Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Benefits-Signature-RequestsPlan#241205.com.exe

Overview

General Information

Sample name:Benefits-Signature-RequestsPlan#241205.com.exe
Analysis ID:1445946
MD5:46e978f5dee2d39687269d77e44df3cf
SHA1:f15c27a41a2e7e78b07df29c687da3e70e813e66
SHA256:5828d4217d31c59b79df8a93b0a52332d4d3ef267f02c2448c463338e017f48d
Tags:comexe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Opens the same file many times (likely Sandbox evasion)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4570321949.00000000072E7000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Benefits-Signature-RequestsPlan#241205.com.exeAvira: detected
    Source: Benefits-Signature-RequestsPlan#241205.com.exeReversingLabs: Detection: 39%
    Source: Benefits-Signature-RequestsPlan#241205.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Benefits-Signature-RequestsPlan#241205.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
    Source: Benefits-Signature-RequestsPlan#241205.com.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: Benefits-Signature-RequestsPlan#241205.com.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040535C
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Windows\stepsireJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Windows\stepsire\Diamondbacks22Jump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_004069450_2_00406945
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_0040711C0_2_0040711C
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_6E7C1A980_2_6E7C1A98
    Source: Benefits-Signature-RequestsPlan#241205.com.exe, 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesolaarene frankeniaceae.exe4 vs Benefits-Signature-RequestsPlan#241205.com.exe
    Source: Benefits-Signature-RequestsPlan#241205.com.exeBinary or memory string: OriginalFilenamesolaarene frankeniaceae.exe4 vs Benefits-Signature-RequestsPlan#241205.com.exe
    Source: Benefits-Signature-RequestsPlan#241205.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/20@0/0
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040460D
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Users\user\AppData\Local\skolebetjentsJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsj81E3.tmpJump to behavior
    Source: Benefits-Signature-RequestsPlan#241205.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Benefits-Signature-RequestsPlan#241205.com.exeReversingLabs: Detection: 39%
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile read: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: polres.lnk.0.drLNK file: ..\..\user\AppData\Local\Temp\nsz8290.tmp\Revitalizers\Forsoldet.Cho46
    Source: Benefits-Signature-RequestsPlan#241205.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4570321949.00000000072E7000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_6E7C1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6E7C1A98
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_6E7C2F60 push eax; ret 0_2_6E7C2F8E
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile created: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\redargue\demonising.ini count: 411076Jump to behavior
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeRDTSC instruction interceptor: First address: 7975AD6 second address: 7975AD6 instructions: 0x00000000 rdtsc 0x00000002 cmp al, 58h 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F79BCE41B38h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeAPI call chain: ExitProcess graph end nodegraph_0-4193
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeAPI call chain: ExitProcess graph end nodegraph_0-4188
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_6E7C1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6E7C1A98
    Source: C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Access Token Manipulation
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS13
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Benefits-Signature-RequestsPlan#241205.com.exe39%ReversingLabsWin32.Trojan.Sonbokli
    Benefits-Signature-RequestsPlan#241205.com.exe100%AviraTR/Injector.ooawv
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsz8290.tmp\UserInfo.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsz8290.tmp\nsDialogs.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorBenefits-Signature-RequestsPlan#241205.com.exefalse
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorBenefits-Signature-RequestsPlan#241205.com.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1445946
    Start date and time:2024-05-22 20:11:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 54s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Benefits-Signature-RequestsPlan#241205.com.exe
    Detection:MAL
    Classification:mal72.troj.evad.winEXE@1/20@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 49
    • Number of non-executed functions: 26
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: Benefits-Signature-RequestsPlan#241205.com.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsz8290.tmp\UserInfo.dllPO#RMS9877946001 RMSMARINE SERVICE.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
      PO#RMS9877946001 RMSMARINE SERVICE.com.exeGet hashmaliciousGuLoaderBrowse
        C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dllPO#RMS9877946001 RMSMARINE SERVICE.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
          PO#RMS9877946001 RMSMARINE SERVICE.com.exeGet hashmaliciousGuLoaderBrowse
            __824pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
              __824pdf.exeGet hashmaliciousGuLoaderBrowse
                AyE60D4cst.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  AyE60D4cst.exeGet hashmaliciousUnknownBrowse
                    AyE60D4cst.exeGet hashmaliciousUnknownBrowse
                      Fatura_M23_890_Originalpdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        Fatura_M23_890_Originalpdf.exeGet hashmaliciousGuLoaderBrowse
                          8986-55-269-30_16-08-2033.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                            Category:dropped
                            Size (bytes):1316
                            Entropy (8bit):3.1424847856108173
                            Encrypted:false
                            SSDEEP:24:8wTaRMgKcHbfYoVN6Aafk6Wo6HPHAJqy:8rRFfYyYAafLWo6fAgy
                            MD5:0EA7EB893BCC385CF6C825B3E2E857D2
                            SHA1:D52580CF5E3E02737D5875FC6080D1985A8BF99F
                            SHA-256:5AD34957D3F1CCDBB126EB600C7F6A8FDE0AA8DF6D7D812037D53E8CB24393A0
                            SHA-512:726E824756FFB4B6DD142FFC79399FF4210B3D11D8CDBF2C68C6365E0197A8512764DA244AE55D7DFE3C0B687B3DF9F7FB496527C320C4D88092413882A36370
                            Malicious:false
                            Reputation:low
                            Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....b.1...........nsz8290.tmp.H............................................n.s.z.8.2.9.0...t.m.p.....f.1...........Revitalizers..J............................................R.e.v.i.t.a.l.i.z.e.r.s.....n.2...........Forsoldet.Cho46.P............................................F.o.r.s.o.l.d.e.t...C.h.o.4.6.......J.....\.....\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.n.s.z.8.2.9.0...t.m.p.\.R.e.v.i.t.a.l.i.z.e.r.s.\.F.o.r.s.o.l.d.e.t...C.h.o.4.6.9
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11776
                            Entropy (8bit):5.8545531334577525
                            Encrypted:false
                            SSDEEP:192:EPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4W:j7VpNo8gmOyRsVc4
                            MD5:4CA4FD3FBEFA2F6E87E6E9EE87D1C0B3
                            SHA1:7CDBEB5FF2B14B86AF04E075D0CA651183EA5DF4
                            SHA-256:D09A8B3ADE4BA4B7292C0B3DA1BCB4B6C6E2012E0CCFD5E029A54AF73A9E1B57
                            SHA-512:CF0F415A97FDC74568297FED4F1295D0D2AEF487A308141144EF8D5F04C669EF4795C273E745B81065429ADDE113FCDEDF4C22717A7AEEF60FDCD8D4D46F97F8
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: PO#RMS9877946001 RMSMARINE SERVICE.com.exe, Detection: malicious, Browse
                            • Filename: PO#RMS9877946001 RMSMARINE SERVICE.com.exe, Detection: malicious, Browse
                            • Filename: __824pdf.exe, Detection: malicious, Browse
                            • Filename: __824pdf.exe, Detection: malicious, Browse
                            • Filename: AyE60D4cst.exe, Detection: malicious, Browse
                            • Filename: AyE60D4cst.exe, Detection: malicious, Browse
                            • Filename: AyE60D4cst.exe, Detection: malicious, Browse
                            • Filename: Fatura_M23_890_Originalpdf.exe, Detection: malicious, Browse
                            • Filename: Fatura_M23_890_Originalpdf.exe, Detection: malicious, Browse
                            • Filename: 8986-55-269-30_16-08-2033.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L...6.$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):4096
                            Entropy (8bit):3.3282212929259076
                            Encrypted:false
                            SSDEEP:48:qKOpbhg7V46Br1wHsl9rECxZShMmj3hTPRYBA:5OZOVZruHs1xH6hT+i
                            MD5:035BDB470A6807313BD005BD98341FFC
                            SHA1:5017D1E5A23F1C64594F737E6FCCD519729C3B3E
                            SHA-256:26FA900E3426B4DD272707E1AAF428B5EE06BDC2CC2BBAECDAB6B54F11F38F27
                            SHA-512:F888BAED5267B05B13722E839634254393AA99B2ADF1A2AE6E799D3A901665E7EBDA0FA1202DB20A6765A8AFF58E2ED6F4E822028BE426DB732EB10EC783AA05
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Joe Sandbox View:
                            • Filename: PO#RMS9877946001 RMSMARINE SERVICE.com.exe, Detection: malicious, Browse
                            • Filename: PO#RMS9877946001 RMSMARINE SERVICE.com.exe, Detection: malicious, Browse
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L...;.$_...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):9728
                            Entropy (8bit):5.127127260486972
                            Encrypted:false
                            SSDEEP:96:oVDlD3cd51V1zL7xqEscxM2DjDf3GEst+Nt+jvcx488qndYv0PLE:oVp34z/x3sREskpxjdO0PLE
                            MD5:EB2C74E05B30B29887B3219F4EA3FDAB
                            SHA1:91173D46B34E7BAE57ACABDBD239111B5BCC4D9E
                            SHA-256:D253CA5ABA34B925796777893F114CC741B015AF7868022AB1DB2341288C55ED
                            SHA-512:1BB035260223EC585170F891C2624B9AE98671F225E74B913B40BB77B66E3B9C2016037BC8E4B0AE16367D82590A60A0A3BD95D05139EA2454F02020D1B54DAE
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L.....$_...........!......... ......Y........0............................................@..........................6..k....0.......`.......................p.......................................................0...............................text............................... ..`.rdata..{....0......................@..@.data........@......................@....rsrc........`....... ..............@..@.reloc..t....p......."..............@..B................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1298
                            Entropy (8bit):4.819168094685199
                            Encrypted:false
                            SSDEEP:24:foIwTQX+y1uklbJlltkrwWGbvz/Nv/sQ4JUJibXC/V0TlnNqbcgX/vIO:fo1QMklbJllSMWGnB/kJUJIJNqH
                            MD5:623272435DE8395E801ABF39701074A3
                            SHA1:5E234E9270EFAB606464277FABE18436FD92E6BD
                            SHA-256:FE85D7B25A41EE93F1A172F4F8F0489A83C24D03A0AC59066E79A1F58F9C5382
                            SHA-512:C80FD2086FCA97387C41AE647801F4F0A991A2FC38E05A6488D069A3D222927B658038E76E05E71183A47372EE38180D9C0A43CCE63149955F1578869CF33A71
                            Malicious:false
                            Reputation:low
                            Preview:....H.......O.....C...... .............3...9...f.........\...........B.\....``..]..........R...._...........e.Y...).).{.........}`..9u.....{......./.....n..F.Y.=.....'....w..s..+....................D...b....K....c.....R...6.......9n....d.H{..dd...7..t........0......,.W......#..|[.......C........(...........}.X.................G....2...^...9...#<..9......O...g2...".....}Y..-...1.%e..........I,......"Rp................L.n.........Q..=.B..\....%N........{.....C...<...T....^.......P....a........]....l..w....l....?.......&.Fm.....,.=.............e`2.....Qge...q....{.....A...w..."....Xd..G...............~".............K........%....u.uKV.......i....<.v...........,....V...................d_.......,.n......f.y)....x.....&?@[Z.......v1h......i...L....u..,..?..^.?%Y..,:.......0....P...l.B....:..f........}.....\....q.c..U......4....`.+......u.0.B...........=.{......"..9..w.....d.......]....u..\..S......F.Z............."W......,..a.&E.C..........T............(.....{.......[.....>L$.....
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):174515
                            Entropy (8bit):7.762228879626632
                            Encrypted:false
                            SSDEEP:3072:VBDvgzRFtlxi49x+lGHvS1aArSomD0WmejodDXVP+h2FUtAPicQZxso9:7DvCXtviQx8CvpuSoRe0rWNTxJ9
                            MD5:2090A6AC72CD30FA002B4682BFDC5E21
                            SHA1:D56EE125775B2015B44006D50C01CE6A4744ABB0
                            SHA-256:5F862B98E08861F4B7E6078BEE8C7EC2BEF80686C04E3047BADCEFC96F783696
                            SHA-512:414513528B913FEE56DA9A15385EB71FD65B6EC486D502F086B87F87AAA0B18EC4448A0168B7BE0600D89E42041D558D766E33E00DEACDDD78B2AE4C31663C0B
                            Malicious:false
                            Reputation:low
                            Preview:.}}...............................----...sss.......................!!........RRR.H.........a.........kkk.w......((.......{{........\\.....0.y...........V......EEEEE.......}.>.........I... ......CC.................................qq...".oo...--..A..++............CCCCCCCC...................................4.........4............|||............K.......yyyy..................................0.................................................PPP..eee......OO.......\...............QQ..nn..`...........f.........i.............*...........00..........J..........E..SS....w............................[[[[...........................................}.\............2..............#..7.......h.....................V.....\.................^^.UUU.....__...@....2...........U......mm..................3....]...........44...................+..N.........:..Z...!!.....?......`....................OOO.......{{{{{{{{...............f............t..wwwwww..rrrr..... .................}}}}.4.........2..222.D...........
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2561
                            Entropy (8bit):4.870990376573247
                            Encrypted:false
                            SSDEEP:48:y140jm+d7sQ58IHJ6fIVOCVNiXKU6U0pqPscYD4YW3/gMqiLj:zYbKLCVNCF/0paRgpgIHiLj
                            MD5:556C42AD236F523422A8D33C7E01D769
                            SHA1:86AD2EE8FAD51E33C3D316083FE427E7D59F8BA2
                            SHA-256:47C9FA08E1FDB45FF4B68936E127BEF728DF2558B79CEA6F9CF812E7A06580E5
                            SHA-512:B50D36A5839AE51BADC821764FC93C7409F62CB97A7677C0C759E06217C48D58EC3AA4554746CA8EFDF23E37B2E8A4B4C629B34E91C50F611578A8D3A58B2042
                            Malicious:false
                            Reputation:low
                            Preview:....8.o......^.....[8.6...,....;.o...}.......a.....@........&.....e..................Q......tOJ0...t...1.....-....g.........H.g...U........v..(`...........3.......d.......@...n...%..k.......A......`.................V..........;..........;.............s.._.....s.....&...A.P....^.......m...c.......j.........@}....w..|jJ....f....~..vk...................4.................,.n....."...X.....B...k....F.......G...r........H........R......x........Y...V.....1....v.....:........s..1.......j.|.J..........#9..U^......[.f&..@.4|................Y.....................I9..........s...F....-....H.......0.,.}a...................J...g........Q....y.....V.)S......(.......o..................i...........&..h)..............As.v.r......~%....!.............s...4..~Z..'.N.............z...............s...U..Y..^......'....=...C...k...............h..i....)...D...8..&..E.n}...y....u...L.R..........C.....................8.+.....O...............;.....iF.......-....|...~......FMS....O...F.1..1.;r....
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2157
                            Entropy (8bit):4.7880500800335914
                            Encrypted:false
                            SSDEEP:48:4HbrcqCyK/bteSTO8zQQZOtkcbHdDZ/U5M5KyHDr+2hX/GM/:IrcqCyit5jUaONHnmyP+25
                            MD5:BC7EDBFCEF64A6C616650E2D9A5A7245
                            SHA1:A87D7BD6A4174FA5BF293BE370C4C08B319A144B
                            SHA-256:02A443F69D7695AFB9B48BFA4F79D2820C1F5C0ED7747EFFDC5CDC7E5DA04747
                            SHA-512:6DF4FFC0CC1835E34C3D22282B6BF1502E852EB861AD5521C826945AFE8AF52347E34F32BF8EA5905431F1B42E3407D05E6D8E5352E63D018CFB1005FFD9F35E
                            Malicious:false
                            Preview:~.z..S....7........(.....-T.................E...........(.@..z.......m..W`...L..X............k.u..Q.....[....{..............K..i...........aP.).........8.......Q.o.....|......D..N!.u..F....2<..E.......e............Z.........'.....n99..................C.J._.....:s..%.).........e.>@.7 ;..9..s.......[..H...f......w..*........x.Mh9#.........[.............Bn........=... .o?..f.................o................q..&.#..{................D..M...s@..y.#.....UiZ..............R.....&......................z..Y..*....B........s..D.....D.2..........E....^.........:......n.V....h1... ..{.....}.........z.....3..1..................G.X........+m..............$....5.....;..@&^.......Ki.......k.B.M.z.L.M>.....d..................l.......g...v...I......5......v..........V...p..z.I.h.2.....v..1.3........y...e..H...%.....W...........i..............zt^...%!......U.............d..\E.q....".......?.[............E.......H....3b........h..............-.....#...r..Y....wLF..u................_...k..[..
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3947
                            Entropy (8bit):4.982400359777868
                            Encrypted:false
                            SSDEEP:96:jExwfmqEDudI2enF8cEOJ1Zv0vp8+oXAv:jExYpwOOpIpv
                            MD5:6968CFE66311AE9BB0DED77DE8492562
                            SHA1:B2991E4B0427E879AD2ABDA54D94624B2D0EAC1E
                            SHA-256:D15FD3D370057160C77A483D9659CF6E79B3892665E0D87D9EF8859E4BE1AE59
                            SHA-512:111EF26E9DD6A1BE84C80FAEC57A6C144DB84A36CDC157E905F91985A221F91148B2B1ED92C2BF740458F959F495F8C559665C49A9E941399F3520139C3E4BE2
                            Malicious:false
                            Preview:}\......U.v....B.\..........v9...U...y........u..............RO.............(......E..[.....R.#...y.........J.. Kz.a..... .q...|.g.`.).......h.=.......&........].aZ.......J..........H.n.........5.../..."...........<......+......Y...T..-..a0.....y.5......j.......k.t........... ..G.....n..........hLg........w..........2.<....b.r.h...........3....k.....&).....##8.".......,.../...s...../....../.........(.. .)I...:..............9.....8...yiW...........[.......................O..(............c.6.j<........._<.M...5...............v.............G..x......<.....k....(.;.)...\....\.......(..-....o..V.......e..5.....T..................*.....a.*.R......:....^......G...=.i..r..t..~..'.$e...p...[..,...^...........)..f..&......m...\...9....r...........L@.N...<.~.<1.........c...........)........F..;A.2....:S.....\c...........]...o.....h.....*e.#.w.....".....z.G..0.N..........a...........s....{)...i..2...E..5....L.a...D..../.A."....Z..........g.......}..H.z....m..../..%....2.w.......-\.
