Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Open.EXE

Overview

General Information

Sample name:Open.EXE
Analysis ID:1430718
MD5:71b721a82f1db2747fad1df78e11f2ec
SHA1:2239279c93ec64d077550d1f7072385d9b9763f3
SHA256:7f79087dfc16b2b7fdb31c0d15f39fc35eeafe3542a4c81f007d51b8086aecf9
Infos:

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Opens network shares
Binary contains a suspicious time stamp
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Found evasive API chain checking for process token information
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • Open.EXE (PID: 6792 cmdline: "C:\Users\user\Desktop\Open.EXE" MD5: 71B721A82F1DB2747FAD1DF78E11F2EC)
    • cmd.exe (PID: 6964 cmdline: cmd /c \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Open.cmd MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • rundll32.exe (PID: 6700 cmdline: "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\" MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Open.EXE, ProcessId: 6792, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9830EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF73F9830EC
Source: Open.EXEStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: wextract.pdb source: Open.EXE
Source: Binary string: wextract.pdbGCTL source: Open.EXE
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F98204C FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00007FF73F98204C
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F982C54 GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle,0_2_00007FF73F982C54
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F981C0C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,0_2_00007FF73F981C0C
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9866C40_2_00007FF73F9866C4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9840C40_2_00007FF73F9840C4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F986CA40_2_00007FF73F986CA4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F982DB40_2_00007FF73F982DB4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F981D280_2_00007FF73F981D28
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F985D900_2_00007FF73F985D90
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F981C0C0_2_00007FF73F981C0C
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9835300_2_00007FF73F983530
Source: Open.EXEStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, Windows 2000/XP setup, 165 bytes, 1 file, at 0x2c +A "Open.cmd", ID 756, number 1, 1 datablock, 0x1503 compression
Source: Open.EXEBinary or memory string: OriginalFilename vs Open.EXE
Source: Open.EXE, 00000000.00000000.1654646480.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWEXTRACT.EXE D vs Open.EXE
Source: Open.EXE, 00000000.00000000.1654646480.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs Open.EXE
Source: Open.EXEBinary or memory string: OriginalFilenameWEXTRACT.EXE D vs Open.EXE
Source: Open.EXEBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs Open.EXE
Source: classification engineClassification label: sus25.spyw.winEXE@5/1@0/0
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F986CA4 GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,0_2_00007FF73F986CA4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F981C0C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,0_2_00007FF73F981C0C
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9866C4 LocalAlloc,LocalFree,lstrcmpA,LocalFree,GetTempPathA,GetDriveTypeA,GetFileAttributesA,GetDiskFreeSpaceA,MulDiv,GetWindowsDirectoryA,GetFileAttributesA,CreateDirectoryA,SetFileAttributesA,GetWindowsDirectoryA,0_2_00007FF73F9866C4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F987AC8 FindResourceA,LoadResource,DialogBoxIndirectParamA,FreeResource,0_2_00007FF73F987AC8
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3760:120:WilError_03
Source: C:\Users\user\Desktop\Open.EXEFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
Source: Open.EXEStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Open.EXEKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: unknownProcess created: C:\Users\user\Desktop\Open.EXE "C:\Users\user\Desktop\Open.EXE"
Source: C:\Users\user\Desktop\Open.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Open.cmd
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: C:\Users\user\Desktop\Open.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Open.cmdJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: feclient.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Open.EXESection loaded: advpack.dllJump to behavior
Source: Open.EXEStatic PE information: Image base 0x140000000 > 0x60000000
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Open.EXEStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Open.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: Open.EXE
Source: Binary string: wextract.pdbGCTL source: Open.EXE
Source: Open.EXEStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Open.EXEStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Open.EXEStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Open.EXEStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Open.EXEStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: Open.EXEStatic PE information: 0xAE1BC4F8 [Tue Jul 25 12:18:00 2062 UTC]
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9830EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF73F9830EC
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F981684 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,0_2_00007FF73F981684
Source: C:\Users\user\Desktop\Open.EXERegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\Open.EXERegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\Open.EXERegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\Open.EXERegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Open.EXECheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-2343
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F98204C FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00007FF73F98204C
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9864E4 GetSystemInfo,CreateDirectoryA,RemoveDirectoryA,0_2_00007FF73F9864E4
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9830EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF73F9830EC
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F988790 SetUnhandledExceptionFilter,0_2_00007FF73F988790
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F988494 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF73F988494
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F9811CC LoadLibraryA,GetProcAddress,AllocateAndInitializeSid,FreeSid,FreeLibrary,0_2_00007FF73F9811CC
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F988964 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF73F988964
Source: C:\Users\user\Desktop\Open.EXECode function: 0_2_00007FF73F982C54 GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle,0_2_00007FF73F982C54

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\cmd.exeFile opened: \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping1
Network Share Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Process Injection
1
Process Injection
LSASS Memory1
System Time Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
Rundll32
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Timestomp
NTDS5
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1430718 Sample: Open.EXE Startdate: 24/04/2024 Architecture: WINDOWS Score: 25 6 Open.EXE 1 3 2->6         started        8 rundll32.exe 2->8         started        process3 10 cmd.exe 1 6->10         started        signatures4 15 Opens network shares 10->15 13 conhost.exe 10->13         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430718
Start date and time:2024-04-24 04:59:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 8s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Open.EXE
Detection:SUS
Classification:sus25.spyw.winEXE@5/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 29
  • Number of non-executed functions: 27
Cookbook Comments:
  • Found application associated with file extension: .EXE
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\Open.EXE
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):67
Entropy (8bit):4.666470720147067
Encrypted:false
SSDEEP:3:IdEBEUoy5n+Aa769pB5QJzd:/BEFy5+Aa+zQd
MD5:2DC636433B2FD3F8FD682E49C5403E0A
SHA1:DE568814299574D1ED80A38899199C59B33F2A66
SHA-256:FEB49D4AF8491B66F779154560D404394396916C0C0C636690FBA21F402EB45A
SHA-512:7E7F4F24CC0B7561705EF47A8A653C4FEF7391234245255DD1A1A12A2C85ED33C51C6C7A4062FFDEA40E151171EDE73D9525154E9D05CEDE6ED397CDCD0EA268
Malicious:false
Reputation:low
Preview:EXPLORER "\\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\3"
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.869085505362055
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Open.EXE
File size:155'136 bytes
MD5:71b721a82f1db2747fad1df78e11f2ec
SHA1:2239279c93ec64d077550d1f7072385d9b9763f3
SHA256:7f79087dfc16b2b7fdb31c0d15f39fc35eeafe3542a4c81f007d51b8086aecf9
SHA512:bd89c4061b3dfd6cf236af842e5b6f1617198806fe887339ef54e9ad44d69bb32c97744b888a42b85f2b8cc6a08e7dd66ddb4d4eafd1b69ff9e50e64b12582ea
SSDEEP:3072:eahKyd2n31w5GWp1icKAArDZz4N9GhbkrNEkGXuk:eahOwp0yN90QEn
TLSH:D7E3AE5A76E420B6D4B983B584E303939A71B8B15B5406FF27D4D97A1E232C4B232F1B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..e...6...6...6...7...6...7...6...7...6...7...6...6...6...7...6..o6...6...7...6Rich...6................PE..d................."
Icon Hash:3b6120282c4c5a1f
Entrypoint:0x140008200
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0xAE1BC4F8 [Tue Jul 25 12:18:00 2062 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:4cea7ae85c87ddc7295d39ff9cda31d1
Instruction
dec eax
sub esp, 28h
call 00007FBBE88FEED0h
dec eax
add esp, 28h
jmp 00007FBBE88FE77Bh
int3
int3
int3
int3
int3
int3
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], edi
inc ecx
push esi
dec eax
sub esp, 000000B0h
and dword ptr [esp+20h], 00000000h
dec eax
lea ecx, dword ptr [esp+40h]
call dword ptr [000011CDh]
nop
dec eax
mov eax, dword ptr [00000030h]
dec eax
mov ebx, dword ptr [eax+08h]
xor edi, edi
xor eax, eax
dec eax
cmpxchg dword ptr [00004922h], ebx
je 00007FBBE88FE77Ch
dec eax
cmp eax, ebx
jne 00007FBBE88FE78Ch
mov edi, 00000001h
mov eax, dword ptr [00004918h]
cmp eax, 01h
jne 00007FBBE88FE789h
lea ecx, dword ptr [eax+1Eh]
call 00007FBBE88FED63h
jmp 00007FBBE88FE7ECh
mov ecx, 000003E8h
call dword ptr [0000117Eh]
jmp 00007FBBE88FE739h
mov eax, dword ptr [000048F6h]
test eax, eax
jne 00007FBBE88FE7CBh
mov dword ptr [000048E8h], 00000001h
dec esp
lea esi, dword ptr [000013E9h]
dec eax
lea ebx, dword ptr [000013CAh]
dec eax
mov dword ptr [esp+30h], ebx
mov dword ptr [esp+24h], eax
dec ecx
cmp ebx, esi
jnc 00007FBBE88FE797h
test eax, eax
jne 00007FBBE88FE797h
dec eax
cmp dword ptr [ebx], 00000000h
je 00007FBBE88FE782h
dec eax
mov eax, dword ptr [ebx]
dec eax
mov ecx, dword ptr [00001388h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xa23c0xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x1ade8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000x408.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x2a0000x20.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x9a100x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x90100x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x91280x520.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x7b800x7c0060800deac1fde21b98089f2241ee6168False0.5499936995967742data6.096261782871538IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x90000x22c80x240059d15cdf89780817c3d48dd588a6a129False0.4136284722222222data4.727841929207054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xc0000x1f000x4009d1580dccaf8e787a43caf4bba48a079False0.3212890625data3.1889769845125677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xe0000x4080x60015cd12257317071f28e4f7b728f8825eFalse0.3932291666666667data3.1563665040475675IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xf0000x1b0000x1ae00131d4271ea11e905f7f5ba7a1914c86fFalse0.7354106104651162data7.083828180525212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x2a0000x200x200637787151ee546a94902de9694a58fd6False0.083984375data0.4068473715812382IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
AVI0xfa100x2e1aRIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppEnglishUnited States0.2713099474665311
RT_ICON0x1282c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3225609756097561
RT_ICON0x12e940x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.41263440860215056
RT_ICON0x1317c0x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.4569672131147541
RT_ICON0x133640x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5574324324324325
RT_ICON0x1348c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6223347547974414
RT_ICON0x143340x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7369133574007221
RT_ICON0x14bdc0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.783410138248848
RT_ICON0x152a40x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3829479768786127
RT_ICON0x1580c0xd9d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004662673505254
RT_ICON0x231e00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5300829875518672
RT_ICON0x257880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6137429643527205
RT_ICON0x268300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.703688524590164
RT_ICON0x271b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.425531914893617
RT_DIALOG0x276200x1e2dataJapaneseJapan0.6037344398340249
RT_DIALOG0x278040x146dataJapaneseJapan0.6840490797546013
RT_DIALOG0x2794c0x13edataJapaneseJapan0.5880503144654088
RT_DIALOG0x27a8c0x194dataJapaneseJapan0.6386138613861386
RT_DIALOG0x27c200x102dataJapaneseJapan0.6434108527131783
RT_DIALOG0x27d240xeadataJapaneseJapan0.6324786324786325
RT_STRING0x27e100x5eMatlab v4 mat-file (little endian) \213\225U0\2140_0\3250\2410\2440\3530\2220\335OX[Y0\2130\3250\2510\3530\3000\3740\2220x\220\236bW0f0O0`0U0D0\0020\002, numeric, rows 0, columns 0JapaneseJapan0.8191489361702128
RT_STRING0x27e700x2ecdataJapaneseJapan0.6377005347593583
RT_STRING0x2815c0x3b6dataJapaneseJapan0.5652631578947368
RT_STRING0x285140x2d6dataJapaneseJapan0.6033057851239669
RT_STRING0x287ec0x282dataJapaneseJapan0.6557632398753894
RT_STRING0x28a700x1bedataJapaneseJapan0.6165919282511211
RT_RCDATA0x28c300x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x28c380xa5Microsoft Cabinet archive data, Windows 2000/XP setup, 165 bytes, 1 file, at 0x2c +A "Open.cmd", ID 756, number 1, 1 datablock, 0x1503 compressionJapaneseJapan0.8787878787878788
RT_RCDATA0x28ce00x4dataJapaneseJapan3.0
RT_RCDATA0x28ce40x24dataJapaneseJapan0.8888888888888888
RT_RCDATA0x28d080x7ASCII text, with no line terminatorsJapaneseJapan2.142857142857143
RT_RCDATA0x28d100x7ASCII text, with no line terminatorsJapaneseJapan2.142857142857143
