169fcc0c84d08
                                                      • Instruction ID: 7f9d410524b28168fcef3deaa09cf2c400fef63c9baa2a67138e087d56acd3c3
                                                      • Opcode Fuzzy Hash: db613ec7a51ded2032a35e11870998995a7572edcbba8e55971169fcc0c84d08
                                                      • Instruction Fuzzy Hash: 21D17E715087819FE330DB64C885F9BB7E9EB89740F40891DF59A8B251DB30F988CB62
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0041CED0
                                                      • CreateCompatibleDC.GDI32(?), ref: 0041CEDC
                                                      • CreateBitmap.GDI32(0041ADD4,?,00000001,00000001,00000000), ref: 0041CF00
                                                      • CreateCompatibleBitmap.GDI32(?,0041ADD4,?), ref: 0041CF10
                                                      • SelectObject.GDI32(0041D2CC,00000000), ref: 0041CF2B
                                                      • FillRect.USER32(0041D2CC,?,?), ref: 0041CF66
                                                      • SetTextColor.GDI32(0041D2CC,00000000), ref: 0041CF7B
                                                      • SetBkColor.GDI32(0041D2CC,00000000), ref: 0041CF92
                                                      • PatBlt.GDI32(0041D2CC,00000000,00000000,0041ADD4,?,00FF0062), ref: 0041CFA8
                                                      • CreateCompatibleDC.GDI32(?), ref: 0041CFBB
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0041CFEC
                                                      • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041D004
                                                      • RealizePalette.GDI32(00000000), ref: 0041D00D
                                                      • SelectPalette.GDI32(0041D2CC,00000000,00000001), ref: 0041D01C
                                                      • RealizePalette.GDI32(0041D2CC), ref: 0041D025
                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0041D03E
                                                      • SetBkColor.GDI32(00000000,00000000), ref: 0041D055
                                                      • BitBlt.GDI32(0041D2CC,00000000,00000000,0041ADD4,?,00000000,00000000,00000000,00CC0020), ref: 0041D071
                                                      • SelectObject.GDI32(00000000,?), ref: 0041D07E
                                                      • DeleteDC.GDI32(00000000), ref: 0041D094
                                                        • Part of subcall function 0041A4E8: GetSysColor.USER32(?), ref: 0041A4F2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                      • String ID:
                                                      • API String ID: 269503290-0
                                                      • Opcode ID: 6fe929e3afe2a13338af335e0b683deee4c25105ce56022b6ded3cf3a3571e5b
                                                      • Instruction ID: 50a53eb504fbb6e8939598bee840ef50963709612b5229ad76d17b3bfbc4c74e
                                                      • Opcode Fuzzy Hash: 6fe929e3afe2a13338af335e0b683deee4c25105ce56022b6ded3cf3a3571e5b
                                                      • Instruction Fuzzy Hash: 8061DD71E44605AFDF10EBA9DC46FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                                                      APIs
                                                        • Part of subcall function 10005410: std::_String_base::_Xlen.LIBCPMT ref: 10005469
                                                        • Part of subcall function 10005410: _memcpy_s.LIBCMT ref: 100054B1
                                                      • _setlocale.LIBCMT ref: 1000E8EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: String_base::_Xlen_memcpy_s_setlocalestd::_
                                                      • String ID: BackButton$ElapsedTime$FileDownloaded$FileName$FileProgressBar$GIBackButton$GINextButton$InvisibleButton$LabelFont$NextButton$RemainingTime$Speed$Status$TotalDownloaded$TotalProgressBar$WizardForm$WizardPage
                                                      • API String ID: 3520238541-1600669
                                                      • Opcode ID: 96426a2bb1ba6d23cd6b140db98d2b3b84f626c468df312a0cf19c341bc602dd
                                                      • Instruction ID: 1acc09cb1054aad71c2b43dffb0aeac1ccb767e2dad10e7c916a6f9bcb7cd872
                                                      • Opcode Fuzzy Hash: 96426a2bb1ba6d23cd6b140db98d2b3b84f626c468df312a0cf19c341bc602dd
                                                      • Instruction Fuzzy Hash: 66025BB440C380AFD345CF28C495A4BBBE4FB99B45F84591EF1895B252DB78D488CB63
                                                      APIs
                                                        • Part of subcall function 0042CC94: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CCB8
                                                      • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00474660
                                                      • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0047477B
                                                      • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00474791
                                                      • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004747B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                      • String ID: .lnk$.pif$.url$Creating the icon.$Desktop.ini$Dest filename: %s$Successfully created the icon.$target.lnk${group}\
                                                      • API String ID: 971782779-2902529204
                                                      • Opcode ID: dfedba3bd349ab3b5efeede3455e74f7497f55b16e4a34f5eada44c138dbca6e
                                                      • Instruction ID: 3ad2e39f7b63c2e1f507bff71cd9103ce15de2bb976d6045025a0d2193d98ff2
                                                      • Opcode Fuzzy Hash: dfedba3bd349ab3b5efeede3455e74f7497f55b16e4a34f5eada44c138dbca6e
                                                      • Instruction Fuzzy Hash: A4D14574A00149AFDB01EFA9D581BEEBBF4AF48304F50806AF904B7391D7789D45CB69
                                                      APIs
                                                      • ShowWindow.USER32(?,00000005,00000000,0049B5EC,?,?,00000000,?,00000000,00000000,?,0049B9A3,00000000,0049B9AD,?,00000000), ref: 0049B2D7
                                                      • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049B5EC,?,?,00000000,?,00000000,00000000,?,0049B9A3,00000000), ref: 0049B2EA
                                                      • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049B5EC,?,?,00000000,?,00000000,00000000), ref: 0049B2FA
                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0049B31B
                                                      • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,0049B5EC,?,?,00000000,?,00000000), ref: 0049B32B
                                                        • Part of subcall function 0042D8DC: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D96A,?,?,?,00000001,?,004568AE,00000000,00456916), ref: 0042D911
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                      • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                      • API String ID: 2000705611-3672972446
                                                      • Opcode ID: d6aed2ef425ab0066acebfcb6b2bf30655a38d553d8a2f30e9976cdf2af0e762
                                                      • Instruction ID: b2f29c3ed6207bb9e160049bb2bddfcad5bd5dcd32a025f4107ba54bac6b8e5f
                                                      • Opcode Fuzzy Hash: d6aed2ef425ab0066acebfcb6b2bf30655a38d553d8a2f30e9976cdf2af0e762
                                                      • Instruction Fuzzy Hash: E691D430A04204AFDF11EBA5E952BAE7FB5EB49308F514477F900A7292C77CAC05DB99
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,0045B224,?,?,?,?,?,00000006,?,00000000,0049A6E1,?,00000000,0049A784), ref: 0045B0D6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                      • API String ID: 1452528299-3112430753
                                                      • Opcode ID: cba0ce9831f5c6e6fd026f7e19bc4dd06a7e2d2876b7822625a22b0a780a2a35
                                                      • Instruction ID: 2fb3476e9d017ff0a5902371132bc4733b6d883e7af691887050c1a5ddfae389
                                                      • Opcode Fuzzy Hash: cba0ce9831f5c6e6fd026f7e19bc4dd06a7e2d2876b7822625a22b0a780a2a35
                                                      • Instruction Fuzzy Hash: 8E71A0307002486BCB01EB6998867AF7BA5EF48705F50846BFC11DB383DB7C9A49879D
                                                      APIs
                                                      • GetVersion.KERNEL32 ref: 0045D46A
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045D48A
                                                      • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045D497
                                                      • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045D4A4
                                                      • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045D4B2
                                                        • Part of subcall function 0045D358: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045D3F7,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045D3D1
                                                      • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D6A5,?,?,00000000), ref: 0045D56B
                                                      • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D6A5,?,?,00000000), ref: 0045D574
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                      • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                      • API String ID: 59345061-4263478283
                                                      • Opcode ID: 0828ca59996f9c66a971ac7fdd8876921b69cb906109572e65858b8da3e68693
                                                      • Instruction ID: 783a5280d5c6dd2c4afe06b2d07c38c27ed9239d6cb54be80e3f389c0ae86338
                                                      • Opcode Fuzzy Hash: 0828ca59996f9c66a971ac7fdd8876921b69cb906109572e65858b8da3e68693
                                                      • Instruction Fuzzy Hash: B75164B1D00608EFDB20DF99C841BAEB7B8EF48315F14806AF915B7381D6789945CF69
                                                      APIs
                                                      • ShowWindow.USER32(?,00000005,0000000A,BackButton,0000000A,?,?,?,?,?,?,?,?,0000000A), ref: 10010FA5
                                                      • EnableWindow.USER32(?), ref: 10011085
                                                        • Part of subcall function 10005410: std::_String_base::_Xlen.LIBCPMT ref: 10005469
                                                        • Part of subcall function 10005410: _memcpy_s.LIBCMT ref: 100054B1
                                                      • EnableWindow.USER32(?,00000001), ref: 10010FCB
                                                      • ShowWindow.USER32(?,00000005,0000000A,GIBackButton,0000000C,0000000A,GIBackButton,0000000C,0000000A,NextButton,0000000A), ref: 10011146
                                                      • EnableWindow.USER32(?,00000001), ref: 1001116C
                                                      • EnableWindow.USER32(?), ref: 10011226
                                                      • SendMessageA.USER32(?,0000040A,00000000,00000000), ref: 10011284
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Enable$Show$MessageSendString_base::_Xlen_memcpy_sstd::_
                                                      • String ID: BackButton$GIBackButton$GINextButton$NextButton$TotalProgressBar
                                                      • API String ID: 1812101747-114455261
                                                      • Opcode ID: 23119850460d871dd33f71e22dff35b55c0663435790c4a612ca13e862a306eb
                                                      • Instruction ID: ed506b060ffed767915349c7c7882e506e0dfa560629d63ae0263cfee80edf1b
                                                      • Opcode Fuzzy Hash: 23119850460d871dd33f71e22dff35b55c0663435790c4a612ca13e862a306eb
                                                      • Instruction Fuzzy Hash: B7B199B0508781AFD304CF64C895A5BBBE5EFC8744F404A2DF1A54B291DBB8E588CB93
                                                      APIs
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 0041B853
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 0041B85D
                                                      • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B86F
                                                      • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B886
                                                      • GetDC.USER32(00000000), ref: 0041B892
                                                      • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B8BF
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041B8E5
                                                      • SelectObject.GDI32(00000000,?), ref: 0041B900
                                                      • SelectObject.GDI32(?,00000000), ref: 0041B90F
                                                      • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B93B
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0041B949
                                                      • SelectObject.GDI32(?,00000000), ref: 0041B957
                                                      • DeleteDC.GDI32(00000000), ref: 0041B960
                                                      • DeleteDC.GDI32(?), ref: 0041B969
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                      • String ID:
                                                      • API String ID: 644427674-0
                                                      • Opcode ID: 73ee91a3acc86688725df9706b2ea354b5f5707f63fbf8f57308390f59fb2a3c
                                                      • Instruction ID: 5bdd10242b191c11111876c14ee0e8e9a171a3e9253023a3b6fe339c600245b0
                                                      • Opcode Fuzzy Hash: 73ee91a3acc86688725df9706b2ea354b5f5707f63fbf8f57308390f59fb2a3c
                                                      • Instruction Fuzzy Hash: F841AC71E40659ABDF10EAE9D846FAFB7BCEB08704F104466F614FB281C77869408BA4
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegQueryValueExA.ADVAPI32(0045B3FA,00000000,00000000,?,00000000,?,00000000,00455309,?,0045B3FA,00000003,00000000,00000000,00455340), ref: 00455189
                                                        • Part of subcall function 0042ED58: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453A6B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED77
                                                      • RegQueryValueExA.ADVAPI32(0045B3FA,00000000,00000000,00000000,?,00000004,00000000,00455253,?,0045B3FA,00000000,00000000,?,00000000,?,00000000), ref: 0045520D
                                                      • RegQueryValueExA.ADVAPI32(0045B3FA,00000000,00000000,00000000,?,00000004,00000000,00455253,?,0045B3FA,00000000,00000000,?,00000000,?,00000000), ref: 0045523C
                                                      Strings
                                                      • , xrefs: 004550FA
                                                      • RegOpenKeyEx, xrefs: 0045510C
                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004550A7
                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004550E0
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: QueryValue$FormatMessageOpen
                                                      • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                      • API String ID: 2812809588-1577016196
                                                      • Opcode ID: b38089396f9bd1e80361f7f4aec32eb98fbac3fcb49b8dce190468ca970a8865
                                                      • Instruction ID: a1e8c034b49f6a69a24190b621a186803033118ea706e5513908ccb254d87fbd
                                                      • Opcode Fuzzy Hash: b38089396f9bd1e80361f7f4aec32eb98fbac3fcb49b8dce190468ca970a8865
                                                      • Instruction Fuzzy Hash: 30914071D00608ABDB00DBE5D952BEEB7F8EB49305F50406BF904F7282D6789E098B69
                                                      APIs
                                                        • Part of subcall function 00459BF4: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459D31,00000000,00459EE9,?,00000000,00000000,00000000), ref: 00459C41
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459EE9,?,00000000,00000000,00000000), ref: 00459D8F
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459EE9,?,00000000,00000000,00000000), ref: 00459DF9
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459EE9,?,00000000,00000000,00000000), ref: 00459E60
                                                      Strings
                                                      • v4.0.30319, xrefs: 00459D81
                                                      • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459D42
                                                      • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459DAC
                                                      • v1.1.4322, xrefs: 00459E52
                                                      • .NET Framework not found, xrefs: 00459EAD
                                                      • v2.0.50727, xrefs: 00459DEB
                                                      • .NET Framework version %s not found, xrefs: 00459E99
                                                      • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459E13
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Close$Open
                                                      • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                      • API String ID: 2976201327-446240816
                                                      • Opcode ID: 7b0c25b8646ceea1d37bfb8bee6288df2e7d11155bddc49a46ccef07b9b08108
                                                      • Instruction ID: 28c73818cd0e0a48a6ea9a4a771bbd3fec88f932accac903083750955a5b2269
                                                      • Opcode Fuzzy Hash: 7b0c25b8646ceea1d37bfb8bee6288df2e7d11155bddc49a46ccef07b9b08108
                                                      • Instruction Fuzzy Hash: 6A51C135A041059BCB00DF65D8A2BEE77BADB49305F5444BBA901D7383EB39AE0EC758
                                                      APIs
                                                      • CloseHandle.KERNEL32(?), ref: 0045930B
                                                      • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00459327
                                                      • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00459335
                                                      • GetExitCodeProcess.KERNEL32(?), ref: 00459346
                                                      • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 0045938D
                                                      • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 004593A9
                                                      Strings
                                                      • Helper process exited, but failed to get exit code., xrefs: 0045937F
                                                      • Helper process exited., xrefs: 00459355
                                                      • Helper isn't responding; killing it., xrefs: 00459317
                                                      • Stopping 64-bit helper process. (PID: %u), xrefs: 004592FD
                                                      • Helper process exited with failure code: 0x%x, xrefs: 00459373
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                      • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                      • API String ID: 3355656108-1243109208
                                                      • Opcode ID: a28fc19403df96fc00f073a75bee5de3f867f6fb9d8838196cadade5ec61da6c
                                                      • Instruction ID: e85fc657e119397c97ed97e1faf084f02df15e80d39cea5897c552b80fc28b15
                                                      • Opcode Fuzzy Hash: a28fc19403df96fc00f073a75bee5de3f867f6fb9d8838196cadade5ec61da6c
                                                      • Instruction Fuzzy Hash: 1C212A70604740DBC720E779C88575B77D49F48305F04892EBC9ADB292EA78EC489B6A
                                                      APIs
                                                      • GetStringTypeW.KERNEL32(00000001,10029470,00000001,?,?,?,00000200,?,?,?,1001EC2C,00000001,?,00000001,?,?), ref: 1001EA73
                                                      • GetLastError.KERNEL32 ref: 1001EA85
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,00000200,?,?,?,1001EC2C,00000001,?,00000001), ref: 1001EAEA
                                                      • __alloca_probe_16.LIBCMT ref: 1001EB0B
                                                      • _malloc.LIBCMT ref: 1001EB1F
                                                      • _memset.LIBCMT ref: 1001EB3F
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000), ref: 1001EB54
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 1001EB62
                                                      • __freea.LIBCMT ref: 1001EB6C
                                                      • ___ansicp.LIBCMT ref: 1001EB96
                                                      • ___convertcp.LIBCMT ref: 1001EBB7
                                                        • Part of subcall function 10020373: GetCPInfo.KERNEL32(?,00000001,?,00000000,00000000,00000200,?,?,?,1001EC2C,00000001,?,00000001,?,?,?), ref: 100203BC
                                                        • Part of subcall function 10020373: GetCPInfo.KERNEL32(?,00000001), ref: 100203D5
                                                        • Part of subcall function 10020373: _strlen.LIBCMT ref: 100203F3
                                                        • Part of subcall function 10020373: __alloca_probe_16.LIBCMT ref: 10020413
                                                        • Part of subcall function 10020373: _memset.LIBCMT ref: 1002046B
                                                        • Part of subcall function 10020373: MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 10020482
                                                        • Part of subcall function 10020373: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000), ref: 1002049D
                                                      • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000200,?,?,?,1001EC2C,00000001,?,00000001,?), ref: 1001EBD7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$StringType$Info__alloca_probe_16_memset$ErrorLast___ansicp___convertcp__freea_malloc_strlen
                                                      • String ID:
                                                      • API String ID: 2971996645-0
                                                      • Opcode ID: ad2cfcae46f9c40792f6c24997c996c081d28579b3556665eb13a23ddd0f0b2c
                                                      • Instruction ID: ab33eb8d0cf54a8948ecbb44247258d8e03b166ce1ae19588d734a95c06230af
                                                      • Opcode Fuzzy Hash: ad2cfcae46f9c40792f6c24997c996c081d28579b3556665eb13a23ddd0f0b2c
                                                      • Instruction Fuzzy Hash: 5251697150429AAFDF00CF64CCC199F7BE9FB08394B614426F906DB261D730EDA18BA1
                                                      APIs
                                                      • ShowWindow.USER32(?,00000000,0000000A,BackButton,0000000A,?,?,?,?,?,?,?,?,0000000A), ref: 10010C24
                                                      • EnableWindow.USER32(?,00000000), ref: 10010CFD
                                                        • Part of subcall function 10005410: std::_String_base::_Xlen.LIBCPMT ref: 10005469
                                                        • Part of subcall function 10005410: _memcpy_s.LIBCMT ref: 100054B1
                                                      • EnableWindow.USER32(?,00000000), ref: 10010C49
                                                      • ShowWindow.USER32(?,00000000,0000000A,GIBackButton,0000000C,0000000A,GIBackButton,0000000C,0000000A,NextButton,0000000A), ref: 10010DBD
                                                      • EnableWindow.USER32(?,00000000), ref: 10010DE2
                                                      • EnableWindow.USER32(?,00000000), ref: 10010E96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Enable$Show$String_base::_Xlen_memcpy_sstd::_
                                                      • String ID: BackButton$GIBackButton$GINextButton$NextButton
                                                      • API String ID: 3471100403-2299138808
                                                      • Opcode ID: 9ae69a1eca4e9bbefc7a77ebc728263f0cc7256fd4ea9ade0bccfc038f7c6a33
                                                      • Instruction ID: ec4f8d1dbd3d33f8a4fc2f27fa54487ed9a29d8a23fddd7b9ce27b760d3a6cbe
                                                      • Opcode Fuzzy Hash: 9ae69a1eca4e9bbefc7a77ebc728263f0cc7256fd4ea9ade0bccfc038f7c6a33
                                                      • Instruction Fuzzy Hash: F7A179B15087819FD304CF55C894A5BBBE9EBC8744F404A2DF1A54B291CBB9E988CF93
                                                      APIs
                                                        • Part of subcall function 0042E274: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042E2A0
                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00454EFB,?,00000000,00454FBF), ref: 00454E4B
                                                      • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00454EFB,?,00000000,00454FBF), ref: 00454F87
                                                        • Part of subcall function 0042ED58: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453A6B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042ED77
                                                      Strings
                                                      • , xrefs: 00454DAD
                                                      • RegCreateKeyEx, xrefs: 00454DBF
                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454D63
                                                      • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454D93
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateFormatMessageQueryValue
                                                      • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                      • API String ID: 2481121983-1280779767
                                                      • Opcode ID: ad96e2b74533b1f25a57ff52286efab689ec44c2628258f67de485b39b5b3c90
                                                      • Instruction ID: c7e759269ab329005b5c2b3a4910326777c7a2f104b103968227fab848b04cb9
                                                      • Opcode Fuzzy Hash: ad96e2b74533b1f25a57ff52286efab689ec44c2628258f67de485b39b5b3c90
                                                      • Instruction Fuzzy Hash: FB81FE71A00209AFDB10DF95C952BEEB7B8FB48305F50452AF900FB282D7789E45CB69
                                                      APIs
                                                        • Part of subcall function 004540B8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00499C8D,_iu,?,00000000,004541F2), ref: 004541A7
                                                        • Part of subcall function 004540B8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00499C8D,_iu,?,00000000,004541F2), ref: 004541B7
                                                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00499B39
                                                      • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00499C8D), ref: 00499B5A
                                                      • CreateWindowExA.USER32(00000000,STATIC,00499C9C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00499B81
                                                      • SetWindowLongA.USER32(?,000000FC,00499314), ref: 00499B94
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00499C60,?,?,000000FC,00499314,00000000,STATIC,00499C9C), ref: 00499BC4
                                                      • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00499C38
                                                      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00499C60,?,?,000000FC,00499314,00000000), ref: 00499C44
                                                        • Part of subcall function 0045452C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00454613
                                                      • DestroyWindow.USER32(?,00499C67,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00499C60,?,?,000000FC,00499314,00000000,STATIC), ref: 00499C5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                      • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                      • API String ID: 1549857992-2312673372
                                                      • Opcode ID: 6d8643aa58682e844a2661fba7b77c03e51012a98f338dc7a5e1e487ecee0865
                                                      • Instruction ID: eb5cd57210df4e96fe4a968102c50da815bdab5ab87cf2bc8b3503f8df2cfa0e
                                                      • Opcode Fuzzy Hash: 6d8643aa58682e844a2661fba7b77c03e51012a98f338dc7a5e1e487ecee0865
                                                      • Instruction Fuzzy Hash: 36414170A00208AFDF00EBA9DD42F9E7BF8EB09704F11457AF510F7291D6799E008B68
                                                      APIs
                                                      • GetActiveWindow.USER32 ref: 0042F660
                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F674
                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F681
                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F68E
                                                      • GetWindowRect.USER32(?,00000000), ref: 0042F6DA
                                                      • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F718
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                      • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                      • API String ID: 2610873146-3407710046
                                                      • Opcode ID: 5e6605ca9b65c224cfc07a0aeee16f59c7bd4f650269865c0fd0a92bfb0552d7