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1360
                            Entropy (8bit):4.773554728401994
                            Encrypted:false
                            SSDEEP:24:fyuYAol4nRKNjFyl0cfj8K692BpWtHEaqWtnQ0gaQzjWTePZMAM:fyuYApRZ3vg2BpWeapa9+AM
                            MD5:AAEFD238CA955B45BC68D442FB059D5B
                            SHA1:71FA1CA71CD483235E0121CB39C34F81511F975B
                            SHA-256:241C8E953F55CE7B68983303E62DD43663DCAD2D32482318A0C9E13A59E37FFF
                            SHA-512:6C9EAAD76DA058B89AC9413064605CCB4195EEBD477697D167F9EDE06DEDF6DD3A3723081317E4EE9DFCCEE5CE1AA27FFEC9AC5B9D21D3BF5B99D9EF752D6F6E
                            Malicious:false
                            Preview:...v............'......3..c.................X......."...r.$...(........V...._....[....C........-t.......<.^.Y..].../..........<?y..+.F.^..........E..........................}..7b..q.a.^.......c.........D....Z...8...M.g.....y.....)<........y..*.......Y.....5..S....m.=.G......p......j......O......#.....@.s....7.......z....................l ......]............t...........:...[..%.....)................................@.?......g........d..<....&.. .....6..................A................f......KX...#.....!.]......9Z..dk.....h..2A.h9..H.6O..@................X..2........t..k.a........................U....H......0w..&....+C......>.;%.....BC.....<.{......j'....'.........M.k..$:............tR..........J.....U..C...6....o.....p...................`.....D.......^.0.....;....(.,...V..aB!..L...].E.y........E............e...=.....x.........%.........................K............%....9..,.....(...............O.O...$.......Q........6...k......../..y.....\7...]....1.....\..&..&.........E.....+L..
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4335
                            Entropy (8bit):4.8827409322826085
                            Encrypted:false
                            SSDEEP:96:7S/jcLYcx/3Ii+AtAfS/hjHek1U0C1Duo9uPsfY6cKZci/5NeysyBm:7SbKnxFpAfSFHnU0C16o9tYuNeYm
                            MD5:6C88A30B4D494FECB6B1364F0E591B9B
                            SHA1:962C04C3D1A5DF4AA609AF206C3C351E25C8ED52
                            SHA-256:6CE8E19EAF50DF4811F04535695C2146C0D9664E70428E27DA844D99FE8DCA7E
                            SHA-512:5BB08D4B7111285D0AB31E5A102CB7DE12FFD14EDAEF6023FD42106A500B7D89179A373488D89FC9A561295446B9AC8890390D46F45BC40FBF4F8F986DC298B9
                            Malicious:false
                            Preview:.........1.~.Q....../.........2......X.T.......d......y..............*~....5.....w..\*........D...{....b........:3...7..........z|.....+...`....)........'.1...e*.'#.2+....=..........O..."..n.v....i.....V..3....3...d.8..3.........0<..5a.................4........(.....4...|........%......j...[.............M..j................h.....f.........4.........Q..6K.........72_...w....,m.....5.(..n........y..Y.v......X..ia.........-rh.......,{........Kl..........C......k3...&............<.pod...../....L.........Y....b..*1....e.....]t...T...........,......C..v.S..=.}...e.........z|..=........#9T...q.[......5...........@............X.....O........l-.1......r...gD..mA..(........y..Ku_..:E........x.o..................r...............'{...~.......H.........N?O....^..TH...J........................|........".. .....w.f..RZ................f.........B..B.O...c{9....w......0....u.g.V..*.<.\....i....U.t............j..O.h...JG.........z.....1C...K....|........O...'..f...............U..0.9..........c.c.Q.
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3775
                            Entropy (8bit):4.950958257088217
                            Encrypted:false
                            SSDEEP:96:GfS1OD4x08ECtJTXQYMYS1SDNpDz97tS6KLva07ce7Z:ES1ODR8ECTMY2MNV97tBKDjhd
                            MD5:7FEA240209F8B573DEFE77AF303502E9
                            SHA1:FB010E47DAB492098E2B596AFCDAE259AAB5491F
                            SHA-256:477003DCDB6BFBC409E90BB3E12BF4DE2437FC37E3944609B6D1563E0B4119F0
                            SHA-512:60C18B95C470130A1613700C098F3F57BAFE80DBD9875CFDF7D023E847182428287F5BEDDF54A64A58869360019697C2E23E2CF02FC121F0365B2F0336EFDFC7
                            Malicious:false
                            Preview:.Z5.........U........a....6........X%........f..Y.T.....Q........E=....w.~...`....Yo..........xR...........S......*...........]..y......z....].~..:........u...........x......b......k.....B....9".......)i......6..j.p.M......h.F...5=..........`C.............?.^......L....V.1...!....._=..7..............C........................A...........+....7......Ni...0........@......+...............1....L.............5....6.....c.....}.......G.H....... .P.Tg..X...&.....4.......n.........w.."...M.-...g.....M.@.....Z...Hp...x.[r......~Y......... v..........t.[....m.W..0&............. ......xv......*..6......o......\X...]...S................>..<....N....g.a5e....)....i.S......O....e.........D.R.....w....................>.RB.V.U..h.&..........._.....Q..x.........q....JD..=..h&.N.......@..3..........#..1.3..........(R.{.$..5.m.p...X..=L...............Z.J;..7...u.s.l....G...U..{.....H.................................. ....M........._.b..i.....B.}.....2....M........"".!..........M.w...,...,J...4..
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):499
                            Entropy (8bit):4.255825957007059
                            Encrypted:false
                            SSDEEP:12:tVIa7sNyNSJY9GXCPtNAXZFn1a2Yxd810LZx:EEHEdCPtNEn1ahk0LZx
                            MD5:AE6051F666A4BE61FEE72E82BE9472FF
                            SHA1:75E78487542EB4829CBEC88DEA748B7F83D6D93E
                            SHA-256:2967EBEB5E16E9FB16CEB5F2770CC1718C9085D5188DEC59F45A9B97640B926A
                            SHA-512:4F4948CEB6320514C801951AF1A8ED746D8A28D9520DCECB96802415D1C083327B2D8D0A24299C72D78C70A7B4C1D8A4C1286AB20257841AAD72D6192981EE72
                            Malicious:false
                            Preview:mythicization thoth slagtemads overfill sptmejser bubaline.mellemkrigsaarene broderlandes tekstfelternes interviewernes,erfaringernes kursusforms dame spindeltrappe dkk overeksponeredes binderen tarmrensningsanlggenes muguet bladres scuffles agroan halvaben..udkldningernes regurgitate shellapple slutbetingelserne antimalarial reweaving systemdiskettens,rumbled demurrages uforstyrreligt unmannishly kexy digteres dmoniser erantisser bulter grahamsbrdets ikonerne..skjuleres liquescency syntactics.
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):3878
                            Entropy (8bit):4.817147450439702
                            Encrypted:false
                            SSDEEP:48:O/imajgqrd1bZRfozJhxaYUtIG7IvoMzau1GVtvSZb6//znYehs+Fot/A2QGcEZ:LggOJhxzUKG7Y43e9SVWaK
                            MD5:2F948404EA3C59278E0D9BFCBE8D4C40
                            SHA1:5378D5D2B0FC0D0B8B966B5D902EB1BC7E6D779D
                            SHA-256:28958123B65F320945BF723D1C61D73C3A8EB8312564074CB35E322FACB0DBEC
                            SHA-512:B808F7FA33194C57581DE9E6D7DB8A8A5DB275C005894B69D150D26FCB4B3A412BB2AC52A13C0D55A0E62EEDDBC6AE6F19B2CCB19CE23290E7E035C335134B0C
                            Malicious:false
                            Preview:r.......I.'..u.m....}.......e.............!.r..........:.\.....@....+...{o.......r.............x....u.......&..K.f5.E3....Q&..:.V...j..|...........M.O..[..f..............|....[......../.....h...._......!N..&...<1.i.7%..K.....o..x....P..}..5......S............}...U..........G.)u...K....T.....z.r..C.H.............]..............9.q....-...............S.....F.;............F..}..Z.............,..i.....y.%.....u../.w.. ...C...X8.O>...........Q.......}.....$.............J............V}.........5..;...=.......j.........M..............=.Xv..:........~..^v..........4...5......e...].,.....3......u........l..i.............].......-........'S.&.^........_...'.q3$.........x.p....|!......K..o..................40.........Q.>.....Uz.............M......b....Z..0...e...e..$...........1.......E......&.....D........E..........<......E..i.................3...`......p.4..........5E......[.N.....%1....(......M .7.........:.n...6............Cn.Y;......F..............d...o.......1n.;.v.{.......
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4824
                            Entropy (8bit):4.954663209503854
                            Encrypted:false
                            SSDEEP:96:To5JpHQbnj0h4vYskWqKXYDC0zNo4/UdvwQI3m8mNly7wDXcNLZc:gHmnwh4gaoDC0zNfUPeVm3pXclc
                            MD5:A8C0B0FD25B502DC728C818B01C4705E
                            SHA1:83C8F134624D964B0946E634229C09262B786358
                            SHA-256:03822E3B8D5042BBC7751BABF9A2510E4C41F75AABAEF9D7317DAFED5C2DA04D
                            SHA-512:C945703CA4A7F28900A0929D4A6BBD4E2FFFE3323E574C5E4F8CE4D3A5A9FBAD948EA106BA030E66A66F52AAEFE957578A8FBABAB7FE3A42D0EDDAE095C285FD
                            Malicious:false
                            Preview:.R...j......C .^.....9..........+...........8V.x-:......x..N,.....\..D......!.L.g....@.....'..........x.....T..............P>.(........6.....F..f\...(...S....o.K.....7...4..Q,....P..8.... ......"...Aq... .U...9.W.............p.....l6n....Z........`...6.......A...1......T.......p.......iH.....B.a...............d.......................M...2.....m.......K...C..........< ............9p....H....b...................U.............2......S.A.r...8J!................(........G..............N...]....(..l........Y ..s.2....yI8....O........................j...................'...................rI.Q...@7%....E.........B.G........5..{...j...S/yQ.Q...,.......k...%....\... ...._.......*......\.....J.P../.........9......-..............Q.....-...........................~....&.....................u..........B....P......'.z.O..O......?......_..AV.....=.........~....y..-...............0.d..[......y.....................C.......^"..>.....v....n.N...).......\A....+.VJ..P.a...<...k.......L..-H.
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4214
                            Entropy (8bit):5.046129082285061
                            Encrypted:false
                            SSDEEP:96:PCiBr5RPnr9McV1tvyZvDmRvNBlcF/XiEwyeivw:PVRPpMcftqZyRvHUXkbr
                            MD5:9ADD6AD16F4E7B71089D9807757A8B85
                            SHA1:0127249EDC98852B4AFC12B17D8C00EA4BDE8519
                            SHA-256:82B86D8FB42303AE132DC37792151FDE087070B9AE5DD01BBC2D77B5762942F5
                            SHA-512:0D52F35B9AC792E909DA465FF72B1C089515EE936E9A1DDCBA076D719431F43AC9C4E93B2C3C33BCF6A94A7638BCB543399F8D235301CEDD34D6A16CA543EDEA
                            Malicious:false
                            Preview:...R.......X...5...........Q.................s.....}...h.k...........r..C....].....y..........................A.....w......N.......|..h......0...L......P.............x..M=......]....H.......`...... .........L....v..=..0.....E......+................/.......=u..Fh..'..`.........}.....U...kZ..V..h..nF...................+=..H...........N..........L..[...@?.g<.A..b........Z.......'..........l..L.0...#..............>...........3..'..%.............P.YP..Y......W.b....J@...W.f.;...4....v......=........V...Pe..... .*.................~...6......%F........?.}........................8..3.............g.k..........I.....&..^........7.eGu..Rd...W......w.8.5P...H..Q........;.6......7u.........>..}.....\.a..`............)e./........k..,.L.E...2.............%+.1..*..|..R.#....`.......V..`...4....................................Wix..@...x.|.......&..S#...KO.......9.......2_"..OP...4..L.(tK.....P....R.............8....s...I+.6...A.5..........}....)....'}W)...Z....#y.%..8.p...x.................G
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4604
                            Entropy (8bit):4.800828433192942
                            Encrypted:false
                            SSDEEP:96:2JZjKAUt4rE5yHGP/tmB4/cLodXL6FYYVtiCOfKRjY:iZjKAUt4Mh0CkenYQCRjY
                            MD5:78C3F9CAADC9005059318C41AF371F53
                            SHA1:47427BE3D4D5C20B10EBE761D44FC3C6DD82B92F
                            SHA-256:38DA1491F6996D1BD6C41949BB0EE04431D1F26991849BE89B3A4FAE488B76B1
                            SHA-512:250ACFC789595818403A27198C930A3DBE006336DE9DEC2C8C1E097C575D8CD1E2960A5B163975324FDC24B5CC9CE251FA28505CAE48A1FE8A9676BC17906120
                            Malicious:false
                            Preview:.......`C.....".(./...+...i.]M.._..........A.....3........6..(.J............c(....t.........1.........6u..-..I...."..........V.................~..........r....e...-....6.........Lb......K........4..9.....X...I".......&..V.....s..........y.....q........$.............2-...........V.....0..m.<........................<........................?..Y0..........r.................R.....@..Z%..O.}......;..............PI.....j...L......u.4..p...Y,.7-.......o.........../.../y.......OP..........~......t...Y$.ch...}...RY.%.........*k................X.c...........]......v7.!......;.....t..h6...M....'...z.....'.r.G^..c...........V.4....b..:H....).w.a................'.T.j.,.V.m.......>.b......7....@......<....Z.......p.M../.........Q.........................*..|D...4.c..n...">.@.....RZgm..<....I...l..&.S......f...........R......3.#..q.......i........9.....U.n......Ow.....................I....d...G........iu..n...A.X............'F...:....}w...W......:v.........T.o.f.x.!M..j....a.K2cg..........d.....
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2293
                            Entropy (8bit):5.0147763937793375
                            Encrypted:false
                            SSDEEP:48:RyaRUkDpACPmhYArwa+FoQTgxVEwCXxAVY0a+XOBj7A0ziFVx/:3UtZUos0VEwCBT9rleLx/
                            MD5:66FE8032945556E76D24C01F08AA618B
                            SHA1:2D1C5646DD4DE7BE749CA66729962DBDAB1AD4D6
                            SHA-256:8A0A214E24B244B5482BA9B064199EA53BC3975C89F70C04E8CF3021EA49FE56
                            SHA-512:01B1B5E568E90C4F0C303F743F6E8288A3CC82BFDCCBB8E5C95125A74F9531BC7A24831FFDAFE95678161AA41A793A092E52C44E0AE625150FD24BB84B469A79
                            Malicious:false
                            Preview:..C.|........................*;~f...n............x.!...A...D.q..Ne.....H.H..s...`....r.......................I....,...|....................]..........&...........=...L.2...M...U...........&..b..........#...............TLf.........h.......'F..........................6!...k.............2.....S...s....U......g...:.. .....o....*.......5.m......z....cC..&..,w.y..............\...b.dZ.H.d............|.,..t........@........k...`;.....q..@.W..z...Zy......%}3......o.. ..d.r.............JF..N.!........y...................A..e...............'............L..VGp.....~.....dY....<j.1D........1..........yl..)78....p.....F....v.5..........g......;...l ..u.J.............Z...w.................T.0.....Ll.....4.............g......`M...........0.....B..............m.......7.........:.z...v...}.l...................1........#..R.......J...^.......K........X...h..W.[.q.....<..'........'.........&.,......................5....#.......l.....e...B.s...GD.....8....................3..I...........s....{.\
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):2256
                            Entropy (8bit):4.849771089742746
                            Encrypted:false
                            SSDEEP:48:5wV8WDczEuKBEKKXiCPsWafh/QrJKmGhYbG5sM:5wVOWSyCdYQNDGN
                            MD5:2A94C01E0FEC66A108816A0758176AAD
                            SHA1:E13323600B9250DE1EB773D897D4278F57ADC5C4
                            SHA-256:B2B861402ECF76335D00DF2551817EF8D8B1307D8D3E0A1349149779B26EB40A
                            SHA-512:2081EB47CFABFD269D1708641D61FDB6D1AD0F402821CCE808FDD404F7382F8B36726590CBDE17A2F1FAD29F5160B99B21C24DF27842E5D433A76DE1670B109C
                            Malicious:false
                            Preview:e.X.......L......s....}.{....v..Y..............g..og.c...!X...'..5................. ....q......^...............3.6..{...............j....X.........u........8p..........u.................a.p.*......f.....(.........[8.h..V..W. ..............K...+.....^..8............{.....)........a.N.......&...........L.........V.................D.h.....f......A....J|c ..Y........\..m....3..... ...w.....<.b.............(..{k6................y1........h............O.....<...G.........P...........9T............e....,.........#q....`.......Z.....v.....-.F....D........(.........................e.....,........G.F........@..w-.................H............-0....(.........}..K.....U........6?......................(.......r....gq.J........3...i.J.......6................T=.........%..._*....@.Y..........qg....]....A..!..#..c.Y...........B...0.a....@M....HA....................^.....@.....}...h...........p.....f....>....a].e.....H....Y,........HUP.......3...........k...#...........Y...U.b..#)...Q5..>....