RT_RCDATA0x28d180x4dataJapaneseJapan3.0
RT_RCDATA0x28d1c0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x28d240x4dataJapaneseJapan3.0
RT_RCDATA0x28d280x4dASCII text, with no line terminatorsEnglishUnited States1.051948051948052
RT_RCDATA0x28d780x4dataJapaneseJapan3.0
RT_RCDATA0x28d7c0x5ASCII text, with no line terminatorsJapaneseJapan2.6
RT_RCDATA0x28d840x7ASCII text, with no line terminatorsJapaneseJapan2.142857142857143
RT_RCDATA0x28d8c0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_GROUP_ICON0x28d940xbcdataEnglishUnited States0.6117021276595744
RT_VERSION0x28e500x400dataEnglishUnited States0.416015625
RT_VERSION0x292500x3b0dataJapaneseJapan0.4936440677966102
RT_MANIFEST0x296000x7e6XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.37734915924826906
DLLImport
ADVAPI32.dllGetTokenInformation, RegDeleteValueA, RegOpenKeyExA, RegQueryInfoKeyA, FreeSid, OpenProcessToken, RegSetValueExA, RegCreateKeyExA, LookupPrivilegeValueA, AllocateAndInitializeSid, RegQueryValueExA, EqualSid, RegCloseKey, AdjustTokenPrivileges
KERNEL32.dll_lopen, _llseek, CompareStringA, GetLastError, GetFileAttributesA, GetSystemDirectoryA, LoadLibraryA, DeleteFileA, GlobalAlloc, GlobalFree, CloseHandle, WritePrivateProfileStringA, IsDBCSLeadByte, GetWindowsDirectoryA, SetFileAttributesA, GetProcAddress, GlobalLock, LocalFree, RemoveDirectoryA, FreeLibrary, _lclose, CreateDirectoryA, GetPrivateProfileIntA, GetPrivateProfileStringA, GlobalUnlock, ReadFile, SizeofResource, WriteFile, GetDriveTypeA, LoadLibraryExA, SetFileTime, SetFilePointer, FindResourceA, CreateMutexA, GetVolumeInformationA, WaitForSingleObject, GetCurrentDirectoryA, FreeResource, GetVersion, SetCurrentDirectoryA, GetTempPathA, LocalFileTimeToFileTime, CreateFileA, SetEvent, TerminateThread, GetVersionExA, LockResource, GetSystemInfo, CreateThread, ResetEvent, LoadResource, ExitProcess, GetModuleHandleW, CreateProcessA, FormatMessageA, GetTempFileNameA, DosDateTimeToFileTime, CreateEventA, GetExitCodeProcess, ExpandEnvironmentStringsA, LocalAlloc, lstrcmpA, FindNextFileA, GetCurrentProcess, FindFirstFileA, GetModuleFileNameA, GetShortPathNameA, Sleep, GetStartupInfoW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, GetTickCount, EnumResourceLanguagesA, GetDiskFreeSpaceA, MulDiv, FindClose
GDI32.dllGetDeviceCaps
USER32.dllShowWindow, MsgWaitForMultipleObjects, SetWindowPos, GetDC, GetWindowRect, DispatchMessageA, GetSystemMetrics, CallWindowProcA, SetWindowTextA, MessageBoxA, SendDlgItemMessageA, SendMessageA, GetDlgItem, DialogBoxIndirectParamA, GetWindowLongPtrA, SetWindowLongPtrA, SetForegroundWindow, ReleaseDC, EnableWindow, CharNextA, LoadStringA, CharPrevA, EndDialog, MessageBeep, ExitWindowsEx, SetDlgItemTextA, CharUpperA, GetDesktopWindow, PeekMessageA, GetDlgItemTextA
msvcrt.dll?terminate@@YAXXZ, _commode, _fmode, _acmdln, __C_specific_handler, memset, __setusermatherr, _ismbblead, _cexit, _exit, exit, __set_app_type, __getmainargs, _amsg_exit, _XcptFilter, memcpy_s, _vsnprintf, _initterm, memcpy
COMCTL32.dll
Cabinet.dll
VERSION.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
JapaneseJapan
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:04:59:56
Start date:24/04/2024
Path:C:\Users\user\Desktop\Open.EXE
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\Open.EXE"
Imagebase:0x7ff73f980000
File size:155'136 bytes
MD5 hash:71B721A82F1DB2747FAD1DF78E11F2EC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:04:59:56
Start date:24/04/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /c \\fada-planner\Other\RevitTool\01_ToolList\files\3_PLC\exe\3\Open.cmd
Imagebase:0x7ff60b1e0000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:04:59:56
Start date:24/04/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:05:00:06
Start date:24/04/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Imagebase:0x7ff6e5820000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:31.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:41.2%
    Total number of Nodes:928
    Total number of Limit Nodes:42
    execution_graph 2066 7ff73f988200 2085 7ff73f988964 2066->2085 2070 7ff73f98824b 2071 7ff73f98825d 2070->2071 2072 7ff73f988277 Sleep 2070->2072 2073 7ff73f98826d _amsg_exit 2071->2073 2078 7ff73f988284 2071->2078 2072->2070 2073->2078 2074 7ff73f9882fc _initterm 2077 7ff73f988319 _IsNonwritableInCurrentImage 2074->2077 2075 7ff73f9882dd 2076 7ff73f9883f8 _ismbblead 2076->2077 2077->2075 2077->2076 2079 7ff73f98837d 2077->2079 2078->2074 2078->2075 2078->2077 2089 7ff73f982c54 GetVersion 2079->2089 2082 7ff73f9883cf 2082->2075 2084 7ff73f9883d8 _cexit 2082->2084 2083 7ff73f9883c7 exit 2083->2082 2084->2075 2086 7ff73f988990 6 API calls 2085->2086 2087 7ff73f988209 GetStartupInfoW 2085->2087 2088 7ff73f988a0f 2086->2088 2087->2070 2088->2087 2090 7ff73f982c7b 2089->2090 2091 7ff73f982cc3 2089->2091 2090->2091 2092 7ff73f982c7f GetModuleHandleW 2090->2092 2113 7ff73f982db4 2091->2113 2092->2091 2094 7ff73f982c97 GetProcAddress 2092->2094 2094->2091 2096 7ff73f982cb2 2094->2096 2096->2091 2097 7ff73f982d7f 2099 7ff73f982d8b CloseHandle 2097->2099 2100 7ff73f982d97 2097->2100 2099->2100 2100->2082 2100->2083 2104 7ff73f982d5e 2106 7ff73f982d7a 2104->2106 2107 7ff73f982d67 ExitWindowsEx 2104->2107 2105 7ff73f982d33 2228 7ff73f984dcc 2105->2228 2257 7ff73f981c0c GetCurrentProcess OpenProcessToken 2106->2257 2107->2097 2111 7ff73f982d29 2111->2097 2111->2104 2111->2105 2114 7ff73f988b09 2113->2114 2115 7ff73f982df9 memset memset 2114->2115 2265 7ff73f985050 FindResourceA SizeofResource 2115->2265 2118 7ff73f982fb5 2122 7ff73f984dcc 24 API calls 2118->2122 2119 7ff73f982e53 CreateEventA SetEvent 2120 7ff73f985050 7 API calls 2119->2120 2121 7ff73f982e92 2120->2121 2123 7ff73f982e96 2121->2123 2124 7ff73f982ed5 2121->2124 2127 7ff73f982fa3 2121->2127 2150 7ff73f982fd9 2122->2150 2125 7ff73f984dcc 24 API calls 2123->2125 2128 7ff73f985050 7 API calls 2124->2128 2158 7ff73f982eb4 2125->2158 2270 7ff73f9870a8 2127->2270 2131 7ff73f982eec 2128->2131 2131->2123 2133 7ff73f982efe CreateMutexA 2131->2133 2133->2127 2134 7ff73f982f22 GetLastError 2133->2134 2134->2127 2136 7ff73f982f35 2134->2136 2135 7ff73f982fc4 2137 7ff73f982fde FindResourceA 2135->2137 2138 7ff73f982fcd 2135->2138 2139 7ff73f982f4a 2136->2139 2140 7ff73f982f62 2136->2140 2141 7ff73f983014 2137->2141 2142 7ff73f982fff LoadResource 2137->2142 2305 7ff73f98204c 2138->2305 2144 7ff73f984dcc 24 API calls 2139->2144 2147 7ff73f984dcc 24 API calls 2140->2147 2145 7ff73f98301d #17 2141->2145 2146 7ff73f983029 2141->2146 2142->2141 2148 7ff73f982f60 2144->2148 2145->2146 2149 7ff73f98303a 2146->2149 2146->2150 2151 7ff73f982f7c 2147->2151 2152 7ff73f982f81 CloseHandle 2148->2152 2320 7ff73f983bf4 GetVersionExA 2149->2320 2297 7ff73f988470 2150->2297 2151->2127 2151->2152 2152->2150 2158->2150 2159 7ff73f9830ec 2160 7ff73f983116 2159->2160 2161 7ff73f983139 2159->2161 2162 7ff73f983123 2160->2162 2434 7ff73f9860a4 2160->2434 2167 7ff73f983236 2161->2167 2473 7ff73f985fe4 2161->2473 2162->2161 2162->2167 2454 7ff73f983f74 2162->2454 2170 7ff73f988470 7 API calls 2167->2170 2172 7ff73f982ce1 2170->2172 2171 7ff73f98315b GetSystemDirectoryA 2173 7ff73f987ba8 CharPrevA 2171->2173 2203 7ff73f9861ec 2172->2203 2174 7ff73f983186 LoadLibraryA 2173->2174 2175 7ff73f9831c9 FreeLibrary 2174->2175 2176 7ff73f98319f GetProcAddress 2174->2176 2178 7ff73f9831e4 2175->2178 2179 7ff73f983273 SetCurrentDirectoryA 2175->2179 2176->2175 2177 7ff73f9831ba DecryptFileA 2176->2177 2177->2175 2178->2179 2181 7ff73f9831f0 GetWindowsDirectoryA 2178->2181 2180 7ff73f98320d 2179->2180 2187 7ff73f983291 2179->2187 2185 7ff73f984dcc 24 API calls 2180->2185 2181->2180 2183 7ff73f98325a 2181->2183 2182 7ff73f98331f 2182->2167 2189 7ff73f982318 18 API calls 2182->2189 2196 7ff73f983347 2182->2196 2536 7ff73f986ca4 GetCurrentDirectoryA SetCurrentDirectoryA 2183->2536 2188 7ff73f98322b 2185->2188 2187->2182 2190 7ff73f9832fb 2187->2190 2193 7ff73f9832cb 2187->2193 2631 7ff73f987700 GetLastError 2188->2631 2189->2196 2563 7ff73f985d90 2190->2563 2192 7ff73f983368 2192->2167 2197 7ff73f983383 2192->2197 2198 7ff73f987ac8 28 API calls 2193->2198 2194 7ff73f983230 2194->2167 2196->2192 2585 7ff73f9840c4 2196->2585 2642 7ff73f98494c 2197->2642 2199 7ff73f9832f6 2198->2199 2199->2167 2632 7ff73f98772c 2199->2632 2205 7ff73f986214 2203->2205 2204 7ff73f98624c LocalFree LocalFree 2204->2205 2205->2204 2207 7ff73f986229 SetFileAttributesA DeleteFileA 2205->2207 2212 7ff73f986273 2205->2212 2206 7ff73f986311 2208 7ff73f986387 2206->2208 2210 7ff73f98632d RegOpenKeyExA 2206->2210 2207->2204 2209 7ff73f988470 7 API calls 2208->2209 2211 7ff73f982ce8 2209->2211 2210->2208 2213 7ff73f98635e RegDeleteValueA RegCloseKey 2210->2213 2211->2097 2211->2111 2217 7ff73f982318 2211->2217 2212->2206 2214 7ff73f9862f4 SetCurrentDirectoryA 2212->2214 2215 7ff73f987c40 4 API calls 2212->2215 2213->2208 2216 7ff73f98204c 16 API calls 2214->2216 2215->2214 2216->2206 2218 7ff73f982447 2217->2218 2219 7ff73f982330 2217->2219 2891 7ff73f982244 GetWindowsDirectoryA 2218->2891 2220 7ff73f9823cb RegOpenKeyExA 2219->2220 2221 7ff73f98233a 2219->2221 2223 7ff73f9823c3 2220->2223 2224 7ff73f9823fe RegQueryInfoKeyA 2220->2224 2221->2223 2225 7ff73f98234a RegOpenKeyExA 2221->2225 2223->2111 2226 7ff73f9823a8 RegCloseKey 2224->2226 2225->2223 2227 7ff73f98237d RegQueryValueExA 2225->2227 2226->2223 2227->2226 2229 7ff73f984e49 LoadStringA 2228->2229 2230 7ff73f985024 2228->2230 2231 7ff73f984eb5 2229->2231 2232 7ff73f984e73 2229->2232 2233 7ff73f988470 7 API calls 2230->2233 2235 7ff73f984f31 2231->2235 2239 7ff73f984ec1 LocalAlloc 2231->2239 2234 7ff73f987f04 13 API calls 2232->2234 2236 7ff73f982d59 2233->2236 2237 7ff73f984e78 2234->2237 2241 7ff73f984f8e LocalAlloc 2235->2241 2242 7ff73f984f44 LocalAlloc 2235->2242 2236->2097 2236->2104 2238 7ff73f984e81 MessageBoxA 2237->2238 2240 7ff73f987e34 2 API calls 2237->2240 2238->2230 2239->2230 2247 7ff73f984f14 2239->2247 2240->2238 2241->2230 2253 7ff73f984f2c 2241->2253 2242->2230 2248 7ff73f984f79 2242->2248 2246 7ff73f984fbc MessageBeep 2249 7ff73f987f04 13 API calls 2246->2249 2250 7ff73f98114c _vsnprintf 2247->2250 2251 7ff73f98114c _vsnprintf 2248->2251 2252 7ff73f984fd3 2249->2252 2250->2253 2251->2253 2254 7ff73f984fdc MessageBoxA LocalFree 2252->2254 2255 7ff73f987e34 2 API calls 2252->2255 2253->2246 2254->2230 2255->2254 2258 7ff73f981c6f LookupPrivilegeValueA AdjustTokenPrivileges CloseHandle 2257->2258 2260 7ff73f981c4c 2257->2260 2259 7ff73f981cec ExitWindowsEx 2258->2259 2258->2260 2259->2260 2262 7ff73f981c68 2259->2262 2261 7ff73f984dcc 24 API calls 2260->2261 2261->2262 2263 7ff73f988470 7 API calls 2262->2263 2264 7ff73f981d1a 2263->2264 2264->2097 2266 7ff73f98509b 2265->2266 2267 7ff73f982e43 2265->2267 2266->2267 2268 7ff73f9850a4 FindResourceA LoadResource LockResource 2266->2268 2267->2118 2267->2119 2268->2267 2269 7ff73f9850e3 memcpy_s FreeResource 2268->2269 2269->2267 2275 7ff73f987566 2270->2275 2294 7ff73f9870f2 2270->2294 2271 7ff73f988470 7 API calls 2273 7ff73f982fb1 2271->2273 2272 7ff73f9871ca 2272->2275 2276 7ff73f9871e7 GetModuleFileNameA 2272->2276 2273->2118 2273->2135 2274 7ff73f98711d CharNextA 2274->2294 2275->2271 2277 7ff73f98721c 2276->2277 2278 7ff73f98720f 2276->2278 2277->2275 2362 7ff73f987d68 2278->2362 2280 7ff73f9876f1 2371 7ff73f988648 RtlCaptureContext RtlLookupFunctionEntry 2280->2371 2283 7ff73f987238 CharUpperA 2284 7ff73f98766f 2283->2284 2283->2294 2285 7ff73f984dcc 24 API calls 2284->2285 2286 7ff73f987692 2285->2286 2287 7ff73f98769e CloseHandle 2286->2287 2288 7ff73f9876aa ExitProcess 2286->2288 2287->2288 2289 7ff73f98739d CharUpperA 2289->2294 2290 7ff73f987346 CompareStringA 2290->2294 2291 7ff73f9873fb CharUpperA 2291->2294 2292 7ff73f987492 CharUpperA 2292->2294 2293 7ff73f9872d0 CharUpperA 2293->2294 2294->2272 2294->2274 2294->2275 2294->2280 2294->2283 2294->2289 2294->2290 2294->2291 2294->2292 2294->2293 2295 7ff73f987ce8 IsDBCSLeadByte CharNextA 2294->2295 2367 7ff73f987ba8 2294->2367 2295->2294 2298 7ff73f988479 2297->2298 2299 7ff73f982cd4 2298->2299 2300 7ff73f9884d0 RtlCaptureContext RtlLookupFunctionEntry 2298->2300 2299->2097 2299->2159 2301 7ff73f988515 RtlVirtualUnwind 2300->2301 2302 7ff73f988557 2300->2302 2301->2302 2377 7ff73f988494 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2302->2377 2306 7ff73f982213 2305->2306 2307 7ff73f982086 2305->2307 2308 7ff73f988470 7 API calls 2306->2308 2310 7ff73f9820dc FindFirstFileA 2307->2310 2309 7ff73f982222 2308->2309 2309->2150 2310->2306 2318 7ff73f9820fe 2310->2318 2311 7ff73f982138 lstrcmpA 2313 7ff73f9821d9 FindNextFileA 2311->2313 2314 7ff73f982158 lstrcmpA 2311->2314 2312 7ff73f9821a3 2315 7ff73f9821b4 SetFileAttributesA DeleteFileA 2312->2315 2316 7ff73f9821f5 FindClose RemoveDirectoryA 2313->2316 2313->2318 2314->2313 2314->2318 2315->2313 2316->2306 2317 7ff73f987ba8 CharPrevA 2317->2318 2318->2311 2318->2312 2318->2313 2318->2317 2319 7ff73f98204c 8 API calls 2318->2319 2319->2318 2325 7ff73f983c59 2320->2325 2328 7ff73f983c4f 2320->2328 2321 7ff73f984dcc 24 API calls 2322 7ff73f983f05 2321->2322 2323 7ff73f988470 7 API calls 2322->2323 2324 7ff73f983042 2323->2324 2324->2150 2335 7ff73f9812ec 2324->2335 2325->2322 2327 7ff73f983db1 2325->2327 2325->2328 2378 7ff73f982834 2325->2378 2327->2322 2327->2328 2329 7ff73f983eb7 MessageBeep 2327->2329 2328->2321 2328->2322 2391 7ff73f987f04 2329->2391 2332 7ff73f983ed3 MessageBoxA 2332->2322 2336 7ff73f98133c 2335->2336 2342 7ff73f9814b5 2335->2342 2425 7ff73f9811cc LoadLibraryA 2336->2425 2338 7ff73f988470 7 API calls 2340 7ff73f9814da 2338->2340 2340->2150 2354 7ff73f987ac8 FindResourceA 2340->2354 2341 7ff73f98134d GetCurrentProcess OpenProcessToken 2341->2342 2343 7ff73f981377 GetTokenInformation 2341->2343 2342->2338 2344 7ff73f9814a0 CloseHandle 2343->2344 2345 7ff73f9813a0 GetLastError 2343->2345 2344->2342 2345->2344 2346 7ff73f9813b5 LocalAlloc 2345->2346 2346->2344 2347 7ff73f9813d2 GetTokenInformation 2346->2347 2348 7ff73f9813fc AllocateAndInitializeSid 2347->2348 2349 7ff73f981491 LocalFree 2347->2349 2348->2349 2350 7ff73f981445 2348->2350 2349->2344 2351 7ff73f981481 FreeSid 2350->2351 2352 7ff73f981452 EqualSid 2350->2352 2353 7ff73f981476 2350->2353 2351->2349 2352->2350 2352->2353 2353->2351 2355 7ff73f987b63 2354->2355 2356 7ff73f987b03 LoadResource 2354->2356 2358 7ff73f984dcc 24 API calls 2355->2358 2356->2355 2357 7ff73f987b1d DialogBoxIndirectParamA FreeResource 2356->2357 2357->2355 2361 7ff73f987b87 2357->2361 2359 7ff73f987b82 2358->2359 2359->2361 2361->2158 2363 7ff73f987dd9 2362->2363 2364 7ff73f987d88 2362->2364 2363->2277 2365 7ff73f987d90 IsDBCSLeadByte 2364->2365 2366 7ff73f987db6 CharNextA 2364->2366 2365->2364 2366->2363 2366->2364 2368 7ff73f987bc8 2367->2368 2369 7ff73f987bec CharPrevA 2368->2369 2370 7ff73f987bda 2368->2370 2369->2370 2370->2294 2372 