                                                      • Instruction ID: 4fddece845ce4b02eeba35f690bf3974305695bca327a465bc6d277b32236c01
                                                      • Opcode Fuzzy Hash: 5e6605ca9b65c224cfc07a0aeee16f59c7bd4f650269865c0fd0a92bfb0552d7
                                                      • Instruction Fuzzy Hash: F721C2B67006146BD300EA78EC85F3B77A9DBD4710F98463AF944DB382DA78EC084B59
                                                      APIs
                                                      • GetActiveWindow.USER32 ref: 00463DF0
                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 00463E04
                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00463E11
                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00463E1E
                                                      • GetWindowRect.USER32(?,00000000), ref: 00463E6A
                                                      • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00463EA8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                      • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                      • API String ID: 2610873146-3407710046
                                                      • Opcode ID: ed5e1d45ac9973ee0f07f934d57a4fe524cf0ba1ee310df62ebcfe77385b1581
                                                      • Instruction ID: 5546c7ca55dac75a37d5be63b5862a2b7bf7fa91672d6aed0c393ab4f47302e1
                                                      • Opcode Fuzzy Hash: ed5e1d45ac9973ee0f07f934d57a4fe524cf0ba1ee310df62ebcfe77385b1581
                                                      • Instruction Fuzzy Hash: 5821B0B67006146BD300AB68CC41F3B76D9DB84B01F08452EF944DB382EA79ED018B6A
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,1002CA78,0000000C,10018084,00000000,00000000), ref: 10017F83
                                                      • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 10017FAC
                                                      • GetProcAddress.KERNEL32(?,DecodePointer), ref: 10017FBC
                                                      • InterlockedIncrement.KERNEL32(100307F8), ref: 10017FDE
                                                      • __lock.LIBCMT ref: 10017FE6
                                                      • ___addlocaleref.LIBCMT ref: 10018005
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                                      • String ID: DecodePointer$EncodePointer$KERNEL32.DLL$"v`"v
                                                      • API String ID: 1036688887-692071613
                                                      • Opcode ID: 3f20a19357eba5985217602ee77d158d2a606d63a4b219b98e3f025795f53c83
                                                      • Instruction ID: 9060a6127f4207b7e65ad4c3e7cfb46c24e1f6a2e98670233e345eb60a1aaef3
                                                      • Opcode Fuzzy Hash: 3f20a19357eba5985217602ee77d158d2a606d63a4b219b98e3f025795f53c83
                                                      • Instruction Fuzzy Hash: CC11AC70800705AFE751CF39C884BAABBE0FF04341F104519F5AA9B250CB75EA80CF50
                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045968B,?,00000000,004596EE,?,?,022F3858,00000000), ref: 00459509
                                                      • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,022F3858,?,00000000,00459620,?,00000000,00000001,00000000,00000000,00000000,0045968B), ref: 00459566
                                                      • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,022F3858,?,00000000,00459620,?,00000000,00000001,00000000,00000000,00000000,0045968B), ref: 00459573
                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004595BF
                                                      • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004595F9,?,-00000020,0000000C,-00004034,00000014,022F3858,?,00000000,00459620,?,00000000), ref: 004595E5
                                                      • GetLastError.KERNEL32(?,?,00000000,00000001,004595F9,?,-00000020,0000000C,-00004034,00000014,022F3858,?,00000000,00459620,?,00000000), ref: 004595EC
                                                        • Part of subcall function 00453C98: GetLastError.KERNEL32(00000000,0045482D,00000005,00000000,00454862,?,?,00000000,0049E62C,00000004,00000000,00000000,00000000,?,0049B229,00000000), ref: 00453C9B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                      • String ID: CreateEvent$TransactNamedPipe
                                                      • API String ID: 2182916169-3012584893
                                                      • Opcode ID: 94d023d1efa5da9e2e7dcefe1a5b2e09118226f8c9a71aaece0e626b0ff6e101
                                                      • Instruction ID: 5e3c9d9fc8331b786f0ce76ad2fce8520c17318b204ac54c9f287bbe44ec3061
                                                      • Opcode Fuzzy Hash: 94d023d1efa5da9e2e7dcefe1a5b2e09118226f8c9a71aaece0e626b0ff6e101
                                                      • Instruction Fuzzy Hash: 8B418D71A00608FFDB05DFA5C981F9EB7F9EB48714F1140A6F900E7692D6789E54CB28
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,004576B5,?,?,00000031,?), ref: 00457578
                                                      • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 0045757E
                                                      • LoadTypeLib.OLEAUT32(00000000,?), ref: 004575CB
                                                        • Part of subcall function 00453C98: GetLastError.KERNEL32(00000000,0045482D,00000005,00000000,00454862,?,?,00000000,0049E62C,00000004,00000000,00000000,00000000,?,0049B229,00000000), ref: 00453C9B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorHandleLastLoadModuleProcType
                                                      • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                      • API String ID: 1914119943-2711329623
                                                      • Opcode ID: ff49ab651ffec048b27d6f6959800377bf6d0acb4d7fd8ae53fc314732ae47ad
                                                      • Instruction ID: 6576a6400b1684fe66b120d0c5268abc33dc5c30e9c8dd9853542a513f4dec10
                                                      • Opcode Fuzzy Hash: ff49ab651ffec048b27d6f6959800377bf6d0acb4d7fd8ae53fc314732ae47ad
                                                      • Instruction Fuzzy Hash: 2931B471604A04AFC711EFAADC41E5B77ADEB8C7157108476F804D3652DA38D904C728
                                                      APIs
                                                      • GetDC.USER32 ref: 100104F2
                                                      • SelectObject.GDI32(00000000), ref: 10010535
                                                      • GetTextExtentPoint32A.GDI32(00000000,?,?,?), ref: 1001056D
                                                      • ReleaseDC.USER32(0000000F,00000000), ref: 10010575
                                                      • GetWindowRect.USER32(0000000F,EC6CF6C6), ref: 10010581
                                                      • GetParent.USER32(0000000F), ref: 1001058F
                                                      • MapWindowPoints.USER32(00000000,00000000,?,?), ref: 10010598
                                                      • MoveWindow.USER32(0000000F,?,0000000F,?,?,00000000,?,?,LabelFont,00000009), ref: 100105B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ExtentMoveObjectParentPoint32PointsRectReleaseSelectText
                                                      • String ID: LabelFont
                                                      • API String ID: 2456833781-2346607873
                                                      • Opcode ID: 99c668a871bbe5cc709cd7bb5e333109b8f6eb540549ca3f4639c057d6a964e4
                                                      • Instruction ID: 281e42c5f0357acdef57f98bfcf6bb07947ba3ee88405b598c6744b60f13115c
                                                      • Opcode Fuzzy Hash: 99c668a871bbe5cc709cd7bb5e333109b8f6eb540549ca3f4639c057d6a964e4
                                                      • Instruction Fuzzy Hash: E53137B6108344AFE300CB65CC89F6BBBF9FB89740F00491DF69686290DB75E945CB62
                                                      APIs
                                                      • GetActiveWindow.USER32 ref: 0042FA6F
                                                      • GetFocus.USER32 ref: 0042FA77
                                                      • RegisterClassA.USER32(0049C7AC), ref: 0042FA98
                                                      • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042FB6C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042FAD6
                                                      • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042FB1C
                                                      • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042FB2D
                                                      • SetFocus.USER32(00000000,00000000,0042FB4F,?,?,?,00000001,00000000,?,00458BE2,00000000,0049E62C), ref: 0042FB34
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                      • String ID: ,I$TWindowDisabler-Window
                                                      • API String ID: 3167913817-1404624659
                                                      • Opcode ID: 24ffb5fbcd7dd1ef6c63b7291c4452f377a861dd0971578668a22e4c8ebfd3f1
                                                      • Instruction ID: a62ceaa4fb40b7d97b276e036e96e71c03e0c95da72a7b9a05d0a528f526b251
                                                      • Opcode Fuzzy Hash: 24ffb5fbcd7dd1ef6c63b7291c4452f377a861dd0971578668a22e4c8ebfd3f1
                                                      • Instruction Fuzzy Hash: A9218171B80710BAE210EB66DD13F1A7AA4EB14B04FE1413BF604BB2D1D7B97D0586AD
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E9AD,?,00000000,00480920,00000000), ref: 0042E8D1
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E8D7
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E9AD,?,00000000,00480920,00000000), ref: 0042E925
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressCloseHandleModuleProc
                                                      • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                      • API String ID: 4190037839-2401316094
                                                      • Opcode ID: 87b4461b7e86ce2d6717f7211101c23f211bba0a86979a7a1627f41e5905d31e
                                                      • Instruction ID: cdd838938204d4cbb06352ad172040986bb4042bf6ca521554dfda5889237b72
                                                      • Opcode Fuzzy Hash: 87b4461b7e86ce2d6717f7211101c23f211bba0a86979a7a1627f41e5905d31e
                                                      • Instruction Fuzzy Hash: 7F212170B00229AFDB50EBA7DC46BAE77A9EB04304F904477A500E7291DB7C9E45DB1C
                                                      APIs
                                                      • RectVisible.GDI32(?,?), ref: 004172A3
                                                      • SaveDC.GDI32(?), ref: 004172B7
                                                      • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 004172DA
                                                      • RestoreDC.GDI32(?,?), ref: 004172F5
                                                      • CreateSolidBrush.GDI32(00000000), ref: 00417375
                                                      • FrameRect.USER32(?,?,?), ref: 004173A8
                                                      • DeleteObject.GDI32(?), ref: 004173B2
                                                      • CreateSolidBrush.GDI32(00000000), ref: 004173C2
                                                      • FrameRect.USER32(?,?,?), ref: 004173F5
                                                      • DeleteObject.GDI32(?), ref: 004173FF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                      • String ID:
                                                      • API String ID: 375863564-0
                                                      • Opcode ID: 7bfe991a36dcdb6d07b2c5d263508ec22064ddef5b3951d7b605cb29af9b978a
                                                      • Instruction ID: c95a734d2d00aea9c177a3b06cfd5000d642d04c6817e823e80f404ee62f0a93
                                                      • Opcode Fuzzy Hash: 7bfe991a36dcdb6d07b2c5d263508ec22064ddef5b3951d7b605cb29af9b978a
                                                      • Instruction Fuzzy Hash: 8B513A716086445FDB51EF69C8C0B9B77E8AF48314F1445AAFD488B287C738EC82CB99
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                      • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                      • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                      • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                      • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                      • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                      • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                      • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                      • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                      • String ID:
                                                      • API String ID: 1694776339-0
                                                      • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                      • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                      • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                      • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                      APIs
                                                      • GetSystemMenu.USER32(00000000,00000000), ref: 004226C3
                                                      • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004226E1
                                                      • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226EE
                                                      • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004226FB
                                                      • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422708
                                                      • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422715
                                                      • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422722
                                                      • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042272F
                                                      • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042274D
                                                      • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422769
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$EnableItem$System
                                                      • String ID:
                                                      • API String ID: 3985193851-0
                                                      • Opcode ID: b633a805c3dfefc2d241534ae929bcf98399df6f62762c46efeb8f5b5c6a909e
                                                      • Instruction ID: 3d3520f8b7ec6d74ae20e05d6755b86abcf69838e80cbfb0a1e170c33371412b
                                                      • Opcode Fuzzy Hash: b633a805c3dfefc2d241534ae929bcf98399df6f62762c46efeb8f5b5c6a909e
                                                      • Instruction Fuzzy Hash: 4F2124703447047AE720E725DD8BFAB7AD89B04B08F044065B6447F2D3C6F8EA40869C
                                                      APIs
                                                      • ShowWindow.USER32(?,00000000,?,BackButton,0000000A), ref: 10010955
                                                      • ShowWindow.USER32(?,00000000,?,GIBackButton,0000000C,?,00000000,?,BackButton,0000000A), ref: 100109AB
                                                      • EnableWindow.USER32(?,00000001), ref: 10010A5E
                                                        • Part of subcall function 10005410: std::_String_base::_Xlen.LIBCPMT ref: 10005469
                                                        • Part of subcall function 10005410: _memcpy_s.LIBCMT ref: 100054B1
                                                      • SendMessageA.USER32(0000000C,00000111,00000000), ref: 10010AF1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$EnableMessageSendString_base::_Xlen_memcpy_sstd::_
                                                      • String ID: BackButton$GIBackButton$NextButton$WizardForm
                                                      • API String ID: 1250478854-632213285
                                                      • Opcode ID: f518be628fc89083a205aecc11afebb976eae7cab70e9f0e6d992759e14a0fa0
                                                      • Instruction ID: b5166d1e5549dd6fe6437059c59fad26e7fe04a203249b2ac3f2f1059db3dd5c
                                                      • Opcode Fuzzy Hash: f518be628fc89083a205aecc11afebb976eae7cab70e9f0e6d992759e14a0fa0
                                                      • Instruction Fuzzy Hash: A0716CB55187809FE314CF64C895A5BFBE8EB84714F500A1EF2A5472A1CBB4D484CF93
                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00483DA9
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00483DBD
                                                      • SendNotifyMessageA.USER32(000203D4,00000496,00002710,00000000), ref: 00483E2F
                                                      Strings
                                                      • Restarting Windows., xrefs: 00483E0A
                                                      • Not restarting Windows because Setup is being run from the debugger., xrefs: 00483DDE
                                                      • GetCustomSetupExitCode, xrefs: 00483C49
                                                      • DeinitializeSetup, xrefs: 00483CA5
                                                      • Deinitializing Setup., xrefs: 00483C0A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary$MessageNotifySend
                                                      • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                      • API String ID: 3817813901-1884538726
                                                      • Opcode ID: 186ee2886046f9b43122ab043af96f7ec1ee3d20723b54ac4271aa589e2f1f9d
                                                      • Instruction ID: eabafc25287b198f6322efd67ece7b763d9c4378165dc3fe8608e6ffeb49dec3
                                                      • Opcode Fuzzy Hash: 186ee2886046f9b43122ab043af96f7ec1ee3d20723b54ac4271aa589e2f1f9d
                                                      • Instruction Fuzzy Hash: 4451B030700240AFD710EF79D885B5E77E4EB29B09F50887BE800D72A1DB38AE49CB19
                                                      APIs
                                                      • SHGetMalloc.SHELL32(?), ref: 004629AF
                                                      • GetActiveWindow.USER32 ref: 00462A13
                                                      • CoInitialize.OLE32(00000000), ref: 00462A27
                                                      • SHBrowseForFolder.SHELL32(?), ref: 00462A3E
                                                      • CoUninitialize.OLE32(00462A7F,00000000,?,?,?,?,?,00000000,00462B03), ref: 00462A53
                                                      • SetActiveWindow.USER32(?,00462A7F,00000000,?,?,?,?,?,00000000,00462B03), ref: 00462A69
                                                      • SetActiveWindow.USER32(?,?,00462A7F,00000000,?,?,?,?,?,00000000,00462B03), ref: 00462A72
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                      • String ID: A
                                                      • API String ID: 2684663990-3554254475
                                                      • Opcode ID: 14be21f0889e27b63cff27c6b7920ac038a1d1e6a07f323e9ad5f5bcee8464c4
                                                      • Instruction ID: 226cd12c2bf5eadadc06a8ace2d3cfe2a2dab59726cbcd1c1d639dda9b16e66d
                                                      • Opcode Fuzzy Hash: 14be21f0889e27b63cff27c6b7920ac038a1d1e6a07f323e9ad5f5bcee8464c4
                                                      • Instruction Fuzzy Hash: 2A3130B0E00208AFCB10EFB6D945A9EBBF8EB09304F51447AF414F7251E7789A04CB69
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,00474419,?,?,?,00000008,00000000,00000000,00000000,?,00474675,?,?,00000000,004748F8), ref: 0047437C
                                                        • Part of subcall function 0042D224: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042D29A
                                                        • Part of subcall function 004073E0: DeleteFileA.KERNEL32(00000000,0049E62C,0049B575,00000000,0049B5CA,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073EB
                                                      • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00474419,?,?,?,00000008,00000000,00000000,00000000,?,00474675), ref: 004743F3
                                                      • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00474419,?,?,?,00000008,00000000,00000000,00000000), ref: 004743F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                      • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                      • API String ID: 884541143-1710247218
                                                      • Opcode ID: 147003ba7c3bbf40b2bfbdba997664b3f04ddcc797e79a53afdb41a85b012f1f
                                                      • Instruction ID: 4e84a14b44ef1bdc1f764160ca150a50166b9b0d2b2f0232ddeafb405eb560a8
                                                      • Opcode Fuzzy Hash: 147003ba7c3bbf40b2bfbdba997664b3f04ddcc797e79a53afdb41a85b012f1f
                                                      • Instruction Fuzzy Hash: 2311C8307005147BD711E6659C82BAF73ADDB84758F60C17BF804A72C2DB3C9E02966D
                                                      APIs
                                                      • GetSystemMetrics.USER32(0000000E), ref: 00419100
                                                      • GetSystemMetrics.USER32(0000000D), ref: 00419108
                                                      • 6FBC2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 0041910E
                                                        • Part of subcall function 00410C88: 6FBBC400.COMCTL32(,I,000000FF,00000000,0041913C,00000000,00419198,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00410C8C
                                                      • 6FC2CB00.COMCTL32(,I,00000000,00000000,00000000,00000000,00419198,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 0041915E
                                                      • 6FC2C740.COMCTL32(00000000,?,,I,00000000,00000000,00000000,00000000,00419198,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00419169
                                                      • 6FC2CB00.COMCTL32(,I,00000001,?,?,00000000,?,,I,00000000,00000000,00000000,00000000,00419198,?,00000000,0000000D,00000000), ref: 0041917C
                                                      • 6FBC0860.COMCTL32(,I,0041919F,?,00000000,?,,I,00000000,00000000,00000000,00000000,00419198,?,00000000,0000000D,00000000,0000000E), ref: 00419192
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$C0860C2980C400C740
                                                      • String ID: ,I
                                                      • API String ID: 624341609-3697734810
                                                      • Opcode ID: 99d237f4e6602aa4adb10bbba9f27b4049ed62bd4d0bb7e82590963255ca77bb
                                                      • Instruction ID: 6bf9c1d71f03a7720a29bcea3f2ffb204bbf738efc2d09f76f7aaa5da4135df4
                                                      • Opcode Fuzzy Hash: 99d237f4e6602aa4adb10bbba9f27b4049ed62bd4d0bb7e82590963255ca77bb
                                                      • Instruction Fuzzy Hash: D0116675744304BBEB14EBA5DC83F9E73A8EB04B04F50456AF604E72D1E6B99D808B58
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045DB4D
                                                      • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045DB5D
                                                      • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045DB6D
                                                      • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045DB7D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                      • API String ID: 190572456-3516654456
                                                      • Opcode ID: 58de473dedc02e4961c84a33a0f5d680adc4af31b5539a839239541ecf730d78
                                                      • Instruction ID: 6393fdd59b419d4e4f2c5b3e50f991f6d57498fd626e4870853c8bb2a7f4f2ae
                                                      • Opcode Fuzzy Hash: 58de473dedc02e4961c84a33a0f5d680adc4af31b5539a839239541ecf730d78
                                                      • Instruction Fuzzy Hash: 1101FFB0D00600DBE724EF369C4672636EAAFA4706F15C43BAD49D66A3E778548CCE1C
                                                      APIs
                                                      • SetBkColor.GDI32(?,00000000), ref: 0041AE49
                                                      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041AE83
                                                      • SetBkColor.GDI32(?,?), ref: 0041AE98
                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AEE2
                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0041AEED
                                                      • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AEFD
                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AF3C
                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0041AF46
                                                      • SetBkColor.GDI32(00000000,?), ref: 0041AF53
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Color$StretchText
                                                      • String ID:
                                                      • API String ID: 2984075790-0
                                                      • Opcode ID: c0d5bcb4e3e136d56fdad79d14bcb2504c33fc8a74749fbb00da5e049b323106
                                                      • Instruction ID: cd8b06f21d39e7e3a7e3fb9164a1477e2cec4af8eaf2e363a2f859aea8ea57af
                                                      • Opcode Fuzzy Hash: c0d5bcb4e3e136d56fdad79d14bcb2504c33fc8a74749fbb00da5e049b323106
                                                      • Instruction Fuzzy Hash: 5B61B4B5A00515EFCB40EFADD985E9AB7F9EF08314B1481AAF518DB251C734ED408BA8
                                                      APIs
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                      • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458B08,?, /s ",?,regsvr32.exe",?,00458B08), ref: 00458A7A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseDirectoryHandleSystem
                                                      • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                      • API String ID: 2051275411-1862435767
                                                      • Opcode ID: 88a8ecc116849fa22b3bf7709861da5fee82e83137093402862dacaf9fb7c2de
                                                      • Instruction ID: 80d87ab17c090028f18ddd9dc69d9a9522a7783b235ef4a64a7d04e5292bd67e
                                                      • Opcode Fuzzy Hash: 88a8ecc116849fa22b3bf7709861da5fee82e83137093402862dacaf9fb7c2de
                                                      • Instruction Fuzzy Hash: 8341E470E003486BDB11EF95C842B9DB7B9AF45305F50407FB904BB296DF78AE098B59
                                                      APIs
                                                      • OffsetRect.USER32(?,00000001,00000001), ref: 0044D815
                                                      • GetSysColor.USER32(00000014), ref: 0044D81C
                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0044D834
                                                      • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D85D
                                                      • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D867
                                                      • GetSysColor.USER32(00000010), ref: 0044D86E
                                                      • SetTextColor.GDI32(00000000,00000000), ref: 0044D886
                                                      • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D8AF
                                                      • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D8DA
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Text$Color$Draw$OffsetRect
                                                      • String ID:
                                                      • API String ID: 1005981011-0
                                                      • Opcode ID: 70c625a45f7822c9c0c8d15dcd55c3925e6146c24073cdeca57399263d9d2978
                                                      • Instruction ID: 7afddb25c4ac74ad42c6f663f4adf30dc2f4b2673d3e6822d8b2a46fb9ac5c49
                                                      • Opcode Fuzzy Hash: 70c625a45f7822c9c0c8d15dcd55c3925e6146c24073cdeca57399263d9d2978
                                                      • Instruction Fuzzy Hash: AB21AFB46015047FD700FB2ACD8AE9B7BECDF19319B00457A7914EB393C678DE408669
                                                      APIs
                                                        • Part of subcall function 00451104: SetEndOfFile.KERNEL32(?,?,0045CBD2,00000000,0045CD5D,?,00000000,00000002,00000002), ref: 0045110B
                                                        • Part of subcall function 004073E0: DeleteFileA.KERNEL32(00000000,0049E62C,0049B575,00000000,0049B5CA,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073EB
                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 004993F1
                                                      • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00499405
                                                      • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 0049941F
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 0049942B
                                                      • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00499431
                                                      • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00499444
                                                      Strings
                                                      • Deleting Uninstall data files., xrefs: 00499367
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                      • String ID: Deleting Uninstall data files.