                            Process:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):10572
                            Entropy (8bit):4.474055010709058
                            Encrypted:false
                            SSDEEP:192:dbjMuE9OL481Ow4fQLQTCZ7AfSZWDfIsySDi9aI5n:d69Xrw4gQT+Af5dySDI5n
                            MD5:57FD79EAFAC08A7C1673C636B45B9078
                            SHA1:0C53D2EB5C9DEF770958F26966258F72A79B0C36
                            SHA-256:EF77D0B3E4BA913094FA838E8A08CE588C4608A6A697AC390E539688CDB4C171
                            SHA-512:DA4053FFF1898A1A9AAAD9B0A135580AC89E42BD2B9B7D8C54AA36362137B58E368D9F369CDB2743F4E5BC70D326E65B633EA962319E2B12EA2AE4D6F117B6A4
                            Malicious:false
                            Preview:.....???......%%.bbbk....e....r....n....e....l....3....2.s..:....:....C....r....e.5..a....t....e....F....i....l....e....A...2(.|.%m.... ....r.N..4.%.. ....,.... ....i.... ....2....1....4....7....4....8....3....6....4...}8....,.... ....i.... ....0..O.,.... ....p.... ....0.p..,.... ....i.... ....4....,.FFF ..99i.... ....1....2....8....,.... .ttti.... ....0....).qq.i./.......r....5....z....k....e....r....n....e.AAAl....3....2.ss.:....:....S....e....t....F..'.i....l....e....P....o....i....n....t....e....r..#.(...$i.... ....r....5....,.... ....i.>.. ....2....2....1....2.... ....,...N ....i.... ....0....,.Q..i.... ....0....)....i.........r....3...4z....k..VVe..E.r....n..\\e..h.l.aa.3.++.2....:....:....V....i....r....t....u....a....l....A....l....l..A.o....c....(....i.... ....0...\,...Mi.... ....4...{6..A.6....5....7..v.5....3....6....,...- ....i.... ....1....2..4.2.ll.8....8..KK,..jj ....i.#.. ....6....4...\)....p.VV......r..LL1....z....k....e....r...Rn....e....l....3.;..2....:....:....R....
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.378150515131689
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Benefits-Signature-RequestsPlan#241205.com.exe
                            File size:325'982 bytes
                            MD5:46e978f5dee2d39687269d77e44df3cf
                            SHA1:f15c27a41a2e7e78b07df29c687da3e70e813e66
                            SHA256:5828d4217d31c59b79df8a93b0a52332d4d3ef267f02c2448c463338e017f48d
                            SHA512:81c38dd8ed41e0fc6b8a83ea536ca568c10cf1ee994edd0ef2acd00e85f45db85830f68e78e28679036d6e950617e4405e1a24fb293bf3e8fabc885f92ca9d19
                            SSDEEP:6144:A9X0GAbjQDWEofo891UrIq5ezWQn1SGse/yuIW7Nrw0zRRb4iUH13T:G0t/voK1UwzWQ13setIWRw0NZlo13T
                            TLSH:3864D0422AA486E3E728057094B7E771CE78AD7065040B17AED4BBEF7F37B865D9D002
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L.....$_.................f...|......H3............@
                            Icon Hash:968646a6c7060f66
                            Entrypoint:0x403348
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x5F24A9AF [Fri Jul 31 23:30:55 2020 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:ced282d9b261d1462772017fe2f6972b
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 0040A198h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [004080B8h]
                            call dword ptr [004080BCh]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042F42Ch], eax
                            je 00007F79BCC60EF3h
                            push ebx
                            call 00007F79BCC64056h
                            cmp eax, ebx
                            je 00007F79BCC60EE9h
                            push 00000C00h
                            call eax
                            mov esi, 004082A0h
                            push esi
                            call 00007F79BCC63FD2h
                            push esi
                            call dword ptr [004080CCh]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007F79BCC60ECDh
                            push 0000000Bh
                            call 00007F79BCC6402Ah
                            push 00000009h
                            call 00007F79BCC64023h
                            push 00000007h
                            mov dword ptr [0042F424h], eax
                            call 00007F79BCC64017h
                            cmp eax, ebx
                            je 00007F79BCC60EF1h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F79BCC60EE9h
                            or byte ptr [0042F42Fh], 00000040h
                            push ebp
                            call dword ptr [00408038h]
                            push ebx
                            call dword ptr [00408288h]
                            mov dword ptr [0042F4F8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 00429850h
                            call dword ptr [0040816Ch]
                            push 0040A188h
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x19070.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x300000x250000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x550000x190700x19200fe8809c5c9eeb1a0843e35f8758c2083False0.37116176927860695data5.512258056875945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x552c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.34928427777120546
                            RT_ICON0x65af00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4194024563060935
                            RT_ICON0x69d180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4966804979253112
                            RT_ICON0x6c2c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5023452157598499
                            RT_ICON0x6d3680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6409574468085106
                            RT_DIALOG0x6d7d00x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x6d8d00x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x6d9f00xc4dataEnglishUnited States0.5918367346938775
                            RT_DIALOG0x6dab80x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x6db180x4cdataEnglishUnited States0.8026315789473685
                            RT_VERSION0x6db680x1c8dataEnglishUnited States0.5021929824561403
                            RT_MANIFEST0x6dd300x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                            DLLImport
                            ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                            SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                            ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                            USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:14:11:52
                            Start date:22/05/2024
                            Path:C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"
                            Imagebase:0x400000
                            File size:325'982 bytes
                            MD5 hash:46E978F5DEE2D39687269D77E44DF3CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4570321949.00000000072E7000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:21.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:16.6%
                              Total number of Nodes:1545
                              Total number of Limit Nodes:37
                              execution_graph 4985 401d44 4986 402bac 17 API calls 4985->4986 4987 401d52 SetWindowLongA 4986->4987 4988 402a5a 4987->4988 3969 401ec5 3977 402bac 3969->3977 3971 401ecb 3972 402bac 17 API calls 3971->3972 3973 401ed7 3972->3973 3974 401ee3 ShowWindow 3973->3974 3975 401eee EnableWindow 3973->3975 3976 402a5a 3974->3976 3975->3976 3978 40618a 17 API calls 3977->3978 3979 402bc1 3978->3979 3979->3971 3980 401746 3981 402bce 17 API calls 3980->3981 3982 40174d 3981->3982 3986 405cbf 3982->3986 3984 401754 3985 405cbf 2 API calls 3984->3985 3985->3984 3987 405cca GetTickCount GetTempFileNameA 3986->3987 3988 405cfb 3987->3988 3989 405cf7 3987->3989 3988->3984 3989->3987 3989->3988 4989 4045c6 4990 4045d6 4989->4990 4991 4045fc 4989->4991 4992 40417b 18 API calls 4990->4992 4993 4041e2 8 API calls 4991->4993 4994 4045e3 SetDlgItemTextA 4992->4994 4995 404608 4993->4995 4994->4991 4996 401947 4997 402bce 17 API calls 4996->4997 4998 40194e lstrlenA 4997->4998 4999 402620 4998->4999 4141 403348 SetErrorMode GetVersion 4142 403389 4141->4142 4144 40338f 4141->4144 4143 406500 5 API calls 4142->4143 4143->4144 4145 406492 3 API calls 4144->4145 4146 4033a5 lstrlenA 4145->4146 4146->4144 4147 4033b4 4146->4147 4148 406500 5 API calls 4147->4148 4149 4033bb 4148->4149 4150 406500 5 API calls 4149->4150 4151 4033c2 4150->4151 4152 406500 5 API calls 4151->4152 4153 4033ce #17 OleInitialize SHGetFileInfoA 4152->4153 4231 4060f7 lstrcpynA 4153->4231 4156 40341a GetCommandLineA 4232 4060f7 lstrcpynA 4156->4232 4158 40342c 4159 405aba CharNextA 4158->4159 4160 403455 CharNextA 4159->4160 4169 403465 4160->4169 4161 40352f 4162 403542 GetTempPathA 4161->4162 4233 403317 4162->4233 4164 40355a 4165 4035b4 DeleteFileA 4164->4165 4166 40355e GetWindowsDirectoryA lstrcatA 4164->4166 4243 402ea1 GetTickCount GetModuleFileNameA 4165->4243 4170 403317 12 API calls 4166->4170 4167 405aba CharNextA 4167->4169 4169->4161 4169->4167 4173 403531 4169->4173 4172 40357a 4170->4172 4171 4035c8 4174 40365e 4171->4174 4177 40364e 4171->4177 4181 405aba CharNextA 4171->4181 4172->4165 4176 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4172->4176 4327 4060f7 lstrcpynA 4173->4327 4344 403830 4174->4344 4179 403317 12 API calls 4176->4179 4271 40390a 4177->4271 4183 4035ac 4179->4183 4184 4035e3 4181->4184 4183->4165 4183->4174 4191 403629 4184->4191 4192 40368e 4184->4192 4185 403796 4188 403818 ExitProcess 4185->4188 4189 40379e GetCurrentProcess OpenProcessToken 4185->4189 4186 403678 4187 405813 MessageBoxIndirectA 4186->4187 4193 403686 ExitProcess 4187->4193 4194 4037e9 4189->4194 4195 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 4189->4195 4328 405b7d 4191->4328 4351 40577e 4192->4351 4196 406500 5 API calls 4194->4196 4195->4194 4199 4037f0 4196->4199 4202 403805 ExitWindowsEx 4199->4202 4206 403811 4199->4206 4202->4188 4202->4206 4203 4036a4 lstrcatA 4204 4036af lstrcatA lstrcmpiA 4203->4204 4204->4174 4205 4036cb 4204->4205 4208 4036d0 4205->4208 4209 4036d7 4205->4209 4210 40140b 2 API calls 4206->4210 4354 4056e4 CreateDirectoryA 4208->4354 4359 405761 CreateDirectoryA 4209->4359 4210->4188 4211 403643 4343 4060f7 lstrcpynA 4211->4343 4216 4036dc SetCurrentDirectoryA 4217 4036f6 4216->4217 4218 4036eb 4216->4218 4363 4060f7 lstrcpynA 4217->4363 4362 4060f7 lstrcpynA 4218->4362 4221 40618a 17 API calls 4222 403735 DeleteFileA 4221->4222 4223 403742 CopyFileA 4222->4223 4228 403704 4222->4228 4223->4228 4224 40378a 4226 405ed6 36 API calls 4224->4226 4226->4174 4227 40618a 17 API calls 4227->4228 4228->4221 4228->4224 4228->4227 4230 403776 CloseHandle 4228->4230 4364 405ed6 MoveFileExA 4228->4364 4368 405796 CreateProcessA 4228->4368 4230->4228 4231->4156 4232->4158 4234 4063d2 5 API calls 4233->4234 4236 403323 4234->4236 4235 40332d 4235->4164 4236->4235 4371 405a8f lstrlenA CharPrevA 4236->4371 4239 405761 2 API calls 4240 40333b 4239->4240 4241 405cbf 2 API calls 4240->4241 4242 403346 4241->4242 4242->4164 4374 405c90 GetFileAttributesA CreateFileA 4243->4374 4245 402ee1 4264 402ef1 4245->4264 4375 4060f7 lstrcpynA 4245->4375 4247 402f07 4376 405ad6 lstrlenA 4247->4376 4251 402f18 GetFileSize 4252 403012 4251->4252 4270 402f2f 4251->4270 4381 402e3d 4252->4381 4254 40301b 4256 40304b GlobalAlloc 4254->4256 4254->4264 4416 403300 SetFilePointer 4254->4416 4392 403300 SetFilePointer 4256->4392 4257 40307e 4261 402e3d 6 API calls 4257->4261 4260 403066 4393 4030d8 4260->4393 4261->4264 4262 403034 4265 4032ea ReadFile 4262->4265 4264->4171 4267 40303f 4265->4267 4266 402e3d 6 API calls 4266->4270 4267->4256 4267->4264 4268 403072 4268->4264 4268->4268 4269 4030af SetFilePointer 4268->4269 4269->4264 4270->4252 4270->4257 4270->4264 4270->4266 4413 4032ea 4270->4413 4272 406500 5 API calls 4271->4272 4273 40391e 4272->4273 4274 403924 4273->4274 4275 403936 4273->4275 4452 406055 wsprintfA 4274->4452 4276 405fde 3 API calls 4275->4276 4277 403961 4276->4277 4279 40397f lstrcatA 4277->4279 4281 405fde 3 API calls 4277->4281 4280 403934 4279->4280 4437 403bcf 4280->4437 4281->4279 4284 405b7d 18 API calls 4285 4039b1 4284->4285 4286 403a3a 4285->4286 4288 405fde 3 API calls 4285->4288 4287 405b7d 18 API calls 4286->4287 4289 403a40 4287->4289 4290 4039dd 4288->4290 4291 403a50 LoadImageA 4289->4291 4292 40618a 17 API calls 4289->4292 4290->4286 4295 4039f9 lstrlenA 4290->4295 4298 405aba CharNextA 4290->4298 4293 403af6 4291->4293 4294 403a77 RegisterClassA 4291->4294 4292->4291 4297 40140b 2 API calls 4293->4297 4296 403aad SystemParametersInfoA CreateWindowExA 4294->4296 4326 403b00 4294->4326 4299 403a07 lstrcmpiA 4295->4299 4300 403a2d 4295->4300 4296->4293 4301 403afc 4297->4301 4302 4039f7 4298->4302 4299->4300 4303 403a17 GetFileAttributesA 4299->4303 4304 405a8f 3 API calls 4300->4304 4306 403bcf 18 API calls 4301->4306 4301->4326 4302->4295 4305 403a23 4303->4305 4307 403a33 4304->4307 4305->4300 4308 405ad6 2 API calls 4305->4308 4309 403b0d 4306->4309 4453 4060f7 lstrcpynA 4307->4453 4308->4300 4311 403b19 ShowWindow 4309->4311 4312 403b9c 4309->4312 4313 406492 3 API calls 4311->4313 4445 4052f0 OleInitialize 4312->4445 4315 403b31 4313->4315 4317 403b3f GetClassInfoA 4315->4317 4320 406492 3 API calls 4315->4320 4316 403ba2 4318 403ba6 4316->4318 4319 403bbe 4316->4319 4322 403b53 GetClassInfoA RegisterClassA 4317->4322 4323 403b69 DialogBoxParamA 4317->4323 4324 40140b 2 API calls 4318->4324 4318->4326 4321 40140b 2 API calls 4319->4321 4320->4317 4321->4326 4322->4323 4325 40140b 2 API calls 4323->4325 4324->4326 4325->4326 4326->4174 4327->4162 4455 4060f7 lstrcpynA 4328->4455 4330 405b8e 4456 405b28 CharNextA CharNextA 4330->4456 4333 403634 4333->4174 4342 4060f7 lstrcpynA 4333->4342 4334 4063d2 5 API calls 4340 405ba4 4334->4340 4335 405bcf lstrlenA 4336 405bda 4335->4336 4335->4340 4338 405a8f 3 API calls 4336->4338 4339 405bdf GetFileAttributesA 4338->4339 4339->4333 4340->4333 4340->4335 4341 405ad6 2 API calls 4340->4341 4462 40646b FindFirstFileA 4340->4462 4341->4335 4342->4211 4343->4177 4345 403848 4344->4345 4346 40383a CloseHandle 4344->4346 4465 403875 4345->4465 4346->4345 4352 406500 5 API calls 4351->4352 4353 403693 lstrcatA 4352->4353 4353->4203 4353->4204 4355 4036d5 4354->4355 4356 405735 GetLastError 4354->4356 4355->4216 4356->4355 4357 405744 SetFileSecurityA 4356->4357 4357->4355 4358 40575a GetLastError 4357->4358 4358->4355 4360 405771 4359->4360 4361 405775 GetLastError 4359->4361 4360->4216 4361->4360 4362->4217 4363->4228 4365 405ef7 4364->4365 4366 405eea 4364->4366 4365->4228 4522 405d66 4366->4522 4369 4057d5 4368->4369 4370 4057c9 CloseHandle 4368->4370 4369->4228 4370->4369 4372 403335 4371->4372 4373 405aa9 lstrcatA 4371->4373 4372->4239 4373->4372 4374->4245 4375->4247 4377 405ae3 4376->4377 4378 402f0d 4377->4378 4379 405ae8 CharPrevA 4377->4379 4380 4060f7 lstrcpynA 4378->4380 4379->4377 4379->4378 4380->4251 4382 402e46 4381->4382 4383 402e5e 4381->4383 4384 402e56 4382->4384 4385 402e4f DestroyWindow 4382->4385 4386 402e66 4383->4386 4387 402e6e GetTickCount 4383->4387 4384->4254 4385->4384 4417 40653c 4386->4417 4389 402e7c CreateDialogParamA ShowWindow 4387->4389 4390 402e9f 4387->4390 4389->4390 4390->4254 4392->4260 4394 4030ee 4393->4394 4395 40311c 4394->4395 4423 403300 SetFilePointer 4394->4423 4397 4032ea ReadFile 4395->4397 4398 403127 4397->4398 4399 403283 4398->4399 4400 403139 GetTickCount 4398->4400 4402 40326d 4398->4402 4401 4032c5 4399->4401 4406 403287 4399->4406 4400->4402 4409 403188 4400->4409 4403 4032ea ReadFile 4401->4403 4402->4268 4403->4402 4404 4032ea ReadFile 4404->4409 4405 4032ea ReadFile 4405->4406 4406->4402 4406->4405 4407 405d37 WriteFile 4406->4407 4407->4406 4408 4031de GetTickCount 4408->4409 4409->4402 4409->4404 4409->4408 4410 403203 MulDiv wsprintfA 4409->4410 4421 405d37 WriteFile 4409->4421 4424 40521e 4410->4424 4435 405d08 ReadFile 4413->4435 4416->4262 4418 406559 PeekMessageA 4417->4418 4419 402e6c 4418->4419 4420 40654f DispatchMessageA 4418->4420 4419->4254 4420->4418 4422 405d55 4421->4422 4422->4409 4423->4395 4425 4052dc 4424->4425 4426 405239 4424->4426 4425->4409 4427 405256 lstrlenA 4426->4427 4430 40618a 17 API calls 