7ff73f988685 RtlVirtualUnwind 2371->2372 2373 7ff73f9886c7 2371->2373 2372->2373 2376 7ff73f988494 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2373->2376 2379 7ff73f982a2f 2378->2379 2389 7ff73f982872 2378->2389 2381 7ff73f982a41 GlobalFree 2379->2381 2382 7ff73f982a50 2379->2382 2381->2382 2382->2327 2383 7ff73f9828a5 GetFileVersionInfoSizeA 2384 7ff73f9828c2 GlobalAlloc 2383->2384 2383->2389 2384->2379 2385 7ff73f9828e1 GlobalLock 2384->2385 2385->2379 2386 7ff73f9828fc GetFileVersionInfoA 2385->2386 2387 7ff73f982920 VerQueryValueA 2386->2387 2386->2389 2388 7ff73f9829ed GlobalUnlock 2387->2388 2387->2389 2388->2389 2389->2379 2389->2383 2389->2388 2390 7ff73f9829d9 GlobalUnlock 2389->2390 2406 7ff73f98261c 2389->2406 2390->2379 2392 7ff73f988076 2391->2392 2393 7ff73f987f44 GetVersionExA 2391->2393 2395 7ff73f988470 7 API calls 2392->2395 2393->2392 2394 7ff73f987f6d 2393->2394 2394->2392 2397 7ff73f987f90 GetSystemMetrics 2394->2397 2396 7ff73f983eca 2395->2396 2396->2332 2402 7ff73f987e34 2396->2402 2397->2392 2398 7ff73f987fa7 RegOpenKeyExA 2397->2398 2398->2392 2399 7ff73f987fdc RegQueryValueExA RegCloseKey 2398->2399 2399->2392 2401 7ff73f988026 2399->2401 2400 7ff73f988065 CharNextA 2400->2401 2401->2392 2401->2400 2403 7ff73f987edd 2402->2403 2404 7ff73f987e5a EnumResourceLanguagesA 2402->2404 2403->2332 2404->2403 2405 7ff73f987e9f EnumResourceLanguagesA 2404->2405 2405->2403 2407 7ff73f98265b CharUpperA CharNextA CharNextA 2406->2407 2408 7ff73f9827e0 GetSystemDirectoryA 2406->2408 2409 7ff73f9827dd 2407->2409 2410 7ff73f98269c 2407->2410 2411 7ff73f9827f1 2408->2411 2409->2408 2412 7ff73f9827c7 GetWindowsDirectoryA 2410->2412 2413 7ff73f9826a6 2410->2413 2414 7ff73f982805 2411->2414 2415 7ff73f987ba8 CharPrevA 2411->2415 2412->2411 2418 7ff73f987ba8 CharPrevA 2413->2418 2416 7ff73f988470 7 API calls 2414->2416 2415->2414 2417 7ff73f982814 2416->2417 2417->2389 2419 7ff73f982705 RegOpenKeyExA 2418->2419 2419->2411 2420 7ff73f982738 RegQueryValueExA 2419->2420 2421 7ff73f98276b 2420->2421 2422 7ff73f9827b4 RegCloseKey 2420->2422 2423 7ff73f982774 ExpandEnvironmentStringsA 2421->2423 2424 7ff73f982792 2421->2424 2422->2411 2423->2424 2424->2422 2426 7ff73f9812bb 2425->2426 2427 7ff73f981221 GetProcAddress 2425->2427 2428 7ff73f988470 7 API calls 2426->2428 2429 7ff73f9812ac FreeLibrary 2427->2429 2430 7ff73f98123f AllocateAndInitializeSid 2427->2430 2431 7ff73f9812ca 2428->2431 2429->2426 2430->2429 2432 7ff73f981288 FreeSid 2430->2432 2431->2341 2431->2342 2432->2429 2435 7ff73f985050 7 API calls 2434->2435 2436 7ff73f9860bf LocalAlloc 2435->2436 2437 7ff73f9860dd 2436->2437 2438 7ff73f98610b 2436->2438 2440 7ff73f984dcc 24 API calls 2437->2440 2439 7ff73f985050 7 API calls 2438->2439 2441 7ff73f98611d 2439->2441 2442 7ff73f9860fb 2440->2442 2443 7ff73f98615a lstrcmp 2441->2443 2444 7ff73f986121 2441->2444 2655 7ff73f987700 GetLastError 2442->2655 2447 7ff73f98618a 2443->2447 2448 7ff73f986174 LocalFree 2443->2448 2446 7ff73f984dcc 24 API calls 2444->2446 2450 7ff73f98613f LocalFree 2446->2450 2451 7ff73f984dcc 24 API calls 2447->2451 2449 7ff73f986183 2448->2449 2449->2162 2450->2449 2452 7ff73f9861ac LocalFree 2451->2452 2453 7ff73f986100 2452->2453 2453->2449 2455 7ff73f985050 7 API calls 2454->2455 2456 7ff73f983f8b LocalAlloc 2455->2456 2457 7ff73f983fdd 2456->2457 2458 7ff73f983fad 2456->2458 2460 7ff73f985050 7 API calls 2457->2460 2459 7ff73f984dcc 24 API calls 2458->2459 2461 7ff73f983fcb 2459->2461 2462 7ff73f983fef 2460->2462 2656 7ff73f987700 GetLastError 2461->2656 2464 7ff73f983ff3 2462->2464 2465 7ff73f984030 lstrcmpA 2462->2465 2467 7ff73f984dcc 24 API calls 2464->2467 2468 7ff73f98404e 2465->2468 2469 7ff73f984098 LocalFree 2465->2469 2466 7ff73f983fd0 2466->2161 2470 7ff73f984011 LocalFree 2467->2470 2471 7ff73f987ac8 28 API calls 2468->2471 2469->2466 2470->2466 2472 7ff73f98406e LocalFree 2471->2472 2472->2466 2474 7ff73f985050 7 API calls 2473->2474 2475 7ff73f986001 2474->2475 2476 7ff73f98604a 2475->2476 2477 7ff73f986006 2475->2477 2479 7ff73f985050 7 API calls 2476->2479 2478 7ff73f984dcc 24 API calls 2477->2478 2480 7ff73f986025 2478->2480 2481 7ff73f986063 2479->2481 2482 7ff73f983146 2480->2482 2483 7ff73f98772c 13 API calls 2481->2483 2482->2167 2487 7ff73f9866c4 2482->2487 2484 7ff73f98606f 2483->2484 2484->2482 2485 7ff73f986073 2484->2485 2486 7ff73f984dcc 24 API calls 2485->2486 2486->2480 2488 7ff73f985050 7 API calls 2487->2488 2489 7ff73f986706 LocalAlloc 2488->2489 2490 7ff73f986756 2489->2490 2491 7ff73f986726 2489->2491 2492 7ff73f985050 7 API calls 2490->2492 2493 7ff73f984dcc 24 API calls 2491->2493 2494 7ff73f986768 2492->2494 2495 7ff73f986744 2493->2495 2496 7ff73f98676c 2494->2496 2497 7ff73f9867a5 lstrcmpA LocalFree 2494->2497 2681 7ff73f987700 GetLastError 2495->2681 2500 7ff73f984dcc 24 API calls 2496->2500 2501 7ff73f9867ec 2497->2501 2502 7ff73f986837 2497->2502 2499 7ff73f986749 2503 7ff73f98674f 2499->2503 2505 7ff73f98678a LocalFree 2500->2505 2510 7ff73f9864e4 53 API calls 2501->2510 2504 7ff73f986b14 2502->2504 2507 7ff73f98684f GetTempPathA 2502->2507 2508 7ff73f988470 7 API calls 2503->2508 2506 7ff73f987ac8 28 API calls 2504->2506 2505->2503 2506->2503 2509 7ff73f986872 2507->2509 2517 7ff73f9868a5 2507->2517 2511 7ff73f983153 2508->2511 2657 7ff73f9864e4 2509->2657 2513 7ff73f98680c 2510->2513 2511->2167 2511->2171 2513->2503 2515 7ff73f986814 2513->2515 2516 7ff73f984dcc 24 API calls 2515->2516 2516->2499 2517->2503 2518 7ff73f986adb GetWindowsDirectoryA 2517->2518 2519 7ff73f9868f9 GetDriveTypeA 2517->2519 2523 7ff73f986ca4 38 API calls 2518->2523 2521 7ff73f986916 GetFileAttributesA 2519->2521 2529 7ff73f986911 2519->2529 2521->2529 2523->2517 2524 7ff73f986ca4 38 API calls 2524->2529 2525 7ff73f9864e4 53 API calls 2525->2517 2526 7ff73f986955 GetDiskFreeSpaceA 2528 7ff73f986983 MulDiv 2526->2528 2526->2529 2527 7ff73f982468 25 API calls 2527->2529 2528->2529 2529->2503 2529->2518 2529->2519 2529->2521 2529->2524 2529->2526 2529->2527 2530 7ff73f986a02 GetWindowsDirectoryA 2529->2530 2531 7ff73f987ba8 CharPrevA 2529->2531 2534 7ff73f986a6d SetFileAttributesA 2529->2534 2535 7ff73f9864e4 53 API calls 2529->2535 2530->2529 2532 7ff73f986a2a GetFileAttributesA 2531->2532 2532->2529 2533 7ff73f986a40 CreateDirectoryA 2532->2533 2533->2529 2534->2529 2535->2529 2537 7ff73f986d12 2536->2537 2538 7ff73f986d3f GetDiskFreeSpaceA 2536->2538 2541 7ff73f984dcc 24 API calls 2537->2541 2539 7ff73f986f63 memset 2538->2539 2540 7ff73f986d80 MulDiv 2538->2540 2735 7ff73f987700 GetLastError 2539->2735 2540->2539 2542 7ff73f986dae GetVolumeInformationA 2540->2542 2543 7ff73f986d2f 2541->2543 2546 7ff73f986de6 memset 2542->2546 2547 7ff73f986e45 SetCurrentDirectoryA 2542->2547 2716 7ff73f987700 GetLastError 2543->2716 2545 7ff73f986f7b GetLastError FormatMessageA 2549 7ff73f986fbd 2545->2549 2717 7ff73f987700 GetLastError 2546->2717 2557 7ff73f986e6c 2547->2557 2552 7ff73f984dcc 24 API calls 2549->2552 2551 7ff73f986d34 2554 7ff73f986f41 2551->2554 2555 7ff73f986fd8 SetCurrentDirectoryA 2552->2555 2553 7ff73f986dfe GetLastError FormatMessageA 2553->2549 2556 7ff73f988470 7 API calls 2554->2556 2555->2554 2558 7ff73f98326f 2556->2558 2559 7ff73f986eb4 2557->2559 2561 7ff73f986ed8 2557->2561 2558->2167 2558->2179 2560 7ff73f984dcc 24 API calls 2559->2560 2560->2551 2561->2554 2718 7ff73f9824f8 2561->2718 2564 7ff73f985050 7 API calls 2563->2564 2565 7ff73f985dab FindResourceA LoadResource LockResource 2564->2565 2566 7ff73f985dfc 2565->2566 2582 7ff73f985fcf 2565->2582 2567 7ff73f985e08 GetDlgItem ShowWindow GetDlgItem ShowWindow 2566->2567 2568 7ff73f985e56 2566->2568 2567->2568 2736 7ff73f985c60 #20 2568->2736 2571 7ff73f985e69 #20 2572 7ff73f985e5f 2571->2572 2573 7ff73f985ed1 #22 2571->2573 2576 7ff73f984dcc 24 API calls 2572->2576 2574 7ff73f985f55 2573->2574 2575 7ff73f985f15 #23 2573->2575 2577 7ff73f985f75 2574->2577 2578 7ff73f985f61 FreeResource 2574->2578 2575->2572 2575->2574 2579 7ff73f985f53 2576->2579 2580 7ff73f985f81 2577->2580 2581 7ff73f985f9f 2577->2581 2578->2577 2579->2574 2583 7ff73f984dcc 24 API calls 2580->2583 2581->2582 2584 7ff73f985fb1 SendMessageA 2581->2584 2582->2199 2583->2581 2584->2582 2586 7ff73f984118 2585->2586 2598 7ff73f98412f 2585->2598 2587 7ff73f985050 7 API calls 2586->2587 2587->2598 2588 7ff73f984145 memset 2588->2598 2589 7ff73f984254 2590 7ff73f984dcc 24 API calls 2589->2590 2627 7ff73f984273 2590->2627 2591 7ff73f9844ee 2594 7ff73f988470 7 API calls 2591->2594 2592 7ff73f985050 7 API calls 2592->2598 2595 7ff73f9844ff 2594->2595 2595->2192 2596 7ff73f9845d8 2596->2591 2600 7ff73f9845f2 RegOpenKeyExA 2596->2600 2597 7ff73f9842f5 CompareStringA 2597->2596 2597->2598 2598->2588 2598->2589 2598->2591 2598->2592 2598->2596 2598->2597 2599 7ff73f9844df LocalFree 2598->2599 2601 7ff73f984599 2598->2601 2611 7ff73f9841fd CompareStringA 2598->2611 2613 7ff73f9844ad LocalFree 2598->2613 2628 7ff73f984394 2598->2628 2763 7ff73f981684 2598->2763 2802 7ff73f981d28 memset memset RegCreateKeyExA 2598->2802 2829 7ff73f98473c CreateProcessA 2598->2829 2599->2591 2600->2591 2604 7ff73f984627 RegQueryValueExA 2600->2604 2603 7ff73f984dcc 24 API calls 2601->2603 2605 7ff73f9845b8 LocalFree 2603->2605 2607 7ff73f98471c RegCloseKey 2604->2607 2608 7ff73f98466c memset GetSystemDirectoryA 2604->2608 2605->2591 2607->2591 2609 7ff73f98469d 2608->2609 2610 7ff73f9846b3 2608->2610 2614 7ff73f987ba8 CharPrevA 2609->2614 2615 7ff73f98114c _vsnprintf 2610->2615 2611->2598 2613->2596 2613->2598 2614->2610 2616 7ff73f9846dc RegSetValueExA 2615->2616 2616->2607 2617 7ff73f9843a5 GetProcAddress 2619 7ff73f984521 2617->2619 2617->2628 2618 7ff73f984574 2620 7ff73f984dcc 24 API calls 2618->2620 2621 7ff73f984dcc 24 API calls 2619->2621 2623 7ff73f984597 2620->2623 2624 7ff73f984544 FreeLibrary 2621->2624 2625 7ff73f984553 LocalFree 2623->2625 2624->2625 2854 7ff73f987700 GetLastError 2625->2854 2627->2591 2628->2617 2628->2618 2629 7ff73f9844d3 FreeLibrary 2628->2629 2630 7ff73f984480 FreeLibrary 2628->2630 2844 7ff73f9879f0 2628->2844 2629->2599 2630->2613 2631->2194 2639 7ff73f98778a 2632->2639 2633 7ff73f98114c _vsnprintf 2634 7ff73f9877df FindResourceA 2633->2634 2635 7ff73f98775e LoadResource LockResource 2634->2635 2636 7ff73f987801 2634->2636 2635->2636 2635->2639 2637 7ff73f988470 7 API calls 2636->2637 2638 7ff73f98782e 2637->2638 2638->2182 2639->2633 2640 7ff73f9877b8 FreeResource 2639->2640 2641 7ff73f987803 FreeResource 2639->2641 2640->2639 2641->2636 2643 7ff73f985050 7 API calls 2642->2643 2644 7ff73f984967 LocalAlloc 2643->2644 2645 7ff73f9849a9 2644->2645 2646 7ff73f984989 2644->2646 2648 7ff73f985050 7 API calls 2645->2648 2647 7ff73f984dcc 24 API calls 2646->2647 2649 7ff73f9849a7 2647->2649 2650 7ff73f9849bb 2648->2650 2649->2167 2651 7ff73f9849d5 lstrcmpA 2650->2651 2652 7ff73f9849bf 2650->2652 2651->2652 2653 7ff73f984a0e LocalFree 2651->2653 2654 7ff73f984dcc 24 API calls 2652->2654 2653->2649 2654->2653 2655->2453 2656->2466 2658 7ff73f986516 2657->2658 2661 7ff73f9865dd 2657->2661 2688 7ff73f9863b8 2658->2688 2660 7ff73f986688 2664 7ff73f988470 7 API calls 2660->2664 2699 7ff73f986b70 2661->2699 2670 7ff73f9866a8 2664->2670 2666 7ff73f98662a CreateDirectoryA 2671 7ff73f98667d 2666->2671 2672 7ff73f98663f 2666->2672 2667 7ff73f986649 2667->2660 2674 7ff73f986ca4 38 API calls 2667->2674 2668 7ff73f9865cc 2673 7ff73f987ba8 CharPrevA 2668->2673 2669 7ff73f986577 GetSystemInfo 2676 7ff73f986591 2669->2676 2670->2503 2682 7ff73f982468 GetWindowsDirectoryA 2670->2682 2711 7ff73f987700 GetLastError 2671->2711 2672->2667 2673->2661 2678 7ff73f98665a 2674->2678 2676->2668 2677 7ff73f987ba8 CharPrevA 2676->2677 2677->2668 2678->2660 2680 7ff73f986666 RemoveDirectoryA 2678->2680 2679 7ff73f986682 2679->2660 2680->2660 2681->2499 2683 7ff73f9824a6 2682->2683 2684 7ff73f9824c4 2682->2684 2685 7ff73f984dcc 24 API calls 2683->2685 2686 7ff73f988470 7 API calls 2684->2686 2685->2684 2687 7ff73f9824df 2686->2687 2687->2517 2687->2525 2690 7ff73f9863e3 2688->2690 2691 7ff73f987ba8 CharPrevA 2690->2691 2694 7ff73f98644b GetTempFileNameA 2690->2694 2712 7ff73f98114c 2690->2712 2692 7ff73f986420 RemoveDirectoryA GetFileAttributesA 2691->2692 2692->2690 2693 7ff73f9864b6 CreateDirectoryA 2692->2693 2693->2694 2695 7ff73f986490 2693->2695 2694->2695 2696 7ff73f98646b DeleteFileA CreateDirectoryA 2694->2696 2697 7ff73f988470 7 API calls 2695->2697 2696->2695 2698 7ff73f9864a2 2697->2698 2698->2660 2698->2668 2698->2669 2700 7ff73f986b8b 2699->2700 2700->2700 2701 7ff73f986b94 LocalAlloc 2700->2701 2702 7ff73f986bb4 2701->2702 2704 7ff73f986bf5 2701->2704 2703 7ff73f984dcc 24 API calls 2702->2703 2705 7ff73f986bd2 2703->2705 2706 7ff73f987ba8 CharPrevA 2704->2706 2709 7ff73f986626 2705->2709 2715 7ff73f987700 GetLastError 2705->2715 2708 7ff73f986c14 CreateFileA LocalFree 2706->2708 2708->2705 2710 7ff73f986c61 CloseHandle GetFileAttributesA 2708->2710 2709->2666 2709->2667 2710->2705 2711->2679 2713 7ff73f981178 _vsnprintf 2712->2713 2714 7ff73f981199 2712->2714 2713->2714 2714->2690 2715->2709 2716->2551 2717->2553 2719 7ff73f982525 2718->2719 2720 7ff73f982562 2718->2720 2721 7ff73f98114c _vsnprintf 2719->2721 2722 7ff73f9825ab 2720->2722 2723 7ff73f982567 2720->2723 2724 7ff73f98253d 2721->2724 2726 7ff73f98114c _vsnprintf 2722->2726 2733 7ff73f98255d 2722->2733 2725 7ff73f98114c _vsnprintf 2723->2725 2728 7ff73f984dcc 24 API calls 2724->2728 2729 7ff73f98257f 2725->2729 2730 7ff73f9825c7 2726->2730 2727 7ff73f988470 7 API calls 2731 7ff73f982609 2727->2731 2728->2733 2732 7ff73f984dcc 24 API calls 2729->2732 2734 7ff73f984dcc 24 API calls 2730->2734 2731->2554 2732->2733 2733->2727 2734->2733 2735->2545 2737 7ff73f985ced 2736->2737 2738 7ff73f985d62 2736->2738 2748 7ff73f985380 2737->2748 2740 7ff73f988470 7 API calls 2738->2740 2742 7ff73f985d78 2740->2742 2742->2571 2742->2572 2743 7ff73f985d0d #21 2743->2738 2744 7ff73f985d28 2743->2744 2744->2738 2760 7ff73f985770 2744->2760 2747 7ff73f985d4f #23 2747->2738 2749 7ff73f9853b3 2748->2749 2750 7ff73f9853fd lstrcmpA 2749->2750 2751 7ff73f9853d0 2749->2751 2753 7ff73f9853f4 2750->2753 2754 7ff73f985454 2750->2754 2752 7ff73f984dcc 24 API calls 2751->2752 2752->2753 2753->2738 2753->2743 2754->2753 2755 7ff73f9854a8 CreateFileA 2754->2755 2755->2753 2758 7ff73f9854de 2755->2758 2756 7ff73f985561 CreateFileA 2756->2753 2757 7ff73f985549 CharNextA 2757->2758 2758->2753 2758->2756 2758->2757 2759 7ff73f985532 CreateDirectoryA 2758->2759 2759->2757 2761 7ff73f9857a4 FindCloseChangeNotification 2760->2761 2762 7ff73f98578f 2760->2762 2761->2762 2762->2738 2762->2747 2764 7ff73f9816d3 2763->2764 2855 7ff73f9815e8 2764->2855 2767 7ff73f987ba8 CharPrevA 2770 7ff73f981766 2767->2770 2768 7ff73f987d68 2 API calls 2769 7ff73f981811 2768->2769 2771 7ff73f981a1b 2769->2771 2772 7ff73f98181a CompareStringA 2769->2772 2770->2768 2773 7ff73f987d68 2 API