                                                      • API String ID: 1570157960-2568741658
                                                      • Opcode ID: 3a776e577e820ddaef14c7e250d16aa821cc1e2dd83993fe724374ff748e9082
                                                      • Instruction ID: b7a2e365abb4ca1ce7a24153babf5e0292396e8760e8134f6a37584f4bf7a1e8
                                                      • Opcode Fuzzy Hash: 3a776e577e820ddaef14c7e250d16aa821cc1e2dd83993fe724374ff748e9082
                                                      • Instruction Fuzzy Hash: 8F214470708200AFEB21EF7AEC86B163798DB58759F11453FB901DA1E3D6789C05DA1D
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00471B5D,?,?,?,?,00000000), ref: 00471AC7
                                                      • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00471B5D), ref: 00471ADE
                                                      • AddFontResourceA.GDI32(00000000), ref: 00471AFB
                                                      • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00471B0F
                                                      Strings
                                                      • Failed to set value in Fonts registry key., xrefs: 00471AD0
                                                      • AddFontResource, xrefs: 00471B19
                                                      • Failed to open Fonts registry key., xrefs: 00471AE5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                      • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                      • API String ID: 955540645-649663873
                                                      • Opcode ID: 84f6a41e8c6dd6550177eab81c252e77b7800c9e9bc3319483211bedbc9b2c33
                                                      • Instruction ID: e418864d87a496604354a2259d3816e8ecf3f11e764263395734e4855b1f90ef
                                                      • Opcode Fuzzy Hash: 84f6a41e8c6dd6550177eab81c252e77b7800c9e9bc3319483211bedbc9b2c33
                                                      • Instruction Fuzzy Hash: 5B2181707402047BDB10EA6A9C42F9A679CDB45704F60C077B904EB3D2EA7CED05966D
                                                      APIs
                                                      • __CxxThrowException@8.LIBCMT ref: 1000B87D
                                                        • Part of subcall function 1001621B: RaiseException.KERNEL32(?,?,10014774,?,?,?,?,?,10014774,?,1002D024,10031A64), ref: 1001625B
                                                      • __CxxThrowException@8.LIBCMT ref: 1000B8C1
                                                      • __CxxThrowException@8.LIBCMT ref: 1000B905
                                                      • __CxxThrowException@8.LIBCMT ref: 1000B944
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                      • API String ID: 3476068407-1866435925
                                                      • Opcode ID: 0d6574c4b8d0f2852891c05f094d968911462884a2713bd0ad415edaf70bf12b
                                                      • Instruction ID: cd146272872ced55ef4406843b970657603d59c2871c0bf75d2210d99da4f7f1
                                                      • Opcode Fuzzy Hash: 0d6574c4b8d0f2852891c05f094d968911462884a2713bd0ad415edaf70bf12b
                                                      • Instruction Fuzzy Hash: 9B315CB5018B44AEE314DF54DC42F9BB7E8FB89380F808A1DF29946191EF74A509CB66
                                                      APIs
                                                        • Part of subcall function 004168A0: GetClassInfoA.USER32(00400000,?,?), ref: 0041690F
                                                        • Part of subcall function 004168A0: UnregisterClassA.USER32(?,00400000), ref: 0041693B
                                                        • Part of subcall function 004168A0: RegisterClassA.USER32(?), ref: 0041695E
                                                      • GetVersion.KERNEL32 ref: 00464254
                                                      • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00464292
                                                      • SHGetFileInfo.SHELL32(00464330,00000000,?,00000160,00004011), ref: 004642AF
                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 004642CD
                                                      • SetCursor.USER32(00000000,00000000,00007F02,00464330,00000000,?,00000160,00004011), ref: 004642D3
                                                      • SetCursor.USER32(?,00464313,00007F02,00464330,00000000,?,00000160,00004011), ref: 00464306
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                      • String ID: Explorer
                                                      • API String ID: 2594429197-512347832
                                                      • Opcode ID: e4246b70e64443b15e1828aa2d441563241c4fbc43c60fe3ab0de6d9b0488d6c
                                                      • Instruction ID: b3b98aa5a53488e53f8304eecf0dc9993ee5463f80e55bafd62bb8cbb11790a6
                                                      • Opcode Fuzzy Hash: e4246b70e64443b15e1828aa2d441563241c4fbc43c60fe3ab0de6d9b0488d6c
                                                      • Instruction Fuzzy Hash: 4321BB307403046AFF11BBB65C47B9A76989B45708F5040BBBA05EB2C3D9BD5851866D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,022F7A28,?,?,?,022F7A28,0047A6A8,00000000,0047A7C6,?,?,?,?), ref: 0047A4FD
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047A503
                                                      • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,022F7A28,?,?,?,022F7A28,0047A6A8,00000000,0047A7C6,?,?,?,?), ref: 0047A516
                                                      • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,022F7A28,?,?,?,022F7A28), ref: 0047A540
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,022F7A28,0047A6A8,00000000,0047A7C6,?,?,?,?), ref: 0047A55E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                      • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                      • API String ID: 2704155762-2318956294
                                                      • Opcode ID: f6e096ca0daf558875fc081709d481464f2ae0a0495a8f950f35fc7622461238
                                                      • Instruction ID: 4c547af52153d5fc494c8abbb987ccd3797ba2b79672919e7250df90ec71fc91
                                                      • Opcode Fuzzy Hash: f6e096ca0daf558875fc081709d481464f2ae0a0495a8f950f35fc7622461238
                                                      • Instruction Fuzzy Hash: 54019291B4070476E520717A4C86BBF264C8BD4769F248137BB1CFE2D2E9AD992601AF
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,0045A81E,?,00000000,00000000,00000000,?,00000006,?,00000000,0049A6E1,?,00000000,0049A784), ref: 0045A762
                                                        • Part of subcall function 00454BF0: FindClose.KERNEL32(000000FF,00454CE6), ref: 00454CD5
                                                      Strings
                                                      • Stripped read-only attribute., xrefs: 0045A724
                                                      • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A73C
                                                      • Deleting directory: %s, xrefs: 0045A6EB
                                                      • Failed to strip read-only attribute., xrefs: 0045A730
                                                      • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A7D7
                                                      • Failed to delete directory (%d). Will retry later., xrefs: 0045A77B
                                                      • Failed to delete directory (%d)., xrefs: 0045A7F8
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorFindLast
                                                      • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                      • API String ID: 754982922-1448842058
                                                      • Opcode ID: 5346217df39339977b51ae0a3ca3b2b9cdfea47d40e409fafac5e4da8c828573
                                                      • Instruction ID: ed451348c7d3678a4819a833a09a40bf82a586c96773c367329f7393d5e0e002
                                                      • Opcode Fuzzy Hash: 5346217df39339977b51ae0a3ca3b2b9cdfea47d40e409fafac5e4da8c828573
                                                      • Instruction Fuzzy Hash: 9441A734A101189BCB00EB6988417AE76A59F89306F55867FAC01E7383DB7CCA1D875F
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0042991A
                                                      • GetTextMetricsA.GDI32(00000000), ref: 00429923
                                                        • Part of subcall function 0041A678: CreateFontIndirectA.GDI32(?), ref: 0041A737
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00429932
                                                      • GetTextMetricsA.GDI32(00000000,?), ref: 0042993F
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00429946
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0042994E
                                                      • GetSystemMetrics.USER32(00000006), ref: 00429973
                                                      • GetSystemMetrics.USER32(00000006), ref: 0042998D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                      • String ID:
                                                      • API String ID: 1583807278-0
                                                      • Opcode ID: fcd26ccfdf6108e84c8416210a92b931db41bfea8d69a3a7f30610f4478b51e7
                                                      • Instruction ID: 064b8ceea34646deb673d9898a5f132a00f345b4bbd4d539d92df2c89931976d
                                                      • Opcode Fuzzy Hash: fcd26ccfdf6108e84c8416210a92b931db41bfea8d69a3a7f30610f4478b51e7
                                                      • Instruction Fuzzy Hash: 1801C4D17047112BF710B2B69CC2F6B5588DB84368F44053FFA869A3D3E97D9C80866E
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0041E2B7
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041E2C1
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041E2CE
                                                      • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041E2DD
                                                      • GetStockObject.GDI32(00000007), ref: 0041E2EB
                                                      • GetStockObject.GDI32(00000005), ref: 0041E2F7
                                                      • GetStockObject.GDI32(0000000D), ref: 0041E303
                                                      • LoadIconA.USER32(00000000,00007F00), ref: 0041E314
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                      • String ID:
                                                      • API String ID: 225703358-0
                                                      • Opcode ID: 23cce13aa5fe555fb55eaf4af2e89c8eae1af8f60db2075199e19e80c48d8f58
                                                      • Instruction ID: eda06bb9e73b08d19024368069479301758e63dc44a0e31fec7fdbc279e4b1ec
                                                      • Opcode Fuzzy Hash: 23cce13aa5fe555fb55eaf4af2e89c8eae1af8f60db2075199e19e80c48d8f58
                                                      • Instruction Fuzzy Hash: 8C112B70645301AAE740FF765996BAA3690D724708F40943BF604EF3D2DB7E5C418B6E
                                                      APIs
                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 00464738
                                                      • SetCursor.USER32(00000000,00000000,00007F02,00000000,004647CD), ref: 0046473E
                                                      • SetCursor.USER32(?,004647B5,00007F02,00000000,004647CD), ref: 004647A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load
                                                      • String ID: $ $Internal error: Item already expanding
                                                      • API String ID: 1675784387-1948079669
                                                      • Opcode ID: f0d8b3a22494a668e36ff372e63dbf03653d2e1c551dd02a847e0882ae5da109
                                                      • Instruction ID: 9cbbcba472df96bd09ce797c5f765fac8c2f652b56477a68fde2327aac6a5f51
                                                      • Opcode Fuzzy Hash: f0d8b3a22494a668e36ff372e63dbf03653d2e1c551dd02a847e0882ae5da109
                                                      • Instruction Fuzzy Hash: 8CB1C174600604DFDB20DF65C585B9BBBF0AF85308F1580ABE8459B792E778ED44CB1A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CountTick
                                                      • String ID: KB/s$MB/s$RemainingTime$Speed$Unknown
                                                      • API String ID: 536389180-3641574352
                                                      • Opcode ID: ab0434d183f243e0ed6e512f89f3685bdb81d8b3184551b64f2266404b659fb0
                                                      • Instruction ID: bd3edbe84073a581e45eb2bdc281081dc8067cdb59d34de02d3a8bd64a9b0f5b
                                                      • Opcode Fuzzy Hash: ab0434d183f243e0ed6e512f89f3685bdb81d8b3184551b64f2266404b659fb0
                                                      • Instruction Fuzzy Hash: 6CA1E2B19087809BD310EF28C845B4BBBF4FB88394F50896DF99447256DB31E548CBA3
                                                      APIs
                                                      • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00454613
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringWrite
                                                      • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                      • API String ID: 390214022-3304407042
                                                      • Opcode ID: ef2b37ecb60733e99519b8817963c481a42caec7a41d94771ca950514a75206d
                                                      • Instruction ID: c5648654d35dc4fa5992192bdfac3c74e0b4d15883e79a195514524b6fb94f40
                                                      • Opcode Fuzzy Hash: ef2b37ecb60733e99519b8817963c481a42caec7a41d94771ca950514a75206d
                                                      • Instruction Fuzzy Hash: D1912334A001099BDB01EFA5D841BDEB7F5EF89309F508467E900BB692D778AE49CB58
                                                      APIs
                                                      • GetStringTypeW.KERNEL32(00000001,10029470,00000001,?,?,?,00000200,?,?,?,1001EC2C,00000001,?,00000001,?,?), ref: 1001EA73
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,00000200,?,?,?,1001EC2C,00000001,?,00000001), ref: 1001EAEA
                                                      • __alloca_probe_16.LIBCMT ref: 1001EB0B
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiStringTypeWide__alloca_probe_16
                                                      • String ID:
                                                      • API String ID: 1485939849-0
                                                      • Opcode ID: f34b825662bd055eb4f319c4d7e12427de5614a4d18ce492dd3096f531484fda
                                                      • Instruction ID: 4bad496bf5ea3fb3bce38e9283f96bf0082282f14c9bb01bca957e4837ef70b6
                                                      • Opcode Fuzzy Hash: f34b825662bd055eb4f319c4d7e12427de5614a4d18ce492dd3096f531484fda
                                                      • Instruction Fuzzy Hash: 5D51D1715042D5DFD702CF24CC8199E7FA5FF0A3A8B6A04A9E941AA022D736DD95CB90
                                                      APIs
                                                      • GetSystemDefaultLCID.KERNEL32(00000000,00408DF8,?,?,?,?,00000000,00000000,00000000,?,00409DFF,00000000,00409E12), ref: 00408BCA
                                                        • Part of subcall function 004089F8: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049E4C4,00000001,?,00408AC3,?,00000000,00408BA2), ref: 00408A16
                                                        • Part of subcall function 00408A44: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00408C46,?,?,?,00000000,00408DF8), ref: 00408A57
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale$DefaultSystem
                                                      • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                      • API String ID: 1044490935-665933166
                                                      • Opcode ID: 9a7eb394a66080edfd24f68117555f400a3e3cdfc1c474aefde3fc5f2e1ccb78
                                                      • Instruction ID: 6e389ecbf5aa42e5faf75f2f0cdd2dfe5a993f3520af0ea01b43abf2a46df86b
                                                      • Opcode Fuzzy Hash: 9a7eb394a66080edfd24f68117555f400a3e3cdfc1c474aefde3fc5f2e1ccb78
                                                      • Instruction Fuzzy Hash: 20514E34B00148ABDB01EBAAC94169E676ADB98308F50947FB091BB7C7CE3CDA05975D
                                                      APIs
                                                      • GetVersion.KERNEL32(00000000,00411D89), ref: 00411C1C
                                                      • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 00411CDA
                                                        • Part of subcall function 00411F3C: CreatePopupMenu.USER32 ref: 00411F56
                                                      • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411D66
                                                        • Part of subcall function 00411F3C: CreateMenu.USER32 ref: 00411F60
                                                      • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00411D4D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Menu$Insert$Create$ItemPopupVersion
                                                      • String ID: ,$?
                                                      • API String ID: 2359071979-2308483597
                                                      • Opcode ID: 2e8e8ea7aa81c0bb070b735559dd4681aa84df17034fe18f9a62e23080711f87
                                                      • Instruction ID: 3fb5e0cd3bdc3201fae72ff24864c2251e092a1c83a82613ff871d7f09dca240
                                                      • Opcode Fuzzy Hash: 2e8e8ea7aa81c0bb070b735559dd4681aa84df17034fe18f9a62e23080711f87
                                                      • Instruction Fuzzy Hash: 82510674A00145ABDB10EF7ADD816DA7BF9AB09304F21417BFA04E73A6E738D941CB58
                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455A28,00455A28,?,00455A28,00000000), ref: 004559B6
                                                      • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455A28,00455A28,?,00455A28), ref: 004559C3
                                                        • Part of subcall function 00455778: WaitForInputIdle.USER32(?,00000032), ref: 004557A4
                                                        • Part of subcall function 00455778: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004557C6
                                                        • Part of subcall function 00455778: GetExitCodeProcess.KERNEL32(?,?), ref: 004557D5
                                                        • Part of subcall function 00455778: CloseHandle.KERNEL32(?,00455802,004557FB,?,?,?,00000000,?,?,004559D7,?,?,?,00000044,00000000,00000000), ref: 004557F5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                      • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                      • API String ID: 854858120-615399546
                                                      • Opcode ID: 507f094d76cd667aa2017d5ded2e4ab533ed5b9f1343ca21013152d5989c650d
                                                      • Instruction ID: 0bf838f29b43a6125692e3b7c5bec048a51817b33ba316f47a5a27346a6aee42
                                                      • Opcode Fuzzy Hash: 507f094d76cd667aa2017d5ded2e4ab533ed5b9f1343ca21013152d5989c650d
                                                      • Instruction Fuzzy Hash: 34518B7060074DABDB00EF95D892BEEBBB9AF44305F50453BB804B7292D77C5E098759
                                                      APIs
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 0041C3B8
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 0041C3C7
                                                      • GetBitmapBits.GDI32(?,?,?), ref: 0041C418
                                                      • GetBitmapBits.GDI32(?,?,?), ref: 0041C426
                                                      • DeleteObject.GDI32(?), ref: 0041C42F
                                                      • DeleteObject.GDI32(?), ref: 0041C438
                                                      • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041C455
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Object$BitmapBitsDelete$CreateIcon
                                                      • String ID:
                                                      • API String ID: 1030595962-0
                                                      • Opcode ID: ec19989a10235cbf9a1edf4f8eb35756c5d910f1ff26f4107efc2cfff39a000d
                                                      • Instruction ID: 503a746306143f5d70b37ccc37edd8169d972c8c437de2bc6362dd1504a2ea70
                                                      • Opcode Fuzzy Hash: ec19989a10235cbf9a1edf4f8eb35756c5d910f1ff26f4107efc2cfff39a000d
                                                      • Instruction Fuzzy Hash: 52511831E002199FCB14DFE9C8819EEB7F9EF48314B10852AF914E7391D638AD81CB64
                                                      APIs
                                                      • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041D38E
                                                      • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041D3AD
                                                      • SelectPalette.GDI32(?,?,00000001), ref: 0041D413
                                                      • RealizePalette.GDI32(?), ref: 0041D422
                                                      • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D48C
                                                      • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D4CA
                                                      • SelectPalette.GDI32(?,?,00000001), ref: 0041D4EF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                      • String ID:
                                                      • API String ID: 2222416421-0
                                                      • Opcode ID: 04b102cceab6519e9c3a92a55d02afe56828cc33fe19e53c7d712d938cb733d8
                                                      • Instruction ID: 994e6928e375576195bbff131da20e2633e51e8889d6c5a0b4bc55991cd6db0b
                                                      • Opcode Fuzzy Hash: 04b102cceab6519e9c3a92a55d02afe56828cc33fe19e53c7d712d938cb733d8
                                                      • Instruction Fuzzy Hash: 10512FB0A00604AFD714DFA9C985F9AB7F9EF08304F148599B959D7292C778ED80CB58
                                                      APIs
                                                      • SendMessageA.USER32(00000000,?,?), ref: 00457BBE
                                                        • Part of subcall function 0042470C: GetWindowTextA.USER32(?,?,00000100), ref: 0042472C
                                                        • Part of subcall function 0041F334: GetCurrentThreadId.KERNEL32 ref: 0041F383
                                                        • Part of subcall function 0041F334: EnumThreadWindows.USER32(00000000,0041F2E4,00000000), ref: 0041F389
                                                        • Part of subcall function 00424754: SetWindowTextA.USER32(?,00000000), ref: 0042476C
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457C25
                                                      • TranslateMessage.USER32(?), ref: 00457C43
                                                      • DispatchMessageA.USER32(?), ref: 00457C4C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                      • String ID: [Paused]
                                                      • API String ID: 1007367021-4230553315
                                                      • Opcode ID: 243bd422c61f2622546d11c945774c602dc8f4b1793521091e356525211c3557
                                                      • Instruction ID: 06e1226616be40fe5bc559768a91633e97e499603686e5a952697563b4c26b81
                                                      • Opcode Fuzzy Hash: 243bd422c61f2622546d11c945774c602dc8f4b1793521091e356525211c3557
                                                      • Instruction Fuzzy Hash: 523195319082485EDB12DBB5E841BDE7BF8DB49304F908077E810E7292D63C9909CB68
                                                      APIs
                                                      • GetCursor.USER32(00000000,0046CB0B), ref: 0046CA88
                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 0046CA96
                                                      • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046CB0B), ref: 0046CA9C
                                                      • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046CB0B), ref: 0046CAA6
                                                      • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046CB0B), ref: 0046CAAC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LoadSleep
                                                      • String ID: CheckPassword
                                                      • API String ID: 4023313301-1302249611
                                                      • Opcode ID: b011458cb729c60ce144568bfe133873a52670ccbc0d1a437788af54ec369301
                                                      • Instruction ID: dc4a4552949694c44ab81909cbfa5d37629526438aba0b0bd6801612213ae34e
                                                      • Opcode Fuzzy Hash: b011458cb729c60ce144568bfe133873a52670ccbc0d1a437788af54ec369301
                                                      • Instruction Fuzzy Hash: 10318234740244AFD711DB69C8CAFAA7BE4AF05304F5580B6B944AB3E2D778AE40CB49
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1000DF2B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1000DF51
                                                      • __CxxThrowException@8.LIBCMT ref: 1000DFE5
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 1000DFFA
                                                      • std::locale::facet::facet_Register.LIBCPMT ref: 1000E017
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: LockitLockit::_std::_$Exception@8RegisterThrowstd::locale::facet::facet_
                                                      • String ID: bad cast
                                                      • API String ID: 1988240374-3145022300
                                                      • Opcode ID: f3559da6f9a655964bb78822a0fd5d31394151d333624a8a656a7a23b482a4cc
                                                      • Instruction ID: 82230c7a271eec3862c11afaf12b5856b759d5043ab5025c21eddcf8d5082210
                                                      • Opcode Fuzzy Hash: f3559da6f9a655964bb78822a0fd5d31394151d333624a8a656a7a23b482a4cc
                                                      • Instruction Fuzzy Hash: 8F31B1354086119FE701DF14D891B9EB3E0FB44760F468A6EF8669B295DB30FC44CB92
                                                      APIs
                                                        • Part of subcall function 00479D08: GetWindowThreadProcessId.USER32(00000000), ref: 00479D10
                                                        • Part of subcall function 00479D08: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00479E07,0049F0AC,00000000), ref: 00479D23
                                                        • Part of subcall function 00479D08: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00479D29
                                                      • SendMessageA.USER32(00000000,0000004A,00000000,0047A19A), ref: 00479E15
                                                      • GetTickCount.KERNEL32 ref: 00479E5A
                                                      • GetTickCount.KERNEL32 ref: 00479E64
                                                      • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00479EB9
                                                      Strings
                                                      • CallSpawnServer: Unexpected response: $%x, xrefs: 00479E4A
                                                      • CallSpawnServer: Unexpected status: %d, xrefs: 00479EA2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                      • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                      • API String ID: 613034392-3771334282