4426->4430 4428 405264 lstrlenA 4427->4428 4429 40527f 4427->4429 4428->4425 4431 405276 lstrcatA 4428->4431 4432 405292 4429->4432 4433 405285 SetWindowTextA 4429->4433 4430->4427 4431->4429 4432->4425 4434 405298 SendMessageA SendMessageA SendMessageA 4432->4434 4433->4432 4434->4425 4436 4032fd 4435->4436 4436->4270 4438 403be3 4437->4438 4454 406055 wsprintfA 4438->4454 4440 403c54 4441 403c88 18 API calls 4440->4441 4443 403c59 4441->4443 4442 40398f 4442->4284 4443->4442 4444 40618a 17 API calls 4443->4444 4444->4443 4446 4041c7 SendMessageA 4445->4446 4450 405313 4446->4450 4447 40533a 4448 4041c7 SendMessageA 4447->4448 4449 40534c OleUninitialize 4448->4449 4449->4316 4450->4447 4451 401389 2 API calls 4450->4451 4451->4450 4452->4280 4453->4286 4454->4440 4455->4330 4457 405b43 4456->4457 4459 405b53 4456->4459 4457->4459 4460 405b4e CharNextA 4457->4460 4458 405b73 4458->4333 4458->4334 4459->4458 4461 405aba CharNextA 4459->4461 4460->4458 4461->4459 4463 406481 FindClose 4462->4463 4464 40648c 4462->4464 4463->4464 4464->4340 4466 403883 4465->4466 4467 40384d 4466->4467 4468 403888 FreeLibrary GlobalFree 4466->4468 4469 4058bf 4467->4469 4468->4467 4468->4468 4470 405b7d 18 API calls 4469->4470 4471 4058df 4470->4471 4472 4058e7 DeleteFileA 4471->4472 4473 4058fe 4471->4473 4474 403667 OleUninitialize 4472->4474 4475 405a2c 4473->4475 4509 4060f7 lstrcpynA 4473->4509 4474->4185 4474->4186 4475->4474 4480 40646b 2 API calls 4475->4480 4477 405924 4478 405937 4477->4478 4479 40592a lstrcatA 4477->4479 4482 405ad6 2 API calls 4478->4482 4481 40593d 4479->4481 4483 405a50 4480->4483 4484 40594b lstrcatA 4481->4484 4486 405956 lstrlenA FindFirstFileA 4481->4486 4482->4481 4483->4474 4485 405a54 4483->4485 4484->4486 4487 405a8f 3 API calls 4485->4487 4486->4475 4491 40597a 4486->4491 4489 405a5a 4487->4489 4488 405aba CharNextA 4488->4491 4490 405877 5 API calls 4489->4490 4492 405a66 4490->4492 4491->4488 4496 405a0b FindNextFileA 4491->4496 4505 4059cc 4491->4505 4510 4060f7 lstrcpynA 4491->4510 4493 405a80 4492->4493 4494 405a6a 4492->4494 4495 40521e 24 API calls 4493->4495 4494->4474 4499 40521e 24 API calls 4494->4499 4495->4474 4496->4491 4498 405a23 FindClose 4496->4498 4498->4475 4500 405a77 4499->4500 4502 405ed6 36 API calls 4500->4502 4504 405a7e 4502->4504 4503 4058bf 60 API calls 4503->4505 4504->4474 4505->4496 4505->4503 4506 40521e 24 API calls 4505->4506 4507 40521e 24 API calls 4505->4507 4508 405ed6 36 API calls 4505->4508 4511 405877 4505->4511 4506->4496 4507->4505 4508->4505 4509->4477 4510->4491 4519 405c6b GetFileAttributesA 4511->4519 4514 4058a4 4514->4505 4515 405892 RemoveDirectoryA 4517 4058a0 4515->4517 4516 40589a DeleteFileA 4516->4517 4517->4514 4518 4058b0 SetFileAttributesA 4517->4518 4518->4514 4520 405883 4519->4520 4521 405c7d SetFileAttributesA 4519->4521 4520->4514 4520->4515 4520->4516 4521->4520 4523 405db2 GetShortPathNameA 4522->4523 4524 405d8c 4522->4524 4526 405ed1 4523->4526 4527 405dc7 4523->4527 4549 405c90 GetFileAttributesA CreateFileA 4524->4549 4526->4365 4527->4526 4529 405dcf wsprintfA 4527->4529 4528 405d96 CloseHandle GetShortPathNameA 4528->4526 4530 405daa 4528->4530 4531 40618a 17 API calls 4529->4531 4530->4523 4530->4526 4532 405df7 4531->4532 4550 405c90 GetFileAttributesA CreateFileA 4532->4550 4534 405e04 4534->4526 4535 405e13 GetFileSize GlobalAlloc 4534->4535 4536 405e35 4535->4536 4537 405eca CloseHandle 4535->4537 4538 405d08 ReadFile 4536->4538 4537->4526 4539 405e3d 4538->4539 4539->4537 4551 405bf5 lstrlenA 4539->4551 4542 405e54 lstrcpyA 4545 405e76 4542->4545 4543 405e68 4544 405bf5 4 API calls 4543->4544 4544->4545 4546 405ead SetFilePointer 4545->4546 4547 405d37 WriteFile 4546->4547 4548 405ec3 GlobalFree 4547->4548 4548->4537 4549->4528 4550->4534 4552 405c36 lstrlenA 4551->4552 4553 405c3e 4552->4553 4554 405c0f lstrcmpiA 4552->4554 4553->4542 4553->4543 4554->4553 4555 405c2d CharNextA 4554->4555 4555->4552 5000 4038c8 5001 4038d3 5000->5001 5002 4038d7 5001->5002 5003 4038da GlobalAlloc 5001->5003 5003->5002 5007 401fcb 5008 402bce 17 API calls 5007->5008 5009 401fd2 5008->5009 5010 40646b 2 API calls 5009->5010 5011 401fd8 5010->5011 5013 401fea 5011->5013 5014 406055 wsprintfA 5011->5014 5014->5013 5015 4014d6 5016 402bac 17 API calls 5015->5016 5017 4014dc Sleep 5016->5017 5019 402a5a 5017->5019 4654 401759 4655 402bce 17 API calls 4654->4655 4656 401760 4655->4656 4657 401786 4656->4657 4658 40177e 4656->4658 4695 4060f7 lstrcpynA 4657->4695 4694 4060f7 lstrcpynA 4658->4694 4661 401784 4665 4063d2 5 API calls 4661->4665 4662 401791 4663 405a8f 3 API calls 4662->4663 4664 401797 lstrcatA 4663->4664 4664->4661 4668 4017a3 4665->4668 4666 40646b 2 API calls 4666->4668 4667 4017e4 4669 405c6b 2 API calls 4667->4669 4668->4666 4668->4667 4671 4017ba CompareFileTime 4668->4671 4672 40187e 4668->4672 4677 4060f7 lstrcpynA 4668->4677 4680 40618a 17 API calls 4668->4680 4689 405813 MessageBoxIndirectA 4668->4689 4692 401855 4668->4692 4693 405c90 GetFileAttributesA CreateFileA 4668->4693 4669->4668 4671->4668 4673 40521e 24 API calls 4672->4673 4675 401888 4673->4675 4674 40521e 24 API calls 4690 40186a 4674->4690 4676 4030d8 31 API calls 4675->4676 4678 40189b 4676->4678 4677->4668 4679 4018af SetFileTime 4678->4679 4681 4018c1 FindCloseChangeNotification 4678->4681 4679->4681 4680->4668 4682 4018d2 4681->4682 4681->4690 4683 4018d7 4682->4683 4684 4018ea 4682->4684 4686 40618a 17 API calls 4683->4686 4685 40618a 17 API calls 4684->4685 4688 4018f2 4685->4688 4687 4018df lstrcatA 4686->4687 4687->4688 4688->4690 4691 405813 MessageBoxIndirectA 4688->4691 4689->4668 4691->4690 4692->4674 4692->4690 4693->4668 4694->4661 4695->4662 5020 401959 5021 402bac 17 API calls 5020->5021 5022 401960 5021->5022 5023 402bac 17 API calls 5022->5023 5024 40196d 5023->5024 5025 402bce 17 API calls 5024->5025 5026 401984 lstrlenA 5025->5026 5028 401994 5026->5028 5027 4019d4 5028->5027 5032 4060f7 lstrcpynA 5028->5032 5030 4019c4 5030->5027 5031 4019c9 lstrlenA 5030->5031 5031->5027 5032->5030 4737 40535c 4738 405507 4737->4738 4739 40537e GetDlgItem GetDlgItem GetDlgItem 4737->4739 4740 40550f GetDlgItem CreateThread FindCloseChangeNotification 4738->4740 4743 405537 4738->4743 4783 4041b0 SendMessageA 4739->4783 4740->4743 4786 4052f0 5 API calls 4740->4786 4742 405565 4747 4055c0 4742->4747 4748 40556d 4742->4748 4743->4742 4745 405586 4743->4745 4746 40554d ShowWindow ShowWindow 4743->4746 4744 4053ee 4749 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4744->4749 4753 4041e2 8 API calls 4745->4753 4785 4041b0 SendMessageA 4746->4785 4747->4745 4756 4055cd SendMessageA 4747->4756 4751 405575 4748->4751 4752 405599 ShowWindow 4748->4752 4754 405463 4749->4754 4755 405447 SendMessageA SendMessageA 4749->4755 4757 404154 SendMessageA 4751->4757 4759 4055b9 4752->4759 4760 4055ab 4752->4760 4758 405592 4753->4758 4762 405476 4754->4762 4763 405468 SendMessageA 4754->4763 4755->4754 4756->4758 4764 4055e6 CreatePopupMenu 4756->4764 4757->4745 4761 404154 SendMessageA 4759->4761 4765 40521e 24 API calls 4760->4765 4761->4747 4767 40417b 18 API calls 4762->4767 4763->4762 4766 40618a 17 API calls 4764->4766 4765->4759 4768 4055f6 AppendMenuA 4766->4768 4769 405486 4767->4769 4770 405614 GetWindowRect 4768->4770 4771 405627 TrackPopupMenu 4768->4771 4772 4054c3 GetDlgItem SendMessageA 4769->4772 4773 40548f ShowWindow 4769->4773 4770->4771 4771->4758 4774 405643 4771->4774 4772->4758 4777 4054ea SendMessageA SendMessageA 4772->4777 4775 4054b2 4773->4775 4776 4054a5 ShowWindow 4773->4776 4778 405662 SendMessageA 4774->4778 4784 4041b0 SendMessageA 4775->4784 4776->4775 4777->4758 4778->4778 4779 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4778->4779 4781 4056a1 SendMessageA 4779->4781 4781->4781 4782 4056c3 GlobalUnlock SetClipboardData CloseClipboard 4781->4782 4782->4758 4783->4744 4784->4772 4785->4742 5033 6e7c10e0 5042 6e7c110e 5033->5042 5034 6e7c11c4 GlobalFree 5035 6e7c12ad 2 API calls 5035->5042 5036 6e7c11c3 5036->5034 5037 6e7c1266 2 API calls 5040 6e7c11b1 GlobalFree 5037->5040 5038 6e7c1155 GlobalAlloc 5038->5042 5039 6e7c11ea GlobalFree 5039->5042 5040->5042 5041 6e7c12d1 lstrcpyA 5041->5042 5042->5034 5042->5035 5042->5036 5042->5037 5042->5038 5042->5039 5042->5040 5042->5041 5043 40275d 5044 402763 5043->5044 5045 40276b FindClose 5044->5045 5046 402a5a 5044->5046 5045->5046 5047 401a5e 5048 402bac 17 API calls 5047->5048 5049 401a67 5048->5049 5050 402bac 17 API calls 5049->5050 5051 401a0e 5050->5051 5052 40495e 5053 40498a 5052->5053 5054 40496e 5052->5054 5056 404990 SHGetPathFromIDListA 5053->5056 5057 4049bd 5053->5057 5063 4057f7 GetDlgItemTextA 5054->5063 5059 4049a0 5056->5059 5060 4049a7 SendMessageA 5056->5060 5058 40497b SendMessageA 5058->5053 5061 40140b 2 API calls 5059->5061 5060->5057 5061->5060 5063->5058 5064 4029de 5065 406500 5 API calls 5064->5065 5066 4029e5 5065->5066 5067 402bce 17 API calls 5066->5067 5068 4029ee 5067->5068 5070 402a2a 5068->5070 5074 40614a 5068->5074 5071 4029fc 5071->5070 5078 406134 5071->5078 5075 406155 5074->5075 5076 406178 IIDFromString 5075->5076 5077 406171 5075->5077 5076->5071 5077->5071 5081 406119 WideCharToMultiByte 5078->5081 5080 402a1d CoTaskMemFree 5080->5070 5081->5080 5082 6e7c2be3 5083 6e7c2bfb 5082->5083 5084 6e7c1534 2 API calls 5083->5084 5085 6e7c2c16 5084->5085 5086 4027df 5087 402bce 17 API calls 5086->5087 5089 4027ed 5087->5089 5088 402803 5091 405c6b 2 API calls 5088->5091 5089->5088 5090 402bce 17 API calls 5089->5090 5090->5088 5092 402809 5091->5092 5114 405c90 GetFileAttributesA CreateFileA 5092->5114 5094 402816 5095 402822 GlobalAlloc 5094->5095 5096 4028bf 5094->5096 5099 4028b6 CloseHandle 5095->5099 5100 40283b 5095->5100 5097 4028c7 DeleteFileA 5096->5097 5098 4028da 5096->5098 5097->5098 5099->5096 5115 403300 SetFilePointer 5100->5115 5102 402841 5103 4032ea ReadFile 5102->5103 5104 40284a GlobalAlloc 5103->5104 5105 402894 5104->5105 5106 40285a 5104->5106 5108 405d37 WriteFile 5105->5108 5107 4030d8 31 API calls 5106->5107 5113 402867 5107->5113 5109 4028a0 GlobalFree 5108->5109 5110 4030d8 31 API calls 5109->5110 5112 4028b3 5110->5112 5111 40288b GlobalFree 5111->5105 5112->5099 5113->5111 5114->5094 5115->5102 5116 4028e0 5117 402bac 17 API calls 5116->5117 5118 4028e6 5117->5118 5119 402925 5118->5119 5120 40290e 5118->5120 5126 4027bf 5118->5126 5123 40293f 5119->5123 5124 40292f 5119->5124 5121 402922 5120->5121 5122 402913 5120->5122 5131 406055 wsprintfA 5121->5131 5130 4060f7 lstrcpynA 5122->5130 5125 40618a 17 API calls 5123->5125 5127 402bac 17 API calls 5124->5127 5125->5126 5127->5126 5130->5126 5131->5126 5132 4023e0 5133 402bce 17 API calls 5132->5133 5134 4023f1 5133->5134 5135 402bce 17 API calls 5134->5135 5136 4023fa 5135->5136 5137 402bce 17 API calls 5136->5137 5138 402404 GetPrivateProfileStringA 5137->5138 5139 401b63 5140 402bce 17 API calls 5139->5140 5141 401b6a 5140->5141 5142 402bac 17 API calls 5141->5142 5143 401b73 wsprintfA 5142->5143 5144 402a5a 5143->5144 5145 6e7c1058 5147 6e7c1074 5145->5147 5146 6e7c10dc 5147->5146 5148 6e7c1091 5147->5148 5149 6e7c14bb GlobalFree 5147->5149 5150 6e7c14bb GlobalFree 5148->5150 5149->5148 5151 6e7c10a1 5150->5151 5152 6e7c10a8 GlobalSize 5151->5152 5153 6e7c10b1 5151->5153 5152->5153 5154 6e7c10b5 GlobalAlloc 5153->5154 5155 6e7c10c6 5153->5155 5156 6e7c14e2 3 API calls 5154->5156 5157 6e7c10d1 GlobalFree 5155->5157 5156->5155 5157->5146 5158 401d65 5159 401d78 GetDlgItem 5158->5159 5160 401d6b 5158->5160 5162 401d72 5159->5162 5161 402bac 17 API calls 5160->5161 5161->5162 5163 401db9 GetClientRect LoadImageA SendMessageA 5162->5163 5164 402bce 17 API calls 5162->5164 5166 401e1a 5163->5166 5168 401e26 5163->5168 5164->5163 5167 401e1f DeleteObject 5166->5167 5166->5168 5167->5168 5169 6e7c225a 5170 6e7c22c4 5169->5170 5171 6e7c22ee 5170->5171 5172 6e7c22cf GlobalAlloc 5170->5172 5172->5170 5173 4042e6 5174 404408 5173->5174 5175 4042fc 5173->5175 5176 404477 5174->5176 5178 404541 5174->5178 5183 40444c GetDlgItem SendMessageA 5174->5183 5177 40417b 18 API calls 5175->5177 5176->5178 5179 404481 GetDlgItem 5176->5179 5180 404352 5177->5180 5185 4041e2 8 API calls 5178->5185 5181 404497 5179->5181 5182 4044ff 5179->5182 5184 40417b 18 API calls 5180->5184 5181->5182 5190 4044bd SendMessageA LoadCursorA SetCursor 5181->5190 5182->5178 5186 404511 5182->5186 5206 40419d KiUserCallbackDispatcher 5183->5206 5188 40435f CheckDlgButton 5184->5188 5189 40453c 5185->5189 5191 404517 SendMessageA 5186->5191 5192 404528 5186->5192 5204 40419d KiUserCallbackDispatcher 5188->5204 5210 40458a 5190->5210 5191->5192 5192->5189 5196 40452e SendMessageA 5192->5196 5193 404472 5207 404566 5193->5207 5196->5189 5198 40437d GetDlgItem 5205 4041b0 SendMessageA 5198->5205 5201 404393 SendMessageA 5202 4043b1 GetSysColor 5201->5202 5203 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5201->5203 5202->5203 5203->5189 5204->5198 5205->5201 5206->5193 5208 404574 5207->5208 5209 404579 SendMessageA 5207->5209 5208->5209 5209->5176 5213 4057d9 ShellExecuteExA 5210->5213 5212 4044f0 LoadCursorA SetCursor 5212->5182 5213->5212 5214 40166a 5215 402bce 17 API calls 5214->5215 5216 401671 5215->5216 5217 402bce 17 API calls 5216->5217 5218 40167a 5217->5218 5219 402bce 17 API calls 5218->5219 5220 401683 MoveFileA 5219->5220 5221 401696 5220->5221 5222 40168f 5220->5222 5224 40646b 2 API calls 5221->5224 5226 4022e2 5221->5226 5223 401423 24 API calls 5222->5223 5223->5226 5225 4016a5 5224->5225 5225->5226 5227 405ed6 36 API calls 5225->5227 5227->5222 4568 40216b 4569 402bce 17 API calls 4568->4569 4570 402172 4569->4570 4571 402bce 17 API calls 4570->4571 4572 40217c 4571->4572 4573 402bce 17 API calls 4572->4573 4574 402186 4573->4574 4575 402bce 17 API calls 4574->4575 4576 402193 4575->4576 4577 402bce 17 API calls 4576->4577 4578 40219d 4577->4578 4579 4021df CoCreateInstance 4578->4579 4580 402bce 17 API calls 4578->4580 4583 4021fe 4579->4583 4585 4022ac 4579->4585 4580->4579 4582 4022e2 4584 40228c MultiByteToWideChar 4583->4584 4583->4585 4584->4585 4585->4582 4586 401423 4585->4586 4587 40521e 24 API calls 4586->4587 4588 401431 4587->4588 4588->4582 5228 4022eb 5229 402bce 17 API calls 5228->5229 5230 4022f1 5229->5230 5231 402bce 17 API calls 5230->5231 5232 4022fa 5231->5232 5233 402bce 17 API calls 5232->5233 5234 402303 5233->5234 5235 40646b 2 API calls 5234->5235 5236 40230c 5235->5236 5237 402310 5236->5237 5238 40231d lstrlenA lstrlenA 5236->5238 5239 40521e 24 API calls 5237->5239 5241 402318 5237->5241 5240 40521e 24 API calls 5238->5240 5239->5241 5242 402359 SHFileOperationA 5240->5242 5242->5237 5242->5241 5243 40266d 5244 402bac 17 API calls 5243->5244 5250 402677 5244->5250 5245 4026e5 5246 405d08 ReadFile 5246->5250 5247 4026e7 5252 406055 wsprintfA 5247->5252 5249 4026f7 5249->5245 5251 40270d SetFilePointer 5249->5251 5250->5245 5250->5246 5250->5247 5250->5249 5251->5245 5252->5245 5253 40236d 5254 402374 5253->5254 5256 402387 5253->5256 5255 40618a 17 API calls 5254->5255 5257 402381 5255->5257 5257->5256 5258 405813 MessageBoxIndirectA 5257->5258 5258->5256 5259 6e7c15d1 5260 6e7c14bb GlobalFree 5259->5260 5263 6e7c15e9 5260->5263 5261 6e7c162f GlobalFree 5262 6e7c1604 5262->5261 5263->5261 5263->5262 5264 6e7c161b VirtualFree 5263->5264 5264->5261 5265 4019ed 5266 402bce 17 API calls 5265->5266 5267 4019f4 5266->5267 5268 402bce 17 API calls 5267->5268 5269 4019fd 5268->5269 5270 401a04 lstrcmpiA 5269->5270 5271 401a16 lstrcmpA 5269->5271 5272 401a0a 5270->5272 5271->5272 5273 40296e 5274 402bac 17 API calls 5273->5274 5275 402974 5274->5275 5276 4029af 5275->5276 5277 4027bf 5275->5277 5279 402986 5275->5279 5276->5277 5278 40618a 17 API calls 5276->5278 5278->5277 5279->5277 5281 406055 wsprintfA 5279->5281 5281->5277 5282 4014f4 SetForegroundWindow 5283 402a5a 5282->5283 4617 402476 4618 402bce 17 API calls 4617->4618 4619 402488 4618->4619 4620 402bce 17 API calls 4619->4620 4621 402492 4620->4621 4634 402c5e 4621->4634 4624 402a5a 4625 4024c7 4626 4024d3 4625->4626 4629 402bac 17 API calls 4625->4629 4630 4024f5 RegSetValueExA 4626->4630 4631 4030d8 31 API calls 4626->4631 4627 402bce 17 API calls 4628 4024c0 lstrlenA 4627->4628 4628->4625 4629->4626 4632 40250b RegCloseKey 4630->4632 4631->4630 4632->4624 4635 402c79 4634->4635 4638 405fab 4635->4638 4639 405fba 4638->4639 4640 4024a2 4639->4640 4641 