calls 2771->2773 2772->2771 2774 7ff73f98184d GetFileAttributesA 2772->2774 2775 7ff73f981a28 2773->2775 2776 7ff73f981867 2774->2776 2777 7ff73f9819f3 2774->2777 2778 7ff73f981acb LocalAlloc 2775->2778 2779 7ff73f981a31 CompareStringA 2775->2779 2776->2777 2782 7ff73f9815e8 2 API calls 2776->2782 2780 7ff73f984dcc 24 API calls 2777->2780 2778->2777 2781 7ff73f981aeb GetFileAttributesA 2778->2781 2779->2778 2790 7ff73f981a60 2779->2790 2800 7ff73f98194f 2780->2800 2788 7ff73f981b01 2781->2788 2783 7ff73f98188b 2782->2783 2784 7ff73f9818b5 LocalAlloc 2783->2784 2786 7ff73f9815e8 2 API calls 2783->2786 2784->2777 2787 7ff73f9818d7 GetPrivateProfileIntA GetPrivateProfileStringA 2784->2787 2785 7ff73f981bd1 2789 7ff73f988470 7 API calls 2785->2789 2786->2784 2791 7ff73f981984 2787->2791 2787->2800 2801 7ff73f981b54 2788->2801 2792 7ff73f981be9 2789->2792 2790->2790 2793 7ff73f981a81 LocalAlloc 2790->2793 2795 7ff73f9819ba 2791->2795 2796 7ff73f981995 GetShortPathNameA 2791->2796 2792->2598 2793->2777 2797 7ff73f981ab2 2793->2797 2799 7ff73f98114c _vsnprintf 2795->2799 2796->2795 2798 7ff73f98114c _vsnprintf 2797->2798 2798->2800 2799->2800 2800->2785 2863 7ff73f982a6c 2801->2863 2803 7ff73f981dce 2802->2803 2804 7ff73f982019 2802->2804 2807 7ff73f98114c _vsnprintf 2803->2807 2809 7ff73f981e25 2803->2809 2805 7ff73f988470 7 API calls 2804->2805 2806 7ff73f982028 2805->2806 2806->2598 2808 7ff73f981dee RegQueryValueExA 2807->2808 2808->2803 2808->2809 2810 7ff73f981e29 RegCloseKey 2809->2810 2811 7ff73f981e46 GetSystemDirectoryA 2809->2811 2810->2804 2812 7ff73f987ba8 CharPrevA 2811->2812 2813 7ff73f981e6a LoadLibraryA 2812->2813 2814 7ff73f981e86 GetProcAddress FreeLibrary 2813->2814 2815 7ff73f981f55 GetModuleFileNameA 2813->2815 2814->2815 2817 7ff73f981ebe GetSystemDirectoryA 2814->2817 2816 7ff73f981f78 RegCloseKey 2815->2816 2818 7ff73f981ee8 2815->2818 2816->2804 2817->2818 2819 7ff73f981ed5 2817->2819 2818->2818 2821 7ff73f981f11 LocalAlloc 2818->2821 2820 7ff73f987ba8 CharPrevA 2819->2820 2820->2818 2822 7ff73f981f8e 2821->2822 2823 7ff73f981f35 2821->2823 2825 7ff73f98114c _vsnprintf 2822->2825 2824 7ff73f984dcc 24 API calls 2823->2824 2826 7ff73f981f53 2824->2826 2827 7ff73f981fc4 2825->2827 2826->2816 2827->2827 2828 7ff73f981fcd RegSetValueExA RegCloseKey LocalFree 2827->2828 2828->2804 2830 7ff73f9848b3 2829->2830 2831 7ff73f9847c2 WaitForSingleObject GetExitCodeProcess 2829->2831 2890 7ff73f987700 GetLastError 2830->2890 2833 7ff73f9847f9 2831->2833 2838 7ff73f982318 18 API calls 2833->2838 2843 7ff73f98482a CloseHandle CloseHandle 2833->2843 2834 7ff73f9848b8 GetLastError FormatMessageA 2835 7ff73f984dcc 24 API calls 2834->2835 2837 7ff73f98491c 2835->2837 2840 7ff73f988470 7 API calls 2837->2840 2841 7ff73f98484d 2838->2841 2839 7ff73f9848aa 2839->2837 2842 7ff73f98492f 2840->2842 2841->2843 2842->2598 2843->2837 2843->2839 2845 7ff73f987a25 2844->2845 2846 7ff73f987ba8 CharPrevA 2845->2846 2847 7ff73f987a63 GetFileAttributesA 2846->2847 2848 7ff73f987a79 2847->2848 2849 7ff73f987a96 LoadLibraryA 2847->2849 2848->2849 2850 7ff73f987a7d LoadLibraryExA 2848->2850 2851 7ff73f987aa9 2849->2851 2850->2851 2852 7ff73f988470 7 API calls 2851->2852 2853 7ff73f987ab9 2852->2853 2853->2628 2854->2627 2856 7ff73f981609 2855->2856 2858 7ff73f981621 2856->2858 2861 7ff73f981651 2856->2861 2876 7ff73f987ce8 2856->2876 2859 7ff73f987ce8 2 API calls 2858->2859 2860 7ff73f98162f 2859->2860 2860->2861 2862 7ff73f987ce8 2 API calls 2860->2862 2861->2767 2861->2770 2862->2860 2864 7ff73f982c24 2863->2864 2865 7ff73f982aa0 GetModuleFileNameA 2863->2865 2866 7ff73f988470 7 API calls 2864->2866 2865->2864 2875 7ff73f982ac8 2865->2875 2868 7ff73f982c37 2866->2868 2867 7ff73f982acc IsDBCSLeadByte 2867->2875 2868->2785 2869 7ff73f982bf6 CharNextA 2871 7ff73f982c08 CharNextA 2869->2871 2870 7ff73f982af1 CharNextA CharUpperA 2872 7ff73f982b9b CharUpperA 2870->2872 2870->2875 2871->2864 2871->2867 2872->2875 2874 7ff73f982b36 CharPrevA 2874->2875 2875->2867 2875->2869 2875->2870 2875->2871 2875->2874 2881 7ff73f987c40 2875->2881 2879 7ff73f987d00 2876->2879 2877 7ff73f987d0a IsDBCSLeadByte 2878 7ff73f987d47 2877->2878 2877->2879 2878->2856 2879->2877 2879->2878 2880 7ff73f987d30 CharNextA 2879->2880 2880->2879 2882 7ff73f987c58 2881->2882 2882->2882 2883 7ff73f987c61 CharPrevA 2882->2883 2884 7ff73f987c7d CharPrevA 2883->2884 2885 7ff73f987c75 2884->2885 2886 7ff73f987c94 2884->2886 2885->2884 2885->2886 2887 7ff73f987c9e CharPrevA 2886->2887 2888 7ff73f987cb5 CharNextA 2886->2888 2889 7ff73f987cc7 2886->2889 2887->2888 2887->2889 2888->2889 2889->2875 2890->2834 2892 7ff73f9822eb 2891->2892 2893 7ff73f982281 2891->2893 2895 7ff73f988470 7 API calls 2892->2895 2894 7ff73f987ba8 CharPrevA 2893->2894 2896 7ff73f982294 WritePrivateProfileStringA _lopen 2894->2896 2897 7ff73f9822fd 2895->2897 2896->2892 2898 7ff73f9822c7 _llseek _lclose 2896->2898 2897->2223 2898->2892 2987 7ff73f983840 2988 7ff73f983852 2987->2988 2990 7ff73f98385a 2987->2990 2989 7ff73f98388e GetDesktopWindow 2988->2989 2988->2990 2993 7ff73f984c68 14 API calls 2989->2993 2991 7ff73f9838ec EndDialog 2990->2991 2992 7ff73f98385f 2990->2992 2991->2992 2994 7ff73f9838a5 SetWindowTextA SetDlgItemTextA SetForegroundWindow 2993->2994 2994->2992 2995 7ff73f981500 2996 7ff73f981557 GetDesktopWindow 2995->2996 2997 7ff73f981530 2995->2997 2999 7ff73f984c68 14 API calls 2996->2999 2998 7ff73f981553 2997->2998 3000 7ff73f981542 EndDialog 2997->3000 3002 7ff73f988470 7 API calls 2998->3002 3001 7ff73f98156e LoadStringA SetDlgItemTextA MessageBeep 2999->3001 3000->2998 3001->2998 3003 7ff73f9815d0 3002->3003 3015 7ff73f988750 3016 7ff73f98875f 3015->3016 3017 7ff73f988782 3015->3017 3016->3017 3018 7ff73f98877b ?terminate@ 3016->3018 3018->3017 3019 7ff73f988790 SetUnhandledExceptionFilter 2899 7ff73f983910 2900 7ff73f983933 2899->2900 2901 7ff73f983a09 2899->2901 2900->2901 2904 7ff73f983948 2900->2904 2905 7ff73f983a11 GetDesktopWindow 2900->2905 2902 7ff73f983954 2901->2902 2903 7ff73f983b1a EndDialog 2901->2903 2903->2902 2907 7ff73f98394c 2904->2907 2908 7ff73f98397b 2904->2908 2922 7ff73f984c68 6 API calls 2905->2922 2907->2902 2909 7ff73f98395b TerminateThread 2907->2909 2908->2902 2910 7ff73f983985 ResetEvent 2908->2910 2909->2903 2912 7ff73f984dcc 24 API calls 2910->2912 2916 7ff73f9839c3 2912->2916 2913 7ff73f983a9b SetWindowTextA CreateThread 2913->2902 2915 7ff73f983ae8 2913->2915 2914 7ff73f983a38 GetDlgItem SendMessageA GetDlgItem SendMessageA 2914->2913 2917 7ff73f984dcc 24 API calls 2915->2917 2918 7ff73f9839e4 SetEvent 2916->2918 2920 7ff73f9839cc SetEvent 2916->2920 2919 7ff73f983b07 2917->2919 2927 7ff73f983b40 2918->2927 2919->2901 2920->2902 2923 7ff73f984d3f SetWindowPos 2922->2923 2925 7ff73f988470 7 API calls 2923->2925 2926 7ff73f983a2f 2925->2926 2926->2913 2926->2914 2928 7ff73f983b4c MsgWaitForMultipleObjects 2927->2928 2929 7ff73f983be5 2928->2929 2930 7ff73f983b74 PeekMessageA 2928->2930 2929->2901 2930->2928 2931 7ff73f983b99 2930->2931 2931->2928 2931->2929 2932 7ff73f983ba7 DispatchMessageA 2931->2932 2933 7ff73f983bb8 PeekMessageA 2931->2933 2932->2933 2933->2931 2934 7ff73f985690 2935 7ff73f983b40 4 API calls 2934->2935 2936 7ff73f9856b1 2935->2936 2937 7ff73f9856c2 WriteFile 2936->2937 2939 7ff73f9856ba 2936->2939 2938 7ff73f9856f9 2937->2938 2937->2939 2938->2939 2940 7ff73f985725 SendDlgItemMessageA 2938->2940 2940->2939 3022 7ff73f9880d0 3024 7ff73f9880e2 3022->3024 3029 7ff73f988818 GetModuleHandleW 3024->3029 3025 7ff73f988149 __set_app_type 3026 7ff73f988186 3025->3026 3027 7ff73f98818f __setusermatherr 3026->3027 3028 7ff73f98819c 3026->3028 3027->3028 3030 7ff73f98882d 3029->3030 3030->3025 2982 7ff73f988417 2983 7ff73f98842f 2982->2983 2984 7ff73f988426 _exit 2982->2984 2985 7ff73f988444 2983->2985 2986 7ff73f988438 _cexit 2983->2986 2984->2983 2986->2985 3004 7ff73f9833a0 3005 7ff73f9833ac 3004->3005 3006 7ff73f9833bb CallWindowProcA 3004->3006 3005->3006 3007 7ff73f9833b7 3005->3007 3006->3007 3008 7ff73f9855e0 3009 7ff73f985641 ReadFile 3008->3009 3010 7ff73f98560d 3008->3010 3009->3010 3011 7ff73f9857e0 3012 7ff73f98581e 3011->3012 3013 7ff73f9857fc 3011->3013 3012->3013 3014 7ff73f98583d SetFilePointer 3012->3014 3014->3013 3020 7ff73f9881b0 __getmainargs 3021 7ff73f988b30 _XcptFilter 2941 7ff73f9858b0 2942 7ff73f9858ee 2941->2942 2943 7ff73f985904 2941->2943 2944 7ff73f9858fc 2942->2944 2945 7ff73f985770 FindCloseChangeNotification 2942->2945 2943->2944 2946 7ff73f985a29 2943->2946 2950 7ff73f98591a 2943->2950 2947 7ff73f988470 7 API calls 2944->2947 2945->2944 2949 7ff73f985a35 SetWindowTextA 2946->2949 2951 7ff73f985a4a 2946->2951 2948 7ff73f985af4 2947->2948 2949->2951 2950->2944 2953 7ff73f985982 DosDateTimeToFileTime 2950->2953 2951->2944 2966 7ff73f9851bc GetFileAttributesA 2951->2966 2953->2944 2955 7ff73f9859a3 LocalFileTimeToFileTime 2953->2955 2955->2944 2956 7ff73f9859c1 SetFileTime 2955->2956 2956->2944 2957 7ff73f9859e9 2956->2957 2959 7ff73f985770 FindCloseChangeNotification 2957->2959 2958 7ff73f985380 29 API calls 2960 7ff73f985ab5 2958->2960 2961 7ff73f9859f2 SetFileAttributesA 2959->2961 2960->2944 2962 7ff73f985ac1 2960->2962 2961->2944 2973 7ff73f98527c LocalAlloc 2962->2973 2965 7ff73f985acb 2965->2944 2967 7ff73f98525f 2966->2967 2969 7ff73f9851de 2966->2969 2967->2944 2967->2958 2968 7ff73f985246 SetFileAttributesA 2968->2967 2969->2967 2969->2968 2970 7ff73f987ac8 28 API calls 2969->2970 2971 7ff73f985228 2970->2971 2971->2967 2971->2968 2972 7ff73f98523c 2971->2972 2972->2968 2974 7ff73f9852aa 2973->2974 2975 7ff73f9852d4 LocalAlloc 2973->2975 2976 7ff73f984dcc 24 API calls 2974->2976 2977 7ff73f9852cd 2975->2977 2979 7ff73f985300 2975->2979 2976->2977 2977->2965 2980 7ff73f984dcc 24 API calls 2979->2980 2981 7ff73f985323 LocalFree 2980->2981 2981->2977 3031 7ff73f9878b0 3032 7ff73f9878fd 3031->3032 3033 7ff73f987ba8 CharPrevA 3032->3033 3034 7ff73f987935 CreateFileA 3033->3034 3035 7ff73f98797e WriteFile 3034->3035 3036 7ff73f987970 3034->3036 3037 7ff73f9879a2 CloseHandle 3035->3037 3039 7ff73f988470 7 API calls 3036->3039 3037->3036 3040 7ff73f9879d5 3039->3040 3041 7ff73f984a30 3042 7ff73f984a39 SendMessageA 3041->3042 3043 7ff73f984a50 3041->3043 3042->3043 3044 7ff73f983530 3045 7ff73f983557 3044->3045 3046 7ff73f983802 EndDialog 3044->3046 3047 7ff73f98377e GetDesktopWindow 3045->3047 3048 7ff73f983567 3045->3048 3049 7ff73f98356b 3046->3049 3050 7ff73f984c68 14 API calls 3047->3050 3048->3049 3052 7ff73f98357b 3048->3052 3053 7ff73f983635 GetDlgItemTextA 3048->3053 3051 7ff73f983795 SetWindowTextA SendDlgItemMessageA 3050->3051 3051->3049 3054 7ff73f9837d8 GetDlgItem EnableWindow 3051->3054 3055 7ff73f983618 EndDialog 3052->3055 3056 7ff73f983584 3052->3056 3062 7ff73f98365e 3053->3062 3076 7ff73f9836e9 3053->3076 3054->3049 3055->3049 3056->3049 3057 7ff73f983591 LoadStringA 3056->3057 3058 7ff73f9835de 3057->3058 3059 7ff73f9835bd 3057->3059 3081 7ff73f984a60 LoadLibraryA 3058->3081 3065 7ff73f984dcc 24 API calls 3059->3065 3061 7ff73f984dcc 24 API calls 3061->3049 3064 7ff73f983694 GetFileAttributesA 3062->3064 3062->3076 3067 7ff73f9836fa 3064->3067 3068 7ff73f9836a8 3064->3068 3079 7ff73f9835d7 3065->3079 3066 7ff73f9835eb SetDlgItemTextA 3066->3049 3066->3059 3069 7ff73f987ba8 CharPrevA 3067->3069 3070 7ff73f984dcc 24 API calls 3068->3070 3072 7ff73f98370e 3069->3072 3073 7ff73f9836cb 3070->3073 3071 7ff73f98374b EndDialog 3071->3049 3075 7ff73f986b70 31 API calls 3072->3075 3073->3049 3074 7ff73f9836d4 CreateDirectoryA 3073->3074 3074->3067 3074->3076 3077 7ff73f983716 3075->3077 3076->3061 3077->3076 3078 7ff73f983721 3077->3078 3078->3079 3080 7ff73f986ca4 38 API calls 3078->3080 3079->3049 3079->3071 3080->3079 3082 7ff73f984c20 3081->3082 3083 7ff73f984aa0 GetProcAddress 3081->3083 3086 7ff73f984dcc 24 API calls 3082->3086 3084 7ff73f984c0a FreeLibrary 3083->3084 3085 7ff73f984ac2 GetProcAddress 3083->3085 3084->3082 3085->3084 3087 7ff73f984ae2 GetProcAddress 3085->3087 3089 7ff73f9835e3 3086->3089 3087->3084 3088 7ff73f984b04 3087->3088 3090 7ff73f984b13 GetTempPathA 3088->3090 3095 7ff73f984b65 3088->3095 3089->3049 3089->3066 3091 7ff73f984b2b 3090->3091 3091->3091 3092 7ff73f984b34 CharPrevA 3091->3092 3093 7ff73f984b4e CharPrevA 3092->3093 3092->3095 3093->3095 3094 7ff73f984bee FreeLibrary 3094->3089 3095->3094 3096 7ff73f9833f0 3097 7ff73f9834ec 3096->3097 3098 7ff73f983402 3096->3098 3099 7ff73f9834f5 SendDlgItemMessageA 3097->3099 3100 7ff73f9834e5 3097->3100 3102 7ff73f983441 GetDesktopWindow 3098->3102 3104 7ff73f98340f 3098->3104 3099->3100 3101 7ff73f983430 EndDialog 3101->3100 3103 7ff73f984c68 14 API calls 3102->3103 3105 7ff73f983458 6 API calls 3103->3105 3104->3100 3104->3101 3105->3100 3106 7ff73f985870 GlobalAlloc

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF73F9851BC 17 Function_00007FF73F987AC8 0->17 1 Function_00007FF73F98473C 13 Function_00007FF73F984DCC 1->13 24 Function_00007FF73F982318 1->24 57 Function_00007FF73F987700 1->57 77 Function_00007FF73F988470 1->77 2 Function_00007FF73F9863B8 15 Function_00007FF73F98114C 2->15 39 Function_00007FF73F987BA8 2->39 64 Function_00007FF73F981008 2->64 2->77 3 Function_00007FF73F9840C4 3->1 3->13 3->15 20 Function_00007FF73F985050 3->20 38 Function_00007FF73F981D28 3->38 3->39 53 Function_00007FF73F981684 3->53 3->57 3->77 93 Function_00007FF73F9879F0 3->93 4 Function_00007FF73F9866C4 4->13 4->17 4->20 28 Function_00007FF73F986CA4 4->28 4->39 4->57 71 Function_00007FF73F9864E4 4->71 4->77 87 Function_00007FF73F982468 4->87 5 Function_00007FF73F982244 5->39 5->77 6 Function_00007FF73F9887BC 7 Function_00007FF73F987C40 8 Function_00007FF73F983840 83 Function_00007FF73F984C68 8->83 9 Function_00007FF73F983B40 10 Function_00007FF73F9888D0 34 Function_00007FF73F988930 10->34 49 Function_00007FF73F988880 10->49 11 Function_00007FF73F988750 12 Function_00007FF73F9811CC 12->77 13->15 42 Function_00007FF73F987E34 13->42 54 Function_00007FF73F987F04 13->54 13->64 13->77 14 Function_00007FF73F98204C 14->14 14->39 55 Function_00007FF73F981084 14->55 14->77 16 Function_00007FF73F98494C 16->13 16->20 17->13 18 Function_00007FF73F988648 63 Function_00007FF73F988494 18->63 19 Function_00007FF73F982C54 19->13 19->24 41 Function_00007FF73F982DB4 19->41 62 Function_00007FF73F981C0C 19->62 79 Function_00007FF73F9861EC 19->79 80 Function_00007FF73F9830EC 19->80 21 Function_00007FF73F9880D0 27 Function_00007FF73F988818 21->27 78 Function_00007FF73F988870 21->78 22 Function_00007FF73F987850 23 Function_00007FF73F98261C 23->39 23->64 23->77 24->5 25 Function_00007FF73F985B18 26 Function_00007FF73F988417 27->6 28->13 52 Function_00007FF73F9824F8 28->52 28->57 28->77 29 Function_00007FF73F9860A4 29->13 29->20 29->57 30 Function_00007FF73F987024 31 Function_00007FF73F988A9C 32 Function_00007FF73F9833A0 33 Function_00007FF73F9881B0 35 Function_00007FF73F988B30 36 Function_00007FF73F98772C 36->15 36->77 37 Function_00007FF73F98512C 37->55 37->64 38->13 38->15 38->39 38->77 39->55 40 Function_00007FF73F9870A8 40->13 40->18 40->30 40->39 40->77 84 Function_00007FF73F987CE8 40->84 86 Function_00007FF73F987D68 40->86 41->13 41->14 41->17 41->20 41->40 41->77 81 Function_00007FF73F9812EC 41->81 89 Function_00007FF73F983BF4 41->89 43 Function_00007FF73F982834 43->23 44 Function_00007FF73F9858B0 44->0 44->25 44->37 50 Function_00007FF73F98527C 44->50 56 Function_00007FF73F985380 44->56 44->77 91 Function_00007FF73F985770 44->91 45 Function_00007FF73F9878B0 45->39 45->77 46 Function_00007FF73F984A30 47 Function_00007FF73F983530 47->13 47->28 47->39 75 Function_00007FF73F984A60 47->75 47->83 90 Function_00007FF73F986B70 47->90 48 Function_00007FF73F988200 48->10 48->19 70 Function_00007FF73F988964 48->70 50->13 50->64 51 Function_00007FF73F988802 52->13 52->15 52->77 53->13 53->15 53->39 53->55 53->64 53->77 82 Function_00007FF73F982A6C 53->82 85 Function_00007FF73F9815E8 53->85 53->86 54->77 56->13 58 Function_00007FF73F981500 58->77 58->83 59 Function_00007FF73F987E00 60 Function_00007FF73F988910 61 Function_00007FF73F988790 62->13 62->77 65 Function_00007FF73F985690 65->9 66 Function_00007FF73F985D90 66->13 66->20 76 Function_00007FF73F985C60 66->76 67 Function_00007FF73F983910 67->9 67->13 67->83 68 Function_00007FF73F988B60 69 Function_00007FF73F988A62 69->31 71->2 71->28 71->39 71->57 71->77 71->90 72 Function_00007FF73F985FE4 72->13 72->20 72->36 73 Function_00007FF73F9855E0 74 Function_00007FF73F9857E0 75->13 75->64 76->56 76->77 76->91 77->63 79->7 79->14 79->77 80->3 80->4 80->13 80->16 80->17 80->24 80->28 80->29 80->36 80->39 80->57 80->66 80->72 80->77 88 Function_00007FF73F983F74 80->88 81->12 81->77 82->7 82->64 82->77 83->77 85->84 87->13 87->77 88->13 88->17 88->20 88->57 89->13 89->42 89->43 89->54 89->77 90->13 90->39 90->57 90->64 92 Function_00007FF73F9833F0 92->83 93->39 93->77 94 Function_00007FF73F985870