                                                      • Opcode ID: 8f3ce9092d78e5e8ffb09c4fd0b96ce6ea02ef27a8c3c931be51606f83c456ff
                                                      • Instruction ID: d0290b535038f0b538ca996bd373034cc9ef5a4571df1c0a7e48467b85276075
                                                      • Opcode Fuzzy Hash: 8f3ce9092d78e5e8ffb09c4fd0b96ce6ea02ef27a8c3c931be51606f83c456ff
                                                      • Instruction Fuzzy Hash: 82319C34A102149ADB20EBB9C8867EEB7A59F44704F50843BB148EB382D67D8E41C7AD
                                                      APIs
                                                      • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045A0CF
                                                      Strings
                                                      • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045A0DA
                                                      • Failed to load .NET Framework DLL "%s", xrefs: 0045A0B4
                                                      • .NET Framework CreateAssemblyCache function failed, xrefs: 0045A0F2
                                                      • Fusion.dll, xrefs: 0045A06F
                                                      • CreateAssemblyCache, xrefs: 0045A0C6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                      • API String ID: 190572456-3990135632
                                                      • Opcode ID: 47528f8cc21b60fe5fd6cbfcf43eb270d72f12e503475e47cc24ebc3cb25aa49
                                                      • Instruction ID: 9a321e89453ba4f36132349ca91dc91ba75a1bd21e0a38aa57df13fbbf55b943
                                                      • Opcode Fuzzy Hash: 47528f8cc21b60fe5fd6cbfcf43eb270d72f12e503475e47cc24ebc3cb25aa49
                                                      • Instruction Fuzzy Hash: B831A970D006059BCB11EFA5C84169EF7B5AF44715F40867BE910A7382DB3C9A188799
                                                      APIs
                                                        • Part of subcall function 0041C4D8: GetObjectA.GDI32(?,00000018), ref: 0041C4E5
                                                      • GetFocus.USER32 ref: 0041C5F8
                                                      • GetDC.USER32(?), ref: 0041C604
                                                      • SelectPalette.GDI32(?,?,00000000), ref: 0041C625
                                                      • RealizePalette.GDI32(?), ref: 0041C631
                                                      • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C648
                                                      • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C670
                                                      • ReleaseDC.USER32(?,?), ref: 0041C67D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                      • String ID:
                                                      • API String ID: 3303097818-0
                                                      • Opcode ID: 06f70be5c2937d22c7d59323c1d4f85c74eb10055d491e17f779f64a32073242
                                                      • Instruction ID: 25388d08763cc31724119198cc62293da4a252d14e83de2780c9a5f0ba17a272
                                                      • Opcode Fuzzy Hash: 06f70be5c2937d22c7d59323c1d4f85c74eb10055d491e17f779f64a32073242
                                                      • Instruction Fuzzy Hash: C6116A71A40608BBDB10EBE9CC85FAFB7FCEF48700F15446AB518E7281D6789D008B68
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004860F4), ref: 004860D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                      • API String ID: 47109696-2530820420
                                                      • Opcode ID: c9539a08b2b853992093d52bd6a45a0801c08c2e485eb2d00d7f5d93e4191c3f
                                                      • Instruction ID: a713916a89d0883095a157a8cdf94fb09fad54fb56f7fa23aac7c7215c81ef38
                                                      • Opcode Fuzzy Hash: c9539a08b2b853992093d52bd6a45a0801c08c2e485eb2d00d7f5d93e4191c3f
                                                      • Instruction Fuzzy Hash: C411BF30604248AADB82FB65CC45B9FBBA9DB12314F524977A800E7283EB3DDE45871D
                                                      APIs
                                                      • EndDialog.USER32(?,?), ref: 10007CA3
                                                      • LoadIconA.USER32(00000000,00007F03), ref: 10007CC1
                                                      • GetDlgItem.USER32(?,000003EB), ref: 10007CDD
                                                      • SendMessageA.USER32(00000000), ref: 10007CE0
                                                      • GetDlgItem.USER32(?,00000005), ref: 10007CFB
                                                      • ShowWindow.USER32(00000000), ref: 10007CFE
                                                      • GetDlgItem.USER32(?,000003E9), ref: 10007D12
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Item$DialogIconLoadMessageSendShowWindow
                                                      • String ID:
                                                      • API String ID: 1615092200-0
                                                      • Opcode ID: 6a1520962860c77f87f3e153edca328fa580c06cbdb6d37fb6f67d641262e419
                                                      • Instruction ID: 908aa63a5ec54450efda2dd22186b3da308237a7a35ef60577aa1b2ce05e9d16
                                                      • Opcode Fuzzy Hash: 6a1520962860c77f87f3e153edca328fa580c06cbdb6d37fb6f67d641262e419
                                                      • Instruction Fuzzy Hash: 4D118275A04225AFF201DB25CC9DF6B37A9FF89741F104449F549DB2D5C7789902CB60
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00498385
                                                        • Part of subcall function 0041A678: CreateFontIndirectA.GDI32(?), ref: 0041A737
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004983A7
                                                      • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00498925), ref: 004983BB
                                                      • GetTextMetricsA.GDI32(00000000,?), ref: 004983DD
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004983FA
                                                      Strings
                                                      • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 004983B2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                      • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                      • API String ID: 2948443157-222967699
                                                      • Opcode ID: 40663912515a33d48857a7cc17ded0f9fd9d2e35270be9166755b58ff18b4f99
                                                      • Instruction ID: c67935f8e5cb56b1937036d64f6bf01096dd8c8546995d157710775fc85ec82d
                                                      • Opcode Fuzzy Hash: 40663912515a33d48857a7cc17ded0f9fd9d2e35270be9166755b58ff18b4f99
                                                      • Instruction Fuzzy Hash: 10018875604605AFEB00DFE9CC41F5FB7ECDB49704F51447AB500E7281EA78AD008B68
                                                      APIs
                                                        • Part of subcall function 0044CDAC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0044CDC4
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,0044CE9E,?,?,?,?,00000000,00000000), ref: 0044CE26
                                                      • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044CE37
                                                      • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044CE47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                      • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                      • API String ID: 2141747552-1050967733
                                                      • Opcode ID: 7ba4e215260a1174b67bd43160c3744282142a018bd3cfbd5bd7167bd4463890
                                                      • Instruction ID: a702f4643fe6e099115479b548097bfe9a63d2924ca5d738d996a727133e4afc
                                                      • Opcode Fuzzy Hash: 7ba4e215260a1174b67bd43160c3744282142a018bd3cfbd5bd7167bd4463890
                                                      • Instruction Fuzzy Hash: 65119170602308ABF710EFA2DCC2B5A77A8E794708F64047BA00066691D7BD99448A1D
                                                      APIs
                                                      • SelectObject.GDI32(00000000,?), ref: 0041B900
                                                      • SelectObject.GDI32(?,00000000), ref: 0041B90F
                                                      • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B93B
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0041B949
                                                      • SelectObject.GDI32(?,00000000), ref: 0041B957
                                                      • DeleteDC.GDI32(00000000), ref: 0041B960
                                                      • DeleteDC.GDI32(?), ref: 0041B969
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$Delete$Stretch
                                                      • String ID:
                                                      • API String ID: 1458357782-0
                                                      • Opcode ID: 9877176484a70d403600f1714a00c8a025884f8eac3cfbcae5058479fbc8ea05
                                                      • Instruction ID: 7af7168ee4e3f122af8b0d4427163761b09037522acd9a56f3a9582fc2e5d9ca
                                                      • Opcode Fuzzy Hash: 9877176484a70d403600f1714a00c8a025884f8eac3cfbcae5058479fbc8ea05
                                                      • Instruction Fuzzy Hash: F7117CB2E40559ABDF10D6D9D885FAFB7BCEF08304F004416B714FB241C678A8418B94
                                                      APIs
                                                      • GetCursorPos.USER32 ref: 0042383F
                                                      • WindowFromPoint.USER32(?,?), ref: 0042384C
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042385A
                                                      • GetCurrentThreadId.KERNEL32 ref: 00423861
                                                      • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042387A
                                                      • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423891
                                                      • SetCursor.USER32(00000000), ref: 004238A3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                      • String ID:
                                                      • API String ID: 1770779139-0
                                                      • Opcode ID: 70500f7dcf266beb48586870626c57fb13a9a50022589c1df5f619c5c3ec88b1
                                                      • Instruction ID: af43fee0338c9e624ebb6e65c196278dc7248109df2d757125d2dc099b9481b9
                                                      • Opcode Fuzzy Hash: 70500f7dcf266beb48586870626c57fb13a9a50022589c1df5f619c5c3ec88b1
                                                      • Instruction Fuzzy Hash: 4C01B16230431136D6207A795C86E2F26E8DFC5B19F50413FB509BE282DA3D8C00636D
                                                      APIs
                                                      • RtlInitializeCriticalSection.KERNEL32(0049E420,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                      • RtlEnterCriticalSection.KERNEL32(0049E420,0049E420,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                      • LocalAlloc.KERNEL32(00000000,00000FF8,0049E420,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                      • RtlLeaveCriticalSection.KERNEL32(0049E420,00401A89,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                      • String ID: `I$`I
                                                      • API String ID: 730355536-3984424023
                                                      • Opcode ID: 64002adec9d96eccb06c3eb006b1eb85ee1d021eaacb40bd1b5c7d4f0963175f
                                                      • Instruction ID: 94269b02b44d1611755d75869bdd1b1cad58823c34eb859de2800409b3eb1631
                                                      • Opcode Fuzzy Hash: 64002adec9d96eccb06c3eb006b1eb85ee1d021eaacb40bd1b5c7d4f0963175f
                                                      • Instruction Fuzzy Hash: BC01C070644240AEFB19EB6B98027253ED4D799748F11883BF440A6AF1CABD4840CB6E
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll), ref: 004981A8
                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 004981B5
                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 004981C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                      • API String ID: 667068680-2254406584
                                                      • Opcode ID: 5be428eabab937aecaf376b261ae7240ba502668b3757660f019f9de16c27e60
                                                      • Instruction ID: c24bc2e529edd3fc2f7d71c8166a3bd51aa09706bb3324dad5a4058a97bc4c43
                                                      • Opcode Fuzzy Hash: 5be428eabab937aecaf376b261ae7240ba502668b3757660f019f9de16c27e60
                                                      • Instruction Fuzzy Hash: D5F09662B81A1566DA20257E1C42A7B69CCCB87764F14017FBE44B7383EDAD8C0646BD
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,ISCryptGetVersion), ref: 0045DA21
                                                      • GetProcAddress.KERNEL32(00000000,ArcFourInit), ref: 0045DA31
                                                      • GetProcAddress.KERNEL32(00000000,ArcFourCrypt), ref: 0045DA41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                      • API String ID: 190572456-508647305
                                                      • Opcode ID: dde6d51f60abe5d0672bfaed80a86c2dd87a06dd1ae076193d4a680638cd494a
                                                      • Instruction ID: 1edccc56acb66b4562ddfa4c7a90d58ee85ee4b976394e257a4a6a33c45d2cf5
                                                      • Opcode Fuzzy Hash: dde6d51f60abe5d0672bfaed80a86c2dd87a06dd1ae076193d4a680638cd494a
                                                      • Instruction Fuzzy Hash: 52F01DB09056008BD314DF36AC45727379DEB98306F58803BA845D11A3E77A089CEA0C
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045DF21
                                                      • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DF31
                                                      • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DF41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc
                                                      • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                      • API String ID: 190572456-212574377
                                                      • Opcode ID: 1ba7f0a7f932c0f12d1df9f0648249643268a813f4c94efa46eb8b1189ec4832
                                                      • Instruction ID: c781611ed6df2ffd52f678218cea13a9d8474895aea0bca464552a1c0941260e
                                                      • Opcode Fuzzy Hash: 1ba7f0a7f932c0f12d1df9f0648249643268a813f4c94efa46eb8b1189ec4832
                                                      • Instruction Fuzzy Hash: 97F030B5E00300DEE724DF32AC0972336D9AFA4716F14803BA946D66A3D378444DCE2D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,0049C938,00457A81,00457E24,004579D8,00000000,00000B06,00000000,00000000,00000002,00000000,0048361D), ref: 0042EEC5
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EECB
                                                      • InterlockedExchange.KERNEL32(0049E66C,00000001), ref: 0042EEDC
                                                        • Part of subcall function 0042EE3C: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EF00,00000004,0049C938,00457A81,00457E24,004579D8,00000000,00000B06,00000000,00000000,00000002,00000000,0048361D), ref: 0042EE52
                                                        • Part of subcall function 0042EE3C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE58
                                                        • Part of subcall function 0042EE3C: InterlockedExchange.KERNEL32(0049E664,00000001), ref: 0042EE69
                                                      • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,0049C938,00457A81,00457E24,004579D8,00000000,00000B06,00000000,00000000,00000002,00000000,0048361D), ref: 0042EEF0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                      • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                      • API String ID: 142928637-2676053874
                                                      • Opcode ID: 927f38515658db31c7fed5d91d2e5f67c49424a855da097203f7ba78f6ca986b
                                                      • Instruction ID: d73472cc1cf9ee785b15135c95e247d87a8e276cbab312dacd1aac06db931f35
                                                      • Opcode Fuzzy Hash: 927f38515658db31c7fed5d91d2e5f67c49424a855da097203f7ba78f6ca986b
                                                      • Instruction Fuzzy Hash: 6BE01BB1750720E6EE10B7777C46FA72654DB64769F950437F100A51D1C7FE0C848A6D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,0049BAA8), ref: 0047AD9A
                                                      • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047ADA7
                                                      • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047ADB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                      • API String ID: 667068680-222143506
                                                      • Opcode ID: b45619e19b7df4f31f5a5e1e7913cc9e2f5992c7008335275ff0f295cd2b689d
                                                      • Instruction ID: e761ed85866ee686b9535240fc539701727dd680da56f3fb001ecc562e4fb54d
                                                      • Opcode Fuzzy Hash: b45619e19b7df4f31f5a5e1e7913cc9e2f5992c7008335275ff0f295cd2b689d
                                                      • Instruction Fuzzy Hash: 07C012E0680701AED610B7715C86D7E254DD550B1A320C03B7089B55C3D67C0C284F2D
                                                      APIs
                                                      • GetFocus.USER32 ref: 0041BBD5
                                                      • GetDC.USER32(?), ref: 0041BBE1
                                                      • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BC16
                                                      • RealizePalette.GDI32(00000000), ref: 0041BC22
                                                      • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC50
                                                      • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BC84
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Palette$Select$BitmapCreateFocusRealize
                                                      • String ID:
                                                      • API String ID: 3275473261-0
                                                      • Opcode ID: c95e916aea5b0b320e39deb2acbd71507781b42672567b85ab8b3b895a144eff
                                                      • Instruction ID: 6f3d196da8cc9963e266c073c65a40cf0d83fd4bf7ad6034c31d612a174a896e
                                                      • Opcode Fuzzy Hash: c95e916aea5b0b320e39deb2acbd71507781b42672567b85ab8b3b895a144eff
                                                      • Instruction Fuzzy Hash: 23511D70A00209AFDB11DFA9C895AEEBBF8FF49704F10446AF500A7750D7799D81CBA9
                                                      APIs
                                                      • GetFocus.USER32 ref: 0041BEA7
                                                      • GetDC.USER32(?), ref: 0041BEB3
                                                      • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BEED
                                                      • RealizePalette.GDI32(00000000), ref: 0041BEF9
                                                      • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BF1D
                                                      • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BF51
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Palette$Select$BitmapCreateFocusRealize
                                                      • String ID:
                                                      • API String ID: 3275473261-0
                                                      • Opcode ID: 9472f51cddc4c318b63d6c649322b096de862bc5fca767e6fe291a367ca23efe
                                                      • Instruction ID: d1d8e12ac76011fa0e11fd225ecf21e9d1788b3d06fe05564f2eab64f20773a9
                                                      • Opcode Fuzzy Hash: 9472f51cddc4c318b63d6c649322b096de862bc5fca767e6fe291a367ca23efe
                                                      • Instruction Fuzzy Hash: 28510875A00618AFCB11DFA9C891AEEBBF9EF49700F158066F504EB750D7389D40CBA8
                                                      APIs
                                                        • Part of subcall function 0042F2FC: GetTickCount.KERNEL32 ref: 0042F302
                                                        • Part of subcall function 0042F118: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042F14D
                                                      • GetLastError.KERNEL32(00000000,004776FD,?,?,0049F1E4,00000000), ref: 004775D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CountErrorFileLastMoveTick
                                                      • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx$Renaming uninstaller.$The existing file appears to be in use (%d). Retrying.
                                                      • API String ID: 2406187244-79500563
                                                      • Opcode ID: d597868801e4d0ea2fd5800a3e69bd95f30f368d2522e7376fb4945bdb66630f
                                                      • Instruction ID: 6023fe8b67aa7ba447fd38945f059c1701a0e9a08149722a7a21e5b3243787af
                                                      • Opcode Fuzzy Hash: d597868801e4d0ea2fd5800a3e69bd95f30f368d2522e7376fb4945bdb66630f
                                                      • Instruction Fuzzy Hash: 2B4145749041099FCB11EFA9D882ADEB7B4EF48314FA0853BE404A7355D77CA905CBAD
                                                      APIs
                                                      • GetFocus.USER32 ref: 0041BA0E
                                                      • GetDC.USER32(?), ref: 0041BA1A
                                                      • GetDeviceCaps.GDI32(?,00000068), ref: 0041BA36
                                                      • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041BA53
                                                      • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041BA6A
                                                      • ReleaseDC.USER32(?,?), ref: 0041BAB6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                      • String ID:
                                                      • API String ID: 2502006586-0
                                                      • Opcode ID: 8677b4c9643155cfa8b241eb815e8948b89f536ec76e5c7ec5a5b4487363e7b6
                                                      • Instruction ID: a7c0e65a03819a5ca0ecfd2330013adb4d65aecf06c5c54e884ed256bbcda07e
                                                      • Opcode Fuzzy Hash: 8677b4c9643155cfa8b241eb815e8948b89f536ec76e5c7ec5a5b4487363e7b6
                                                      • Instruction Fuzzy Hash: 7941C371A042149FDB10DFA9C886AAFBBB4EF45740F1484AAF940EB351D238AD11CBA5
                                                      APIs
                                                      • ___set_flsgetvalue.LIBCMT ref: 10014410
                                                      • __calloc_crt.LIBCMT ref: 1001441C
                                                      • CreateThread.KERNEL32(00000000,?,10014369,00000000,00000004,00000000), ref: 1001444F
                                                      • ResumeThread.KERNEL32(00000000,?,?,?,?,?,10009436,10001F60,00000000,10032560), ref: 1001445F
                                                      • GetLastError.KERNEL32(?,?,?,?,?,10009436,10001F60,00000000,10032560), ref: 1001446A
                                                      • __dosmaperr.LIBCMT ref: 10014482
                                                        • Part of subcall function 100179F0: __getptd_noexit.LIBCMT ref: 100179F0
                                                        • Part of subcall function 1001459A: __decode_pointer.LIBCMT ref: 100145A3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 4018905736-0
                                                      • Opcode ID: 0c311c3bcce0f4c21b2cdf85f6b8aa463f7b44db2a2ff769e43984b274e6722d
                                                      • Instruction ID: 6af206c98dabb6b8e01621cf6b11183f8f7259711ecb482eaa05c62315f3d78e
                                                      • Opcode Fuzzy Hash: 0c311c3bcce0f4c21b2cdf85f6b8aa463f7b44db2a2ff769e43984b274e6722d
                                                      • Instruction Fuzzy Hash: AC113875401214AFE710EFB4CC8198E77B8FF44374B22022AF5189B1E1CF70E9818661
                                                      APIs
                                                      • SetLastError.KERNEL32(00000057,00000000,0045D9A8,?,?,?,?,00000000), ref: 0045D947
                                                      • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045DA14,?,00000000,0045D9A8,?,?,?,?,00000000), ref: 0045D986
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                      • API String ID: 1452528299-1580325520
                                                      • Opcode ID: e67dd52cdc243cbb5e72bacc990bd15c15be47e674f81fc936459ad46248d631
                                                      • Instruction ID: 6e5dfac74c505aaab96e92fe344d79fc6b24c6561d5ee78f4b35f8cdf0e82ab5
                                                      • Opcode Fuzzy Hash: e67dd52cdc243cbb5e72bacc990bd15c15be47e674f81fc936459ad46248d631
                                                      • Instruction Fuzzy Hash: 1611A5B5A04209AFD731DEA1C941BAA7AACDF48306F6040376D04A6283D67C5F0AD52E
                                                      APIs
                                                      • GetSystemMetrics.USER32(0000000B), ref: 0041C265
                                                      • GetSystemMetrics.USER32(0000000C), ref: 0041C26F
                                                      • GetDC.USER32(00000000), ref: 0041C279
                                                      • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041C2A0
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041C2AD
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041C2E6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CapsDeviceMetricsSystem$Release
                                                      • String ID:
                                                      • API String ID: 447804332-0
                                                      • Opcode ID: b56dce364db8681bf449ce1525ba10edc72df88ae5eafd2cc45f48ffa874235a
                                                      • Instruction ID: 9f2a90fdc7dd77bbc6d9abc5b90aadbfd0b864dc6f709442552c07669a95c1ee
                                                      • Opcode Fuzzy Hash: b56dce364db8681bf449ce1525ba10edc72df88ae5eafd2cc45f48ffa874235a
                                                      • Instruction Fuzzy Hash: 07213C75E44649AFEB00EFE9C882BEEB7B4EB48714F10806AF514B7280D7795940CB69
                                                      APIs
                                                      • RtlEnterCriticalSection.KERNEL32(0049E420,00000000,00401B68), ref: 00401ABD
                                                      • LocalFree.KERNEL32(00778D70,00000000,00401B68), ref: 00401ACF
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00778D70,00000000,00401B68), ref: 00401AEE
                                                      • LocalFree.KERNEL32(00779D70,?,00000000,00008000,00778D70,00000000,00401B68), ref: 00401B2D
                                                      • RtlLeaveCriticalSection.KERNEL32(0049E420,00401B6F), ref: 00401B58