405fc5 RegCreateKeyExA 4639->4641 4640->4624 4640->4625 4640->4627 4641->4640 5284 402777 5285 40277d 5284->5285 5286 402781 FindNextFileA 5285->5286 5288 402793 5285->5288 5287 4027d2 5286->5287 5286->5288 5290 4060f7 lstrcpynA 5287->5290 5290->5288 5291 401ef9 5292 402bce 17 API calls 5291->5292 5293 401eff 5292->5293 5294 402bce 17 API calls 5293->5294 5295 401f08 5294->5295 5296 402bce 17 API calls 5295->5296 5297 401f11 5296->5297 5298 402bce 17 API calls 5297->5298 5299 401f1a 5298->5299 5300 401423 24 API calls 5299->5300 5301 401f21 5300->5301 5308 4057d9 ShellExecuteExA 5301->5308 5303 4027bf 5304 401f5c 5304->5303 5305 406575 5 API calls 5304->5305 5306 401f76 CloseHandle 5305->5306 5306->5303 5308->5304 4696 401f7b 4697 402bce 17 API calls 4696->4697 4698 401f81 4697->4698 4699 40521e 24 API calls 4698->4699 4700 401f8b 4699->4700 4701 405796 2 API calls 4700->4701 4702 401f91 4701->4702 4703 4027bf 4702->4703 4709 401fb2 CloseHandle 4702->4709 4711 406575 WaitForSingleObject 4702->4711 4706 401fa6 4707 401fb4 4706->4707 4708 401fab 4706->4708 4707->4709 4716 406055 wsprintfA 4708->4716 4709->4703 4712 40658f 4711->4712 4713 4065a1 GetExitCodeProcess 4712->4713 4714 40653c 2 API calls 4712->4714 4713->4706 4715 406596 WaitForSingleObject 4714->4715 4715->4712 4716->4709 5309 401ffb 5310 402bce 17 API calls 5309->5310 5311 402002 5310->5311 5312 406500 5 API calls 5311->5312 5313 402011 5312->5313 5314 402029 GlobalAlloc 5313->5314 5317 402091 5313->5317 5315 40203d 5314->5315 5314->5317 5316 406500 5 API calls 5315->5316 5318 402044 5316->5318 5319 406500 5 API calls 5318->5319 5320 40204e 5319->5320 5320->5317 5324 406055 wsprintfA 5320->5324 5322 402085 5325 406055 wsprintfA 5322->5325 5324->5322 5325->5317 5326 4018fd 5327 401934 5326->5327 5328 402bce 17 API calls 5327->5328 5329 401939 5328->5329 5330 4058bf 67 API calls 5329->5330 5331 401942 5330->5331 5332 401000 5333 401037 BeginPaint GetClientRect 5332->5333 5334 40100c DefWindowProcA 5332->5334 5336 4010f3 5333->5336 5337 401179 5334->5337 5338 401073 CreateBrushIndirect FillRect DeleteObject 5336->5338 5339 4010fc 5336->5339 5338->5336 5340 401102 CreateFontIndirectA 5339->5340 5341 401167 EndPaint 5339->5341 5340->5341 5342 401112 6 API calls 5340->5342 5341->5337 5342->5341 5343 401900 5344 402bce 17 API calls 5343->5344 5345 401907 5344->5345 5346 405813 MessageBoxIndirectA 5345->5346 5347 401910 5346->5347 5348 404b80 GetDlgItem GetDlgItem 5349 404bd6 7 API calls 5348->5349 5356 404dfd 5348->5356 5350 404c72 SendMessageA 5349->5350 5351 404c7e DeleteObject 5349->5351 5350->5351 5352 404c89 5351->5352 5354 404cc0 5352->5354 5357 40618a 17 API calls 5352->5357 5353 404edf 5355 404f8b 5353->5355 5360 404df0 5353->5360 5365 404f38 SendMessageA 5353->5365 5358 40417b 18 API calls 5354->5358 5361 404f95 SendMessageA 5355->5361 5362 404f9d 5355->5362 5356->5353 5380 404e6c 5356->5380 5402 404ace SendMessageA 5356->5402 5363 404ca2 SendMessageA SendMessageA 5357->5363 5359 404cd4 5358->5359 5364 40417b 18 API calls 5359->5364 5367 4041e2 8 API calls 5360->5367 5361->5362 5372 404fb6 5362->5372 5373 404faf ImageList_Destroy 5362->5373 5377 404fc6 5362->5377 5363->5352 5381 404ce5 5364->5381 5365->5360 5370 404f4d SendMessageA 5365->5370 5366 404ed1 SendMessageA 5366->5353 5371 40518b 5367->5371 5369 40513f 5369->5360 5378 405151 ShowWindow GetDlgItem ShowWindow 5369->5378 5376 404f60 5370->5376 5374 404fbf GlobalFree 5372->5374 5372->5377 5373->5372 5374->5377 5375 404dbf GetWindowLongA SetWindowLongA 5379 404dd8 5375->5379 5386 404f71 SendMessageA 5376->5386 5377->5369 5396 405001 5377->5396 5407 404b4e 5377->5407 5378->5360 5382 404df5 5379->5382 5383 404ddd ShowWindow 5379->5383 5380->5353 5380->5366 5381->5375 5385 404d37 SendMessageA 5381->5385 5387 404dba 5381->5387 5389 404d75 SendMessageA 5381->5389 5390 404d89 SendMessageA 5381->5390 5401 4041b0 SendMessageA 5382->5401 5400 4041b0 SendMessageA 5383->5400 5385->5381 5386->5355 5387->5375 5387->5379 5389->5381 5390->5381 5392 40510b 5394 405121 5392->5394 5395 405115 InvalidateRect 5392->5395 5393 405045 5393->5392 5399 4050b9 SendMessageA SendMessageA 5393->5399 5394->5369 5416 404a89 5394->5416 5395->5394 5396->5393 5397 40502f SendMessageA 5396->5397 5397->5393 5399->5393 5400->5360 5401->5356 5403 404af1 GetMessagePos ScreenToClient SendMessageA 5402->5403 5404 404b2d SendMessageA 5402->5404 5405 404b25 5403->5405 5406 404b2a 5403->5406 5404->5405 5405->5380 5406->5404 5419 4060f7 lstrcpynA 5407->5419 5409 404b61 5420 406055 wsprintfA 5409->5420 5411 404b6b 5412 40140b 2 API calls 5411->5412 5413 404b74 5412->5413 5421 4060f7 lstrcpynA 5413->5421 5415 404b7b 5415->5396 5422 4049c4 5416->5422 5418 404a9e 5418->5369 5419->5409 5420->5411 5421->5415 5423 4049da 5422->5423 5424 40618a 17 API calls 5423->5424 5425 404a3e 5424->5425 5426 40618a 17 API calls 5425->5426 5427 404a49 5426->5427 5428 40618a 17 API calls 5427->5428 5429 404a5f lstrlenA wsprintfA SetDlgItemTextA 5428->5429 5429->5418 5430 6e7c103d 5433 6e7c101b 5430->5433 5434 6e7c14bb GlobalFree 5433->5434 5435 6e7c1020 5434->5435 5436 6e7c1024 5435->5436 5437 6e7c1027 GlobalAlloc 5435->5437 5438 6e7c14e2 3 API calls 5436->5438 5437->5436 5439 6e7c103b 5438->5439 5440 401502 5441 40150a 5440->5441 5443 40151d 5440->5443 5442 402bac 17 API calls 5441->5442 5442->5443 5444 6e7c1638 5445 6e7c1667 5444->5445 5446 6e7c1a98 18 API calls 5445->5446 5447 6e7c166e 5446->5447 5448 6e7c1675 5447->5448 5449 6e7c1681 5447->5449 5450 6e7c1266 2 API calls 5448->5450 5451 6e7c16a8 5449->5451 5452 6e7c168b 5449->5452 5456 6e7c167f 5450->5456 5454 6e7c16ae 5451->5454 5455 6e7c16d2 5451->5455 5453 6e7c14e2 3 API calls 5452->5453 5457 6e7c1690 5453->5457 5458 6e7c1559 3 API calls 5454->5458 5459 6e7c14e2 3 API calls 5455->5459 5460 6e7c1559 3 API calls 5457->5460 5461 6e7c16b3 5458->5461 5459->5456 5462 6e7c1696 5460->5462 5463 6e7c1266 2 API calls 5461->5463 5464 6e7c1266 2 API calls 5462->5464 5465 6e7c16b9 GlobalFree 5463->5465 5466 6e7c169c GlobalFree 5464->5466 5465->5456 5467 6e7c16cd GlobalFree 5465->5467 5466->5456 5467->5456 5468 402604 5469 402bce 17 API calls 5468->5469 5470 40260b 5469->5470 5473 405c90 GetFileAttributesA CreateFileA 5470->5473 5472 402617 5473->5472 3990 401b87 3991 401b94 3990->3991 3992 401bd8 3990->3992 3993 401c1c 3991->3993 3998 401bab 3991->3998 3994 401c01 GlobalAlloc 3992->3994 3995 401bdc 3992->3995 3997 40618a 17 API calls 3993->3997 4004 402387 3993->4004 3996 40618a 17 API calls 3994->3996 3995->4004 4011 4060f7 lstrcpynA 3995->4011 3996->3993 4000 402381 3997->4000 4009 4060f7 lstrcpynA 3998->4009 4000->4004 4012 405813 4000->4012 4002 401bee GlobalFree 4002->4004 4003 401bba 4010 4060f7 lstrcpynA 4003->4010 4007 401bc9 4016 4060f7 lstrcpynA 4007->4016 4009->4003 4010->4007 4011->4002 4013 405828 4012->4013 4014 405874 4013->4014 4015 40583c MessageBoxIndirectA 4013->4015 4014->4004 4015->4014 4016->4004 4556 402588 4557 402c0e 17 API calls 4556->4557 4558 402592 4557->4558 4559 402bac 17 API calls 4558->4559 4560 40259b 4559->4560 4561 4025a9 4560->4561 4562 4027bf 4560->4562 4563 4025c2 RegEnumValueA 4561->4563 4564 4025b6 RegEnumKeyA 4561->4564 4565 4025d7 4563->4565 4566 4025de RegCloseKey 4563->4566 4564->4566 4565->4566 4566->4562 5474 6e7c1837 5475 6e7c185a 5474->5475 5476 6e7c188a GlobalFree 5475->5476 5477 6e7c189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5475->5477 5476->5477 5478 6e7c1266 2 API calls 5477->5478 5479 6e7c1a1e GlobalFree GlobalFree 5478->5479 5480 40460d 5481 404639 5480->5481 5482 40464a 5480->5482 5541 4057f7 GetDlgItemTextA 5481->5541 5483 404656 GetDlgItem 5482->5483 5491 4046b5 5482->5491 5489 40466a 5483->5489 5485 404644 5486 4063d2 5 API calls 5485->5486 5486->5482 5487 404799 5490 404943 5487->5490 5543 4057f7 GetDlgItemTextA 5487->5543 5488 40467e SetWindowTextA 5495 40417b 18 API calls 5488->5495 5489->5488 5494 405b28 4 API calls 5489->5494 5493 4041e2 8 API calls 5490->5493 5491->5487 5491->5490 5496 40618a 17 API calls 5491->5496 5498 404957 5493->5498 5499 404674 5494->5499 5500 40469a 5495->5500 5501 404729 SHBrowseForFolderA 5496->5501 5497 4047c9 5502 405b7d 18 API calls 5497->5502 5499->5488 5506 405a8f 3 API calls 5499->5506 5503 40417b 18 API calls 5500->5503 5501->5487 5504 404741 CoTaskMemFree 5501->5504 5505 4047cf 5502->5505 5507 4046a8 5503->5507 5508 405a8f 3 API calls 5504->5508 5544 4060f7 lstrcpynA 5505->5544 5506->5488 5542 4041b0 SendMessageA 5507->5542 5511 40474e 5508->5511 5513 404785 SetDlgItemTextA 5511->5513 5517 40618a 17 API calls 5511->5517 5512 4046ae 5515 406500 5 API calls 5512->5515 5513->5487 5514 4047e6 5516 406500 5 API calls 5514->5516 5515->5491 5524 4047ed 5516->5524 5518 40476d lstrcmpiA 5517->5518 5518->5513 5520 40477e lstrcatA 5518->5520 5519 404829 5545 4060f7 lstrcpynA 5519->5545 5520->5513 5522 404830 5523 405b28 4 API calls 5522->5523 5525 404836 GetDiskFreeSpaceA 5523->5525 5524->5519 5528 405ad6 2 API calls 5524->5528 5529 404881 5524->5529 5527 40485a MulDiv 5525->5527 5525->5529 5527->5529 5528->5524 5530 4048f2 5529->5530 5531 404a89 20 API calls 5529->5531 5532 404915 5530->5532 5534 40140b 2 API calls 5530->5534 5533 4048df 5531->5533 5546 40419d KiUserCallbackDispatcher 5532->5546 5535 4048f4 SetDlgItemTextA 5533->5535 5536 4048e4 5533->5536 5534->5532 5535->5530 5538 4049c4 20 API calls 5536->5538 5538->5530 5539 404931 5539->5490 5540 404566 SendMessageA 5539->5540 5540->5490 5541->5485 5542->5512 5543->5497 5544->5514 5545->5522 5546->5539 5547 401490 5548 40521e 24 API calls 5547->5548 5549 401497 5548->5549 5550 405192 5551 4051a2 5550->5551 5552 4051b6 5550->5552 5554 4051ff 5551->5554 5555 4051a8 5551->5555 5553 4051be IsWindowVisible 5552->5553 5561 4051d5 5552->5561 5553->5554 5557 4051cb 5553->5557 5558 405204 CallWindowProcA 5554->5558 5556 4041c7 SendMessageA 5555->5556 5559 4051b2 5556->5559 5560 404ace 5 API calls 5557->5560 5558->5559 5560->5561 5561->5558 5562 404b4e 4 API calls 5561->5562 5562->5554 4642 402516 4643 402c0e 17 API calls 4642->4643 4644 402520 4643->4644 4645 402bce 17 API calls 4644->4645 4646 402529 4645->4646 4647 402533 RegQueryValueExA 4646->4647 4652 4027bf 4646->4652 4648 402559 RegCloseKey 4647->4648 4649 402553 4647->4649 4648->4652 4649->4648 4653 406055 wsprintfA 4649->4653 4653->4648 4787 40239c 4788 4023a4 4787->4788 4789 4023aa 4787->4789 4790 402bce 17 API calls 4788->4790 4791 4023ba 4789->4791 4792 402bce 17 API calls 4789->4792 4790->4789 4793 4023c8 4791->4793 4795 402bce 17 API calls 4791->4795 4792->4791 4794 402bce 17 API calls 4793->4794 4796 4023d1 WritePrivateProfileStringA 4794->4796 4795->4793 4797 40209d 4798 40215d 4797->4798 4799 4020af 4797->4799 4801 401423 24 API calls 4798->4801 4800 402bce 17 API calls 4799->4800 4802 4020b6 4800->4802 4807 4022e2 4801->4807 4803 402bce 17 API calls 4802->4803 4804 4020bf 4803->4804 4805 4020d4 LoadLibraryExA 4804->4805 4806 4020c7 GetModuleHandleA 4804->4806 4805->4798 4808 4020e4 GetProcAddress 4805->4808 4806->4805 4806->4808 4809 402130 4808->4809 4810 4020f3 4808->4810 4811 40521e 24 API calls 4809->4811 4812 402112 4810->4812 4813 4020fb 4810->4813 4815 402103 4811->4815 4819 6e7c1215 GlobalAlloc 4812->4819 4820 6e7c16db 4812->4820 4814 401423 24 API calls 4813->4814 4814->4815 4815->4807 4816 402151 FreeLibrary 4815->4816 4816->4807 4819->4815 4821 6e7c170b 4820->4821 4860 6e7c1a98 4821->4860 4823 6e7c1712 4824 6e7c171d 4823->4824 4825 6e7c1834 4823->4825 4826 6e7c1729 4824->4826 4894 6e7c22af 4824->4894 4825->4815 4898 6e7c22f1 4826->4898 4830 6e7c178e 4836 6e7c17dc 4830->4836 4837 6e7c1794 4830->4837 4831 6e7c1770 4920 6e7c24d8 4831->4920 4832 6e7c1759 4845 6e7c174f 4832->4845 4917 6e7c2cc3 4832->4917 4833 6e7c1740 4835 6e7c1746 4833->4835 4842 6e7c1751 4833->4842 4835->4845 4907 6e7c2a38 4835->4907 4840 6e7c24d8 11 API calls 4836->4840 4936 6e7c156b 4837->4936 4846 6e7c17cd 4840->4846 4841 6e7c1776 4931 6e7c1559 4841->4931 4911 6e7c26b2 4842->4911 4845->4830 4845->4831 4851 6e7c1823 4846->4851 4942 6e7c249e 4846->4942 4849 6e7c24d8 11 API calls 4849->4846 4851->4825 4853 6e7c182d GlobalFree 4851->4853 4852 6e7c1266 2 API calls 4855 6e7c1782 GlobalFree 4852->4855 4853->4825 4855->4846 4857 6e7c180f 4857->4851 4858 6e7c14e2 3 API calls 4857->4858 4858->4851 4859 6e7c1808 FreeLibrary 4859->4857 4946 6e7c1215 GlobalAlloc 4860->4946 4862 6e7c1abf 4947 6e7c1215 GlobalAlloc 4862->4947 4864 6e7c1d00 GlobalFree GlobalFree GlobalFree 4865 6e7c1d1d 4864->4865 4883 6e7c1d67 4864->4883 4867 6e7c20f1 4865->4867 4875 6e7c1d32 4865->4875 4865->4883 4866 6e7c1bbd GlobalAlloc 4886 6e7c1aca 4866->4886 4868 6e7c2113 GetModuleHandleA 4867->4868 4867->4883 4871 6e7c2139 4868->4871 4872 6e7c2124 LoadLibraryA 4868->4872 4869 6e7c1c08 lstrcpyA 4874 6e7c1c12 lstrcpyA 4869->4874 4870 6e7c1c26 GlobalFree 4870->4886 4954 6e7c15c2 GetProcAddress 4871->4954 4872->4871 4872->4883 4874->4886 4875->4883 4950 6e7c1224 4875->4950 4876 6e7c218a 4880 6e7c2197 lstrlenA 4876->4880 4876->4883 4877 6e7c1fb7 4953 6e7c1215 GlobalAlloc 4877->4953 4955 6e7c15c2 GetProcAddress 4880->4955 4881 6e7c1ef9 GlobalFree 4881->4886 4882 6e7c2033 4882->4883 4891 6e7c208c lstrcpyA 4882->4891 4883->4823 4884 6e7c214b 4884->4876 4892 6e7c2174 GetProcAddress 4884->4892 4886->4864 4886->4866 4886->4869 4886->4870 4886->4874 4886->4877 4886->4881 4886->4882 4886->4883 4887 6e7c1224 2 API calls 4886->4887 4888 6e7c1c64 4886->4888 4887->4886 4888->4886 4948 6e7c1534 GlobalSize GlobalAlloc 4888->4948 4889 6e7c21b0 4889->4883 4891->4883 4892->4876 4893 6e7c1fbf 4893->4823 4895 6e7c22c4 4894->4895 4896 6e7c22ee 4895->4896 4897 6e7c22cf GlobalAlloc 4895->4897 4896->4826 4897->4895 4899 6e7c230a 4898->4899 4901 6e7c2446 GlobalFree 4899->4901 4902 6e7c23b8 GlobalAlloc MultiByteToWideChar 4899->4902 4905 6e7c1224 GlobalAlloc lstrcpynA 4899->4905 4957 6e7c12ad 4899->4957 4961 6e7c2646 4899->4961 4901->4899 4903 6e7c1730 4901->4903 4902->4899 4904 6e7c23e4 GlobalAlloc CLSIDFromString GlobalFree 4902->4904 4903->4832 4903->4833 4903->4845 4904->4901 4905->4899 4910 6e7c2a4a 4907->4910 4909 6e7c2bd9 4909->4845 4964 6e7c29e4 4910->4964 4915 6e7c26e2 4911->4915 4912 6e7c277d GlobalAlloc 4916 6e7c27a0 4912->4916 4913 6e7c2790 4914 6e7c2796 GlobalSize 4913->4914 4913->4916 4914->4916 4915->4912 4915->4913 4916->4845 4918 6e7c2cce 4917->4918 4919 6e7c2d0e GlobalFree 4918->4919 4968 6e7c1215 GlobalAlloc 4920->4968 4922 6e7c2598 WideCharToMultiByte 4925 6e7c24e4 4922->4925 4923 6e7c2574 StringFromGUID2 WideCharToMultiByte 4923->4925 4924 6e7c2563 lstrcpynA 4924->4925 4925->4922 4925->4923 4925->4924 4926 6e7c25b9 wsprintfA 4925->4926 4927 6e7c25dd GlobalFree 4925->4927 4928 6e7c2617 GlobalFree 4925->4928 4929 6e7c1266 2 API calls 4925->4929 4969 6e7c12d1 4925->4969 4926->4925 4927->4925 4928->4841 4929->4925 4973 6e7c1215 GlobalAlloc 4931->4973 4933 6e7c155e 4934 6e7c156b 2 API calls 4933->4934 4935 6e7c1568 4934->4935 4935->4852 4937 6e7c15a4 lstrcpyA 4936->4937 4938 6e7c1577 wsprintfA 4936->4938 4941 6e7c15bd 4937->4941 4938->4941 4941->4849 4943 6e7c24ac 4942->4943 4944 6e7c17ef 4942->4944 4943->4944 4945 6e7c24c5 GlobalFree 4943->4945 4944->4857 4944->4859 4945->4943 4946->4862 4947->4886 4949 6e7c1552 4948->4949 4949->4888 4956 6e7c1215 GlobalAlloc 4950->4956 4952 6e7c1233 lstrcpynA 4952->4883 4953->4893 4954->4884 4955->4889 4956->4952 4958 6e7c12b4 4957->4958 4959 6e7c1224 2 API calls 4958->4959 4960 6e7c12cf 4959->4960 4960->4899 4962 6e7c26aa 4961->4962 4963 6e7c2654 VirtualAlloc 4961->4963 4962->4899 4963->4962 4965 6e7c29ef 4964->4965 4966 6e7c29ff 4965->4966 4967 6e7c29f4 GetLastError 4965->4967 4966->4909 4967->4966 4968->4925 4970 6e7c12f9 4969->4970 4971 6e7c12da 4969->4971 4970->4925 4971->4970 4972 6e7c12e0 lstrcpyA 4971->4972 4972->4970 4973->4933 4974 6e7c2921 4975 6e7c2971 4974->4975 4976 6e7c2931 VirtualProtect 4974->4976 4976->4975 4977 40159d 4978 402bce 17 API calls 4977->4978 4979 4015a4 SetFileAttributesA 4978->4979 4980 4015b6 4979->4980 5563 40149d 5564 402387 5563->5564 5565 4014ab PostQuitMessage 5563->5565 5565->5564 5566 401a1e 5567 402bce 17 API calls 5566->5567 5568 401a27 ExpandEnvironmentStringsA 5567->5568 5569 401a3b 5568->5569 5571 401a4e 5568->5571 5570 401a40 lstrcmpA 5569->5570 5569->5571 5570->5571 4981 40171f 4982 402bce 17 API calls 4981->4982 4983 401726 SearchPathA 4982->4983 4984 401741 4983->4984 5577 401d1f 5578 402bac 17 API calls 5577->5578 5579 401d26 5578->5579 5580 402bac 17 