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff73f9840c4-7ff73f984116 1 7ff73f984139-7ff73f984141 0->1 2 7ff73f984118-7ff73f98412a call 7ff73f985050 0->2 4 7ff73f984145-7ff73f984167 memset 1->4 5 7ff73f98412f-7ff73f984133 2->5 6 7ff73f98416d-7ff73f984188 call 7ff73f985050 4->6 7 7ff73f984282-7ff73f984295 4->7 5->1 9 7ff73f984254-7ff73f98427d call 7ff73f984dcc 5->9 6->9 15 7ff73f98418e-7ff73f984194 6->15 8 7ff73f984299-7ff73f9842a3 7->8 13 7ff73f9842b7-7ff73f9842c2 8->13 14 7ff73f9842a5-7ff73f9842ab 8->14 21 7ff73f9844ee 9->21 18 7ff73f9842c5-7ff73f9842c8 13->18 14->13 17 7ff73f9842ad-7ff73f9842b5 14->17 19 7ff73f98419d-7ff73f9841a0 15->19 20 7ff73f984196-7ff73f98419b 15->20 17->8 17->13 22 7ff73f9842ca-7ff73f9842e2 call 7ff73f985050 18->22 23 7ff73f984328-7ff73f98433d call 7ff73f981684 18->23 26 7ff73f9841ad-7ff73f9841af 19->26 27 7ff73f9841a2-7ff73f9841ab 19->27 25 7ff73f9841b5 20->25 29 7ff73f9844f0-7ff73f98451f call 7ff73f988470 21->29 22->9 35 7ff73f9842e8-7ff73f9842ef 22->35 23->21 36 7ff73f984343-7ff73f98434a 23->36 31 7ff73f9841b8-7ff73f9841bb 25->31 26->31 32 7ff73f9841b1 26->32 27->25 31->18 37 7ff73f9841c1-7ff73f9841cb 31->37 32->25 39 7ff73f9845d8-7ff73f9845df 35->39 40 7ff73f9842f5-7ff73f984322 CompareStringA 35->40 41 7ff73f98434c-7ff73f984353 36->41 42 7ff73f98436a-7ff73f98436c 36->42 43 7ff73f9841cd-7ff73f9841d0 37->43 44 7ff73f984231-7ff73f984234 37->44 49 7ff73f98472d-7ff73f98472f 39->49 50 7ff73f9845e5-7ff73f9845ec 39->50 40->23 40->39 41->42 46 7ff73f984355-7ff73f98435c 41->46 51 7ff73f984493-7ff73f98449b 42->51 52 7ff73f984372-7ff73f984379 42->52 47 7ff73f9841db-7ff73f9841dd 43->47 48 7ff73f9841d2-7ff73f9841d9 43->48 44->23 45 7ff73f98423a-7ff73f984252 call 7ff73f985050 44->45 45->9 45->18 46->42 56 7ff73f98435e-7ff73f984360 46->56 47->21 58 7ff73f9841e3 47->58 57 7ff73f9841ea-7ff73f9841fb call 7ff73f985050 48->57 49->29 50->49 59 7ff73f9845f2-7ff73f984621 RegOpenKeyExA 50->59 54 7ff73f98449d-7ff73f9844a4 call 7ff73f98473c 51->54 55 7ff73f9844df-7ff73f9844e9 LocalFree 51->55 60 7ff73f984599-7ff73f9845d3 call 7ff73f984dcc LocalFree 52->60 61 7ff73f98437f-7ff73f984381 52->61 71 7ff73f9844a9-7ff73f9844ab 54->71 55->21 56->52 66 7ff73f984362-7ff73f984365 call 7ff73f981d28 56->66 57->9 78 7ff73f9841fd-7ff73f98422d CompareStringA 57->78 58->57 59->49 67 7ff73f984627-7ff73f984666 RegQueryValueExA 59->67 60->21 61->51 62 7ff73f984387-7ff73f98438e 61->62 62->51 70 7ff73f984394-7ff73f98439f call 7ff73f9879f0 62->70 66->42 74 7ff73f98471c-7ff73f984728 RegCloseKey 67->74 75 7ff73f98466c-7ff73f98469b memset GetSystemDirectoryA 67->75 86 7ff73f9843a5-7ff73f9843c1 GetProcAddress 70->86 87 7ff73f984574-7ff73f984597 call 7ff73f984dcc 70->87 71->55 80 7ff73f9844ad-7ff73f9844c3 LocalFree 71->80 74->49 76 7ff73f98469d-7ff73f9846ae call 7ff73f987ba8 75->76 77 7ff73f9846b3-7ff73f9846dc call 7ff73f98114c 75->77 76->77 88 7ff73f9846e3-7ff73f9846ea 77->88 78->44 80->39 84 7ff73f9844c9-7ff73f9844ce 80->84 84->4 89 7ff73f9843c7-7ff73f984415 86->89 90 7ff73f984521-7ff73f98454e call 7ff73f984dcc FreeLibrary 86->90 100 7ff73f984553-7ff73f98456f LocalFree call 7ff73f987700 87->100 88->88 93 7ff73f9846ec-7ff73f984717 RegSetValueExA 88->93 94 7ff73f984417-7ff73f98441b 89->94 95 7ff73f98441f-7ff73f984427 89->95 90->100 93->74 94->95 98 7ff73f984429-7ff73f98442d 95->98 99 7ff73f984431-7ff73f984433 95->99 98->99 102 7ff73f98443d-7ff73f984445 99->102 103 7ff73f984435-7ff73f984439 99->103 100->21 105 7ff73f984447-7ff73f98444b 102->105 106 7ff73f98444f-7ff73f984451 102->106 103->102 105->106 107 7ff73f98445b-7ff73f98447e 106->107 108 7ff73f984453-7ff73f984457 106->108 110 7ff73f9844d3-7ff73f9844da FreeLibrary 107->110 111 7ff73f984480-7ff73f984491 FreeLibrary 107->111 108->107 110->55 111->80
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$Free$CompareFindLibraryLocalString$AddressLoadLockProcSizeofmemcpy_smemset
    • String ID: <None>$ADMQCMD$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DoInfInstall$Open$POSTRUNPROGRAM$REBOOT$RUNPROGRAM$SHOWWINDOW$Software\Microsoft\Windows\CurrentVersion\RunOnce$USRQCMD$advpack.dll$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup0
    • API String ID: 2679723528-1204618267
    • Opcode ID: 0c4c091c83e196b5ae14768e43b06ee368c2eb7d1cf369b03675d16fd48c86c9
    • Instruction ID: 73543dfb7650e3c86fbea017848df8c77e93a19b6dda32b9e5fd28481f0e08ba
    • Opcode Fuzzy Hash: 0c4c091c83e196b5ae14768e43b06ee368c2eb7d1cf369b03675d16fd48c86c9
    • Instruction Fuzzy Hash: 230250B1A086C2A6E728AB24E8405F9BBA4FF957C4FD40136DA4E8365CDF3DD544E720
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Close$DirectoryFreeLibraryLocalSystemValuememset$AddressAllocCreateFileLoadModuleNameProcQuery_vsnprintf
    • String ID: %s /D:%s$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DelNodeRunDLL32$Software\Microsoft\Windows\CurrentVersion\RunOnce$advpack.dll$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup%d$wextract_cleanup0
    • API String ID: 178549006-3726664654
    • Opcode ID: 276e9805d9b7e1d57039d94b06db834f3dbf8df68e4bbb97ed4dd8757e439085
    • Instruction ID: 5e3d4d18151062354756fcab6202646b3c06743d55bcc3477a4af2d675a77a4a
    • Opcode Fuzzy Hash: 276e9805d9b7e1d57039d94b06db834f3dbf8df68e4bbb97ed4dd8757e439085
    • Instruction Fuzzy Hash: AC814DB2A08AC5A6EB14AF11E8402F9FBA4FB89B94F845131DA4E8375CDF3CE145D710
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 144 7ff73f981684-7ff73f9816ce 145 7ff73f9816d3-7ff73f9816dd 144->145 146 7ff73f9816f2-7ff73f981704 145->146 147 7ff73f9816df-7ff73f9816e5 145->147 148 7ff73f981706-7ff73f981711 146->148 149 7ff73f981713-7ff73f98171a 146->149 147->146 150 7ff73f9816e7-7ff73f9816f0 147->150 151 7ff73f98171e-7ff73f98173c call 7ff73f9815e8 148->151 149->151 150->145 150->146 154 7ff73f98173e 151->154 155 7ff73f9817aa-7ff73f9817c2 151->155 157 7ff73f981741-7ff73f981748 154->157 156 7ff73f9817c7-7ff73f9817d1 155->156 158 7ff73f9817e6-7ff73f9817ff call 7ff73f987ba8 156->158 159 7ff73f9817d3-7ff73f9817d9 156->159 157->157 160 7ff73f98174a-7ff73f98174e 157->160 164 7ff73f981804-7ff73f981814 call 7ff73f987d68 158->164 159->158 161 7ff73f9817db-7ff73f9817e4 159->161 160->155 163 7ff73f981750-7ff73f981757 160->163 161->156 161->158 165 7ff73f98175e-7ff73f981760 163->165 166 7ff73f981759-7ff73f98175c 163->166 172 7ff73f981a1b-7ff73f981a2b call 7ff73f987d68 164->172 173 7ff73f98181a-7ff73f981847 CompareStringA 164->173 165->155 169 7ff73f981762-7ff73f981764 165->169 166->165 168 7ff73f981766-7ff73f981776 166->168 171 7ff73f98177b-7ff73f981785 168->171 169->155 169->168 174 7ff73f98179a-7ff73f9817a8 171->174 175 7ff73f981787-7ff73f98178d 171->175 183 7ff73f981acb-7ff73f981ae9 LocalAlloc 172->183 184 7ff73f981a31-7ff73f981a5e CompareStringA 172->184 173->172 177 7ff73f98184d-7ff73f981861 GetFileAttributesA 173->177 174->164 175->174 178 7ff73f98178f-7ff73f981798 175->178 180 7ff73f981867-7ff73f98186f 177->180 181 7ff73f9819f3-7ff73f9819fb 177->181 178->171 178->174 180->181 185 7ff73f981875-7ff73f981891 call 7ff73f9815e8 180->185 182 7ff73f981a00-7ff73f981a16 call 7ff73f984dcc 181->182 198 7ff73f981bda-7ff73f981c03 call 7ff73f988470 182->198 187 7ff73f981aeb-7ff73f981aff GetFileAttributesA 183->187 188 7ff73f981aa2-7ff73f981aad 183->188 184->183 189 7ff73f981a60-7ff73f981a67 184->189 196 7ff73f9818b5-7ff73f9818d1 LocalAlloc 185->196 197 7ff73f981893-7ff73f9818b0 call 7ff73f9815e8 185->197 192 7ff73f981b7e-7ff73f981b88 187->192 193 7ff73f981b01-7ff73f981b03 187->193 188->182 194 7ff73f981a6a-7ff73f981a71 189->194 201 7ff73f981b8f-7ff73f981b99 192->201 193->192 199 7ff73f981b05-7ff73f981b16 193->199 194->194 200 7ff73f981a73 194->200 196->188 205 7ff73f9818d7-7ff73f98194d GetPrivateProfileIntA GetPrivateProfileStringA 196->205 197->196 206 7ff73f981b1d-7ff73f981b27 199->206 208 7ff73f981a78-7ff73f981a7f 200->208 202 7ff73f981bae-7ff73f981bb9 201->202 203 7ff73f981b9b-7ff73f981ba1 201->203 210 7ff73f981bbc-7ff73f981bcc call 7ff73f982a6c 202->210 203->202 209 7ff73f981ba3-7ff73f981bac 203->209 211 7ff73f981984-7ff73f981993 205->211 212 7ff73f98194f-7ff73f98197f call 7ff73f981008 * 2 205->212 213 7ff73f981b3c-7ff73f981b4d 206->213 214 7ff73f981b29-7ff73f981b2f 206->214 208->208 216 7ff73f981a81-7ff73f981aa0 LocalAlloc 208->216 209->201 209->202 224 7ff73f981bd1-7ff73f981bd5 210->224 221 7ff73f9819ba 211->221 222 7ff73f981995-7ff73f9819b8 GetShortPathNameA 211->222 212->224 213->210 220 7ff73f981b4f-7ff73f981b52 213->220 214->213 219 7ff73f981b31-7ff73f981b3a 214->219 216->188 223 7ff73f981ab2-7ff73f981ac6 call 7ff73f98114c 216->223 219->206 219->213 220->210 226 7ff73f981b54-7ff73f981b7c call 7ff73f981084 * 2 220->226 227 7ff73f9819c1-7ff73f9819ee call 7ff73f98114c 221->227 222->227 223->224 224->198 226->210 227->224
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: String$PrivateProfile$AllocAttributesCompareFileLoadLocalMessageNamePathShort
    • String ID: .BAT$.INF$AdvancedINF$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Command.com /c %s$DefaultInstall$Reboot$Version$rundll32.exe %s,InstallHinfSection %s 128 %s$setupapi.dll$setupx.dll
    • API String ID: 383838535-3544074861
    • Opcode ID: 137c5f28b5b86e8721d426d5fc1592b78fb4194462560af86aa0c2ab9f656457
    • Instruction ID: f179eb5dfd7f8e12c7b5d3d33875b18b187cd4b3126bc44c63609809dc4b6405
    • Opcode Fuzzy Hash: 137c5f28b5b86e8721d426d5fc1592b78fb4194462560af86aa0c2ab9f656457
    • Instruction Fuzzy Hash: 26E1AFA2A087C2A5EB19AF10E4402F9B7A4EB45BC4FD44136DA4D8379DDF3DE589D320
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 238 7ff73f9866c4-7ff73f986724 call 7ff73f985050 LocalAlloc 241 7ff73f986756-7ff73f98676a call 7ff73f985050 238->241 242 7ff73f986726-7ff73f986749 call 7ff73f984dcc call 7ff73f987700 238->242 247 7ff73f98676c-7ff73f9867a3 call 7ff73f984dcc LocalFree 241->247 248 7ff73f9867a5-7ff73f9867ea lstrcmpA LocalFree 241->248 254 7ff73f98674f-7ff73f986751 242->254 247->254 252 7ff73f9867ec-7ff73f9867ee 248->252 253 7ff73f986837-7ff73f98683d 248->253 258 7ff73f9867fb 252->258 259 7ff73f9867f0-7ff73f9867f9 252->259 255 7ff73f986b14-7ff73f986b38 call 7ff73f987ac8 253->255 256 7ff73f986843-7ff73f986849 253->256 260 7ff73f986b3a-7ff73f986b66 call 7ff73f988470 254->260 255->260 256->255 262 7ff73f98684f-7ff73f986870 GetTempPathA 256->262 263 7ff73f9867fe-7ff73f98680e call 7ff73f9864e4 258->263 259->258 259->263 266 7ff73f9868ad-7ff73f9868b9 262->266 267 7ff73f986872-7ff73f98687e call 7ff73f9864e4 262->267 275 7ff73f986814-7ff73f986832 call 7ff73f984dcc 263->275 276 7ff73f986b0f-7ff73f986b12 263->276 272 7ff73f9868bc-7ff73f9868bf 266->272 274 7ff73f986883-7ff73f986885 267->274 273 7ff73f9868c4-7ff73f9868ce 272->273 278 7ff73f9868e1-7ff73f9868f3 273->278 279 7ff73f9868d0-7ff73f9868d5 273->279 274->276 280 7ff73f98688b-7ff73f986895 call 7ff73f982468 274->280 275->254 276->260 283 7ff73f986adb-7ff73f986b04 GetWindowsDirectoryA call 7ff73f986ca4 278->283 284 7ff73f9868f9-7ff73f98690f GetDriveTypeA 278->284 279->278 282 7ff73f9868d7-7ff73f9868df 279->282 280->266 292 7ff73f986897-7ff73f9868a7 call 7ff73f9864e4 280->292 282->273 282->278 283->254 298 7ff73f986b0a 283->298 286 7ff73f986916-7ff73f98692a GetFileAttributesA 284->286 287 7ff73f986911-7ff73f986914 284->287 290 7ff73f986930-7ff73f986933 286->290 291 7ff73f9869bd-7ff73f9869d0 call 7ff73f986ca4 286->291 287->286 287->290 295 7ff73f9869ad 290->295 296 7ff73f986935-7ff73f98693f 290->296 303 7ff73f9869f4-7ff73f986a00 call 7ff73f982468 291->303 304 7ff73f9869d2-7ff73f9869de call 7ff73f982468 291->304 292->266 292->276 300 7ff73f9869b1-7ff73f9869b8 295->300 296->300 301 7ff73f986941-7ff73f986953 296->301 298->272 306 7ff73f986ad2-7ff73f986ad5 300->306 301->300 305 7ff73f986955-7ff73f986981 GetDiskFreeSpaceA 301->305 314 7ff73f986a16-7ff73f986a3e call 7ff73f987ba8 GetFileAttributesA 303->314 315 7ff73f986a02-7ff73f986a11 GetWindowsDirectoryA 303->315 304->295 313 7ff73f9869e0-7ff73f9869f2 call 7ff73f986ca4 304->313 305->295 309 7ff73f986983-7ff73f9869a4 MulDiv 305->309 306->283 306->284 309->295 312 7ff73f9869a6-7ff73f9869ab 309->312 312->291 312->295 313->295 313->303 320 7ff73f986a55 314->320 321 7ff73f986a40-7ff73f986a53 CreateDirectoryA 314->321 315->314 322 7ff73f986a58-7ff73f986a5a 320->322 321->322 323 7ff73f986a6d-7ff73f986a8e SetFileAttributesA 322->323 324 7ff73f986a5c-7ff73f986a6b 322->324 325 7ff73f986a91-7ff73f986a9b 323->325 324->306 326 7ff73f986a9d-7ff73f986aa3 325->326 327 7ff73f986aaf-7ff73f986acc call 7ff73f9864e4 325->327 326->327 328 7ff73f986aa5-7ff73f986aad 326->328 327->276 331 7ff73f986ace 327->331 328->325 328->327 331->306
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$Free$AttributesDirectoryFileFindLoadLocal$Windows$AllocCreateDialogDiskDriveErrorIndirectLastLockMessageParamPathSizeofSpaceStringTempTypelstrcmpmemcpy_s
    • String ID: <None>$A:\$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$RUNPROGRAM$Z$msdownld.tmp
    • API String ID: 3973824516-2740620654