                                                      • RtlDeleteCriticalSection.KERNEL32(0049E420,00401B6F), ref: 00401B62
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                      • String ID:
                                                      • API String ID: 3782394904-0
                                                      • Opcode ID: 27230fc28db66510afed4ac7e76b62a69bf1a257bd7dde38b68ece54281650c8
                                                      • Instruction ID: e11c9f51ffc8675c4dd52d411ec329e75971582e09b40c19516fbc4ecb4e7f79
                                                      • Opcode Fuzzy Hash: 27230fc28db66510afed4ac7e76b62a69bf1a257bd7dde38b68ece54281650c8
                                                      • Instruction Fuzzy Hash: 1E119D30B00340AAEB15EB67AC82B263BE49765708F44047BF40067AF2D67DA840876E
                                                      APIs
                                                      • GetWindowLongA.USER32(?,000000EC), ref: 004809AA
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046E2F5), ref: 004809D0
                                                      • GetWindowLongA.USER32(?,000000EC), ref: 004809E0
                                                      • SetWindowLongA.USER32(?,000000EC,00000000), ref: 00480A01
                                                      • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 00480A15
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 00480A31
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$Show
                                                      • String ID:
                                                      • API String ID: 3609083571-0
                                                      • Opcode ID: fd47eba282066f6077479a46be718dc6a36e411284a163d57f72b468d1ce45bd
                                                      • Instruction ID: 5fbc0a759a363429862e9e166b445db90943e559ec10ec679e577617c806b0ab
                                                      • Opcode Fuzzy Hash: fd47eba282066f6077479a46be718dc6a36e411284a163d57f72b468d1ce45bd
                                                      • Instruction Fuzzy Hash: 3C014CB1650210ABD710EB79CD41F2A77A8AB2D310F054767FA55EB3E3C239EC048B08
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 10010338
                                                      • GetParent.USER32(?), ref: 1001034C
                                                      • MapWindowPoints.USER32(00000000,00000000), ref: 10010351
                                                      • GetParent.USER32(?), ref: 10010364
                                                      • RedrawWindow.USER32(00000000), ref: 10010367
                                                      • SendMessageA.USER32(?,0000000C,00000000,?), ref: 10010382
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Parent$MessagePointsRectRedrawSend
                                                      • String ID:
                                                      • API String ID: 4113075923-0
                                                      • Opcode ID: a3ee01fb7553d39f9a948c16fa51a89dc8280046234cf4d0263b505339711d34
                                                      • Instruction ID: 6f79dbd7a11734617dd8e76077c4a5d2b9badc9dcfb53b9c2e4cffef938b4707
                                                      • Opcode Fuzzy Hash: a3ee01fb7553d39f9a948c16fa51a89dc8280046234cf4d0263b505339711d34
                                                      • Instruction Fuzzy Hash: 2B015A71604310BBF300EB55CC8EFAF7BADEB84740F854908F5865A0A1D7B0DA95CBA2
                                                      APIs
                                                        • Part of subcall function 0041AB70: CreateBrushIndirect.GDI32 ref: 0041ABDB
                                                      • UnrealizeObject.GDI32(00000000), ref: 0041B70C
                                                      • SelectObject.GDI32(?,00000000), ref: 0041B71E
                                                      • SetBkColor.GDI32(?,00000000), ref: 0041B741
                                                      • SetBkMode.GDI32(?,00000002), ref: 0041B74C
                                                      • SetBkColor.GDI32(?,00000000), ref: 0041B767
                                                      • SetBkMode.GDI32(?,00000001), ref: 0041B772
                                                        • Part of subcall function 0041A4E8: GetSysColor.USER32(?), ref: 0041A4F2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                      • String ID:
                                                      • API String ID: 3527656728-0
                                                      • Opcode ID: c61030d912a8a6847aea8d9dd9de33bb9ce49b13cbe3d1a7ba6db01534d8f73f
                                                      • Instruction ID: e5a7d4b7c2e235827ad94a1825542cc68ab193fc61db3cfd758683236e3ca83d
                                                      • Opcode Fuzzy Hash: c61030d912a8a6847aea8d9dd9de33bb9ce49b13cbe3d1a7ba6db01534d8f73f
                                                      • Instruction Fuzzy Hash: 25F0C275615100ABDE00FFBADACAE4B37989F443097048097B504DF197C67CE8504B39
                                                      APIs
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 10010454
                                                      • SetWindowLongA.USER32(?,000000F0,00000000), ref: 1001046A
                                                      • SendMessageA.USER32(?,0000040A,00000001,0000001E), ref: 1001047A
                                                      • SendMessageA.USER32(?,0000040A,00000000,00000000), ref: 1001048E
                                                      • SetWindowLongA.USER32(?,000000F0,00000000), ref: 1001049B
                                                      • RedrawWindow.USER32(?,00000000,00000000,00000301), ref: 100104AB
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MessageSend$Redraw
                                                      • String ID:
                                                      • API String ID: 3943020483-0
                                                      • Opcode ID: c3b603542bc25e0be225ad0d9aba1943441581185576c3ecd5876d8ba503e94d
                                                      • Instruction ID: a404be6f20c30acdff53be37c2165a515a2b0846ab5b777aa6a98462630dd4a4
                                                      • Opcode Fuzzy Hash: c3b603542bc25e0be225ad0d9aba1943441581185576c3ecd5876d8ba503e94d
                                                      • Instruction Fuzzy Hash: 08F0127198423276F52117624CCDFEB6D289B56BB2F314245F716780D0CBA41493D669
                                                      APIs
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00473C85,?,00000000,?,0049F1E4,00000000,00473E75,?,00000000,?,00000000,?,00474041), ref: 00473C61
                                                      • FindClose.KERNEL32(000000FF,00473C8C,00473C85,?,00000000,?,0049F1E4,00000000,00473E75,?,00000000,?,00000000,?,00474041,?), ref: 00473C7F
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,00473DA7,?,00000000,?,0049F1E4,00000000,00473E75,?,00000000,?,00000000,?,00474041), ref: 00473D83
                                                      • FindClose.KERNEL32(000000FF,00473DAE,00473DA7,?,00000000,?,0049F1E4,00000000,00473E75,?,00000000,?,00000000,?,00474041,?), ref: 00473DA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileNext
                                                      • String ID: @G
                                                      • API String ID: 2066263336-4243591082
                                                      • Opcode ID: 7ded09717b708ee544d999eb748772b7a047a64154b3b23c4e7dbd4b6474bbde
                                                      • Instruction ID: 0da19416abf0173bdc8d3c7c7f8ad009371619145402d5c4f287baa4c6a871bb
                                                      • Opcode Fuzzy Hash: 7ded09717b708ee544d999eb748772b7a047a64154b3b23c4e7dbd4b6474bbde
                                                      • Instruction Fuzzy Hash: 28C1393490424D9FCF11DFA5C881ADEBBB9BF4C304F5081AAE848B7291D738AA45DF58
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045609F,?,00000000,004560DF), ref: 00455FE5
                                                      Strings
                                                      • PendingFileRenameOperations, xrefs: 00455F84
                                                      • PendingFileRenameOperations2, xrefs: 00455FB4
                                                      • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455F68
                                                      • WININIT.INI, xrefs: 00456014
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                      • API String ID: 47109696-2199428270
                                                      • Opcode ID: 63bc92d3b485808cad68ebc7bad28867575a10dfcc0b1f4ee82dd694707425ba
                                                      • Instruction ID: a4a9f2ec6dce7785653c913c6c24b0c1e176cc517468c749f5f74b0afa9d98e4
                                                      • Opcode Fuzzy Hash: 63bc92d3b485808cad68ebc7bad28867575a10dfcc0b1f4ee82dd694707425ba
                                                      • Instruction Fuzzy Hash: F551B430E002089BDB15EF62DD51ADEB7B9EF45705F50817BF904A72C2DB78AE49CA18
                                                      APIs
                                                        • Part of subcall function 00424754: SetWindowTextA.USER32(?,00000000), ref: 0042476C
                                                      • ShowWindow.USER32(?,00000005,00000000,0049AE45,?,?,00000000), ref: 0049AC16
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                        • Part of subcall function 00407738: SetCurrentDirectoryA.KERNEL32(00000000,?,0049AC3E,00000000,0049AE11,?,?,00000005,00000000,0049AE45,?,?,00000000), ref: 00407743
                                                        • Part of subcall function 0042D8DC: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D96A,?,?,?,00000001,?,004568AE,00000000,00456916), ref: 0042D911
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                      • String ID: .dat$.msg$IMsg$Uninstall
                                                      • API String ID: 3312786188-1660910688
                                                      • Opcode ID: 8cc8741fdde3d57da98d476cec90ec2627ee04639b2208d1d0e6e287e378197b
                                                      • Instruction ID: 41fce5d7155baeeb4201c3977cb987a547f2b9c6e2b52af906847905e2aac1f5
                                                      • Opcode Fuzzy Hash: 8cc8741fdde3d57da98d476cec90ec2627ee04639b2208d1d0e6e287e378197b
                                                      • Instruction Fuzzy Hash: 4E31A374A00214AFCB00EF65CC52A6E7BB5FB89304F61857AF800E7752D739AD15CB99
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EF6A
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EF70
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EF99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressByteCharHandleModuleMultiProcWide
                                                      • String ID: ShutdownBlockReasonCreate$user32.dll
                                                      • API String ID: 828529508-2866557904
                                                      • Opcode ID: 76c3ae556ff5016cceda8b60c842384167c68f0016227ebd4f9b5bd92a37e0ae
                                                      • Instruction ID: 98e14bcb75ccd3fa79125cd8f842b3c85c6f4936fd04c03cffbbcbf6111bfa2c
                                                      • Opcode Fuzzy Hash: 76c3ae556ff5016cceda8b60c842384167c68f0016227ebd4f9b5bd92a37e0ae
                                                      • Instruction Fuzzy Hash: 8AF0F6E134462237E620B27FAC82F7B55CC8F98719F15003AB508FA2C1EA6CC905426F
                                                      APIs
                                                        • Part of subcall function 100180A9: __getptd_noexit.LIBCMT ref: 100180AA
                                                        • Part of subcall function 100180A9: __amsg_exit.LIBCMT ref: 100180B7
                                                      • __amsg_exit.LIBCMT ref: 1001BB0E
                                                      • __lock.LIBCMT ref: 1001BB1E
                                                      • InterlockedDecrement.KERNEL32(?), ref: 1001BB3B
                                                      • InterlockedIncrement.KERNEL32(03271380), ref: 1001BB66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock
                                                      • String ID: "v`"v
                                                      • API String ID: 2880340415-2422224426
                                                      • Opcode ID: d790256de5d9771fb46f0d331803a04c815179442b81a80bf8ec92e8d90e2276
                                                      • Instruction ID: cb3f8d07e474b1524a156136a7d50c6c7ab46c97c9500bb4219fe40de5198427
                                                      • Opcode Fuzzy Hash: d790256de5d9771fb46f0d331803a04c815179442b81a80bf8ec92e8d90e2276
                                                      • Instruction Fuzzy Hash: 1E01A135E05A259BDB51DB68988175973A0FF04650F110105F800AFA96CB78EAC1CBD2
                                                      APIs
                                                      • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004588B8
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004588D9
                                                      • CloseHandle.KERNEL32(?,0045890C), ref: 004588FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                      • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                      • API String ID: 2573145106-3235461205
                                                      • Opcode ID: b41d100c780e0102d567981e9ead043da43d2217099a59abe6d3b29184cbb4a6
                                                      • Instruction ID: 5ab474d98eb3a0ece9291f621c53fee7be03ae90ebbbcbdbcbdfc60506012216
                                                      • Opcode Fuzzy Hash: b41d100c780e0102d567981e9ead043da43d2217099a59abe6d3b29184cbb4a6
                                                      • Instruction Fuzzy Hash: 5601A271600204AFDB11EBA98C02A6A73A8EB45715F60057AF810F73D3DE38AE04961D
                                                      APIs
                                                      • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042E2E0
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042E47B,00000000,0042E493,?,?,?,?,00000006,?,00000000,0049A6E1), ref: 0042E2FB
                                                      • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E301
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressDeleteHandleModuleProc
                                                      • String ID: RegDeleteKeyExA$advapi32.dll
                                                      • API String ID: 588496660-1846899949
                                                      • Opcode ID: a7d7d163a2b4572837d540fa9020a88c6075fbeda32d6ef88a980983cb7fdc09
                                                      • Instruction ID: 4593d6951ad1389f122581937974f3187b46c4a982a9796ded25b619d02fe20b
                                                      • Opcode Fuzzy Hash: a7d7d163a2b4572837d540fa9020a88c6075fbeda32d6ef88a980983cb7fdc09
                                                      • Instruction Fuzzy Hash: 84E06571750234F6D674AA677C4AF97260CD764726F940837F545661D187BC1C40CA5C
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EF00,00000004,0049C938,00457A81,00457E24,004579D8,00000000,00000B06,00000000,00000000,00000002,00000000,0048361D), ref: 0042EE52
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EE58
                                                      • InterlockedExchange.KERNEL32(0049E664,00000001), ref: 0042EE69
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressExchangeHandleInterlockedModuleProc
                                                      • String ID: ChangeWindowMessageFilter$user32.dll
                                                      • API String ID: 3478007392-2498399450
                                                      • Opcode ID: d92cc62ee20d7ac2e8fab9b782aa11417d22a09e2c448ccd967ab38ddec500c6
                                                      • Instruction ID: 048ca61b172dfedb03cf1c059d2784ab3124221c9e2a99dd16ddbc81be59c6a3
                                                      • Opcode Fuzzy Hash: d92cc62ee20d7ac2e8fab9b782aa11417d22a09e2c448ccd967ab38ddec500c6
                                                      • Instruction Fuzzy Hash: B6E0B6A1661310EAFA10B7736C8AF562555AB34B19FA1043BF100651E1C6BC0884C91D
                                                      APIs
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00479D10
                                                      • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00479E07,0049F0AC,00000000), ref: 00479D23
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00479D29
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProcessThreadWindow
                                                      • String ID: AllowSetForegroundWindow$user32.dll
                                                      • API String ID: 1782028327-3855017861
                                                      • Opcode ID: c36f3de8e5dc3318ea7383228e8bc1b00cc42ae4fa1597e4dc77134cd03fc9db
                                                      • Instruction ID: 5357bd2adcb02916e042a40b4a090124369338466f1717feba3059f4eb7ed124
                                                      • Opcode Fuzzy Hash: c36f3de8e5dc3318ea7383228e8bc1b00cc42ae4fa1597e4dc77134cd03fc9db
                                                      • Instruction Fuzzy Hash: F8D0A9A0200301A6ED20B3B68C0BEEF239C8E9470AB10C83B3808F2187CA3CDC455B3C
                                                      APIs
                                                      • BeginPaint.USER32(00000000,?), ref: 004170E2
                                                      • SaveDC.GDI32(?), ref: 00417113
                                                      • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,004171D5), ref: 00417174
                                                      • RestoreDC.GDI32(?,?), ref: 0041719B
                                                      • EndPaint.USER32(00000000,?,004171DC,00000000,004171D5), ref: 004171CF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                      • String ID:
                                                      • API String ID: 3808407030-0
                                                      • Opcode ID: 2aefb1f11be775139b331da31e14453598fb34486e2afd9f20f5c966e66715d4
                                                      • Instruction ID: a59a5e74ec56046a8e44d3172024536881dae92cda495952d4f2aea49f83957e
                                                      • Opcode Fuzzy Hash: 2aefb1f11be775139b331da31e14453598fb34486e2afd9f20f5c966e66715d4
                                                      • Instruction Fuzzy Hash: 9C413D70A08204AFDB14DBA9C985FAA77F9FB48314F1544AAE8059B362C7789D81CB18
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6723b5202e330dc32e4e910c1744c1f6af12d9a6ca138e20ff4de4c990d11818
                                                      • Instruction ID: b7433d6af5671a809cf87ab508426f3e85ed5e2fdb4bb50135625d5106dc29cf
                                                      • Opcode Fuzzy Hash: 6723b5202e330dc32e4e910c1744c1f6af12d9a6ca138e20ff4de4c990d11818
                                                      • Instruction Fuzzy Hash: 1B3170706057009FC720EB2DC884AABB7E8AF89710F04891EF9D5C3751D238EC808B59
                                                      APIs
                                                      • GetSystemMetrics.USER32(0000000B), ref: 0041C05A
                                                      • GetSystemMetrics.USER32(0000000C), ref: 0041C064
                                                      • GetDC.USER32(00000000), ref: 0041C0A2
                                                      • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041C0E9
                                                      • DeleteObject.GDI32(00000000), ref: 0041C12A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                      • String ID:
                                                      • API String ID: 1095203571-0
                                                      • Opcode ID: 142aaef5fb75dc877dec10a7682396b9e25510c94f542f6073738a5e6d3aa482
                                                      • Instruction ID: af0cd6ff41168786fc466cfb62adbf741af89e47da0ede509f3e80318da31809
                                                      • Opcode Fuzzy Hash: 142aaef5fb75dc877dec10a7682396b9e25510c94f542f6073738a5e6d3aa482
                                                      • Instruction Fuzzy Hash: 92314174E40205EFDB00DFA5C981AAEB7F5EB48704F1185AAF510AB381D7789E80DF98
                                                      APIs
                                                      • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429C98
                                                      • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429CC7
                                                      • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429CE3
                                                      • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 00429D0E
                                                      • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429D2C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: bc63629cb27ad13ca6417472d4f3f1d186b1f81fbb10e3d200fe59e3d4f08092
                                                      • Instruction ID: 60921b255c01a359d0eb68e62e5e28d9b6fe2da514f119f30b014399c46582d3
                                                      • Opcode Fuzzy Hash: bc63629cb27ad13ca6417472d4f3f1d186b1f81fbb10e3d200fe59e3d4f08092
                                                      • Instruction Fuzzy Hash: C121AF707007057AD710ABA7DC82F4BB6ACDB40708F90043EB501AB2D2DB78AD41866D
                                                      APIs
                                                        • Part of subcall function 0045D8DC: SetLastError.KERNEL32(00000057,00000000,0045D9A8,?,?,?,?,00000000), ref: 0045D947
                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,00475241,?,?,0049F1E4,00000000), ref: 004751FA
                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,00475241,?,?,0049F1E4,00000000), ref: 00475210
                                                      Strings
                                                      • Setting permissions on key: %s\%s, xrefs: 004751BE
                                                      • Could not set permissions on the key because it currently does not exist., xrefs: 00475204
                                                      • Failed to set permissions on the key (%d)., xrefs: 00475221
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: Could not set permissions on the key because it currently does not exist.$Failed to set permissions on the key (%d).$Setting permissions on key: %s\%s
                                                      • API String ID: 1452528299-522033246
                                                      • Opcode ID: 1355e60d520c537b245591eb314ca0669cdd5b0204c3c9ddf5a0d2ec40fba8e3
                                                      • Instruction ID: 51041ab3257bc5012ea3fc5fd74b59e1bc6a173a0ae5939bb589f078bf527dbc
                                                      • Opcode Fuzzy Hash: 1355e60d520c537b245591eb314ca0669cdd5b0204c3c9ddf5a0d2ec40fba8e3
                                                      • Instruction Fuzzy Hash: 0821A770A046045FDB00EBA9D8416DEBBF4EB89314F5044BBE404EB353DBB85D058BAD
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                      • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocString
                                                      • String ID:
                                                      • API String ID: 262959230-0
                                                      • Opcode ID: 5ebc352aac4f77473dff7e3dcc86cc0c7398385e60e6a11f17e44d50ff4a2e93
                                                      • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                      • Opcode Fuzzy Hash: 5ebc352aac4f77473dff7e3dcc86cc0c7398385e60e6a11f17e44d50ff4a2e93
                                                      • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                      APIs
                                                      • SelectPalette.GDI32(00000000,00000000,00000000), ref: 004148A9
                                                      • RealizePalette.GDI32(00000000), ref: 004148B1
                                                      • SelectPalette.GDI32(00000000,00000000,00000001), ref: 004148C5
                                                      • RealizePalette.GDI32(00000000), ref: 004148CB
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004148D6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Palette$RealizeSelect$Release
                                                      • String ID:
                                                      • API String ID: 2261976640-0
                                                      • Opcode ID: de0628dfb3b178927ad573b2282efd4894c3506f2a3e842425f6db2cbe849912
                                                      • Instruction ID: 1b199f70f0334c5ad2d95ba866badc65d16692e0f82b4d98eea4daff33ed8e78
                                                      • Opcode Fuzzy Hash: de0628dfb3b178927ad573b2282efd4894c3506f2a3e842425f6db2cbe849912
                                                      • Instruction Fuzzy Hash: 8901DF7521C3806AE200B63D8C85A9F6FEC9FCA314F05596EF498DB382CA7ACC018765
                                                      APIs
                                                      • __lock.LIBCMT ref: 10014DB8
                                                        • Part of subcall function 1001ADA4: __mtinitlocknum.LIBCMT ref: 1001ADB8
                                                        • Part of subcall function 1001ADA4: __amsg_exit.LIBCMT ref: 1001ADC4
                                                        • Part of subcall function 1001ADA4: EnterCriticalSection.KERNEL32(?,?,?,10020975,00000004,1002CDE8,0000000C,100173D8,00000000,00000000,00000000,00000000,00000000,1001805B,00000001,00000214), ref: 1001ADCC
                                                      • ___sbh_find_block.LIBCMT ref: 10014DC3
                                                      • ___sbh_free_block.LIBCMT ref: 10014DD2
                                                      • HeapFree.KERNEL32(00000000,00000001,1002C9C0,0000000C,1001AD85,00000000,1002CBE8,0000000C,1001ADBD,00000001,?,?,10020975,00000004,1002CDE8,0000000C), ref: 10014E02
                                                      • GetLastError.KERNEL32 ref: 10014E13
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 2714421763-0
                                                      • Opcode ID: 8138c0ffbe481b899e05031c0380943a3c2390b269d77bff90a9d0a706bde6ae
                                                      • Instruction ID: cfc76feb669d3357d397b8650369f13d843ecf664989c9355249c888fcd2c980
                                                      • Opcode Fuzzy Hash: 8138c0ffbe481b899e05031c0380943a3c2390b269d77bff90a9d0a706bde6ae
                                                      • Instruction Fuzzy Hash: 4C018B39C01225AAEF21DF70AC45B4E37E8EF01761F214009F505AF192CF74D5C58B91
                                                      Strings
                                                      • PrepareToInstall failed: %s, xrefs: 0046D41A
                                                      • NextButtonClick, xrefs: 0046D1F8
                                                      • Need to restart Windows? %s, xrefs: 0046D441
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                      • API String ID: 0-2329492092
                                                      • Opcode ID: 3a186a007e4f91e7caeefa56d0da4c1e8601630267600823766f63052068a651
                                                      • Instruction ID: 44988f13848ffd89d71039ac62f11851b9b9fcebd064a36e5433384ef0c4aa5d
                                                      • Opcode Fuzzy Hash: 3a186a007e4f91e7caeefa56d0da4c1e8601630267600823766f63052068a651
                                                      • Instruction Fuzzy Hash: 4ED13E34E00109DFDB00EF99C585AEE77F5AB49308F6444B6E804AB352E778AE45CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message$Peek$DispatchErrorInternetLastOpenTranslate
                                                      • String ID: Getting file information...$HEAD$Initializing...