API calls 5579->5580 5581 401d32 GetDlgItem 5580->5581 5582 402620 5581->5582 3866 402421 3867 402453 3866->3867 3868 402428 3866->3868 3878 402bce 3867->3878 3888 402c0e 3868->3888 3873 402439 3875 402bce 17 API calls 3873->3875 3877 402440 RegDeleteValueA RegCloseKey 3875->3877 3876 402467 3877->3876 3879 402bda 3878->3879 3893 40618a 3879->3893 3882 40245a 3884 402c8c 3882->3884 3885 402c98 3884->3885 3886 402c9f 3884->3886 3885->3876 3886->3885 3935 402cd0 3886->3935 3889 402bce 17 API calls 3888->3889 3890 402c25 3889->3890 3891 405f7d RegOpenKeyExA 3890->3891 3892 40242f 3891->3892 3892->3873 3892->3876 3908 406197 3893->3908 3894 4063b9 3895 402bfb 3894->3895 3926 4060f7 lstrcpynA 3894->3926 3895->3882 3910 4063d2 3895->3910 3897 406393 lstrlenA 3897->3908 3898 40618a 10 API calls 3898->3897 3901 4062af GetSystemDirectoryA 3901->3908 3903 4062c2 GetWindowsDirectoryA 3903->3908 3904 4063d2 5 API calls 3904->3908 3905 40618a 10 API calls 3905->3908 3906 40633c lstrcatA 3906->3908 3907 4062f6 SHGetSpecialFolderLocation 3907->3908 3909 40630e SHGetPathFromIDListA CoTaskMemFree 3907->3909 3908->3894 3908->3897 3908->3898 3908->3901 3908->3903 3908->3904 3908->3905 3908->3906 3908->3907 3919 405fde 3908->3919 3924 406055 wsprintfA 3908->3924 3925 4060f7 lstrcpynA 3908->3925 3909->3908 3917 4063de 3910->3917 3911 406446 3912 40644a CharPrevA 3911->3912 3914 406465 3911->3914 3912->3911 3913 40643b CharNextA 3913->3911 3913->3917 3914->3882 3916 406429 CharNextA 3916->3917 3917->3911 3917->3913 3917->3916 3918 406436 CharNextA 3917->3918 3931 405aba 3917->3931 3918->3913 3927 405f7d 3919->3927 3922 406012 RegQueryValueExA RegCloseKey 3923 406041 3922->3923 3923->3908 3924->3908 3925->3908 3926->3895 3928 405f8c 3927->3928 3929 405f90 3928->3929 3930 405f95 RegOpenKeyExA 3928->3930 3929->3922 3929->3923 3930->3929 3932 405ac0 3931->3932 3933 405ad3 3932->3933 3934 405ac6 CharNextA 3932->3934 3933->3917 3934->3932 3936 405f7d RegOpenKeyExA 3935->3936 3937 402cfe 3936->3937 3938 402db3 3937->3938 3939 402d08 3937->3939 3938->3885 3940 402d0e RegEnumValueA 3939->3940 3947 402d31 3939->3947 3941 402d98 RegCloseKey 3940->3941 3940->3947 3941->3938 3942 402d6d RegEnumKeyA 3943 402d76 RegCloseKey 3942->3943 3942->3947 3950 406500 GetModuleHandleA 3943->3950 3945 402cd0 6 API calls 3945->3947 3947->3941 3947->3942 3947->3943 3947->3945 3948 402da8 3948->3938 3949 402d8a RegDeleteKeyA 3949->3938 3951 406526 GetProcAddress 3950->3951 3952 40651c 3950->3952 3955 402d86 3951->3955 3956 406492 GetSystemDirectoryA 3952->3956 3954 406522 3954->3951 3954->3955 3955->3948 3955->3949 3957 4064b4 wsprintfA LoadLibraryExA 3956->3957 3957->3954 3959 4027a1 3960 402bce 17 API calls 3959->3960 3961 4027a8 FindFirstFileA 3960->3961 3962 4027cb 3961->3962 3963 4027bb 3961->3963 3964 4027d2 3962->3964 3967 406055 wsprintfA 3962->3967 3968 4060f7 lstrcpynA 3964->3968 3967->3964 3968->3963 5583 402626 5584 40262b 5583->5584 5585 40263f 5583->5585 5586 402bac 17 API calls 5584->5586 5587 402bce 17 API calls 5585->5587 5588 402634 5586->5588 5589 402646 lstrlenA 5587->5589 5590 402668 5588->5590 5591 405d37 WriteFile 5588->5591 5589->5588 5591->5590 4017 403ca7 4018 403dfa 4017->4018 4019 403cbf 4017->4019 4021 403e4b 4018->4021 4022 403e0b GetDlgItem GetDlgItem 4018->4022 4019->4018 4020 403ccb 4019->4020 4023 403cd6 SetWindowPos 4020->4023 4024 403ce9 4020->4024 4026 403ea5 4021->4026 4031 401389 2 API calls 4021->4031 4025 40417b 18 API calls 4022->4025 4023->4024 4028 403d06 4024->4028 4029 403cee ShowWindow 4024->4029 4030 403e35 SetClassLongA 4025->4030 4047 403df5 4026->4047 4088 4041c7 4026->4088 4032 403d28 4028->4032 4033 403d0e DestroyWindow 4028->4033 4029->4028 4034 40140b 2 API calls 4030->4034 4035 403e7d 4031->4035 4036 403d2d SetWindowLongA 4032->4036 4037 403d3e 4032->4037 4087 404104 4033->4087 4034->4021 4035->4026 4038 403e81 SendMessageA 4035->4038 4036->4047 4041 403de7 4037->4041 4042 403d4a GetDlgItem 4037->4042 4038->4047 4039 40140b 2 API calls 4057 403eb7 4039->4057 4040 404106 DestroyWindow EndDialog 4040->4087 4110 4041e2 4041->4110 4043 403d7a 4042->4043 4044 403d5d SendMessageA IsWindowEnabled 4042->4044 4049 403d87 4043->4049 4050 403dce SendMessageA 4043->4050 4051 403d9a 4043->4051 4061 403d7f 4043->4061 4044->4043 4044->4047 4046 404135 ShowWindow 4046->4047 4048 40618a 17 API calls 4048->4057 4049->4050 4049->4061 4050->4041 4054 403da2 4051->4054 4055 403db7 4051->4055 4053 40417b 18 API calls 4053->4057 4104 40140b 4054->4104 4058 40140b 2 API calls 4055->4058 4056 403db5 4056->4041 4057->4039 4057->4040 4057->4047 4057->4048 4057->4053 4078 404046 DestroyWindow 4057->4078 4091 40417b 4057->4091 4060 403dbe 4058->4060 4060->4041 4060->4061 4107 404154 4061->4107 4063 403f32 GetDlgItem 4064 403f47 4063->4064 4065 403f4f ShowWindow KiUserCallbackDispatcher 4063->4065 4064->4065 4094 40419d KiUserCallbackDispatcher 4065->4094 4067 403f79 EnableWindow 4072 403f8d 4067->4072 4068 403f92 GetSystemMenu EnableMenuItem SendMessageA 4069 403fc2 SendMessageA 4068->4069 4068->4072 4069->4072 4072->4068 4095 4041b0 SendMessageA 4072->4095 4096 403c88 4072->4096 4099 4060f7 lstrcpynA 4072->4099 4074 403ff1 lstrlenA 4075 40618a 17 API calls 4074->4075 4076 404002 SetWindowTextA 4075->4076 4100 401389 4076->4100 4079 404060 CreateDialogParamA 4078->4079 4078->4087 4080 404093 4079->4080 4079->4087 4081 40417b 18 API calls 4080->4081 4082 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4081->4082 4083 401389 2 API calls 4082->4083 4084 4040e4 4083->4084 4084->4047 4085 4040ec ShowWindow 4084->4085 4086 4041c7 SendMessageA 4085->4086 4086->4087 4087->4046 4087->4047 4089 4041d0 SendMessageA 4088->4089 4090 4041df 4088->4090 4089->4090 4090->4057 4092 40618a 17 API calls 4091->4092 4093 404186 SetDlgItemTextA 4092->4093 4093->4063 4094->4067 4095->4072 4097 40618a 17 API calls 4096->4097 4098 403c96 SetWindowTextA 4097->4098 4098->4072 4099->4074 4102 401390 4100->4102 4101 4013fe 4101->4057 4102->4101 4103 4013cb MulDiv SendMessageA 4102->4103 4103->4102 4105 401389 2 API calls 4104->4105 4106 401420 4105->4106 4106->4061 4108 404161 SendMessageA 4107->4108 4109 40415b 4107->4109 4108->4056 4109->4108 4111 4042a5 4110->4111 4112 4041fa GetWindowLongA 4110->4112 4111->4047 4112->4111 4113 40420f 4112->4113 4113->4111 4114 40423c GetSysColor 4113->4114 4115 40423f 4113->4115 4114->4115 4116 404245 SetTextColor 4115->4116 4117 40424f SetBkMode 4115->4117 4116->4117 4118 404267 GetSysColor 4117->4118 4119 40426d 4117->4119 4118->4119 4120 404274 SetBkColor 4119->4120 4121 40427e 4119->4121 4120->4121 4121->4111 4122 404291 DeleteObject 4121->4122 4123 404298 CreateBrushIndirect 4121->4123 4122->4123 4123->4111 4124 6e7c101b 4131 6e7c14bb 4124->4131 4126 6e7c1020 4127 6e7c1024 4126->4127 4128 6e7c1027 GlobalAlloc 4126->4128 4135 6e7c14e2 wsprintfA 4127->4135 4128->4127 4133 6e7c14c1 4131->4133 4132 6e7c14c7 4132->4126 4133->4132 4134 6e7c14d3 GlobalFree 4133->4134 4134->4126 4138 6e7c1266 4135->4138 4139 6e7c126f GlobalAlloc lstrcpynA 4138->4139 4140 6e7c103b 4138->4140 4139->4140 5592 40272b 5593 402732 5592->5593 5595 4029aa 5592->5595 5594 402bac 17 API calls 5593->5594 5596 402739 5594->5596 5597 402748 SetFilePointer 5596->5597 5597->5595 5598 402758 5597->5598 5600 406055 wsprintfA 5598->5600 5600->5595 4589 401c2e 4590 402bac 17 API calls 4589->4590 4591 401c35 4590->4591 4592 402bac 17 API calls 4591->4592 4593 401c42 4592->4593 4594 401c57 4593->4594 4595 402bce 17 API calls 4593->4595 4596 401c67 4594->4596 4597 402bce 17 API calls 4594->4597 4595->4594 4598 401c72 4596->4598 4599 401cbe 4596->4599 4597->4596 4601 402bac 17 API calls 4598->4601 4600 402bce 17 API calls 4599->4600 4602 401cc3 4600->4602 4603 401c77 4601->4603 4604 402bce 17 API calls 4602->4604 4605 402bac 17 API calls 4603->4605 4607 401ccc FindWindowExA 4604->4607 4606 401c83 4605->4606 4608 401c90 SendMessageTimeoutA 4606->4608 4609 401cae SendMessageA 4606->4609 4610 401cea 4607->4610 4608->4610 4609->4610 5601 4042b1 lstrcpynA lstrlenA 5602 401e35 GetDC 5603 402bac 17 API calls 5602->5603 5604 401e47 GetDeviceCaps MulDiv ReleaseDC 5603->5604 5605 402bac 17 API calls 5604->5605 5606 401e78 5605->5606 5607 40618a 17 API calls 5606->5607 5608 401eb5 CreateFontIndirectA 5607->5608 5609 402620 5608->5609 5610 402a35 SendMessageA 5611 402a5a 5610->5611 5612 402a4f InvalidateRect 5610->5612 5612->5611 5613 4014b7 5614 4014bd 5613->5614 5615 401389 2 API calls 5614->5615 5616 4014c5 5615->5616 5617 402dba 5618 402dc9 SetTimer 5617->5618 5620 402de2 5617->5620 5618->5620 5619 402e37 5620->5619 5621 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5620->5621 5621->5619 4717 4015bb 4718 402bce 17 API calls 4717->4718 4719 4015c2 4718->4719 4720 405b28 4 API calls 4719->4720 4735 4015ca 4720->4735 4721 401624 4723 401652 4721->4723 4724 401629 4721->4724 4722 405aba CharNextA 4722->4735 4726 401423 24 API calls 4723->4726 4725 401423 24 API calls 4724->4725 4727 401630 4725->4727 4732 40164a 4726->4732 4736 4060f7 lstrcpynA 4727->4736 4728 405761 2 API calls 4728->4735 4730 40577e 5 API calls 4730->4735 4731 40163b SetCurrentDirectoryA 4731->4732 4733 40160c GetFileAttributesA 4733->4735 4734 4056e4 4 API calls 4734->4735 4735->4721 4735->4722 4735->4728 4735->4730 4735->4733 4735->4734 4736->4731 5622 4016bb 5623 402bce 17 API calls 5622->5623 5624 4016c1 GetFullPathNameA 5623->5624 5625 4016d8 5624->5625 5631 4016f9 5624->5631 5628 40646b 2 API calls 5625->5628 5625->5631 5626 402a5a 5627 40170d GetShortPathNameA 5627->5626 5629 4016e9 5628->5629 5629->5631 5632 4060f7 lstrcpynA 5629->5632 5631->5626 5631->5627 5632->5631 5633 6e7c1000 5634 6e7c101b 5 API calls 5633->5634 5635 6e7c1019 5634->5635

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 7 403393 1->7 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 7->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 21 4033da 17->21 21->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 31 403470-403478 29->31 32 40346a-40346e 29->32 33 403542-40355c GetTempPathA call 403317 30->33 34 403480-403483 31->34 35 40347a-40347b 31->35 32->31 32->32 42 4035b4-4035ce DeleteFileA call 402ea1 33->42 43 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 33->43 37 403515-403522 call 405aba 34->37 38 403489-40348d 34->38 35->34 37->28 53 403524 37->53 40 4034a5-4034d2 38->40 41 40348f-403495 38->41 49 4034d4-4034da 40->49 50 4034e5-403513 40->50 47 403497-403499 41->47 48 40349b 41->48 58 403662-403672 call 403830 OleUninitialize 42->58 59 4035d4-4035da 42->59 43->42 61 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 43->61 47->40 47->48 48->40 54 4034e0 49->54 55 4034dc-4034de 49->55 50->37 57 403531-40353d call 4060f7 50->57 53->28 54->50 55->50 55->54 57->33 72 403796-40379c 58->72 73 403678-403688 call 405813 ExitProcess 58->73 62 403652-403659 call 40390a 59->62 63 4035dc-4035e7 call 405aba 59->63 61->42 61->58 70 40365e 62->70 74 4035e9-403612 63->74 75 40361d-403627 63->75 70->58 77 403818-403820 72->77 78 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->78 79 403614-403616 74->79 82 403629-403636 call 405b7d 75->82 83 40368e-4036a2 call 40577e lstrcatA 75->83 80 403822 77->80 81 403826-40382a ExitProcess 77->81 85 4037e9-4037f7 call 406500 78->85 86 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 88 403618-40361b 79->88 80->81 82->58 96 403638-40364e call 4060f7 * 2 82->96 97 4036a4-4036aa lstrcatA 83->97 98 4036af-4036c9 lstrcatA lstrcmpiA 83->98 94 403805-40380f ExitWindowsEx 85->94 95 4037f9-403803 85->95 86->85 88->75 88->79 94->77 100 403811-403813 call 40140b 94->100 95->94 95->100 96->62 97->98 98->58 99 4036cb-4036ce 98->99 102 4036d0-4036d5 call 4056e4 99->102 103 4036d7 call 405761 99->103 100->77 112 4036dc-4036e9 SetCurrentDirectoryA 102->112 103->112 113 4036f6-40371e call 4060f7 112->113 114 4036eb-4036f1 call 4060f7 112->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 124 40378a-403791 call 405ed6 121->124 122->121 123 403754-403774 call 405ed6 call 40618a call 405796 122->123 123->121 133 403776-40377d CloseHandle 123->133 124->58 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 0040336D
                              • GetVersion.KERNEL32 ref: 00403373
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                              • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033E2
                              • OleInitialize.OLE32(00000000), ref: 004033E9
                              • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 00403405
                              • GetCommandLineA.KERNEL32(Gomerec Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 0040341A
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",00000020,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",00000000,?,00000007,00000009,0000000B), ref: 00403456
                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 00403553
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 00403564
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403570
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403584
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040358C
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040359D
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004035A5
                              • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 004035B9
                                • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\skolebetjents,1033,Gomerec Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Gomerec Setup: Installing,00000000,00000002,76233410), ref: 004039FA
                                • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                • Part of subcall function 0040390A: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\skolebetjents), ref: 00403A61
                                • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                • Part of subcall function 00403830: CloseHandle.KERNEL32(000002EC,00403667,?,?,00000007,00000009,0000000B), ref: 0040383B
                              • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403667
                              • ExitProcess.KERNEL32 ref: 00403688
                              • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004037A5
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                              • ExitProcess.KERNEL32 ref: 0040382A
                                • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                              • String ID: "$"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\skolebetjents$C:\Users\user\AppData\Local\skolebetjents\Unbegrudged$C:\Users\user\Desktop$C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe$Error launching installer$Gomerec Setup$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K$v$kernel32::EnumResourceTypesW(i 0,i r1,i 0)$~nsu
                              • API String ID: 3776617018-3621018858
                              • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                              • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                              • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                              • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 40535c-405378 135 405507-40550d 134->135 136 40537e-405445 GetDlgItem * 3 call 4041b0 call 404aa1 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 137 405537-405543 135->137 138 40550f-405531 GetDlgItem CreateThread FindCloseChangeNotification 135->138 154 405463-405466 136->154 155 405447-405461 SendMessageA * 2 136->155 141 405565-40556b 137->141 142 405545-40554b 137->142 138->137 146 4055c0-4055c3 141->146 147 40556d-405573 141->147 144 405586-40558d call 4041e2 142->144 145 40554d-405560 ShowWindow * 2 call 4041b0 142->145 158 405592-405596 144->158 145->141 146->144 149 4055c5-4055cb 146->149 151 405575-405581 call 404154 147->151 152 405599-4055a9 ShowWindow 147->152 149->144 156 4055cd-4055e0 SendMessageA 149->156 151->144 159 4055b9-4055bb call 404154 152->159 160 4055ab-4055b4 call 40521e 152->160 162 405476-40548d call 40417b 154->162 163 405468-405474 SendMessageA 154->163 155->154 164 4055e6-405612 CreatePopupMenu call 40618a AppendMenuA 156->164 165 4056dd-4056df 156->165 159->146 160->159 173 4054c3-4054e4 GetDlgItem SendMessageA 162->173 174 40548f-4054a3 ShowWindow 162->174 163->162 171 405614-405624 GetWindowRect 164->171 172 405627-40563d TrackPopupMenu 164->172 165->158 171->172 172->165 175 405643-40565d 172->175 173->165 178 4054ea-405502 SendMessageA * 2 173->178 176 4054b2 174->176 177 4054a5-4054b0 ShowWindow 174->177 179 405662-40567d SendMessageA 175->179 180 4054b8-4054be call 4041b0 176->180 177->180 178->165 179->179 181 40567f-40569f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->173 183 4056a1-4056c1 SendMessageA 181->183 183->183 184 4056c3-4056d7 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->165