    • Opcode ID: 2d8e839b3a043200ffa940665c8789ad88760caaed9a3537215d82f6b3617662
    • Instruction ID: bf8cfc17573a277c09991112062c6263d6dc3b1ad65994c6ade6dcf5addc1715
    • Opcode Fuzzy Hash: 2d8e839b3a043200ffa940665c8789ad88760caaed9a3537215d82f6b3617662
    • Instruction Fuzzy Hash: E1D1B2A2A186C6A6EB18AF20D4106FAF7A1FB857C4FD04035DA4E8769DDF3DD805D720
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 332 7ff73f982db4-7ff73f982e4d call 7ff73f988b09 memset * 2 call 7ff73f985050 337 7ff73f9830a5 332->337 338 7ff73f982e53-7ff73f982e94 CreateEventA SetEvent call 7ff73f985050 332->338 340 7ff73f9830aa-7ff73f9830b9 call 7ff73f984dcc 337->340 343 7ff73f982e96-7ff73f982ea0 338->343 344 7ff73f982ec3-7ff73f982ecb 338->344 345 7ff73f9830be 340->345 346 7ff73f982ea2-7ff73f982ebe call 7ff73f984dcc 343->346 348 7ff73f982ecd-7ff73f982ecf 344->348 349 7ff73f982ed5-7ff73f982ef0 call 7ff73f985050 344->349 347 7ff73f9830c0-7ff73f9830e3 call 7ff73f988470 345->347 346->345 348->349 352 7ff73f982fa3-7ff73f982fb3 call 7ff73f9870a8 348->352 359 7ff73f982efe-7ff73f982f1c CreateMutexA 349->359 360 7ff73f982ef2-7ff73f982efc 349->360 362 7ff73f982fb5-7ff73f982fbf 352->362 363 7ff73f982fc4-7ff73f982fcb 352->363 359->352 361 7ff73f982f22-7ff73f982f33 GetLastError 359->361 360->346 361->352 364 7ff73f982f35-7ff73f982f48 361->364 362->340 365 7ff73f982fde-7ff73f982ffd FindResourceA 363->365 366 7ff73f982fcd-7ff73f982fd9 call 7ff73f98204c 363->366 367 7ff73f982f4a-7ff73f982f60 call 7ff73f984dcc 364->367 368 7ff73f982f62-7ff73f982f7f call 7ff73f984dcc 364->368 369 7ff73f983014-7ff73f98301b 365->369 370 7ff73f982fff-7ff73f983011 LoadResource 365->370 366->345 381 7ff73f982f81-7ff73f982f9e CloseHandle 367->381 368->352 368->381 374 7ff73f98301d-7ff73f983024 #17 369->374 375 7ff73f983029-7ff73f983030 369->375 370->369 374->375 378 7ff73f98303a-7ff73f983044 call 7ff73f983bf4 375->378 379 7ff73f983032-7ff73f983035 375->379 378->345 384 7ff73f983046-7ff73f983055 378->384 379->347 381->345 384->379 385 7ff73f983057-7ff73f983061 384->385 385->379 386 7ff73f983063-7ff73f98306a 385->386 386->379 387 7ff73f98306c-7ff73f983073 call 7ff73f9812ec 386->387 387->379 390 7ff73f983075-7ff73f9830a1 call 7ff73f987ac8 387->390 390->345 393 7ff73f9830a3 390->393 393->379
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$FindLoad$CreateEventmemset$CloseErrorFreeHandleLastLockMessageMutexSizeofStringVersionmemcpy_s
    • String ID: $EXTRACTOPT$INSTANCECHECK$Open$TITLE$VERCHECK
    • API String ID: 3100096412-1926350809
    • Opcode ID: f21eaf2065c6241e7a519f3bddc1b5d75266ef9fda77f4a4b915c60b794fde5a
    • Instruction ID: 71e0a342a3f96e240fcb4fb4f8c4e8b1afb8c09a9c5792ea832e70400989b328
    • Opcode Fuzzy Hash: f21eaf2065c6241e7a519f3bddc1b5d75266ef9fda77f4a4b915c60b794fde5a
    • Instruction Fuzzy Hash: BE815EE1A186C3A6F728BB11E4007F9E690AF897D4FD04036D94EC669DCF7CA405EA20
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 394 7ff73f986ca4-7ff73f986d10 GetCurrentDirectoryA SetCurrentDirectoryA 395 7ff73f986d12-7ff73f986d3a call 7ff73f984dcc call 7ff73f987700 394->395 396 7ff73f986d3f-7ff73f986d7a GetDiskFreeSpaceA 394->396 415 7ff73f986fe9 395->415 397 7ff73f986f63-7ff73f986fb8 memset call 7ff73f987700 GetLastError FormatMessageA 396->397 398 7ff73f986d80-7ff73f986da8 MulDiv 396->398 407 7ff73f986fbd-7ff73f986fe4 call 7ff73f984dcc SetCurrentDirectoryA 397->407 398->397 400 7ff73f986dae-7ff73f986de4 GetVolumeInformationA 398->400 404 7ff73f986de6-7ff73f986e40 memset call 7ff73f987700 GetLastError FormatMessageA 400->404 405 7ff73f986e45-7ff73f986e68 SetCurrentDirectoryA 400->405 404->407 409 7ff73f986e6c-7ff73f986e73 405->409 407->415 413 7ff73f986e86-7ff73f986e99 409->413 414 7ff73f986e75-7ff73f986e7a 409->414 419 7ff73f986e9d-7ff73f986ea0 413->419 414->413 418 7ff73f986e7c-7ff73f986e84 414->418 417 7ff73f986feb-7ff73f98701a call 7ff73f988470 415->417 418->409 418->413 421 7ff73f986eae-7ff73f986eb2 419->421 422 7ff73f986ea2-7ff73f986eac 419->422 424 7ff73f986ed8-7ff73f986edf 421->424 425 7ff73f986eb4-7ff73f986ed3 call 7ff73f984dcc 421->425 422->419 422->421 426 7ff73f986f0e-7ff73f986f1f 424->426 427 7ff73f986ee1-7ff73f986ee9 424->427 425->415 430 7ff73f986f22-7ff73f986f2a 426->430 427->426 429 7ff73f986eeb-7ff73f986f0c 427->429 429->430 432 7ff73f986f2c-7ff73f986f30 430->432 433 7ff73f986f46-7ff73f986f49 430->433 434 7ff73f986f32 432->434 435 7ff73f986f4b-7ff73f986f4d 433->435 436 7ff73f986f4f-7ff73f986f52 433->436 437 7ff73f986f54-7ff73f986f5e 434->437 438 7ff73f986f34-7ff73f986f41 call 7ff73f9824f8 434->438 435->434 436->434 437->417 438->417
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CurrentDirectory$ErrorLastMessage$DiskFormatFreeInformationLoadSpaceStringVolumememset
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 4237285672-305352358
    • Opcode ID: 49cd0adaaefc1983ba8fc555e95bfd9e5a633419e36afff043da1f8bde31fc7d
    • Instruction ID: 25443228a86fe5f6510f63806889362b77f14ef0c71bdb52c67f1a50e5323f53
    • Opcode Fuzzy Hash: 49cd0adaaefc1983ba8fc555e95bfd9e5a633419e36afff043da1f8bde31fc7d
    • Instruction Fuzzy Hash: 57A193B6A1878596E724AF21E4406EAFBA5FB89784F804135DA4E87B5CCF3CD409DB10
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$Find$FreeItemLoadLockShowWindow$MessageSendSizeofmemcpy_s
    • String ID: *MEMCAB$CABINET
    • API String ID: 1305606123-2642027498
    • Opcode ID: f882a7c50b35efb5f215cde0c72f03eaf3176b93dc19dac94f7000cee1ca45cb
    • Instruction ID: 7076bd195e217f304daa16d6a7f19c3ebb1e4ad6f05a14daf7836c674dd35674
    • Opcode Fuzzy Hash: f882a7c50b35efb5f215cde0c72f03eaf3176b93dc19dac94f7000cee1ca45cb
    • Instruction Fuzzy Hash: D951FDB1A08B82A6EB18AB11E8547F5F7A4FF89B95FC44136D94E8265CDF3CD008D720
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 525 7ff73f9830ec-7ff73f983114 526 7ff73f983116-7ff73f98311c 525->526 527 7ff73f983141-7ff73f983148 call 7ff73f985fe4 525->527 528 7ff73f98311e-7ff73f983125 call 7ff73f9860a4 526->528 529 7ff73f983134 call 7ff73f983f74 526->529 536 7ff73f98314e-7ff73f983155 call 7ff73f9866c4 527->536 537 7ff73f983236 527->537 528->537 538 7ff73f98312b-7ff73f983132 528->538 535 7ff73f983139-7ff73f98313b 529->535 535->527 535->537 536->537 543 7ff73f98315b-7ff73f98319d GetSystemDirectoryA call 7ff73f987ba8 LoadLibraryA 536->543 540 7ff73f983238-7ff73f983258 call 7ff73f988470 537->540 538->527 538->529 547 7ff73f9831c9-7ff73f9831de FreeLibrary 543->547 548 7ff73f98319f-7ff73f9831b8 GetProcAddress 543->548 550 7ff73f9831e4-7ff73f9831ea 547->550 551 7ff73f983273-7ff73f983288 SetCurrentDirectoryA 547->551 548->547 549 7ff73f9831ba-7ff73f9831c3 DecryptFileA 548->549 549->547 550->551 554 7ff73f9831f0-7ff73f98320b GetWindowsDirectoryA 550->554 552 7ff73f98328a-7ff73f98328f 551->552 553 7ff73f983291-7ff73f983297 551->553 555 7ff73f983212-7ff73f983230 call 7ff73f984dcc call 7ff73f987700 552->555 556 7ff73f98332d-7ff73f983335 553->556 557 7ff73f98329d-7ff73f9832a4 553->557 558 7ff73f98320d 554->558 559 7ff73f98325a-7ff73f98326a call 7ff73f986ca4 554->559 555->537 561 7ff73f983349 556->561 562 7ff73f983337-7ff73f983339 556->562 563 7ff73f9832a9-7ff73f9832b7 557->563 558->555 565 7ff73f98326f-7ff73f983271 559->565 569 7ff73f98334b-7ff73f983359 561->569 562->561 566 7ff73f98333b-7ff73f983342 call 7ff73f982318 562->566 563->563 567 7ff73f9832b9-7ff73f9832c0 563->567 565->537 565->551 578 7ff73f983347 566->578 571 7ff73f9832fb call 7ff73f985d90 567->571 572 7ff73f9832c2-7ff73f9832c9 567->572 574 7ff73f98335b-7ff73f983361 569->574 575 7ff73f983376-7ff73f98337d 569->575 585 7ff73f983300 571->585 572->571 579 7ff73f9832cb-7ff73f9832f1 call 7ff73f987ac8 572->579 574->575 582 7ff73f983363 call 7ff73f9840c4 574->582 576 7ff73f983388-7ff73f98338d 575->576 577 7ff73f98337f-7ff73f983381 575->577 576->540 577->576 583 7ff73f983383 call 7ff73f98494c 577->583 578->569 590 7ff73f9832f6-7ff73f9832f9 579->590 588 7ff73f983368-7ff73f98336a 582->588 583->576 587 7ff73f983302 585->587 591 7ff73f983304-7ff73f98330e 587->591 592 7ff73f983313-7ff73f983321 call 7ff73f98772c 587->592 588->537 593 7ff73f983370 588->593 590->587 591->537 592->537 596 7ff73f983327 592->596 593->575 596->556
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: DirectoryLibrary$AddressAllocDecryptFileFreeLoadLocalProcSystemWindows
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DecryptFileA$advapi32.dll
    • API String ID: 3010855178-1173327654
    • Opcode ID: 1b568c9d80e1c16c25a8832b7560ad1fe553b1887f492639f14b46a0c907384f
    • Instruction ID: 3a65a7df9c2c8870f5378c3e16b879735ccb22739c3961b362ee4bca02bd8d21
    • Opcode Fuzzy Hash: 1b568c9d80e1c16c25a8832b7560ad1fe553b1887f492639f14b46a0c907384f
    • Instruction Fuzzy Hash: 797132E1E0C6C3A5FB69BB11E840AF5E695AF987D0FC04036D94EC269DDF2CE445E620
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 597 7ff73f9864e4-7ff73f986510 598 7ff73f986516-7ff73f98651b call 7ff73f9863b8 597->598 599 7ff73f9865df-7ff73f9865ee 597->599 602 7ff73f986520-7ff73f986522 598->602 601 7ff73f9865f1-7ff73f9865fb 599->601 603 7ff73f9865fd-7ff73f986603 601->603 604 7ff73f986610-7ff73f98661b 601->604 605 7ff73f986688-7ff73f98668a 602->605 606 7ff73f986528-7ff73f98653e 602->606 603->604 607 7ff73f986605-7ff73f98660e 603->607 608 7ff73f98661e-7ff73f986628 call 7ff73f986b70 604->608 610 7ff73f986698-7ff73f9866bc call 7ff73f988470 605->610 609 7ff73f986541-7ff73f98654b 606->609 607->601 607->604 616 7ff73f98662a-7ff73f98663d CreateDirectoryA 608->616 617 7ff73f986649-7ff73f98664b 608->617 612 7ff73f98654d-7ff73f986553 609->612 613 7ff73f986560-7ff73f986575 609->613 612->613 618 7ff73f986555-7ff73f98655e 612->618 619 7ff73f9865cc-7ff73f9865dd call 7ff73f987ba8 613->619 620 7ff73f986577-7ff73f98658f GetSystemInfo 613->620 622 7ff73f98667d-7ff73f986682 call 7ff73f987700 616->622 623 7ff73f98663f 616->623 624 7ff73f98664d-7ff73f986655 call 7ff73f986ca4 617->624 625 7ff73f98668c-7ff73f986693 617->625 618->609 618->613 619->608 627 7ff73f9865bb 620->627 628 7ff73f986591-7ff73f986594 620->628 622->605 623->617 636 7ff73f98665a-7ff73f98665c 624->636 625->610 629 7ff73f9865c2-7ff73f9865c7 call 7ff73f987ba8 627->629 633 7ff73f986596-7ff73f986599 628->633 634 7ff73f9865b2-7ff73f9865b9 628->634 629->619 638 7ff73f98659b-7ff73f98659e 633->638 639 7ff73f9865a9-7ff73f9865b0 633->639 634->629 636->625 640 7ff73f98665e-7ff73f986664 636->640 638->619 641 7ff73f9865a0-7ff73f9865a7 638->641 639->629 640->605 642 7ff73f986666-7ff73f98667b RemoveDirectoryA 640->642 641->629 642->605
    APIs
    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,0000000A,00007FF73F982CE1), ref: 00007FF73F98657C
    • CreateDirectoryA.KERNEL32(?,?,?,?,?,?,0000000A,00007FF73F982CE1), ref: 00007FF73F98662F
    • RemoveDirectoryA.KERNEL32(?,?,?,?,?,?,0000000A,00007FF73F982CE1), ref: 00007FF73F98666F
      • Part of subcall function 00007FF73F9863B8: RemoveDirectoryA.KERNELBASE(0000000A,00007FF73F982CE1), ref: 00007FF73F986423
      • Part of subcall function 00007FF73F9863B8: GetFileAttributesA.KERNELBASE ref: 00007FF73F986432
      • Part of subcall function 00007FF73F9863B8: GetTempFileNameA.KERNEL32 ref: 00007FF73F98645B
      • Part of subcall function 00007FF73F9863B8: DeleteFileA.KERNEL32 ref: 00007FF73F986473
      • Part of subcall function 00007FF73F9863B8: CreateDirectoryA.KERNEL32 ref: 00007FF73F986484
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Directory$File$CreateRemove$AttributesDeleteInfoNameSystemTemp
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$alpha$i386$mips$ppc
    • API String ID: 1979080616-3374052426
    • Opcode ID: 46ce37abadc5027e1bb67ef9580c9553c9e3bc3d3873299fa6b8c7dc3ad8012b
    • Instruction ID: eb4afa9a9c4759a025adc848a0b4593f1658dbee93c32044ab21c921123dc171
    • Opcode Fuzzy Hash: 46ce37abadc5027e1bb67ef9580c9553c9e3bc3d3873299fa6b8c7dc3ad8012b
    • Instruction Fuzzy Hash: C35175E1E0D6C6A1FB59AB15E8102F9E7A4AF44BC0FD44135C94EC669DDF3DE804E620
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Handle$AddressCloseExitModuleProcVersionWindows
    • String ID: @$HeapSetInformation$Kernel32.dll
    • API String ID: 1302179841-1204263913
    • Opcode ID: d0bfb26a70778e8c6dce021e27be85d7a0cec3bff586eb98b8bfca0f5ba54e91
    • Instruction ID: 71bbae0d1b9860d99cbf7f312736b1baa5a59ae1ed58ad22a9105d2621226d53
    • Opcode Fuzzy Hash: d0bfb26a70778e8c6dce021e27be85d7a0cec3bff586eb98b8bfca0f5ba54e91
    • Instruction Fuzzy Hash: FD312FA1A086C2AAFB6C7B10E4446F5EA90AF55BD0FC44135D90E8669DCF6DE444A630
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: File$Find$lstrcmp$AttributesCloseDeleteDirectoryFirstNextRemove
    • String ID:
    • API String ID: 836429354-0
    • Opcode ID: 443ad30fadf752f4578cad6f697bceb18b99ad69543bd59e09de2f484cdf82b3
    • Instruction ID: 4c1aec0dc7129cbec8b7a30531ef3c46df50d25ba5d6b2c744aae2e9e625b0ec
    • Opcode Fuzzy Hash: 443ad30fadf752f4578cad6f697bceb18b99ad69543bd59e09de2f484cdf82b3
    • Instruction Fuzzy Hash: 5C516DB2608BC5A5EB15AF20D8402E8ABA1FB45BC4FC48171DA4E8769DDF3CD509D710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$DialogFindFreeIndirectLoadParam
    • String ID:
    • API String ID: 1214682469-0
    • Opcode ID: 49aab33a39cc72be79b49f501bba61147af0a043aada8a8b069909c25daef280
    • Instruction ID: 19761fbcda4cb6fe4d2e63b8cc2b7ef169335613001ee404d1db18136351d7d3
    • Opcode Fuzzy Hash: 49aab33a39cc72be79b49f501bba61147af0a043aada8a8b069909c25daef280
    • Instruction Fuzzy Hash: 4C118171A08B8192EB149B11F8002A9FAA1FB89FE0F884735DE5E43B9CDF3CD0409B10
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: EventItemMessageSendThreadWindow$CreateDesktopDialogResetTerminateText
    • String ID: $Open
    • API String ID: 2654313074-2804539095
    • Opcode ID: 00a4735194eecac90b7f23e95863fe14a5468c5ab709964e4691a7869e5d0189
    • Instruction ID: 422ecb5eb56a717bf4a37e3110a9b3e49c71af5f0790530196bbdaa10d5fc0e3
    • Opcode Fuzzy Hash: 00a4735194eecac90b7f23e95863fe14a5468c5ab709964e4691a7869e5d0189
    • Instruction Fuzzy Hash: 0F5178B1A086C2D6E7586B11E4446F9FA91FB89BD5F849231C91E83B9CCF3C9045D710
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: DeleteFileFreeLocal$AttributesCloseCurrentDirectoryOpenValue
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Software\Microsoft\Windows\CurrentVersion\RunOnce$wextract_cleanup0
    • API String ID: 3049360512-3137473940
    • Opcode ID: 88b67cf9d0802eb801fbc77634297f52a5ae07bc3bb60e3e8d3801540334588a
    • Instruction ID: 32ca6ca5cebf6d5107e0082290228e41159dc3ecdac12c8446a2f5b328f107da
    • Opcode Fuzzy Hash: 88b67cf9d0802eb801fbc77634297f52a5ae07bc3bb60e3e8d3801540334588a
    • Instruction Fuzzy Hash: 8B5111A1A086C6A6EB19AB14E4443F9B7A0FB45BC5FC44171D64EC769DCF2CE848D720
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CloseHandleProcess$CodeCreateErrorExitFormatLastMessageObjectSingleWait
    • String ID:
    • API String ID: 3183975587-3916222277
    • Opcode ID: 98467f424fe36bd15bb507385cdbd18d0c765d323d878b3b0929ff50d27d6618
    • Instruction ID: 78e0eaeceb6082a07387d8ced480c52289ebaac752b0c6345a7c600c0c0b051c