                                                      • API String ID: 112184695-2928475931
                                                      • Opcode ID: 94d24d67314c8fa4178f1b4aa1c9104cf026291a00f7cdead894d27cde1e5cc4
                                                      • Instruction ID: ea77723d18dfd50b1d2fc6192bc443b74d99293cbfc67afdc41aa1699e1097d4
                                                      • Opcode Fuzzy Hash: 94d24d67314c8fa4178f1b4aa1c9104cf026291a00f7cdead894d27cde1e5cc4
                                                      • Instruction Fuzzy Hash: 2F91F271A00645AFDB00DF68C8816AEBBF1FF483A4F14822EE52497686CB31B955CBD1
                                                      APIs
                                                      • SetActiveWindow.USER32(?,?,00000000,00485795), ref: 00485568
                                                      • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00485606
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ActiveChangeNotifyWindow
                                                      • String ID: $Need to restart Windows? %s
                                                      • API String ID: 1160245247-4200181552
                                                      • Opcode ID: a95cbf927e22f80de55b02d4689da4a175a84f58c248fd1ee268b9745b637bd1
                                                      • Instruction ID: 8ac728fbb8e3d27f98a22662cdea6886523d2868be6ee68a7c392ecda210aa03
                                                      • Opcode Fuzzy Hash: a95cbf927e22f80de55b02d4689da4a175a84f58c248fd1ee268b9745b637bd1
                                                      • Instruction Fuzzy Hash: 1B91A034A006449FDB10EB69D885B9E77E1AF55308F5484BBE800DB366D73CA809CB5E
                                                      APIs
                                                      • PostMessageA.USER32(?,00000402,?,00000000), ref: 1000EF58
                                                      • PostMessageA.USER32(?,00000402,?,00000000), ref: 1000F085
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MessagePost
                                                      • String ID: FileProgressBar$TotalProgressBar
                                                      • API String ID: 410705778-679699356
                                                      • Opcode ID: b856897ba4d1df8bfb805c8b996d0b8bb57fe9702c0e9d5d22ac01fcd5b6dadb
                                                      • Instruction ID: 64bab11ce356a1b2a99fd013084b73626a41dc127b502d7358c22f98eb5cbfb0
                                                      • Opcode Fuzzy Hash: b856897ba4d1df8bfb805c8b996d0b8bb57fe9702c0e9d5d22ac01fcd5b6dadb
                                                      • Instruction Fuzzy Hash: E9715CB150C7808BD304DFA5C99165BFBE4FB88790F204D2DF8A5863A0EB79D884CB42
                                                      APIs
                                                        • Part of subcall function 0042CC94: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CCB8
                                                      • GetLastError.KERNEL32(00000000,0047153D,?,?,0049F1E4,00000000), ref: 0047141A
                                                      • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00471494
                                                      • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004714B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ChangeNotify$ErrorFullLastNamePath
                                                      • String ID: Creating directory: %s
                                                      • API String ID: 2451617938-483064649
                                                      • Opcode ID: f3f5c76d6a811d2342dfff82ede6b91c6ded70d56010fc8a7de985c9a00577ad
                                                      • Instruction ID: 20bf2e2c57de6391f44c88e9dad00ec8a22121e450acada444c040a0f05f54d0
                                                      • Opcode Fuzzy Hash: f3f5c76d6a811d2342dfff82ede6b91c6ded70d56010fc8a7de985c9a00577ad
                                                      • Instruction Fuzzy Hash: 94514634E00248ABDB01DFA9C982BDEB7F5AF48304F50847AE815B7392D7789E04CB59
                                                      APIs
                                                      • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407493
                                                      • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040750D
                                                      • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 00407565
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Enum$NameOpenResourceUniversal
                                                      • String ID: Z
                                                      • API String ID: 3604996873-1505515367
                                                      • Opcode ID: 59fc97221ce8e2239389e9c8dfc74c2c781be37928cd4af1c274feeaca823a59
                                                      • Instruction ID: 40f8d8e8b2f406d6a8a22564fe957c27a4ea1e6c79599dfe788430968c9fdea8
                                                      • Opcode Fuzzy Hash: 59fc97221ce8e2239389e9c8dfc74c2c781be37928cd4af1c274feeaca823a59
                                                      • Instruction Fuzzy Hash: DD51A270E04608AFDB11EF99CC41A9EBBF9EB09314F1045BAE400B72D1D778AE418F5A
                                                      APIs
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004613D4
                                                      • GetDIBits.GDI32(00000000,00000000,?,00000000,00000000,004615E1), ref: 004614D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: BitsCapsDevice
                                                      • String ID: $(
                                                      • API String ID: 1216508973-55695022
                                                      • Opcode ID: 5957ec3d1a6f1ea59fd2c6b39eb5ebbf337cafbddb9fa20bd40169d8452b2992
                                                      • Instruction ID: 5dc47b70b294587cc13581978d3ce92ec5f010f9ab1f52b5f87cd7b8da97004a
                                                      • Opcode Fuzzy Hash: 5957ec3d1a6f1ea59fd2c6b39eb5ebbf337cafbddb9fa20bd40169d8452b2992
                                                      • Instruction Fuzzy Hash: 67413E71E00209AFDB00DFA9C885AAEFBF8FF49304F14406AE515F72A0D7799944CB5A
                                                      APIs
                                                      • SetRectEmpty.USER32(?), ref: 0044D6BA
                                                      • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D6E5
                                                      • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D76D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DrawText$EmptyRect
                                                      • String ID:
                                                      • API String ID: 182455014-2867612384
                                                      • Opcode ID: e6e59adc673dea5e3a01a58b7e7b770fcdf0972a29114f76cbe18b4b20e21186
                                                      • Instruction ID: 12a4b21e602b9f7a78cd53eafda620a7b7433ebb18c5ccfef023c502be569e40
                                                      • Opcode Fuzzy Hash: e6e59adc673dea5e3a01a58b7e7b770fcdf0972a29114f76cbe18b4b20e21186
                                                      • Instruction Fuzzy Hash: B6515171E00244AFDB11DFA5C885BDEBBF9EF49308F05847AE805EB252D7789944CB64
                                                      APIs
                                                      • SendMessageA.USER32(?,00000111,00000000), ref: 100113AE
                                                      • idpReportError.IDP ref: 100113FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorMessageReportSend
                                                      • String ID: InvisibleButton$WizardForm
                                                      • API String ID: 832656352-3077912615
                                                      • Opcode ID: 6fe366af748c9212a4c210cba9be6ec28d3324f956991dd6cb23fb1c02a94907
                                                      • Instruction ID: 302f3f52566c2900e7d544648f35baabe7b1fa575a50273f1bd01b015bf0bc9c
                                                      • Opcode Fuzzy Hash: 6fe366af748c9212a4c210cba9be6ec28d3324f956991dd6cb23fb1c02a94907
                                                      • Instruction Fuzzy Hash: D641AEB65087409FD314CF19C881A9BBBE8FB85B50F400A2EF69547351DB79E888CB97
                                                      APIs
                                                      • MessageBeep.USER32(00000030), ref: 10010826
                                                      • GetDesktopWindow.USER32 ref: 10010835
                                                      • DialogBoxParamA.USER32(?,00000065,00000000,10007C80,00000000), ref: 1001084C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: BeepDesktopDialogMessageParamWindow
                                                      • String ID: LabelFont
                                                      • API String ID: 2847301737-2346607873
                                                      • Opcode ID: 814ec205267feb42dd700eb0244b538c278535473597b201e6d18a1966c88bfd
                                                      • Instruction ID: 45189f05bad93587ec4a766e1363c1d582697811280d4e49e11effef2d98524f
                                                      • Opcode Fuzzy Hash: 814ec205267feb42dd700eb0244b538c278535473597b201e6d18a1966c88bfd
                                                      • Instruction Fuzzy Hash: 10418C755083819FE320CB68C886B9FB7E8FF89650F40491EF59987252DB34E948CB63
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0042F46A
                                                        • Part of subcall function 0041A678: CreateFontIndirectA.GDI32(?), ref: 0041A737
                                                      • SelectObject.GDI32(?,00000000), ref: 0042F48D
                                                      • ReleaseDC.USER32(00000000,?), ref: 0042F56C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CreateFontIndirectObjectReleaseSelect
                                                      • String ID: ...\
                                                      • API String ID: 3133960002-983595016
                                                      • Opcode ID: 4dbb05239853b56f211487c34bba1e3065c43c6cc540eb48ddca839a47f377ff
                                                      • Instruction ID: 6da19e17498f2b2ee05211f2735e4231f31b0ac4056ea50bc180adaf4849e001
                                                      • Opcode Fuzzy Hash: 4dbb05239853b56f211487c34bba1e3065c43c6cc540eb48ddca839a47f377ff
                                                      • Instruction Fuzzy Hash: 3E313370B00229ABDF11EF9AD851BAEB7B8EB48304FD0447BF414A7291C77C5D45CA59
                                                      APIs
                                                      • std::_String_base::_Xlen.LIBCPMT ref: 10007493
                                                      • std::_String_base::_Xlen.LIBCPMT ref: 100074A6
                                                      • _memcpy_s.LIBCMT ref: 100074F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: String_base::_Xlenstd::_$_memcpy_s
                                                      • String ID: HEAD
                                                      • API String ID: 709706234-2439387944
                                                      • Opcode ID: af5304e976208645e8e736165c8dd4e7d2c9d6aad5028bd832b100f8e18a0a8b
                                                      • Instruction ID: 962f7e72fdadf9a267ec6c835637fa989174db726706bc13f6c7598dbf747d76
                                                      • Opcode Fuzzy Hash: af5304e976208645e8e736165c8dd4e7d2c9d6aad5028bd832b100f8e18a0a8b
                                                      • Instruction Fuzzy Hash: F631F831B006144BE730DE5CD8C051EB7E6FB912D07614A2DE14A8B64EDB75FC4487A2
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 0045567E
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00455744), ref: 004556E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressByteCharMultiProcWide
                                                      • String ID: SfcIsFileProtected$sfc.dll
                                                      • API String ID: 2508298434-591603554
                                                      • Opcode ID: cd1d4ec634ffaaeb32f3c4dbc28009c9e63fbc03d90feba525fc8c0b3ebaedcf
                                                      • Instruction ID: 311e8501e48ef86dedbd1e32416f62ff44579e2f461d143f7aa5c8e880f43ce1
                                                      • Opcode Fuzzy Hash: cd1d4ec634ffaaeb32f3c4dbc28009c9e63fbc03d90feba525fc8c0b3ebaedcf
                                                      • Instruction Fuzzy Hash: FC418670A00718DBEB20EB55DC95BAD77B8AB04309F5041B7A908E7293D7785F48DA5C
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00499C8D,_iu,?,00000000,004541F2), ref: 004541A7
                                                      • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00499C8D,_iu,?,00000000,004541F2), ref: 004541B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateFileHandle
                                                      • String ID: .tmp$_iu
                                                      • API String ID: 3498533004-10593223
                                                      • Opcode ID: 53f828e6ceb702bbfaa2d7dbbab8cdacf8318c59bed055e58ff6238b3f7065b7
                                                      • Instruction ID: 578c6d25dcdad9d531da493d0199c9855db5075e5bb7f28aad5cf4ca392b9bb0
                                                      • Opcode Fuzzy Hash: 53f828e6ceb702bbfaa2d7dbbab8cdacf8318c59bed055e58ff6238b3f7065b7
                                                      • Instruction Fuzzy Hash: F431C770E00119ABCB11EFA5C842B9EBBB5AF54309F60416AF804BB3C2D6385F4586A8
                                                      APIs
                                                      • GetClassInfoA.USER32(00400000,?,?), ref: 0041690F
                                                      • UnregisterClassA.USER32(?,00400000), ref: 0041693B
                                                      • RegisterClassA.USER32(?), ref: 0041695E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Class$InfoRegisterUnregister
                                                      • String ID: @
                                                      • API String ID: 3749476976-2766056989
                                                      • Opcode ID: 09c5f863f50a19c9c3a0ba234899ce8f036c1dfa8e61a409ba2f05b6422b8e41
                                                      • Instruction ID: f0814f926fbfb3063bbfc520005841906eff1053595eb63299fc6e458af65efd
                                                      • Opcode Fuzzy Hash: 09c5f863f50a19c9c3a0ba234899ce8f036c1dfa8e61a409ba2f05b6422b8e41
                                                      • Instruction Fuzzy Hash: 70316E702043418BDB20EF69C485B9A77E5AB89308F04447FF985DF392DB39DD858B6A
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,0049B9E4,00000000,0049B18A,?,?,00000000,0049E62C), ref: 0049B104
                                                      • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,0049B9E4,00000000,0049B18A,?,?,00000000,0049E62C), ref: 0049B12D
                                                      • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0049B146
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: File$Attributes$Move
                                                      • String ID: isRS-%.3u.tmp
                                                      • API String ID: 3839737484-3657609586
                                                      • Opcode ID: fe636f5d486f977561d955d8d27fc1c933ee631e33dfc5204804ac15784fdca6
                                                      • Instruction ID: e58a6bb4d61ebf27a8f85bf79e18a3daf7ddf139a146e4c83f08b8ac6b3baeb0
                                                      • Opcode Fuzzy Hash: fe636f5d486f977561d955d8d27fc1c933ee631e33dfc5204804ac15784fdca6
                                                      • Instruction Fuzzy Hash: B2216470E10209ABCF04EFA9D9929AFBBB8EF44354F10453AB814B72D1D7385E018A99
                                                      APIs
                                                      • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                      • ExitProcess.KERNEL32 ref: 00404E0D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ExitMessageProcess
                                                      • String ID: Error$Runtime error at 00000000
                                                      • API String ID: 1220098344-2970929446
                                                      • Opcode ID: 3b61d1fed352f5282028831249daba76a748604d35a297349552cc65daff4f89
                                                      • Instruction ID: d5004cfacfd42fd5c2be0182736057b03719568bea5446043c3b888183e5f090
                                                      • Opcode Fuzzy Hash: 3b61d1fed352f5282028831249daba76a748604d35a297349552cc65daff4f89
                                                      • Instruction Fuzzy Hash: AE21B360A442519AEB15E7B7EC857163BD197E9348F048177E700B73E3C6BC984487AE
                                                      APIs
                                                        • Part of subcall function 0042CC94: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042CCB8
                                                        • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                        • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                      • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00457480
                                                      • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 004574AD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                      • String ID: LoadTypeLib$RegisterTypeLib
                                                      • API String ID: 1312246647-2435364021
                                                      • Opcode ID: ef98400a3cb6d0e3d8d993fb867b0761591a4800f398f9cc68cb898a501ed530
                                                      • Instruction ID: 9f3c69dbed6527a7536611739b590712afd4786c139aba5f8c5ce656fa2fa7d6
                                                      • Opcode Fuzzy Hash: ef98400a3cb6d0e3d8d993fb867b0761591a4800f398f9cc68cb898a501ed530
                                                      • Instruction Fuzzy Hash: 0D11B130B04604BFDB11DFA6DD51A5ABBADEB89305F1084B6BC04D3652EA389A04CA18
                                                      APIs
                                                      • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 004579FE
                                                      • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457A9B
                                                      Strings
                                                      • Failed to create DebugClientWnd, xrefs: 00457A64
                                                      • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00457A2A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                      • API String ID: 3850602802-3720027226
                                                      • Opcode ID: b03ed1056f1f7c238425172a1330e6ac177058c3a5e9163237303df94b25fdc9
                                                      • Instruction ID: 1ab6ed05e85d1bb283b6b865c49c58556a26672ef247bde5bc39928aa0d5d30a
                                                      • Opcode Fuzzy Hash: b03ed1056f1f7c238425172a1330e6ac177058c3a5e9163237303df94b25fdc9
                                                      • Instruction Fuzzy Hash: 751123707082106FE310AB28AC81B8F7B989B15309F04807BF985DB383C3799D08C7AE
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,004504FD,?,?,?,?,00000000,00000000), ref: 0045048C
                                                      • LoadLibraryA.KERNEL32(00000000,00000000,004504FD,?,?,?,?,00000000,00000000), ref: 004504D2
                                                        • Part of subcall function 004503F4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0045040C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$DirectorySystem
                                                      • String ID: RICHED20.DLL$RICHED32.DLL
                                                      • API String ID: 2630572097-740611112
                                                      • Opcode ID: 374f2d9e90cc37eef180cc8d20d2e3149e70aeb14d460e8c5a8d30249f6f1077
                                                      • Instruction ID: 4d2f5d6df61b0d0ac72fc53e5f3b8721577eb5fe8aac3b6587ce23d73eaa98fa
                                                      • Opcode Fuzzy Hash: 374f2d9e90cc37eef180cc8d20d2e3149e70aeb14d460e8c5a8d30249f6f1077
                                                      • Instruction Fuzzy Hash: 4F212174500248FFDB00FFA2D886B5E77F8EB5435AF504477E800A7662D7786A498E5C
                                                      APIs
                                                        • Part of subcall function 00424754: SetWindowTextA.USER32(?,00000000), ref: 0042476C
                                                      • GetFocus.USER32 ref: 0047A8CB
                                                      • GetKeyState.USER32(0000007A), ref: 0047A8DD
                                                      • WaitMessage.USER32(?,00000000,0047A904,?,00000000,0047A92B,?,?,00000001,00000000,?,00482693,00000000,0048361D), ref: 0047A8E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FocusMessageStateTextWaitWindow
                                                      • String ID: Wnd=$%x
                                                      • API String ID: 1381870634-2927251529
                                                      • Opcode ID: e5dbb5df603875cdc39d478cadb00c751de2674426fb931424df1fbe3e193bac
                                                      • Instruction ID: 77d4776769ed3d961f5a478265b7c30efea3ded7fa53bcd9a53f0dfc2223b557
                                                      • Opcode Fuzzy Hash: e5dbb5df603875cdc39d478cadb00c751de2674426fb931424df1fbe3e193bac
                                                      • Instruction Fuzzy Hash: A91194B0604145AFC700FF66D841A9E77B8EB89714B5288B6F408E7281D73C6D208A6B
                                                      APIs
                                                      • _memset.LIBCMT ref: 1000B0D8
                                                      • GetModuleHandleA.KERNEL32(wininet.dll,00000000,00000400,?,00000400,00000000), ref: 1000B105
                                                      • FormatMessageA.KERNEL32(00001200,00000000,00000000,00000400,?,00000400,00000000), ref: 1000B125
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: FormatHandleMessageModule_memset
                                                      • String ID: wininet.dll
                                                      • API String ID: 528496211-3354682871
                                                      • Opcode ID: 38a10d756f39a5cfb6feebfa59d39f2de6f8920bf53a07f71fe09334c7cc00e4
                                                      • Instruction ID: bfd13f30e42cf246182aa47666bba72f02dbdecf80acc5ef3aaa173cbfc2ea29
                                                      • Opcode Fuzzy Hash: 38a10d756f39a5cfb6feebfa59d39f2de6f8920bf53a07f71fe09334c7cc00e4
                                                      • Instruction Fuzzy Hash: 171170B42047406FF320CB10CD56FAB77E9EB84B44F508518F7499A1C5DBB4A549879A
                                                      APIs
                                                      • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046FD58
                                                      • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046FD67
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Time$File$LocalSystem
                                                      • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                      • API String ID: 1748579591-1013271723
                                                      • Opcode ID: bb060cc39148aedb455345e7bc3ff301bf93d173113d396d92c14034a51e3361
                                                      • Instruction ID: 1dc787eced2517cb8807bab7c2b20f1510b2cd86f013857d73bb6b07fca1fef3
                                                      • Opcode Fuzzy Hash: bb060cc39148aedb455345e7bc3ff301bf93d173113d396d92c14034a51e3361
                                                      • Instruction Fuzzy Hash: CB11F8A440C3919AD340DF2AC44472BBAE4AF99704F04496EF9C8D6391E77AC948DB67
                                                      APIs
                                                      • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 0045477F
                                                        • Part of subcall function 004073E0: DeleteFileA.KERNEL32(00000000,0049E62C,0049B575,00000000,0049B5CA,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 004073EB
                                                      • MoveFileA.KERNEL32(00000000,00000000), ref: 004547A4
                                                        • Part of subcall function 00453C98: GetLastError.KERNEL32(00000000,0045482D,00000005,00000000,00454862,?,?,00000000,0049E62C,00000004,00000000,00000000,00000000,?,0049B229,00000000), ref: 00453C9B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesDeleteErrorLastMove
                                                      • String ID: DeleteFile$MoveFile
                                                      • API String ID: 3024442154-139070271
                                                      • Opcode ID: b6f22cc9759424c3a784986225b8e0c35bb72f21a930fd5492b6a91afa80a7cc
                                                      • Instruction ID: 530c5230d1c48a198e6632d8711bb006f4eeac499d42d39edb4531016cb1c6b4
                                                      • Opcode Fuzzy Hash: b6f22cc9759424c3a784986225b8e0c35bb72f21a930fd5492b6a91afa80a7cc
                                                      • Instruction Fuzzy Hash: C2F086752142445AE701FFA6D84266E63ECDB8431FFA1443BFC00BB6C3DA3C9D094929
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(?,004562AB,?,00000001,00000000), ref: 0045629E
                                                      Strings
                                                      • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 0045624C
                                                      • PendingFileRenameOperations, xrefs: 00456270
                                                      • PendingFileRenameOperations2, xrefs: 0045627F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                      • API String ID: 47109696-2115312317
                                                      • Opcode ID: 92624241078a00f7c1b0f08652fbe8534835c4ea1a2c908f545524f159a12353
                                                      • Instruction ID: 03744892537dc61f373a56118159d2a705b6a08e7bce835c08af8ac15a0ef851
                                                      • Opcode Fuzzy Hash: 92624241078a00f7c1b0f08652fbe8534835c4ea1a2c908f545524f159a12353
                                                      • Instruction Fuzzy Hash: 2EF09671204604AFDB05E7A6DC13B6B73ACD744715FE245B7F900C7682DAB9ED04962C
                                                      APIs
                                                        • Part of subcall function 0044BBBC: LoadLibraryA.KERNEL32(00000000,00000000,0044BF9F,?,?,?,?,00000000,00000000,?,0044FDE1,0049BA76), ref: 0044BC1E
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044BC36
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044BC48
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044BC5A
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044BC6C
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BC7E
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044BC90
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044BCA2
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044BCB4
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044BCC6
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044BCD8
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044BCEA
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044BCFC
                                                        • Part of subcall function 0044BBBC: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044BD0E
                                                        • Part of subcall function 004659E8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004659FB
                                                      • LoadLibraryA.KERNEL32(00000000,SHPathPrepareForWriteA,00000000,00465A8A,?,?,?,?,00000000,00000000,?,0049BA9E), ref: 00465A5F
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00465A65
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$DirectorySystem
                                                      • String ID: SHPathPrepareForWriteA$shell32.dll
                                                      • API String ID: 1442766254-2683653824
                                                      • Opcode ID: af518b03cf9376046f8dcedef4f09e900b75585814e9c5691420b5e6294b90ad
                                                      • Instruction ID: 40adbffb9e5bdfd27d779661ae68592eaffae07e03a1378c290830cb38e34495
                                                      • Opcode Fuzzy Hash: af518b03cf9376046f8dcedef4f09e900b75585814e9c5691420b5e6294b90ad
                                                      • Instruction Fuzzy Hash: 07F04470640A08BFD701FBA2DC93F5E7BACDB45714FA0457BB400B6592E67C9E048A5D
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459D31,00000000,00459EE9,?,00000000,00000000,00000000), ref: 00459C41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpen
                                                      • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                      • API String ID: 47109696-2631785700
                                                      • Opcode ID: 8e19ad16d369bcc1cdc551d6f7a6bfc3dd5aaf0307e8b56589e706dd5174713a
                                                      • Instruction ID: 38d3340ec7adb02875813bbcd1e17bd1b65749923c884860087a6e41a9d30ab7
                                                      • Opcode Fuzzy Hash: 8e19ad16d369bcc1cdc551d6f7a6bfc3dd5aaf0307e8b56589e706dd5174713a
                                                      • Instruction Fuzzy Hash: CEF0A9713001109BC710EB1A9881B9E63CEDB92316F24403BBA85C7353E63CCC0A8629
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00485FD5
                                                      • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00485FF8
                                                      Strings
                                                      • System\CurrentControlSet\Control\Windows, xrefs: 00485FA2
                                                      • CSDVersion, xrefs: 00485FCC
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                      • API String ID: 3677997916-1910633163
                                                      • Opcode ID: 6218c6c2fb9451a17f77c2bb797b492f1626bc5d3910a3f1f10820abaf446096
                                                      • Instruction ID: 690f3357d7f3b8f107864325de2190f20260369eddc5d30bd8c99057d7f378d2
                                                      • Opcode Fuzzy Hash: 6218c6c2fb9451a17f77c2bb797b492f1626bc5d3910a3f1f10820abaf446096
                                                      • Instruction Fuzzy Hash: D9F04475A40208EADF10EAD58C45BDF73BC9B04704F104567EB10E7280EB39AA04CB5D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32,10018C05), ref: 10021D4A
                                                      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 10021D5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: IsProcessorFeaturePresent$KERNEL32
                                                      • API String ID: 1646373207-3105848591
                                                      • Opcode ID: 52f91cba384985d72e24e7e642c3ea1e1a73a93e61eeab7bf516b55f6d64dcda
                                                      • Instruction ID: 836bf0a6e4ae59400666b4504b5a2db79e34c851a083ef9494c8542cb11c8dd3
                                                      • Opcode Fuzzy Hash: 52f91cba384985d72e24e7e642c3ea1e1a73a93e61eeab7bf516b55f6d64dcda
                                                      • Instruction Fuzzy Hash: FFF0D034900919E6EF44AFA1BC496EE7A78FB95746FD20590D5D2B0094DF3180B59391
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00454356,00000000,004543F9,?,?,00000000,00000000,00000000,00000000,00000000,?,004547E9,00000000), ref: 0042DD9A
                                                      • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042DDA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                      • API String ID: 1646373207-4063490227
                                                      • Opcode ID: 90681687b24dd86f9c3e273dd486589356378cd60c5b464a2f7951d6e4eef599