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 004053BB
                              • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                              • GetClientRect.USER32(?,?), ref: 00405407
                              • GetSystemMetrics.USER32(00000002), ref: 0040540E
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405496
                              • ShowWindow.USER32(?,00000008), ref: 004054AA
                              • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                              • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                                • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                              • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                              • CreateThread.KERNELBASE(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405531
                              • ShowWindow.USER32(00000000), ref: 00405554
                              • ShowWindow.USER32(?,00000008), ref: 0040555B
                              • ShowWindow.USER32(00000008), ref: 004055A1
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                              • CreatePopupMenu.USER32 ref: 004055E6
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055FB
                              • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                              • OpenClipboard.USER32(00000000), ref: 00405680
                              • EmptyClipboard.USER32 ref: 00405686
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 0040568F
                              • GlobalLock.KERNEL32(00000000), ref: 00405699
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                              • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                              • SetClipboardData.USER32(00000001,00000000), ref: 004056D1
                              • CloseClipboard.USER32 ref: 004056D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                              • String ID: <J$Gomerec Setup: Installing
                              • API String ID: 4154960007-1016820093
                              • Opcode ID: c436c8918fb38c7b5545f7f1a6554f2816d857099955c46476942f2c38664fdc
                              • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                              • Opcode Fuzzy Hash: c436c8918fb38c7b5545f7f1a6554f2816d857099955c46476942f2c38664fdc
                              • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                              APIs
                                • Part of subcall function 6E7C1215: GlobalAlloc.KERNELBASE(00000040,6E7C1233,?,6E7C12CF,-6E7C404B,6E7C11AB,-000000A0), ref: 6E7C121D
                              • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 6E7C1BC4
                              • lstrcpyA.KERNEL32(00000008,?), ref: 6E7C1C0C
                              • lstrcpyA.KERNEL32(00000408,?), ref: 6E7C1C16
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C1C29
                              • GlobalFree.KERNEL32(?), ref: 6E7C1D09
                              • GlobalFree.KERNEL32(?), ref: 6E7C1D0E
                              • GlobalFree.KERNEL32(?), ref: 6E7C1D13
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C1EFA
                              • lstrcpyA.KERNEL32(?,?), ref: 6E7C2098
                              • GetModuleHandleA.KERNEL32(00000008), ref: 6E7C2114
                              • LoadLibraryA.KERNEL32(00000008), ref: 6E7C2125
                              • GetProcAddress.KERNEL32(?,?), ref: 6E7C217E
                              • lstrlenA.KERNEL32(00000408), ref: 6E7C2198
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                              • String ID:
                              • API String ID: 245916457-0
                              • Opcode ID: 973fa8b33d970817009749ae1f1f439147e910a9bf2bb1c137a9868f192baefd
                              • Instruction ID: 7f8d2311f37e1c439067df3f69177e6e3386671116ef0d04a24e6b3c5da2695a
                              • Opcode Fuzzy Hash: 973fa8b33d970817009749ae1f1f439147e910a9bf2bb1c137a9868f192baefd
                              • Instruction Fuzzy Hash: EB22CC7190464A9FDB60CFE986943EDBBFCBB06B05F10853AD1A5A32A0DB704589CF52

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 714 4058bf-4058e5 call 405b7d 717 4058e7-4058f9 DeleteFileA 714->717 718 4058fe-405905 714->718 719 405a88-405a8c 717->719 720 405907-405909 718->720 721 405918-405928 call 4060f7 718->721 722 405a36-405a3b 720->722 723 40590f-405912 720->723 729 405937-405938 call 405ad6 721->729 730 40592a-405935 lstrcatA 721->730 722->719 725 405a3d-405a40 722->725 723->721 723->722 727 405a42-405a48 725->727 728 405a4a-405a52 call 40646b 725->728 727->719 728->719 737 405a54-405a68 call 405a8f call 405877 728->737 732 40593d-405940 729->732 730->732 735 405942-405949 732->735 736 40594b-405951 lstrcatA 732->736 735->736 738 405956-405974 lstrlenA FindFirstFileA 735->738 736->738 753 405a80-405a83 call 40521e 737->753 754 405a6a-405a6d 737->754 740 40597a-405991 call 405aba 738->740 741 405a2c-405a30 738->741 747 405993-405997 740->747 748 40599c-40599f 740->748 741->722 744 405a32 741->744 744->722 747->748 750 405999 747->750 751 4059a1-4059a6 748->751 752 4059b2-4059c0 call 4060f7 748->752 750->748 756 4059a8-4059aa 751->756 757 405a0b-405a1d FindNextFileA 751->757 764 4059c2-4059ca 752->764 765 4059d7-4059e2 call 405877 752->765 753->719 754->727 759 405a6f-405a7e call 40521e call 405ed6 754->759 756->752 760 4059ac-4059b0 756->760 757->740 762 405a23-405a26 FindClose 757->762 759->719 760->752 760->757 762->741 764->757 768 4059cc-4059d5 call 4058bf 764->768 773 405a03-405a06 call 40521e 765->773 774 4059e4-4059e7 765->774 768->757 773->757 776 4059e9-4059f9 call 40521e call 405ed6 774->776 777 4059fb-405a01 774->777 776->757 777->757
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058E8
                              • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405930
                              • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405951
                              • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405957
                              • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405968
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A15
                              • FindClose.KERNEL32(00000000), ref: 00405A26
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004058CC
                              • "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe", xrefs: 004058BF
                              • \*.*, xrefs: 0040592A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                              • API String ID: 2035342205-1207616540
                              • Opcode ID: f3fd74a69a70d8db6e57e20adcaf86135d1334a53a37cdeda7ffd007c5e38f1d
                              • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                              • Opcode Fuzzy Hash: f3fd74a69a70d8db6e57e20adcaf86135d1334a53a37cdeda7ffd007c5e38f1d
                              • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                              APIs
                              • CoCreateInstance.OLE32(00408524,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                              Strings
                              • C:\Users\user\AppData\Local\skolebetjents\Unbegrudged, xrefs: 00402230
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Local\skolebetjents\Unbegrudged
                              • API String ID: 123533781-732890835
                              • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                              • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                              • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                              • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                              APIs
                              • FindFirstFileA.KERNELBASE(76233410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\), ref: 00406476
                              • FindClose.KERNELBASE(00000000), ref: 00406482
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                              • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                              • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                              • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                              APIs
                              • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 004027B0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                              • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                              • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                              • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 185 403ca7-403cb9 186 403dfa-403e09 185->186 187 403cbf-403cc5 185->187 189 403e58-403e6d 186->189 190 403e0b-403e53 GetDlgItem * 2 call 40417b SetClassLongA call 40140b 186->190 187->186 188 403ccb-403cd4 187->188 191 403cd6-403ce3 SetWindowPos 188->191 192 403ce9-403cec 188->192 194 403ead-403eb2 call 4041c7 189->194 195 403e6f-403e72 189->195 190->189 191->192 197 403d06-403d0c 192->197 198 403cee-403d00 ShowWindow 192->198 204 403eb7-403ed2 194->204 200 403e74-403e7f call 401389 195->200 201 403ea5-403ea7 195->201 205 403d28-403d2b 197->205 206 403d0e-403d23 DestroyWindow 197->206 198->197 200->201 216 403e81-403ea0 SendMessageA 200->216 201->194 203 404148 201->203 211 40414a-404151 203->211 209 403ed4-403ed6 call 40140b 204->209 210 403edb-403ee1 204->210 214 403d2d-403d39 SetWindowLongA 205->214 215 403d3e-403d44 205->215 212 404125-40412b 206->212 209->210 219 404106-40411f DestroyWindow EndDialog 210->219 220 403ee7-403ef2 210->220 212->203 218 40412d-404133 212->218 214->211 221 403de7-403df5 call 4041e2 215->221 222 403d4a-403d5b GetDlgItem 215->222 216->211 218->203 226 404135-40413e ShowWindow 218->226 219->212 220->219 227 403ef8-403f45 call 40618a call 40417b * 3 GetDlgItem 220->227 221->211 223 403d7a-403d7d 222->223 224 403d5d-403d74 SendMessageA IsWindowEnabled 222->224 228 403d82-403d85 223->228 229 403d7f-403d80 223->229 224->203 224->223 226->203 255 403f47-403f4c 227->255 256 403f4f-403f8b ShowWindow KiUserCallbackDispatcher call 40419d EnableWindow 227->256 233 403d93-403d98 228->233 234 403d87-403d8d 228->234 232 403db0-403db5 call 404154 229->232 232->221 236 403dce-403de1 SendMessageA 233->236 238 403d9a-403da0 233->238 234->236 237 403d8f-403d91 234->237 236->221 237->232 241 403da2-403da8 call 40140b 238->241 242 403db7-403dc0 call 40140b 238->242 253 403dae 241->253 242->221 251 403dc2-403dcc 242->251 251->253 253->232 255->256 259 403f90 256->259 260 403f8d-403f8e 256->260 261 403f92-403fc0 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403fc2-403fd3 SendMessageA 261->262 263 403fd5 261->263 264 403fdb-404015 call 4041b0 call 403c88 call 4060f7 lstrlenA call 40618a SetWindowTextA call 401389 262->264 263->264 264->204 275 40401b-40401d 264->275 275->204 276 404023-404027 275->276 277 404046-40405a DestroyWindow 276->277 278 404029-40402f 276->278 277->212 280 404060-40408d CreateDialogParamA 277->280 278->203 279 404035-40403b 278->279 279->204 281 404041 279->281 280->212 282 404093-4040ea call 40417b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->203 282->203 287 4040ec-4040ff ShowWindow call 4041c7 282->287 289 404104 287->289 289->212
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE3
                              • ShowWindow.USER32(?), ref: 00403D00
                              • DestroyWindow.USER32 ref: 00403D14
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                              • GetDlgItem.USER32(?,?), ref: 00403D51
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                              • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                              • GetDlgItem.USER32(?,00000001), ref: 00403E1A
                              • GetDlgItem.USER32(?,00000002), ref: 00403E24
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E8F
                              • GetDlgItem.USER32(?,00000003), ref: 00403F35
                              • ShowWindow.USER32(00000000,?), ref: 00403F56
                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F68
                              • EnableWindow.USER32(?,?), ref: 00403F83
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F99
                              • EnableMenuItem.USER32(00000000), ref: 00403FA0
                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB8
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FCB
                              • lstrlenA.KERNEL32(Gomerec Setup: Installing,?,Gomerec Setup: Installing,00000000), ref: 00403FF5
                              • SetWindowTextA.USER32(?,Gomerec Setup: Installing), ref: 00404004
                              • ShowWindow.USER32(?,0000000A), ref: 00404138
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                              • String ID: <J$Gomerec Setup: Installing
                              • API String ID: 3282139019-1016820093
                              • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                              • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                              • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                              • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 290 40390a-403922 call 406500 293 403924-403934 call 406055 290->293 294 403936-403967 call 405fde 290->294 303 40398a-4039b3 call 403bcf call 405b7d 293->303 299 403969-40397a call 405fde 294->299 300 40397f-403985 lstrcatA 294->300 299->300 300->303 308 4039b9-4039be 303->308 309 403a3a-403a42 call 405b7d 303->309 308->309 311 4039c0-4039e4 call 405fde 308->311 315 403a50-403a75 LoadImageA 309->315 316 403a44-403a4b call 40618a 309->316 311->309 317 4039e6-4039e8 311->317 319 403af6-403afe call 40140b 315->319 320 403a77-403aa7 RegisterClassA 315->320 316->315 321 4039f9-403a05 lstrlenA 317->321 322 4039ea-4039f7 call 405aba 317->322 333 403b00-403b03 319->333 334 403b08-403b13 call 403bcf 319->334 323 403bc5 320->323 324 403aad-403af1 SystemParametersInfoA CreateWindowExA 320->324 328 403a07-403a15 lstrcmpiA 321->328 329 403a2d-403a35 call 405a8f call 4060f7 321->329 322->321 327 403bc7-403bce 323->327 324->319 328->329 332 403a17-403a21 GetFileAttributesA 328->332 329->309 336 403a23-403a25 332->336 337 403a27-403a28 call 405ad6 332->337 333->327 343 403b19-403b33 ShowWindow call 406492 334->343 344 403b9c-403b9d call 4052f0 334->344 336->329 336->337 337->329 349 403b35-403b3a call 406492 343->349 350 403b3f-403b51 GetClassInfoA 343->350 348 403ba2-403ba4 344->348 351 403ba6-403bac 348->351 352 403bbe-403bc0 call 40140b 348->352 349->350 355 403b53-403b63 GetClassInfoA RegisterClassA 350->355 356 403b69-403b8c DialogBoxParamA call 40140b 350->356 351->333 357 403bb2-403bb9 call 40140b 351->357 352->323 355->356 361 403b91-403b9a call 40385a 356->361 357->333 361->327
                              APIs
                                • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                              • lstrcatA.KERNEL32(1033,Gomerec Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Gomerec Setup: Installing,00000000,00000002,76233410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",00000000), ref: 00403985
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\skolebetjents,1033,Gomerec Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Gomerec Setup: Installing,00000000,00000002,76233410), ref: 004039FA
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                              • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\skolebetjents), ref: 00403A61