    • Opcode Fuzzy Hash: 98467f424fe36bd15bb507385cdbd18d0c765d323d878b3b0929ff50d27d6618
    • Instruction Fuzzy Hash: DC517CB29086C1D6F768AB14E4447F9F6A0FF88794F804136EA4E826ADCF7CD444DB20
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: OpenQuery$CloseInfoValue
    • String ID: PendingFileRenameOperations$System\CurrentControlSet\Control\Session Manager$System\CurrentControlSet\Control\Session Manager\FileRenameOperations
    • API String ID: 2209512893-559176071
    • Opcode ID: 9f23079a79aaf393f30d7d52ead263bb4ecc079f7f4d037dad90965ff67e785b
    • Instruction ID: f120063a72a4a169442dd504ca0b760232044e3ae7463f5d7fca11f07611ff0b
    • Opcode Fuzzy Hash: 9f23079a79aaf393f30d7d52ead263bb4ecc079f7f4d037dad90965ff67e785b
    • Instruction Fuzzy Hash: 61316F72608B81DAD7249F24F8506E9FBA4FB89B94F844535E64D83B5CDF38D150DB10
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: DirectoryFile$Create$AttributesDeleteNameRemoveTemp_vsnprintf
    • String ID: IXP$IXP%03d.TMP
    • API String ID: 1082909758-3932986939
    • Opcode ID: a8932f2c933087a6f7710ab058026970ef7685da5f8c2755a45c3c5b36be9ab1
    • Instruction ID: 0fa95268ffcdaad6a3c0bc991e43a1a3fc89f430d93f65b1b917d5bcbd99a204
    • Opcode Fuzzy Hash: a8932f2c933087a6f7710ab058026970ef7685da5f8c2755a45c3c5b36be9ab1
    • Instruction Fuzzy Hash: 75214FB16089C1A6F718AB26E9503F9E691EB8ABC0F848130DD4E877ADCF3CD445D610
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Current$CountTickTime$CounterFileImageInfoNonwritablePerformanceProcessQuerySleepStartupSystemThread_amsg_exit_cexit_initterm_ismbbleadexit
    • String ID:
    • API String ID: 2995914023-0
    • Opcode ID: d49111f4b884f1987b7511ab97b886bea71faf8ec09ccfccceaf9d5ebbbc5980
    • Instruction ID: 20ead58cb8d3edd3430ac02648bf5f7505707a8d737f20398d5f65571eda8715
    • Opcode Fuzzy Hash: d49111f4b884f1987b7511ab97b886bea71faf8ec09ccfccceaf9d5ebbbc5980
    • Instruction Fuzzy Hash: AE511BB1908AC2A6E768AB21E9543F9A2E4FB447D4FD80075D94DC369DDF3CE841E630
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00007FF73F985050: FindResourceA.KERNEL32 ref: 00007FF73F985078
      • Part of subcall function 00007FF73F985050: SizeofResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F985089
      • Part of subcall function 00007FF73F985050: FindResourceA.KERNEL32 ref: 00007FF73F9850AF
      • Part of subcall function 00007FF73F985050: LoadResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850C0
      • Part of subcall function 00007FF73F985050: LockResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850CF
      • Part of subcall function 00007FF73F985050: memcpy_s.MSVCRT ref: 00007FF73F9850EE
      • Part of subcall function 00007FF73F985050: FreeResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850FD
    • LocalAlloc.KERNEL32(?,?,?,?,00000000,00007FF73F983123), ref: 00007FF73F9860C9
    • LocalFree.KERNEL32 ref: 00007FF73F986142
      • Part of subcall function 00007FF73F984DCC: LoadStringA.USER32 ref: 00007FF73F984E60
      • Part of subcall function 00007FF73F984DCC: MessageBoxA.USER32 ref: 00007FF73F984EA0
      • Part of subcall function 00007FF73F987700: GetLastError.KERNEL32 ref: 00007FF73F987704
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$FindFreeLoadLocal$AllocErrorLastLockMessageSizeofStringmemcpy_s
    • String ID: $<None>$UPROMPT
    • API String ID: 957408736-2569542085
    • Opcode ID: 3f9fe5337bcce2b93c7e77de5b04aed7ad53957daffb592c1919ade272611d49
    • Instruction ID: 71c56aadc3581e1bceb783b96b80ed8caaea825d1f6072c530f2b66ddd0bdf41
    • Opcode Fuzzy Hash: 3f9fe5337bcce2b93c7e77de5b04aed7ad53957daffb592c1919ade272611d49
    • Instruction Fuzzy Hash: 663164F1A0C682A7F7286B20E5507FAFA51EF85BD4F804135DA0E8669DDF7DE4049B10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CreateFile$lstrcmp
    • String ID: *MEMCAB
    • API String ID: 1301100335-3211172518
    • Opcode ID: fab58b71c17961be18cd8b0539a41123d81d0c9073bbe07ec3ef194c0142598e
    • Instruction ID: d7c4b9f16c15edef6140c6e79e598efedb2e78ede11084de51d2918d0c5eb6cf
    • Opcode Fuzzy Hash: fab58b71c17961be18cd8b0539a41123d81d0c9073bbe07ec3ef194c0142598e
    • Instruction Fuzzy Hash: B561C7E69087C196F7689B14A4807B9BA91EB45BF4F844335CA6E837CCCF3DE4099720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: FileTime$AttributesDateLocalTextWindow
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 1150793416-305352358
    • Opcode ID: 8ba837678c1f67d615ec5eef46cb77bfad3a32e48b5654526580d0bdf889563c
    • Instruction ID: 2263657c17f95d60c14391ee61a0f8cab63d85e8f24bbf08134f16bcfe9b3122
    • Opcode Fuzzy Hash: 8ba837678c1f67d615ec5eef46cb77bfad3a32e48b5654526580d0bdf889563c
    • Instruction Fuzzy Hash: 445174B2A186C2A1EB6CAB11D4501F9A790FF48BE0FC45136DA4EC329DCE3CE549D760
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Window$CapsDeviceRect$Release
    • String ID:
    • API String ID: 2212493051-0
    • Opcode ID: 0d796e944f2108898d7f7223ae91cc33082503468592f481f03ae45c8c0a45dc
    • Instruction ID: ef443fbee32df4ef321b96db122788061572667ac01e280c356e59d1540c1a2f
    • Opcode Fuzzy Hash: 0d796e944f2108898d7f7223ae91cc33082503468592f481f03ae45c8c0a45dc
    • Instruction Fuzzy Hash: AB319F72B146919AE7149B75E8049FDBBA0F789B99F885130CE0A93B0CCF3CE449CB10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: AllocLocal
    • String ID: TMP4351$.TMP
    • API String ID: 3494564517-2619824408
    • Opcode ID: d5ace99f2663905ba72166a92556dafad1272f0db083ef97e46a8f7b12bd3ef1
    • Instruction ID: 151e915d70f1caa386fa80a5f3ecd5813b8748a7e2e08acef77ddec9ae5d31bc
    • Opcode Fuzzy Hash: d5ace99f2663905ba72166a92556dafad1272f0db083ef97e46a8f7b12bd3ef1
    • Instruction Fuzzy Hash: 7D3161B1A0868596F7186B25A4103FAF690EB85BF4F845334DA6A867DDCF3CE4059710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00007FF73F985050: FindResourceA.KERNEL32 ref: 00007FF73F985078
      • Part of subcall function 00007FF73F985050: SizeofResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F985089
      • Part of subcall function 00007FF73F985050: FindResourceA.KERNEL32 ref: 00007FF73F9850AF
      • Part of subcall function 00007FF73F985050: LoadResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850C0
      • Part of subcall function 00007FF73F985050: LockResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850CF
      • Part of subcall function 00007FF73F985050: memcpy_s.MSVCRT ref: 00007FF73F9850EE
      • Part of subcall function 00007FF73F985050: FreeResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850FD
    • LocalAlloc.KERNEL32(?,?,?,?,?,00007FF73F983139), ref: 00007FF73F983F95
    • LocalFree.KERNEL32 ref: 00007FF73F984018
      • Part of subcall function 00007FF73F984DCC: LoadStringA.USER32 ref: 00007FF73F984E60
      • Part of subcall function 00007FF73F984DCC: MessageBoxA.USER32 ref: 00007FF73F984EA0
      • Part of subcall function 00007FF73F987700: GetLastError.KERNEL32 ref: 00007FF73F987704
    • lstrcmpA.KERNEL32(?,?,?,?,?,00007FF73F983139), ref: 00007FF73F98403E
    • LocalFree.KERNEL32(?,?,?,?,?,00007FF73F983139), ref: 00007FF73F98409F
      • Part of subcall function 00007FF73F987AC8: FindResourceA.KERNEL32 ref: 00007FF73F987AF2
      • Part of subcall function 00007FF73F987AC8: LoadResource.KERNEL32 ref: 00007FF73F987B09
      • Part of subcall function 00007FF73F987AC8: DialogBoxIndirectParamA.USER32 ref: 00007FF73F987B3F
      • Part of subcall function 00007FF73F987AC8: FreeResource.KERNEL32 ref: 00007FF73F987B51
    • LocalFree.KERNEL32 ref: 00007FF73F984078
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$Free$Local$FindLoad$AllocDialogErrorIndirectLastLockMessageParamSizeofStringlstrcmpmemcpy_s
    • String ID: <None>$LICENSE
    • API String ID: 2414642746-383193767
    • Opcode ID: 2a56340b2f00b815a7c44a1288c62c107f96cf42b55428e5d812d1c0fdd60103
    • Instruction ID: c5b05eba00aff50ac119b31a52f2b4324ef3602267443ad3feef6b5130092a67
    • Opcode Fuzzy Hash: 2a56340b2f00b815a7c44a1288c62c107f96cf42b55428e5d812d1c0fdd60103
    • Instruction Fuzzy Hash: 823141B2A19682A6F718BF20E411BF6B660FF847C5FD04136D90E8665CDF7DE004AB20
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$Find$FreeLoadLockSizeofmemcpy_s
    • String ID:
    • API String ID: 3370778649-0
    • Opcode ID: 3bf69dff85db5cdf34237252cc992bc602bd2b6bf5befdefafbb4c61634c3979
    • Instruction ID: 393225f8414f2698db82feba010f28aa4201781b7f50f72d01a5333c1c671528
    • Opcode Fuzzy Hash: 3bf69dff85db5cdf34237252cc992bc602bd2b6bf5befdefafbb4c61634c3979
    • Instruction Fuzzy Hash: 83111AA1708B8197EB186B62A4440B9FAA1EB4EFD1B899138DD0F8375CDF3CD4459610
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: MessagePeek$FileMultipleObjectsWaitWrite
    • String ID:
    • API String ID: 1084409-0
    • Opcode ID: 98c152f8f55bf9a598385b6332d329f7c6a89d95a4b0cf9b0f7515c751b46731
    • Instruction ID: 5b809678492a2969ed23bdf340aca398d9f80ce9eddb284467c9b3cf5a2a2152
    • Opcode Fuzzy Hash: 98c152f8f55bf9a598385b6332d329f7c6a89d95a4b0cf9b0f7515c751b46731
    • Instruction Fuzzy Hash: 842192A1A085C296E718AF15E8447B5F7A0FB85BE4F948235D96D876ACCF3CD408DB10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$AttributesFile$DialogFindFreeIndirectLoadParam
    • String ID:
    • API String ID: 2018477427-0
    • Opcode ID: 2994afcc96e4644f858f991349daac6ec3ef4dc9132b2516fbef1fb9fafb314f
    • Instruction ID: 157abcc2bfe91ef04523f219e2c75c935609deaf425cb457aa764c9c6af72d91
    • Opcode Fuzzy Hash: 2994afcc96e4644f858f991349daac6ec3ef4dc9132b2516fbef1fb9fafb314f
    • Instruction Fuzzy Hash: 7A119AB1D0C6C2A2F7586B10A9843F5E690EB457E8FD84231C94D866ACCF7DE888A310
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CharPrev
    • String ID:
    • API String ID: 122130370-0
    • Opcode ID: fe64812d24aaa535377f96cafa4c6c3212caf3ba105ea9cba34c300c858a7088
    • Instruction ID: 32cd3d1911ebcecc640861a173a5fc3031e044f7acc749032053ba5d349cd9b1
    • Opcode Fuzzy Hash: fe64812d24aaa535377f96cafa4c6c3212caf3ba105ea9cba34c300c858a7088
    • Instruction Fuzzy Hash: 8A0145A1A0C7D196F3056F11EC403ADFA90A742BE0F989230DB6A8B7CDCB2CD4829711
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: b743c40088155ea186d23191c44c420b4fd161faa50afe9f4e766b5de3d239a5
    • Instruction ID: 7779c7f249949af8b49103b7b6af29dabc8c5e36bb628797c0ad0de7bc2ffc37
    • Opcode Fuzzy Hash: b743c40088155ea186d23191c44c420b4fd161faa50afe9f4e766b5de3d239a5
    • Instruction Fuzzy Hash: 81F036716087C1E2EB1C5F25F5811F8B660EB48BA8F548239DA2B876DCCF78D485D720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Window$DialogItem$DesktopEnableLoadMessageSendStringText
    • String ID: $C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Open
    • API String ID: 3530494346-1069084353
    • Opcode ID: 02408ae6c79d5afd0dbd1d350f378b5c084b7eca4ab1b8cbcc717c39842157fc
    • Instruction ID: c9ec2fa29289e9d7957a860430be31982191ad7d3848c55b4d5f46259de01268
    • Opcode Fuzzy Hash: 02408ae6c79d5afd0dbd1d350f378b5c084b7eca4ab1b8cbcc717c39842157fc
    • Instruction Fuzzy Hash: 4171AAE1E0C6C2A6F758AB25A400BF9E691FB89BD0FD44130CA4E8678DCF3CD405A720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: FreeLibrary$AddressAllocateInitializeLoadProc
    • String ID: CheckTokenMembership$advapi32.dll
    • API String ID: 4204503880-1888249752
    • Opcode ID: aca234308d6c2b9a7267944faa7f1f83278d608330c87f71542cc3174e944061
    • Instruction ID: 6ac338f50f1c64e549088c3eabb829b480a4c3439933bca6c7d3ff528e987169
    • Opcode Fuzzy Hash: aca234308d6c2b9a7267944faa7f1f83278d608330c87f71542cc3174e944061
    • Instruction Fuzzy Hash: F4314C76608B859AE7149F16F4441E9FBA4FB89B90F855139DE4E83718DF3CE045CB10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCloseCurrentExitHandleLookupOpenPrivilegePrivilegesValueWindows
    • String ID: SeShutdownPrivilege
    • API String ID: 2829607268-3733053543
    • Opcode ID: 4521cc09d256cc9c0a3583f069d9fa5dc9083d0cfa193007e767185542f0c5c5
    • Instruction ID: 61691ff67b53f6b6b6824d950d40f2037f2242e982c2784e695584757ee7dee8
    • Opcode Fuzzy Hash: 4521cc09d256cc9c0a3583f069d9fa5dc9083d0cfa193007e767185542f0c5c5
    • Instruction Fuzzy Hash: 232181B2A18682D7E7149B20E0557FAFBA0FB89B85F909135DA4E86A5CDF3CD044DB10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 4104442557-0
    • Opcode ID: b417f0ca43b0f1a675a55b1394a59fc23cd165e7830d58b26484a22ad4f1a579
    • Instruction ID: a9a5cd82de3057de857af6afc4bd320117616fa5751e05a2fb428f3b8a6621be
    • Opcode Fuzzy Hash: b417f0ca43b0f1a675a55b1394a59fc23cd165e7830d58b26484a22ad4f1a579
    • Instruction Fuzzy Hash: C4115166605B819AEB04EF71E8442A873E4FB49B98F800A30EA6D8779CDF7CD164D350
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 5301e7076f5ef957a13bc7f6d002c3f7f3b9a25b2f64b703cbde4610621febb0
    • Instruction ID: df7192366d4fe4ad7a2bf2e8a240a9dc24878d89d8f88444a729855a3c4fe097
    • Opcode Fuzzy Hash: 5301e7076f5ef957a13bc7f6d002c3f7f3b9a25b2f64b703cbde4610621febb0
    • Instruction Fuzzy Hash: 23B09250E65482E1D708BB719C850A053A0BB98744FC00870C00EC1128DE1C919AE720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Char$Upper$CloseCompareExitFileHandleModuleNameNextProcessString
    • String ID: "$:$@$RegServer
    • API String ID: 1203814774-4077547207
    • Opcode ID: 6e530289b7fe5922f9cfda438616e34a1a36475502b4d42f4ffce2e3ac89d0b1
    • Instruction ID: e598f9d287d500b22d0fc742d41ff46b464228120673b8bdda0ad641614331aa
    • Opcode Fuzzy Hash: 6e530289b7fe5922f9cfda438616e34a1a36475502b4d42f4ffce2e3ac89d0b1
    • Instruction Fuzzy Hash: 1502E4D1E0C6D261FB6DAB2468006F9EBA1AF427C0FD80135C95E8669DCE3DE405E732
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984A86
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984AAA
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984ACA
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984AEC
    • GetTempPathA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984B1B
    • CharPrevA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984B3A
    • CharPrevA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984B54
    • FreeLibrary.KERNEL32 ref: 00007FF73F984BF1
    • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73F9835E3), ref: 00007FF73F984C0D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: AddressLibraryProc$CharFreePrev$LoadPathTemp
    • String ID: SHBrowseForFolder$SHELL32.DLL$SHGetPathFromIDList
    • API String ID: 1865808269-1731843650
    • Opcode ID: 2a5ea4b490894db445cb84de2448d12f1af4c9272f9454c89187ac1fef39355e
    • Instruction ID: c839220f29701e0997964c20abcabbd31a91dd0f8ba94c8c73fa2e7c860bf6fe
    • Opcode Fuzzy Hash: 2a5ea4b490894db445cb84de2448d12f1af4c9272f9454c89187ac1fef39355e
    • Instruction Fuzzy Hash: 8E516DA1A09BC2A6E748AB05B8505F9BA94FF49BD0F844135DE4E8775CDF3CE444E710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Local$AllocMessage$EnumLanguagesResource$BeepCharCloseFreeLoadMetricsNextOpenQueryStringSystemValueVersion
    • String ID: Open$rce.