                                                      • Instruction ID: 364facf3dcd8fd4fb48bac821a112922c1d8aa8d1bb3947713f5e14a9d28bbdd
                                                      • Opcode Fuzzy Hash: 90681687b24dd86f9c3e273dd486589356378cd60c5b464a2f7951d6e4eef599
                                                      • Instruction Fuzzy Hash: 8EE026A1B60F0113D700317A5C8375B208E4F84718F90043F3984F52C2DDBCD988462D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EF60), ref: 0042EFF2
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EFF8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                      • API String ID: 1646373207-260599015
                                                      • Opcode ID: e8811ed0a627a4e133d1dc9a4b4f14b5e47b32fb59af0e63981d665b4b5d3b09
                                                      • Instruction ID: d167ebeb3a0c78ffef62d304a6593c01274f0b6b7e47665dfbb0b7c0d901300f
                                                      • Opcode Fuzzy Hash: e8811ed0a627a4e133d1dc9a4b4f14b5e47b32fb59af0e63981d665b4b5d3b09
                                                      • Instruction Fuzzy Hash: 68D0C792712732576A5035F53CC1AAB429CC9156AE3D40077FA40E6143D95DCC1926AC
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049BA76), ref: 0044FDEB
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044FDF1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: NotifyWinEvent$user32.dll
                                                      • API String ID: 1646373207-597752486
                                                      • Opcode ID: 5908743018cfd2f6cefc4491aa27570e9f34bc63df026fe54f1bbb87c612bb86
                                                      • Instruction ID: 223032890b7009ceba89b3f881feb785258270d151d072d0a62a9436c582bc8a
                                                      • Opcode Fuzzy Hash: 5908743018cfd2f6cefc4491aa27570e9f34bc63df026fe54f1bbb87c612bb86
                                                      • Instruction Fuzzy Hash: 4FE012F0D417509AFB00FBB79846B093AE0D76471CB10107FF541A6653DBBC54588B1E
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,0049BACC,00000001,00000000,0049BAF0), ref: 0049B7F6
                                                      • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0049B7FC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: DisableProcessWindowsGhosting$user32.dll
                                                      • API String ID: 1646373207-834958232
                                                      • Opcode ID: 9ab8e43da6454e8868478a7b9e10f81f4b0d0e94fccef25b277911ace8fae704
                                                      • Instruction ID: 54119c6ef0f49054147f19105d5d020da2821b8521f233d32c589f61db0a4d0d
                                                      • Opcode Fuzzy Hash: 9ab8e43da6454e8868478a7b9e10f81f4b0d0e94fccef25b277911ace8fae704
                                                      • Instruction Fuzzy Hash: E5B09280681A01509C00B2B22E02A6B080CCC887997240037B400B00C6CF6C844504BD
                                                      APIs
                                                      • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FA24,?,?,?,?,00000000,0047FB79,?,?,?,00000000,?,0047FC88), ref: 0047FA00
                                                      • FindClose.KERNEL32(000000FF,0047FA2B,0047FA24,?,?,?,?,00000000,0047FB79,?,?,?,00000000,?,0047FC88,00000000), ref: 0047FA1E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileNext
                                                      • String ID:
                                                      • API String ID: 2066263336-0
                                                      • Opcode ID: 782f464fb3219a71b0426b89cfcc2a1ae4ac0cdfd739204b341c0cf05095bebc
                                                      • Instruction ID: a2492a823a8cbc0112e5e27725a6df3c9536d0a8ebd69a23b4f87c8590b3ed18
                                                      • Opcode Fuzzy Hash: 782f464fb3219a71b0426b89cfcc2a1ae4ac0cdfd739204b341c0cf05095bebc
                                                      • Instruction Fuzzy Hash: AE814F7090024DAFCF11DFA5CC51AEFBBB8EB49304F5080BAE508A7291D7399A4ACF55
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 004141D6
                                                      • GetDesktopWindow.USER32 ref: 0041428E
                                                        • Part of subcall function 00419350: 6FC2C6F0.COMCTL32(?,00000000,00414453,00000000,00414563,?,?,0049E62C), ref: 0041936C
                                                        • Part of subcall function 00419350: ShowCursor.USER32(00000001,?,00000000,00414453,00000000,00414563,?,?,0049E62C), ref: 00419389
                                                      • SetCursor.USER32(00000000,?,?,?,?,00413F83,00000000,00413F96), ref: 004142CC
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CursorDesktopWindow$Show
                                                      • String ID:
                                                      • API String ID: 2074268717-0
                                                      • Opcode ID: 8cfee51e6bd22bc240f75105183b6b05eca44474532d8ed2e66bef73f0c2bade
                                                      • Instruction ID: 19a59601e3d98a3dbb13d851837e3bb0d350916c882c7f1eea00ba3daa39fbf9
                                                      • Opcode Fuzzy Hash: 8cfee51e6bd22bc240f75105183b6b05eca44474532d8ed2e66bef73f0c2bade
                                                      • Instruction Fuzzy Hash: 1B414C74600161EFCB10EF6AE988B9637E1ABA5318B4588BBF414CB365D738DC81CB1D
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 10022D4B
                                                      • __isleadbyte_l.LIBCMT ref: 10022D7F
                                                      • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,A045FF98,?,00000000,?,?,?,1001976C,?,?,00000002), ref: 10022DB0
                                                      • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,?,00000000,?,?,?,1001976C,?,?,00000002), ref: 10022E1E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 01cb28d65e255065f856e53455069d490a0d56db272263c896bbdf87778fb01a
                                                      • Instruction ID: 329c05c60c342fa6dc16da6eb877a45b4e190b72b387b2956c432082f24e4741
                                                      • Opcode Fuzzy Hash: 01cb28d65e255065f856e53455069d490a0d56db272263c896bbdf87778fb01a
                                                      • Instruction Fuzzy Hash: B531CF31A00286FFDB10DFE4E885AAE7BE9FF01251F9285A9E8649B1A1D730DD40DB51
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408F05
                                                      • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408F74
                                                      • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 0040900F
                                                      • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0040904E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: LoadString$FileMessageModuleName
                                                      • String ID:
                                                      • API String ID: 704749118-0
                                                      • Opcode ID: 812d311920031a8e66895dbedfea53089e64aafa65463e8f60422c8f645d5955
                                                      • Instruction ID: ceac9c6dafe2e417819c9b5c7653bc03c0e73b1c5c8721bcefa97444966463b6
                                                      • Opcode Fuzzy Hash: 812d311920031a8e66895dbedfea53089e64aafa65463e8f60422c8f645d5955
                                                      • Instruction Fuzzy Hash: 6B3152716083819EE330EB65C945B9B77D89B86704F00483EB6C8EB2D2DBB999048767
                                                      APIs
                                                      • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044EF79
                                                        • Part of subcall function 0044D5BC: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044D5EE
                                                      • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044EFFD
                                                        • Part of subcall function 0042C044: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042C058
                                                      • IsRectEmpty.USER32(?), ref: 0044EFBF
                                                      • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044EFE2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                      • String ID:
                                                      • API String ID: 855768636-0
                                                      • Opcode ID: 9e5418f1d691a9325b46ebb0c0de8143c548934329e90edb6007b66489b6f05d
                                                      • Instruction ID: 10a93ef1daca5ec4afac806ac6fb62918bca6b9886f72cf97470359dbd205846
                                                      • Opcode Fuzzy Hash: 9e5418f1d691a9325b46ebb0c0de8143c548934329e90edb6007b66489b6f05d
                                                      • Instruction Fuzzy Hash: F211387170030027E720BA7E9C86B5B76899B88748F04083FB545EB383DD79D80987AA
                                                      APIs
                                                      • OffsetRect.USER32(?,?,00000000), ref: 004987F4
                                                      • OffsetRect.USER32(?,00000000,?), ref: 0049880F
                                                      • OffsetRect.USER32(?,?,00000000), ref: 00498829
                                                      • OffsetRect.USER32(?,00000000,?), ref: 00498844
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: OffsetRect
                                                      • String ID:
                                                      • API String ID: 177026234-0
                                                      • Opcode ID: 6336d15f36953f24f9fc14a3ec9817a63ff553bf727e99fcd033c27e753f75de
                                                      • Instruction ID: 3054ac6025076f3b6e7609c5ec68807071a52c8bb3756e2ec3ebb03cdf9dd8d0
                                                      • Opcode Fuzzy Hash: 6336d15f36953f24f9fc14a3ec9817a63ff553bf727e99fcd033c27e753f75de
                                                      • Instruction Fuzzy Hash: A4213BB66042019BD700DE6DCD85E6BB7EEEBC4300F54CA2EF554C724ADA34E94487A6
                                                      APIs
                                                      • GetCursorPos.USER32 ref: 004176F0
                                                      • SetCursor.USER32(00000000), ref: 00417733
                                                      • GetLastActivePopup.USER32(?), ref: 0041775D
                                                      • GetForegroundWindow.USER32(?), ref: 00417764
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                      • String ID:
                                                      • API String ID: 1959210111-0
                                                      • Opcode ID: e473d6fd5258e5271c1e4462a64c5a209d04cf0713861ccc24dc9748cac10f85
                                                      • Instruction ID: 2e5a0fdf5ba03c47f255224e58a8cf5d0223c50b95843e628a0bc5c759944eb4
                                                      • Opcode Fuzzy Hash: e473d6fd5258e5271c1e4462a64c5a209d04cf0713861ccc24dc9748cac10f85
                                                      • Instruction Fuzzy Hash: C521A1342086018ACB10EF2AD885ADB33B1AB54754F45456BE4658B3A2D73CFC80CB89
                                                      APIs
                                                      • FtpGetFileSize.WININET(?,?), ref: 1001386B
                                                      • HttpQueryInfoA.WININET(?,20000005,?,?,?), ref: 100138AC
                                                      • InternetCloseHandle.WININET(?), ref: 100138D8
                                                      • InternetCloseHandle.WININET(?), ref: 100138EF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleInternet$FileHttpInfoQuerySize
                                                      • String ID:
                                                      • API String ID: 3196265937-0
                                                      • Opcode ID: 9ee172b47f6cda229a24c54c5b7c5d8e0de0e7e8b0d3f506f038409a2315639d
                                                      • Instruction ID: 66675e9abe107ef4515a1fce17a470345106ff4a24ee28f0b8a9fe09c6c0636f
                                                      • Opcode Fuzzy Hash: 9ee172b47f6cda229a24c54c5b7c5d8e0de0e7e8b0d3f506f038409a2315639d
                                                      • Instruction Fuzzy Hash: FE112B716047059FE310DF6AC884B97B7E9FB88364F504A2DF969C2240DB34EA498A21
                                                      APIs
                                                      • InternetOpenA.WININET(?,?,?,00000000,00000000), ref: 10001ED5
                                                      • InternetSetOptionA.WININET(00000000,00000002,000000FE,00000004), ref: 10001F01
                                                      • InternetSetOptionA.WININET(00000000,00000005,000000FE,00000004), ref: 10001F1B
                                                      • InternetSetOptionA.WININET(00000000,00000006,?,00000004), ref: 10001F35
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Internet$Option$Open
                                                      • String ID:
                                                      • API String ID: 1764825000-0
                                                      • Opcode ID: fead50b3e73745da6217dd3236f5ad90378ca3a703bf12bc2f084a612d43aa39
                                                      • Instruction ID: 36ce0c1a3cfa839c792adb72fd13ae93b827a54613ac2458d02bdd792e6c7646
                                                      • Opcode Fuzzy Hash: fead50b3e73745da6217dd3236f5ad90378ca3a703bf12bc2f084a612d43aa39
                                                      • Instruction Fuzzy Hash: 7C112970200B46EBE774CA70CC49FEBB3E8EB84795F504A2CE6A6961C0D7B4B8458B10
                                                      APIs
                                                      • MulDiv.KERNEL32(8B500000,00000008,?), ref: 0049845D
                                                      • MulDiv.KERNEL32(50142444,00000008,?), ref: 00498471
                                                      • MulDiv.KERNEL32(F6D0DBE8,00000008,?), ref: 00498485
                                                      • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 004984A3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 132935396d45b7e69a68efe33a8bbc5bdde74f5cffd31387bad91a8df47aab5f
                                                      • Instruction ID: 16986aa08010ea5786b5adfb16098ff8e4cfd335a8687684758257d255a94a27
                                                      • Opcode Fuzzy Hash: 132935396d45b7e69a68efe33a8bbc5bdde74f5cffd31387bad91a8df47aab5f
                                                      • Instruction Fuzzy Hash: E6112172604214ABCB40DFADC8C4D9B7BECEF4D330B14416AF918DB246DA34ED408BA4
                                                      APIs
                                                      • GetClassInfoA.USER32(00400000,0041F900,?), ref: 0041F931
                                                      • UnregisterClassA.USER32(0041F900,00400000), ref: 0041F95A
                                                      • RegisterClassA.USER32(0049C598), ref: 0041F964
                                                      • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F99F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Class$InfoLongRegisterUnregisterWindow
                                                      • String ID:
                                                      • API String ID: 4025006896-0
                                                      • Opcode ID: 5f2beac9259aabfde2fa88ee50984dcdd8da4d914c3ba614155804bbda9a3f11
                                                      • Instruction ID: 68e5657fabb3e6ce4c602d6ce4962bfcd13d5dfe703a8334c3f88caa16143e55
                                                      • Opcode Fuzzy Hash: 5f2beac9259aabfde2fa88ee50984dcdd8da4d914c3ba614155804bbda9a3f11
                                                      • Instruction Fuzzy Hash: 10019EB22001147BCB10EF69DC81E9B3798A719324B10413BBA05EB2E1C63AAC158BAD
                                                      APIs
                                                      • WaitForInputIdle.USER32(?,00000032), ref: 004557A4
                                                      • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004557C6
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004557D5
                                                      • CloseHandle.KERNEL32(?,00455802,004557FB,?,?,?,00000000,?,?,004559D7,?,?,?,00000044,00000000,00000000), ref: 004557F5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                      • String ID:
                                                      • API String ID: 4071923889-0
                                                      • Opcode ID: 57295d33ad6a1093ec6467e7b000eac01f0bccdd93fbf097cc2358da62840bd5
                                                      • Instruction ID: 5ee05597952c7b60c0905264d30be017cf261a6af7f6414952b470fafc47fcf8
                                                      • Opcode Fuzzy Hash: 57295d33ad6a1093ec6467e7b000eac01f0bccdd93fbf097cc2358da62840bd5
                                                      • Instruction Fuzzy Hash: B801B970A40A18BEEB10D7A58C16F7BBBACDF49770F610567F904D72C2D5B85D00C668
                                                      APIs
                                                      • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D4B7
                                                      • LoadResource.KERNEL32(00400000,72756F73,0040AC58,00400000,00000001,00000000,?,0040D414,00000000,?,00000000,?,?,0047ED94,0000000A,00000000), ref: 0040D4D1
                                                      • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040AC58,00400000,00000001,00000000,?,0040D414,00000000,?,00000000,?,?,0047ED94), ref: 0040D4EB
                                                      • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040AC58,00400000,00000001,00000000,?,0040D414,00000000,?,00000000,?), ref: 0040D4F5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID:
                                                      • API String ID: 3473537107-0
                                                      • Opcode ID: 9bd8c699d2ce0c84cebcbedeaf10d9de5ae675f1ab96295db303bf00b8c9f240
                                                      • Instruction ID: 6e22508d3f73bf4cb8027158dc6397cf7561c54783b82958bb500a3598b7952a
                                                      • Opcode Fuzzy Hash: 9bd8c699d2ce0c84cebcbedeaf10d9de5ae675f1ab96295db303bf00b8c9f240
                                                      • Instruction Fuzzy Hash: 66F017736055046F9744EEADA881D6B77DCDE48364310417FF908D7246D938DD118B78
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
                                                      • Instruction ID: e65e0fb3893ad0086685bf588fe0b1a9c84b709b96e47e72e07466fa111e5513
                                                      • Opcode Fuzzy Hash: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
                                                      • Instruction Fuzzy Hash: C001833A44014EBBCF128F80EC418DE3F62FF28284F958414FE5954031C332D971AB81
                                                      APIs
                                                        • Part of subcall function 0042E2AC: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00485FB3,?,00000001,?,?,00485FB3,?,00000001,00000000), ref: 0042E2C8
                                                      • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045C03E,?,?,?,?,?,00000000,0045C065), ref: 00456608
                                                      • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045C03E,?,?,?,?,?,00000000), ref: 00456611
                                                      • RemoveFontResourceA.GDI32(00000000), ref: 0045661E
                                                      • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00456632
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                      • String ID:
                                                      • API String ID: 4283692357-0
                                                      • Opcode ID: 0144adda08525407a7e8f3b5244105c9112ab39d3edb3319c9ec77ff886cb319
                                                      • Instruction ID: 8f096fb0a68a4ca8fa6e8945f44f96b9dbd63233ba955a9cb78d2d10420d775d
                                                      • Opcode Fuzzy Hash: 0144adda08525407a7e8f3b5244105c9112ab39d3edb3319c9ec77ff886cb319
                                                      • Instruction Fuzzy Hash: A4F05EB574131076EA10B6B69D87F5B268C8F54745F50483BBA00EF2C3D97CD805566E
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,00000000), ref: 004716A9
                                                      Strings
                                                      • Setting NTFS compression on directory: %s, xrefs: 00471677
                                                      • Failed to set NTFS compression state (%d)., xrefs: 004716BA
                                                      • Unsetting NTFS compression on directory: %s, xrefs: 0047168F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                      • API String ID: 1452528299-1392080489
                                                      • Opcode ID: 4cef6f6a4a71dfcfdb95b2b4fcf457652783e7f00feeb96097633952fc34e028
                                                      • Instruction ID: 126f6134b27ad8e4671cf18fb541cded6235f59fca6c90d789c2948c6de7ddb8
                                                      • Opcode Fuzzy Hash: 4cef6f6a4a71dfcfdb95b2b4fcf457652783e7f00feeb96097633952fc34e028
                                                      • Instruction Fuzzy Hash: 9C014F30E082486BCB04DBAD54412DDBBE49F4D305F58C1EFA458E7292DA780A088BAA
                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000000), ref: 00471E55
                                                      Strings
                                                      • Setting NTFS compression on file: %s, xrefs: 00471E23
                                                      • Unsetting NTFS compression on file: %s, xrefs: 00471E3B
                                                      • Failed to set NTFS compression state (%d)., xrefs: 00471E66
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                      • API String ID: 1452528299-3038984924
                                                      • Opcode ID: 8e8a0c5cdfe0ce8b7a8857350832ba381cbecebb6f103b99e3fa8de1305063f7
                                                      • Instruction ID: f6184f432152a0a7fc1a05f21f829c234c5ebe7cab1ff57a01f48c4da343ccce
                                                      • Opcode Fuzzy Hash: 8e8a0c5cdfe0ce8b7a8857350832ba381cbecebb6f103b99e3fa8de1305063f7
                                                      • Instruction Fuzzy Hash: 6F01A230E0824866DB00DBED54412DDBBE58F4D344F54C1EFAC58E7392DF780A088B9A
                                                      APIs
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 100035DF
                                                      • TranslateMessage.USER32(?), ref: 100035F4
                                                      • DispatchMessageA.USER32(?), ref: 100035F7
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 10003602
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Message$Peek$DispatchTranslate
                                                      • String ID:
                                                      • API String ID: 1795658109-0
                                                      • Opcode ID: 1f3e084d03dfef12975d8d0d23ba00e1d6486804f9d89c5be42f2a9b48817671
                                                      • Instruction ID: f22ecac74d8b84270f57e9e7b9dfb41fae66a4d7bb78910db73619bb1d974a17
                                                      • Opcode Fuzzy Hash: 1f3e084d03dfef12975d8d0d23ba00e1d6486804f9d89c5be42f2a9b48817671
                                                      • Instruction Fuzzy Hash: C1F0657278572536F22252165C82F9B638D9B46BD8F224011F700661D4D696A94241AC
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountSleepTick
                                                      • String ID:
                                                      • API String ID: 2227064392-0
                                                      • Opcode ID: 3a97ad30cdd890e38319d0d446ae931dd422a5845237926ba868b52b95081b14
                                                      • Instruction ID: 0807e7f7cf1e805980a62751cbb38808fe0fbb755af5a0e062f1309e6a3556a9
                                                      • Opcode Fuzzy Hash: 3a97ad30cdd890e38319d0d446ae931dd422a5845237926ba868b52b95081b14
                                                      • Instruction Fuzzy Hash: 3BE02B3230910065C72075BF18966BF498ACE89368F148BBFF088E7686C81C8C05957E
                                                      APIs
                                                      • ___set_flsgetvalue.LIBCMT ref: 10014369
                                                        • Part of subcall function 10017EF2: TlsGetValue.KERNEL32(10018035), ref: 10017EF8
                                                        • Part of subcall function 10017EF2: __decode_pointer.LIBCMT ref: 10017F08
                                                        • Part of subcall function 10017EF2: TlsSetValue.KERNEL32(00000000), ref: 10017F15
                                                        • Part of subcall function 10017ED7: TlsGetValue.KERNEL32(?,10014379,00000000), ref: 10017EE1
                                                      • __freefls@4.LIBCMT ref: 100143B4
                                                        • Part of subcall function 10017F1C: __decode_pointer.LIBCMT ref: 10017F2A
                                                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 10014390
                                                      • ExitThread.KERNEL32 ref: 10014397
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Value$__decode_pointer$ErrorExitLastThread___set_flsgetvalue__freefls@4
                                                      • String ID:
                                                      • API String ID: 3839060521-0
                                                      • Opcode ID: a4fe926313d7a6d2242ddb2f43980a825445d5553d511e076acb9c5b280ba196
                                                      • Instruction ID: 2fc379692e8ee6ba6c64bcc6eeed7fa4d366cb4c915913473749003525cc6407
                                                      • Opcode Fuzzy Hash: a4fe926313d7a6d2242ddb2f43980a825445d5553d511e076acb9c5b280ba196
                                                      • Instruction Fuzzy Hash: D8F0F9785002519FE708EBA0CD8AA1A7BE9EF48344F228558F91C8B172DF34EDD6DA11
                                                      APIs
                                                        • Part of subcall function 100180A9: __getptd_noexit.LIBCMT ref: 100180AA
                                                        • Part of subcall function 100180A9: __amsg_exit.LIBCMT ref: 100180B7
                                                      • __getptd_noexit.LIBCMT ref: 100142FE
                                                      • CloseHandle.KERNEL32(?), ref: 10014312
                                                      • __freeptd.LIBCMT ref: 10014319
                                                      • ExitThread.KERNEL32 ref: 10014321
                                                        • Part of subcall function 10018442: __FindPESection.LIBCMT ref: 10018469
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit$CloseExitFindHandleSectionThread__amsg_exit__freeptd
                                                      • String ID:
                                                      • API String ID: 3726980375-0
                                                      • Opcode ID: 150d0a0add5352be1a4b1858eddbd6e54890c39aa76365abe1068670a54ed427
                                                      • Instruction ID: ff4ef8a4f2f0ea5e82b298b28a641943d379afee87524f1c2ba5b1f9fc7bdd63
                                                      • Opcode Fuzzy Hash: 150d0a0add5352be1a4b1858eddbd6e54890c39aa76365abe1068670a54ed427
                                                      • Instruction Fuzzy Hash: D3F08C36801625AFE345E7A08C89FDD3BA5DF00792F620200F5229E0B1CF74DBC69766
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000008,?,00000001,00000000,00000002,00000000,0048361D,?,?,?,?,?,0049BB5F,00000000,0049BB87), ref: 0047A381
                                                      • OpenProcessToken.ADVAPI32(00000000,00000008,?,00000001,00000000,00000002,00000000,0048361D,?,?,?,?,?,0049BB5F,00000000,0049BB87), ref: 0047A387
                                                      • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,00000001,00000000,00000002,00000000,0048361D), ref: 0047A3A9
                                                      • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,00000001,00000000,00000002,00000000,0048361D), ref: 0047A3BA
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                      • String ID:
                                                      • API String ID: 215268677-0
                                                      • Opcode ID: f93ed52c88d90ba5c528f42d115abfb4af007baf83d414758cff02644cdb3cd3
                                                      • Instruction ID: c90943684b1729c40737559502ac118c81e83100165bab7ebfc4b972d9605339
                                                      • Opcode Fuzzy Hash: f93ed52c88d90ba5c528f42d115abfb4af007baf83d414758cff02644cdb3cd3
                                                      • Instruction Fuzzy Hash: 94F037616443006BD600EAB58D81E5F73DCDB44354F04883A7E94C72C1E678DC18A776
                                                      APIs
                                                      • GetLastActivePopup.USER32(?), ref: 004246DC
                                                      • IsWindowVisible.USER32(?), ref: 004246ED
                                                      • IsWindowEnabled.USER32(?), ref: 004246F7
                                                      • SetForegroundWindow.USER32(?), ref: 00424701
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                      • String ID:
                                                      • API String ID: 2280970139-0
                                                      • Opcode ID: be5d64faa6e157b5653d3523cc15ea2db8985bb2f0094ead62a70df3ff2b4bec
                                                      • Instruction ID: 089861d4a48d175db2243411625799630e322bd2ba2e4807a6d4d74949adae11
                                                      • Opcode Fuzzy Hash: be5d64faa6e157b5653d3523cc15ea2db8985bb2f0094ead62a70df3ff2b4bec
                                                      • Instruction Fuzzy Hash: 1CE08691B03531129E31FAA518D1A9B018CEDC6B843461127FC26F7243DB1CCC0041BC
                                                      APIs
                                                      • GlobalHandle.KERNEL32 ref: 00406287
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                      • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                      • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocHandleLockUnlock
                                                      • String ID:
                                                      • API String ID: 2167344118-0
                                                      • Opcode ID: a3b8d3293011eaaa35143cb505ff432a4562d86b91654664e64843e7403df00d
                                                      • Instruction ID: 024a49765fc045a09389489d8ed5919b86daafa6bea6a005e9f609907830066e
                                                      • Opcode Fuzzy Hash: a3b8d3293011eaaa35143cb505ff432a4562d86b91654664e64843e7403df00d
                                                      • Instruction Fuzzy Hash: 64B009C6925A46B8EC0473B24C4BD3F041CE88472C3809A6E7554BA0839C7C9C002E3A
                                                      APIs
                                                        • Part of subcall function 10001E80: InternetOpenA.WININET(?,?,?,00000000,00000000), ref: 10001ED5
                                                      • GetTickCount.KERNEL32 ref: 1000240A
                                                        • Part of subcall function 10003810: GetLastError.KERNEL32(EC6CF6C6,?,?,?,00000000,10027C48,000000FF,100030EE,?,Download failed), ref: 10003835
                                                      • InternetCloseHandle.WININET(?), ref: 100026C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Internet$CloseCountErrorHandleLastOpenTick
                                                      • String ID: Starting download...
                                                      • API String ID: 2714926856-2667269516
                                                      • Opcode ID: e167a1e1c28e1c859388f78e7bbe5d42e93a878a9d2667b8d75a20d07f1c78e5
                                                      • Instruction ID: 7e04c7f06969f049970f30f1c27fce7ad9f0dd45213ba74aca60a0fa978390b5
                                                      • Opcode Fuzzy Hash: e167a1e1c28e1c859388f78e7bbe5d42e93a878a9d2667b8d75a20d07f1c78e5
                                                      • Instruction Fuzzy Hash: 1BB12570A04741AFE720DF24C48179AB7E5FF853A4F14466DF8585B28ACB71B885CBE2
                                                      APIs
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047DD3D,?,00000000,00000000,00000001,00000000,0047C6ED,?,00000000), ref: 0047C6B1
                                                      Strings
                                                      • Failed to parse "reg" constant, xrefs: 0047C6B8
                                                      • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047C525
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                      • API String ID: 3535843008-1938159461
                                                      • Opcode ID: be73ed550b73c9f20417e78dc73e822ec0b2bde051a3891d29eeba9427ee46df
                                                      • Instruction ID: 4f1aaac30373af7a786909edf03acd4fac9d6a039f8d9495eedf865a7040ef78
                                                      • Opcode Fuzzy Hash: be73ed550b73c9f20417e78dc73e822ec0b2bde051a3891d29eeba9427ee46df
                                                      • Instruction Fuzzy Hash: FE813274E00118AFCB11EF95D481ADEBBF9AF48354F60816AE414B7391D738AE45CB98
                                                      APIs
                                                        • Part of subcall function 00451104: SetEndOfFile.KERNEL32(?,?,0045CBD2,00000000,0045CD5D,?,00000000,00000002,00000002), ref: 0045110B
                                                      • FlushFileBuffers.KERNEL32(?), ref: 0045CD29
                                                      Strings
                                                      • EndOffset range exceeded, xrefs: 0045CC5D
                                                      • NumRecs range exceeded, xrefs: 0045CC26
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: File$BuffersFlush
                                                      • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                      • API String ID: 3593489403-659731555
                                                      • Opcode ID: c7e604c63b29e8d075c99916e6d10cbafca466e6adb22fecd52460a6388c3f12
                                                      • Instruction ID: 31f4abf116af19d9e5b678acab2297332ff925687264b8022cc2431fdfe05cd7
                                                      • Opcode Fuzzy Hash: c7e604c63b29e8d075c99916e6d10cbafca466e6adb22fecd52460a6388c3f12
                                                      • Instruction Fuzzy Hash: 95617234A002948FDB25DF25C891BDAB7B5AF49305F0084DAED899B352D674AEC8CF54
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,00485AD6,?,00000000,00485B17,?,?,?,?,00000000,00000000,00000000,?,0046D345), ref: 00485985
                                                      • SetActiveWindow.USER32(?,00000000,00485AD6,?,00000000,00485B17,?,?,?,?,00000000,00000000,00000000,?,0046D345), ref: 00485997
                                                      Strings
                                                      • Will not restart Windows automatically., xrefs: 00485AB6
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveForeground
                                                      • String ID: Will not restart Windows automatically.
                                                      • API String ID: 307657957-4169339592
                                                      • Opcode ID: 9d8835dc8d46110495ea61d090e603bececdbc6f3ad0e802ffcb83f831e3beb0
                                                      • Instruction ID: f83d4e2d24e7b328884665d644b63d6f540d85ee55f206053ba059ac37762111
                                                      • Opcode Fuzzy Hash: 9d8835dc8d46110495ea61d090e603bececdbc6f3ad0e802ffcb83f831e3beb0
                                                      • Instruction Fuzzy Hash: 5E411830204A40DFD715FB64DC85BAE7BE89B25308F5549B7E880D73A2D67C9848D71E
                                                      Strings
                                                      • Failed to proceed to next wizard page; aborting., xrefs: 0046E2D0
                                                      • Failed to proceed to next wizard page; showing wizard., xrefs: 0046E2E4
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                      • API String ID: 0-1974262853
                                                      • Opcode ID: 6c0b08fdae734d3c1eb3fe3f4fe9577e29954076c18d8d916fa6dcbbbaf4cb5a
                                                      • Instruction ID: 70d08a633ec7b89d525ec852f300456f6342c088b46b0ce34def68a00de2c099
                                                      • Opcode Fuzzy Hash: 6c0b08fdae734d3c1eb3fe3f4fe9577e29954076c18d8d916fa6dcbbbaf4cb5a
                                                      • Instruction Fuzzy Hash: 1C31B074604240DFD711DB9AD985F9977F9AB15304F6400FBF4049B3A2E738AE84DB1A
                                                      APIs
                                                      • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 00450935
                                                      • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00450966
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ExecuteMessageSendShell
                                                      • String ID: open
                                                      • API String ID: 812272486-2758837156
                                                      • Opcode ID: 41377852c43bddfddcae31f96e2b69fa43cefbc2a0355827ec7b6d4d68a21241
                                                      • Instruction ID: 9d2ddf54ec7714fdda98ff8d0cc6f814dd21c32a1b145895e499ae4a69db9d05
                                                      • Opcode Fuzzy Hash: 41377852c43bddfddcae31f96e2b69fa43cefbc2a0355827ec7b6d4d68a21241
                                                      • Instruction Fuzzy Hash: 2F212EB4E00604AFEB10DF6AC881B9EB7F8EB44705F10857AB401F7297D6789A45CA58
                                                      APIs
                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00455B28
                                                      • GetLastError.KERNEL32(0000003C,00000000,00455B71,?,?,?), ref: 00455B39
                                                        • Part of subcall function 0042DD54: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042DD67
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: DirectoryErrorExecuteLastShellSystem
                                                      • String ID: <
                                                      • API String ID: 893404051-4251816714
                                                      • Opcode ID: 8905fb652c31356344cf329a6b31199d683e67ad4c0ae43da576633582a19355
                                                      • Instruction ID: 999fafdfd618aac71dabfb14027d48496d6343d42a6da5b956ec7361bda3743f
                                                      • Opcode Fuzzy Hash: 8905fb652c31356344cf329a6b31199d683e67ad4c0ae43da576633582a19355
                                                      • Instruction Fuzzy Hash: 48216570A00609AFDB10DF65D8926AE7BF8EF05345F50443BF844E7291D7789E49CB58
                                                      APIs
                                                      • RtlEnterCriticalSection.KERNEL32(0049E420,00000000,)), ref: 004025C7
                                                      • RtlLeaveCriticalSection.KERNEL32(0049E420,0040263D), ref: 00402630
                                                        • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049E420,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                        • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049E420,0049E420,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                        • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049E420,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                        • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049E420,00401A89,00000000,00401A82,?,?,0040222E,0049E460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                      • String ID: )
                                                      • API String ID: 2227675388-1084416617
                                                      • Opcode ID: 662812d5b2f770babba1450f84ee1e78b681317e28eec64c8fceec8e84081569
                                                      • Instruction ID: 917976a40c8b6a40365e5f884633a4dcf06f5f23cdaa1afef62ceea8ee6a87c6
                                                      • Opcode Fuzzy Hash: 662812d5b2f770babba1450f84ee1e78b681317e28eec64c8fceec8e84081569
                                                      • Instruction Fuzzy Hash: F61101317042046FEB25EB7A9F1A62A6AD4D795758B24087FF404F33D2D9FD9C02826C
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004999D5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Window
                                                      • String ID: /INITPROCWND=$%x $@
                                                      • API String ID: 2353593579-4169826103
                                                      • Opcode ID: b77a36dcc97026e4c7e84e03e5d2da815b65b232eacde215835398ce835a4be4
                                                      • Instruction ID: 16850a3933f6126195f36b65bc9072021203f0d8c6b6540213bbd0006db66c27
                                                      • Opcode Fuzzy Hash: b77a36dcc97026e4c7e84e03e5d2da815b65b232eacde215835398ce835a4be4
                                                      • Instruction Fuzzy Hash: 8B11AF71A042498FDB01DBA9D851BAEBBF9EB98304F50847FE804E7292D63D9D058B58
                                                      APIs
                                                        • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                        • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                      • SysFreeString.OLEAUT32(?), ref: 004479B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: String$AllocByteCharFreeMultiWide
                                                      • String ID: NIL Interface Exception$Unknown Method
                                                      • API String ID: 3952431833-1023667238
                                                      • Opcode ID: d7c63457d166a350f53d970eb0409965f77a8d21c5a8cfae6addd8da613f3b75
                                                      • Instruction ID: 6ea0978f5b97d4648a43087cb94c4cadf7395b3a3abdd2f7dcac649bd3e58428
                                                      • Opcode Fuzzy Hash: d7c63457d166a350f53d970eb0409965f77a8d21c5a8cfae6addd8da613f3b75
                                                      • Instruction Fuzzy Hash: A6119371A04244AFEB10DFA58C92AAEBBACEB49704F91407EF504E7281D7789D01CB69
                                                      APIs
                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004992D4,?,004992C8,00000000,004992AF), ref: 0049927A
                                                      • CloseHandle.KERNEL32(00499314,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004992D4,?,004992C8,00000000), ref: 00499291
                                                        • Part of subcall function 00499164: GetLastError.KERNEL32(00000000,004991FC,?,?,?,?), ref: 00499188
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateErrorHandleLastProcess
                                                      • String ID: D
                                                      • API String ID: 3798668922-2746444292
                                                      • Opcode ID: 3852403a966114f0880391513c617ada09f7db3f7ec662499cacf7f263fc3d4a
                                                      • Instruction ID: 28a6660038b4d88ad00b798bd9ba61154fa8ff357054911c5ced557c69a1e98d
                                                      • Opcode Fuzzy Hash: 3852403a966114f0880391513c617ada09f7db3f7ec662499cacf7f263fc3d4a
                                                      • Instruction Fuzzy Hash: B8015EB1604248BFDB00DB96CC42A9F7BACDF49714F51447AF504E72C1D6789E048A28
                                                      APIs
                                                      • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042E208
                                                      • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042E248
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Value$EnumQuery
                                                      • String ID: Inno Setup: No Icons
                                                      • API String ID: 1576479698-2016326496
                                                      • Opcode ID: bd0511ca20757f211e757699c0c9aa78b94ac5dafba73a7c2283d1bafa6b3c91
                                                      • Instruction ID: a539eabee655ef144818f3097a210d44f5522b7a792cb7edb349fa40b75ec101
                                                      • Opcode Fuzzy Hash: bd0511ca20757f211e757699c0c9aa78b94ac5dafba73a7c2283d1bafa6b3c91
                                                      • Instruction Fuzzy Hash: 8C01DB3178D371E9F73545637D42B7B578C9B42B60F64027BF941BA2C0DA589C04927E
                                                      APIs
                                                        • Part of subcall function 00455E14: GetCurrentProcess.KERNEL32(00000028), ref: 00455E23
                                                        • Part of subcall function 00455E14: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00455E29
                                                      • SetForegroundWindow.USER32(?), ref: 0049A71A
                                                      Strings
                                                      • Restarting Windows., xrefs: 0049A6F7
                                                      • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 0049A745
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentForegroundOpenTokenWindow
                                                      • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                      • API String ID: 3179053593-4147564754
                                                      • Opcode ID: bb6777940c6a50ae658ff3ebc4d9c8fd61fcf05fcdd40ee010721d59e4735647
                                                      • Instruction ID: 5122ca49785e6841ab91457b0b89b6e488dcfd7854ae65d0270566c1c2237fbf
                                                      • Opcode Fuzzy Hash: bb6777940c6a50ae658ff3ebc4d9c8fd61fcf05fcdd40ee010721d59e4735647
                                                      • Instruction Fuzzy Hash: EA01D4746041446FEB01FBA5D842B5C2BE99B94309F50447BF400AB2D3DA7CD959875E
                                                      APIs
                                                        • Part of subcall function 0047F300: FreeLibrary.KERNEL32(74A90000,00483DC7), ref: 0047F316
                                                        • Part of subcall function 0047EFD8: GetTickCount.KERNEL32 ref: 0047F022
                                                        • Part of subcall function 00457B24: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 00457B43
                                                      • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049B7DF), ref: 0049AEDD
                                                      • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049B7DF), ref: 0049AEE3
                                                      Strings
                                                      • Detected restart. Removing temporary directory., xrefs: 0049AE97
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                      • String ID: Detected restart. Removing temporary directory.
                                                      • API String ID: 1717587489-3199836293
                                                      • Opcode ID: 228b47364d40a631affd0c677e0885d1ddc7291000f615e4cc02e4ac91571499
                                                      • Instruction ID: 3c913c32d0756031035703f4f4cddf398d0ed36f6509ee9f01125c758f9cf03b
                                                      • Opcode Fuzzy Hash: 228b47364d40a631affd0c677e0885d1ddc7291000f615e4cc02e4ac91571499
                                                      • Instruction Fuzzy Hash: DAE055722082843EDE0277A6BC1382B7F8CD34532D761047BF80481852D92C4820C27E
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047743F), ref: 0047722D
                                                      • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047743F), ref: 00477244
                                                        • Part of subcall function 00453C98: GetLastError.KERNEL32(00000000,0045482D,00000005,00000000,00454862,?,?,00000000,0049E62C,00000004,00000000,00000000,00000000,?,0049B229,00000000), ref: 00453C9B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateErrorFileHandleLast
                                                      • String ID: CreateFile
                                                      • API String ID: 2528220319-823142352
                                                      • Opcode ID: c65408f8976d7c549a038a8c0b1a218b4942c580411e651757ed02999df5e0be
                                                      • Instruction ID: 90e4e6ff62ef8f0e28f50a913bfb33107960128ee808bbf2bf0dc207e29e0456
                                                      • Opcode Fuzzy Hash: c65408f8976d7c549a038a8c0b1a218b4942c580411e651757ed02999df5e0be
                                                      • Instruction Fuzzy Hash: A6E06D306883447BEA20EA69DCC6F4A77889B04768F108152FA58AF3E3C5B9EC408658
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 1001394C
                                                      • __CxxThrowException@8.LIBCMT ref: 1001397E
                                                        • Part of subcall function 1001621B: RaiseException.KERNEL32(?,?,10014774,?,?,?,?,?,10014774,?,1002D024,10031A64), ref: 1001625B
                                                      Strings
                                                      • invalid string position, xrefs: 10013951
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3381047345.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.3381032851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381067522.0000000010029000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381080659.0000000010030000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.3381093281.0000000010034000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid string position
                                                      • API String ID: 1961742612-1799206989
                                                      • Opcode ID: 44a50505c95bcc44ecbbb6ae098b36eb3cc4f9aee659903c1f4b8b2b2202d45e
                                                      • Instruction ID: cc382f927eddd05f6d73bdb53251bee73a652ccb527fc3b47bb6e18114c0897a
                                                      • Opcode Fuzzy Hash: 44a50505c95bcc44ecbbb6ae098b36eb3cc4f9aee659903c1f4b8b2b2202d45e
                                                      • Instruction Fuzzy Hash: 6CE0ECB9810098AADB40DBD0EC51BDDB778FB1C351F800125F205AA489DBB4A5488764
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000,0049BA3A), ref: 0040334B
                                                      • GetCommandLineA.KERNEL32(00000000,0049BA3A), ref: 00403356
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: CommandHandleLineModule
                                                      • String ID: h7v
                                                      • API String ID: 2123368496-2430875575
                                                      • Opcode ID: 507b3439899aadcda4e4dd714f17469bdfd07b248e46d296d00f93cf4dba3756
                                                      • Instruction ID: 98797e2be282b29c5dcb55f6b27639491d6d1699e35d5459d8823e2e9957d9fe
                                                      • Opcode Fuzzy Hash: 507b3439899aadcda4e4dd714f17469bdfd07b248e46d296d00f93cf4dba3756
                                                      • Instruction Fuzzy Hash: 72C002609012159AE750EF7758467152A949751349F80447FB104BE1E1D6BD82055BDE
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3380267985.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000002.00000002.3380250703.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380323665.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380339661.000000000049D000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380357093.000000000049E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000002.00000002.3380375470.00000000004AE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_400000_Setup_DigiSignerOne_x86.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastSleep
                                                      • String ID:
                                                      • API String ID: 1458359878-0
                                                      • Opcode ID: 6a5dd68216f633a44ec124f5b7bc5ae83bc60a54fdb172d1fd1805aed014b2ac
                                                      • Instruction ID: 9465cf589d0d0c12c73eacd3b1eef521cbdc8b34a4c5067471d78d0fd9128cb0
                                                      • Opcode Fuzzy Hash: 6a5dd68216f633a44ec124f5b7bc5ae83bc60a54fdb172d1fd1805aed014b2ac
                                                      • Instruction Fuzzy Hash: 08F02B32B05A14774F20A7BB989357FA28CDE44376710512BFD04D7343D939DE4586A8