    • API String ID: 2929476258-3686285831
    • Opcode ID: abe435584ecd5f6fe87ce2b456f1e06dda66ab3f9fb72e6f330788004a039cce
    • Instruction ID: 4d9ce528dfdd231028dc418fc4fb2e0473dd72376d8d8841c44973fb0f63a6de
    • Opcode Fuzzy Hash: abe435584ecd5f6fe87ce2b456f1e06dda66ab3f9fb72e6f330788004a039cce
    • Instruction Fuzzy Hash: 9161F5A1E087C1A6FB19AB25A8007F4EA90AF59BE4F844234DE4D8379DDF3CE445D720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Char$DirectoryNext$CloseEnvironmentExpandOpenQueryStringsSystemUpperValueWindows
    • String ID: Software\Microsoft\Windows\CurrentVersion\App Paths
    • API String ID: 2659952014-2428544900
    • Opcode ID: 3b652cf53a0166bf7c173558fb1758d4a4d77de799b7ad200d32d7da73422a7a
    • Instruction ID: 950e25093d6f9cd885b332f5c6f9c52e153792bb380f16f08fc0d8067b05de3d
    • Opcode Fuzzy Hash: 3b652cf53a0166bf7c173558fb1758d4a4d77de799b7ad200d32d7da73422a7a
    • Instruction Fuzzy Hash: B25183B66086C1A6EB14AB11E8502F9FBA4FB8ABD0F945031DA4E8775CDF3CD445D710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Window$Item$LongText$DesktopDialogForegroundMessageSend
    • String ID: Open
    • API String ID: 3785188418-71445658
    • Opcode ID: 5437c451f9b0f03a7d5304c51dea48bd08e1932c988bfe6d4e908a474b1ba20e
    • Instruction ID: 794f15516735f52deed2cb00bc47bb1dcf7d383ea189d91b50901c677b1a667b
    • Opcode Fuzzy Hash: 5437c451f9b0f03a7d5304c51dea48bd08e1932c988bfe6d4e908a474b1ba20e
    • Instruction Fuzzy Hash: 0B3121B59086C296E7186B25E8046F4FB91FB8EBA1FD49230C91E8779CDF3DA045E610
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Free$Token$AllocateInformationInitializeLibraryLocalProcess$AddressAllocCloseCurrentEqualErrorHandleLastLoadOpenProc
    • String ID:
    • API String ID: 2168512254-0
    • Opcode ID: 6813b6756910e0ae34933596af1690bcf55f2b4d44473aa3a3cec1d83aee30ca
    • Instruction ID: d15654999a90092b9cf6d461b3c66b43d81842eddbf0afe59e53a8c2d28fabe9
    • Opcode Fuzzy Hash: 6813b6756910e0ae34933596af1690bcf55f2b4d44473aa3a3cec1d83aee30ca
    • Instruction Fuzzy Hash: 79515D72604A81EAE724AF21E4806F9BBA4FB8DBD8F815135DA0E9375CDF38D444DB10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CharCloseMetricsNextOpenQuerySystemValueVersion
    • String ID: Control Panel\Desktop\ResourceLocale
    • API String ID: 3346862599-1109908249
    • Opcode ID: 3b2a06a11d2becce3ce338110b622480474f8ae87116164a32f9474e2bd7df5d
    • Instruction ID: 867fdee6bff52ac3a0ef66b130a2eb0cd269f2ff6569f255138e267ad6b22518
    • Opcode Fuzzy Hash: 3b2a06a11d2becce3ce338110b622480474f8ae87116164a32f9474e2bd7df5d
    • Instruction Fuzzy Hash: 9C5192B2A08AC1AAE7149F20D8401F9F7A5FB88B90F854571DA5E8379CDF3CE544DB20
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Global$Char$FileInfoNextQueryUnlockValueVersion$AllocCloseEnvironmentExpandFreeLockOpenSizeStringsUpper
    • String ID:
    • API String ID: 1051330783-0
    • Opcode ID: 6d4c51d06f972b13cb99adb0e904218bc9eace2558dcc6cb5054029ba0357b51
    • Instruction ID: 659d9af7ec13012c088a6f1505448cb022a77aa70beb4b95657ff430ffe3d58b
    • Opcode Fuzzy Hash: 6d4c51d06f972b13cb99adb0e904218bc9eace2558dcc6cb5054029ba0357b51
    • Instruction Fuzzy Hash: B75183B2A046C2AAEB589F15D5005F8B7A4FB48BD4F945131CE0DAB79CDF39E441D720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Char$Next$Upper$ByteFileLeadModuleNamePrev
    • String ID:
    • API String ID: 975904313-0
    • Opcode ID: 2979d283a01604d961735a48130beb2dfdd98dda21d4e4b67344f999235a94dc
    • Instruction ID: 8837b6cbed3e76073e46ba955aa0c4b4c1a8c6cc1c773025d7aba573a5fb6dbf
    • Opcode Fuzzy Hash: 2979d283a01604d961735a48130beb2dfdd98dda21d4e4b67344f999235a94dc
    • Instruction Fuzzy Hash: 105193A1A0D6C665FB656F25E4003F9EB91EB4ABD0F888171CE8E4B78DCE3CD4459720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$Free$FindLoadLock_vsnprintf
    • String ID: UPDFILE%lu
    • API String ID: 2922116661-2329316264
    • Opcode ID: 5da28ac000a46b9a165e15456f701c43c89cc60981a221babc32eae9389c35de
    • Instruction ID: d68e3510cffdd7f27d59f36e0a61bf0bba40885b70ad5afee91b8fc1af122fd3
    • Opcode Fuzzy Hash: 5da28ac000a46b9a165e15456f701c43c89cc60981a221babc32eae9389c35de
    • Instruction Fuzzy Hash: 0A319572A08681D6E718AB21A8001F9FBA1FB89FD0F958235DA5E8779CCF3CD044D710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: DirectoryPrivateProfileStringWindowsWrite_lclose_llseek_lopen
    • String ID: wininit.ini
    • API String ID: 3273605193-4206010578
    • Opcode ID: 199b65378ca9828830684770953ab38004a5dc8256a53cff6ace6da1301a0c22
    • Instruction ID: a5fb8fe1c5988f94869e6ec2796609f8960439a9945c5c306084202eb6251aec
    • Opcode Fuzzy Hash: 199b65378ca9828830684770953ab38004a5dc8256a53cff6ace6da1301a0c22
    • Instruction Fuzzy Hash: 95116D72608A8197E728AB21E8442E9B7A1FBCDB94FC58131DA4E8765CDF3CD509DA10
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Window$Text$DesktopDialogForegroundItem
    • String ID: Open
    • API String ID: 761066910-71445658
    • Opcode ID: db38f3c764be4f10092f313c704ee52b3d278942d11ca53377af995edae986b7
    • Instruction ID: 04f7f9d470eaa4566315dfdaa3db28c6d28427a4de89a1486874d003a9a5002d
    • Opcode Fuzzy Hash: db38f3c764be4f10092f313c704ee52b3d278942d11ca53377af995edae986b7
    • Instruction Fuzzy Hash: 041121E1D086C2A6F75C3B55E4086F8EA51EB4EBC1FC49131CC0E8639CDE3EA444E620
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00007FF73F985050: FindResourceA.KERNEL32 ref: 00007FF73F985078
      • Part of subcall function 00007FF73F985050: SizeofResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F985089
      • Part of subcall function 00007FF73F985050: FindResourceA.KERNEL32 ref: 00007FF73F9850AF
      • Part of subcall function 00007FF73F985050: LoadResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850C0
      • Part of subcall function 00007FF73F985050: LockResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850CF
      • Part of subcall function 00007FF73F985050: memcpy_s.MSVCRT ref: 00007FF73F9850EE
      • Part of subcall function 00007FF73F985050: FreeResource.KERNEL32(?,?,00000000,00007FF73F982E43), ref: 00007FF73F9850FD
    • LocalAlloc.KERNEL32(?,?,?,?,00000000,00007FF73F983388), ref: 00007FF73F984975
    • LocalFree.KERNEL32(?,?,?,?,00000000,00007FF73F983388), ref: 00007FF73F984A11
      • Part of subcall function 00007FF73F984DCC: LoadStringA.USER32 ref: 00007FF73F984E60
      • Part of subcall function 00007FF73F984DCC: MessageBoxA.USER32 ref: 00007FF73F984EA0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Resource$FindFreeLoadLocal$AllocLockMessageSizeofStringmemcpy_s
    • String ID: <None>$@$FINISHMSG
    • API String ID: 3507850446-4126004490
    • Opcode ID: 084f567f2751bbb327c7852ecae896f84c80c38795d5f8c59f35c596520349e1
    • Instruction ID: 38d25ba36f33a879f56de22b055eacb4fbdbd8973ef47b60c81a3901123693a8
    • Opcode Fuzzy Hash: 084f567f2751bbb327c7852ecae896f84c80c38795d5f8c59f35c596520349e1
    • Instruction Fuzzy Hash: D51195B2A08282D7F728AB24E410BFAF690EF85BD4F945135DA4E8678CDF3DD0049B14
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: LibraryLoad$AttributesFile
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$advpack.dll
    • API String ID: 438848745-3680919256
    • Opcode ID: 9f0cd13c1bb279af47be13cee5dd35000d2da7fbef8f0ef7de7ad0cc9ac3dbe3
    • Instruction ID: 3a4ceacd9e00b078a1ec1bc22a19a980e87f0947482e653791f7e128ad5f350e
    • Opcode Fuzzy Hash: 9f0cd13c1bb279af47be13cee5dd35000d2da7fbef8f0ef7de7ad0cc9ac3dbe3
    • Instruction Fuzzy Hash: 631181B1A196C6A5EF65AB10E8403F9B7A0FB89B84FC40271C55D8269DCF3DD609D710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: BeepDesktopDialogItemLoadMessageStringTextWindow
    • String ID:
    • API String ID: 1273765764-0
    • Opcode ID: d24c32f5bf32a5b72a732329d1a2a01ce98f5d85b6cb7ead8bb70bc12569425c
    • Instruction ID: bfef6f5268bc78a4004d43481eb9b84e52e50fd313b8cfb7e06791ba7c361046
    • Opcode Fuzzy Hash: d24c32f5bf32a5b72a732329d1a2a01ce98f5d85b6cb7ead8bb70bc12569425c
    • Instruction Fuzzy Hash: 18115EA1A08AC596EA546B64A4043F9F7A0FB89BD4F844231CA5E8679DCF3DD0859610
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: EnumLanguagesMessageResourceVersion$BeepCharCloseMetricsNextOpenQuerySystemValue
    • String ID: Open
    • API String ID: 2312377310-71445658
    • Opcode ID: 6925faca6a2cd81837304f5f4f2fd7570e59ff5b7a5509a8ec541a78deb6dc36
    • Instruction ID: d5c81357cc663176dd84758a5a488640940e8ac2f35c8d9ceaa18cb390239018
    • Opcode Fuzzy Hash: 6925faca6a2cd81837304f5f4f2fd7570e59ff5b7a5509a8ec541a78deb6dc36
    • Instruction Fuzzy Hash: 9EA1B8B2A191C2A6F769AF119444AF9F6A4FF487D0F910035E90EC328DDE3DE845E720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: File$CloseCreateHandleWrite
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 1065093856-305352358
    • Opcode ID: 0f65b1997a9f98f28a06f8ce24cdc0a961af7feeb94d9fcacdfae0386ba340ac
    • Instruction ID: db2561674424e458129f0bf40b85009f32e81bc32a0153a71dd805622c944462
    • Opcode Fuzzy Hash: 0f65b1997a9f98f28a06f8ce24cdc0a961af7feeb94d9fcacdfae0386ba340ac
    • Instruction Fuzzy Hash: 313170B26086C196EB149F10E8407E9E760FB89BA4F844235DA9D8769CCF7DD408DB21
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID:
    • String ID: *MEMCAB
    • API String ID: 0-3211172518
    • Opcode ID: 84e3e731c747766a29489c21773a7ead2eab1f416db6fdf01ae2d5964e993175
    • Instruction ID: d4932c9900afaba67b37f87ecc324bcb8358e8886c32bc557910d124713caf66
    • Opcode Fuzzy Hash: 84e3e731c747766a29489c21773a7ead2eab1f416db6fdf01ae2d5964e993175
    • Instruction Fuzzy Hash: 25311BA1A08B81A5EB58AB11E4442E9B7E1BB44BE0FC44236D95E8269CDF3CD449D750
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
    • String ID:
    • API String ID: 140117192-0
    • Opcode ID: 2331a3b639adea238e9a50b849fe14964fd45a281eaa4897dacf7bdda2e71fe4
    • Instruction ID: f46a841bbc655581247d2d992aea7dcf93e09bbda44119112e6c381e908b22b3
    • Opcode Fuzzy Hash: 2331a3b639adea238e9a50b849fe14964fd45a281eaa4897dacf7bdda2e71fe4
    • Instruction Fuzzy Hash: BE41A9B5A08B8191EB58AB58F8903A5B3A4FB847D4F904136D98DC37ACDF3CE445E720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Char$Prev$Next
    • String ID:
    • API String ID: 3260447230-0
    • Opcode ID: 707050412bb26cc287988f04cda4ab0ae1f580e9279edb24177e5c3a1430149b
    • Instruction ID: ac3f1a6c26e1e609b1a7a0201d0f53ae28f6aad8b0bd03a3c49f787df48b599b
    • Opcode Fuzzy Hash: 707050412bb26cc287988f04cda4ab0ae1f580e9279edb24177e5c3a1430149b
    • Instruction Fuzzy Hash: 7811A7A2A086D1A5FB595B11E9002B9EB91E74AFE0F898230DE5F4378CCF2CD4409711
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
    • String ID:
    • API String ID: 140117192-0
    • Opcode ID: f2b1ddacced677a847f8148696c66bf38e9a023ccacb3690f052d0a45ab1694c
    • Instruction ID: 3715a3f76014c4f7073f3d66bd94d4353e8f5a3415287cd7e5974f7eedaa33c7
    • Opcode Fuzzy Hash: f2b1ddacced677a847f8148696c66bf38e9a023ccacb3690f052d0a45ab1694c
    • Instruction Fuzzy Hash: C421E7B5918B81A1E718AB54F8803E5B3A4FB84B94F900036DA8D83B6CDF7DE045E720
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1681830263.00007FF73F981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73F980000, based on PE: true
    • Associated: 00000000.00000002.1681806953.00007FF73F980000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681844662.00007FF73F989000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681857937.00007FF73F98C000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1681872071.00007FF73F98E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff73f980000_Open.jbxd
    Similarity
    • API ID: Message$Peek$DispatchMultipleObjectsWait
    • String ID:
    • API String ID: 2776232527-0
    • Opcode ID: 7c1b033473dba301dd4ecd47eb6d04f722b5b1254afffa929906cb3dfbdd32c6
    • Instruction ID: 96142e1c1b4b67529d0f369acfe471c81681c100b665b3b45f11c6a5f1da2543
    • Opcode Fuzzy Hash: 7c1b033473dba301dd4ecd47eb6d04f722b5b1254afffa929906cb3dfbdd32c6
    • Instruction Fuzzy Hash: F2117EB26185C197E7645F20E444FB5FA90FB99785FC09130DA4E8298CDF3DD044DB10
    Uniqueness

    Uniqueness Score: -1.00%