                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                              • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AB6
                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B21
                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                              • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                              • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                              • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\skolebetjents$Call$Control Panel\Desktop\ResourceLocale$Gomerec Setup: Installing$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 1975747703-2801895123
                              • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                              • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                              • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                              • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 364 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 367 402ef1-402ef6 364->367 368 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 364->368 369 4030d1-4030d5 367->369 376 403014-403022 call 402e3d 368->376 377 402f2f 368->377 383 403024-403027 376->383 384 403077-40307c 376->384 379 402f34-402f4b 377->379 381 402f4d 379->381 382 402f4f-402f58 call 4032ea 379->382 381->382 389 40307e-403086 call 402e3d 382->389 390 402f5e-402f65 382->390 387 403029-403041 call 403300 call 4032ea 383->387 388 40304b-403075 GlobalAlloc call 403300 call 4030d8 383->388 384->369 387->384 411 403043-403049 387->411 388->384 415 403088-403099 388->415 389->384 393 402fe1-402fe5 390->393 394 402f67-402f7b call 405c4b 390->394 401 402fe7-402fee call 402e3d 393->401 402 402fef-402ff5 393->402 394->402 413 402f7d-402f84 394->413 401->402 406 403004-40300c 402->406 407 402ff7-403001 call 4065b7 402->407 406->379 414 403012 406->414 407->406 411->384 411->388 413->402 417 402f86-402f8d 413->417 414->376 418 4030a1-4030a6 415->418 419 40309b 415->419 417->402 420 402f8f-402f96 417->420 421 4030a7-4030ad 418->421 419->418 420->402 422 402f98-402f9f 420->422 421->421 423 4030af-4030ca SetFilePointer call 405c4b 421->423 422->402 425 402fa1-402fc1 422->425 426 4030cf 423->426 425->384 427 402fc7-402fcb 425->427 426->369 428 402fd3-402fdb 427->428 429 402fcd-402fd1 427->429 428->402 430 402fdd-402fdf 428->430 429->414 429->428 430->402
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402EB2
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,00000400), ref: 00402ECE
                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,80000000,00000003), ref: 00405C94
                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                              • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,80000000,00000003), ref: 00402F1A
                              • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                              Strings
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403077
                              • @TA, xrefs: 00402F2F
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EA8
                              • Error launching installer, xrefs: 00402EF1
                              • soft, xrefs: 00402F8F
                              • C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe, xrefs: 00402EB8, 00402EC7, 00402EDB, 00402EFB
                              • Inst, xrefs: 00402F86
                              • "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe", xrefs: 00402EA1
                              • C:\Users\user\Desktop, xrefs: 00402EFC, 00402F01, 00402F07
                              • Null, xrefs: 00402F98
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"$@TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-970273323
                              • Opcode ID: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                              • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                              • Opcode Fuzzy Hash: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                              • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 431 40618a-406195 432 406197-4061a6 431->432 433 4061a8-4061be 431->433 432->433 434 4061c4-4061cf 433->434 435 4063af-4063b3 433->435 434->435 438 4061d5-4061dc 434->438 436 4061e1-4061eb 435->436 437 4063b9-4063c3 435->437 436->437 439 4061f1-4061f8 436->439 440 4063c5-4063c9 call 4060f7 437->440 441 4063ce-4063cf 437->441 438->435 442 4063a2 439->442 443 4061fe-406232 439->443 440->441 445 4063a4-4063aa 442->445 446 4063ac-4063ae 442->446 447 406238-406242 443->447 448 40634f-406352 443->448 445->435 446->435 449 406244-406248 447->449 450 40625c 447->450 451 406382-406385 448->451 452 406354-406357 448->452 449->450 453 40624a-40624e 449->453 456 406263-40626a 450->456 457 406393-4063a0 lstrlenA 451->457 458 406387-40638e call 40618a 451->458 454 406367-406373 call 4060f7 452->454 455 406359-406365 call 406055 452->455 453->450 460 406250-406254 453->460 469 406378-40637e 454->469 455->469 462 40626c-40626e 456->462 463 40626f-406271 456->463 457->435 458->457 460->450 465 406256-40625a 460->465 462->463 467 406273-40628e call 405fde 463->467 468 4062aa-4062ad 463->468 465->456 477 406293-406296 467->477 470 4062bd-4062c0 468->470 471 4062af-4062bb GetSystemDirectoryA 468->471 469->457 473 406380 469->473 475 4062c2-4062d0 GetWindowsDirectoryA 470->475 476 40632d-40632f 470->476 474 406331-406334 471->474 478 406347-40634d call 4063d2 473->478 474->478 479 406336-40633a 474->479 475->476 476->474 481 4062d2-4062dc 476->481 477->479 482 40629c-4062a5 call 40618a 477->482 478->457 479->478 484 40633c-406342 lstrcatA 479->484 486 4062f6-40630c SHGetSpecialFolderLocation 481->486 487 4062de-4062e1 481->487 482->474 484->478 490 40632a 486->490 491 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 486->491 487->486 489 4062e3-4062ea 487->489 492 4062f2-4062f4 489->492 490->476 491->474 491->490 492->474 492->486
                              APIs
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00405256,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000), ref: 004062C8
                              • SHGetSpecialFolderLocation.SHELL32(00405256,762323A0,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00405256,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000), ref: 00406304
                              • SHGetPathFromIDListA.SHELL32(762323A0,Call), ref: 00406312
                              • CoTaskMemFree.OLE32(762323A0), ref: 0040631E
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                              • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00405256,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00000000,00424248,762323A0), ref: 00406394
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$kernel32::EnumResourceTypesW(i 0,i r1,i 0)
                              • API String ID: 717251189-3321397117
                              • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                              • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                              • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                              • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 783 401759-40177c call 402bce call 405afc 788 401786-401798 call 4060f7 call 405a8f lstrcatA 783->788 789 40177e-401784 call 4060f7 783->789 795 40179d-4017a3 call 4063d2 788->795 789->795 799 4017a8-4017ac 795->799 800 4017ae-4017b8 call 40646b 799->800 801 4017df-4017e2 799->801 809 4017ca-4017dc 800->809 810 4017ba-4017c8 CompareFileTime 800->810 803 4017e4-4017e5 call 405c6b 801->803 804 4017ea-401806 call 405c90 801->804 803->804 811 401808-40180b 804->811 812 40187e-4018a7 call 40521e call 4030d8 804->812 809->801 810->809 813 401860-40186a call 40521e 811->813 814 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 811->814 826 4018a9-4018ad 812->826 827 4018af-4018bb SetFileTime 812->827 824 401873-401879 813->824 814->799 848 401855-401856 814->848 828 402a63 824->828 826->827 830 4018c1-4018cc FindCloseChangeNotification 826->830 827->830 831 402a65-402a69 828->831 833 4018d2-4018d5 830->833 834 402a5a-402a5d 830->834 836 4018d7-4018e8 call 40618a lstrcatA 833->836 837 4018ea-4018ed call 40618a 833->837 834->828 842 4018f2-402382 836->842 837->842 846 402387-40238c 842->846 847 402382 call 405813 842->847 846->831 847->846 848->824 849 401858-401859 848->849 849->813
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\skolebetjents\Unbegrudged,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\skolebetjents\Unbegrudged,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,Gomerec Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00403233,00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0), ref: 0040527A
                                • Part of subcall function 0040521E: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll), ref: 0040528C
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Temp\nsz8290.tmp$C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll$C:\Users\user\AppData\Local\skolebetjents\Unbegrudged$Call$kernel32::EnumResourceTypesW(i 0,i r1,i 0)
                              • API String ID: 1941528284-1488770532
                              • Opcode ID: 010f478dded97bc789b326cc51ff6fef7f7987650baebaae1ab3de94b0d9d6fd
                              • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                              • Opcode Fuzzy Hash: 010f478dded97bc789b326cc51ff6fef7f7987650baebaae1ab3de94b0d9d6fd
                              • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 850 40521e-405233 851 4052e9-4052ed 850->851 852 405239-40524b 850->852 853 405256-405262 lstrlenA 852->853 854 40524d-405251 call 40618a 852->854 855 405264-405274 lstrlenA 853->855 856 40527f-405283 853->856 854->853 855->851 858 405276-40527a lstrcatA 855->858 859 405292-405296 856->859 860 405285-40528c SetWindowTextA 856->860 858->856 861 405298-4052da SendMessageA * 3 859->861 862 4052dc-4052de 859->862 860->859 861->862 862->851 863 4052e0-4052e3 862->863 863->851
                              APIs
                              • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                              • lstrlenA.KERNEL32(00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                              • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00403233,00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0), ref: 0040527A
                              • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll), ref: 0040528C
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll
                              • API String ID: 2531174081-65952788
                              • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                              • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                              • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                              • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 864 4030d8-4030ec 865 4030f5-4030fe 864->865 866 4030ee 864->866 867 403100 865->867 868 403107-40310c 865->868 866->865 867->868 869 40311c-403129 call 4032ea 868->869 870 40310e-403117 call 403300 868->870 874 4032d8 869->874 875 40312f-403133 869->875 870->869 876 4032da-4032db 874->876 877 403283-403285 875->877 878 403139-403182 GetTickCount 875->878 881 4032e3-4032e7 876->881 879 4032c5-4032c8 877->879 880 403287-40328a 877->880 882 4032e0 878->882 883 403188-403190 878->883 884 4032ca 879->884 885 4032cd-4032d6 call 4032ea 879->885 880->882 886 40328c 880->886 882->881 887 403192 883->887 888 403195-4031a3 call 4032ea 883->888 884->885 885->874 896 4032dd 885->896 890 40328f-403295 886->890 887->888 888->874 898 4031a9-4031b2 888->898 893 403297 890->893 894 403299-4032a7 call 4032ea 890->894 893->894 894->874 901 4032a9-4032b5 call 405d37 894->901 896->882 900 4031b8-4031d8 call 406625 898->900 906 40327b-40327d 900->906 907 4031de-4031f1 GetTickCount 900->907 910 4032b7-4032c1 901->910 911 40327f-403281 901->911 906->876 908 4031f3-4031fb 907->908 909 403236-403238 907->909 912 403203-403233 MulDiv wsprintfA call 40521e 908->912 913 4031fd-403201 908->913 914 40323a-40323e 909->914 915 40326f-403273 909->915 910->890 916 4032c3 910->916 911->876 912->909 913->909 913->912 918 403240-403247 call 405d37 914->918 919 403255-403260 914->919 915->883 920 403279 915->920 916->882 924 40324c-40324e 918->924 923 403263-403267 919->923 920->882 923->900 925 40326d 923->925 924->911 926 403250-403253 924->926 925->882 926->923
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CountTick$wsprintf
                              • String ID: ... %d%%$HBB
                              • API String ID: 551687249-372310663
                              • Opcode ID: ff3709436155857b8c5f020e51af957004c3e874c7d35684cf027f4474eb8925
                              • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                              • Opcode Fuzzy Hash: ff3709436155857b8c5f020e51af957004c3e874c7d35684cf027f4474eb8925
                              • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 927 4056e4-40572f CreateDirectoryA 928 405731-405733 927->928 929 405735-405742 GetLastError 927->929 930 40575c-40575e 928->930 929->930 931 405744-405758 SetFileSecurityA 929->931 931->928 932 40575a GetLastError 931->932 932->930
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                              • GetLastError.KERNEL32 ref: 0040573B
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                              • GetLastError.KERNEL32 ref: 0040575A
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040570A
                              • C:\Users\user\Desktop, xrefs: 004056E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                              • API String ID: 3449924974-1229045261
                              • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                              • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                              • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                              • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 933 406492-4064b2 GetSystemDirectoryA 934 4064b4 933->934 935 4064b6-4064b8 933->935 934->935 936 4064c8-4064ca 935->936 937 4064ba-4064c2 935->937 939 4064cb-4064fd wsprintfA LoadLibraryExA 936->939 937->936 938 4064c4-4064c6 937->938 938->939
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                              • wsprintfA.USER32 ref: 004064E2
                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                              • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                              • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                              • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 940 40209d-4020a9 941 402164-402166 940->941 942 4020af-4020c5 call 402bce * 2 940->942 944 4022dd-4022e2 call 401423 941->944 952 4020d4-4020e2 LoadLibraryExA 942->952 953 4020c7-4020d2 GetModuleHandleA 942->953 949 402a5a-402a69 944->949 955 4020e4-4020f1 GetProcAddress 952->955 956 40215d-40215f 952->956 953->952 953->955 957 402130-402135 call 40521e 955->957 958 4020f3-4020f9 955->958 956->944 962 40213a-40213d 957->962 960 402112-402126 958->960 961 4020fb-402107 call 401423 958->961 972 402129 call 6e7c16db 960->972 973 402129 call 6e7c1215 960->973 961->962 970 402109-402110 961->970 962->949 965 402143-40214b call 4038aa 962->965 964 40212b-40212e 964->962 965->949 971 402151-402158 FreeLibrary 965->971 970->962 971->949 972->964 973->964
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00403233,00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0), ref: 0040527A
                                • Part of subcall function 0040521E: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll), ref: 0040528C
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                              • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                              Strings
                              • kernel32::EnumResourceTypesW(i 0,i r1,i 0), xrefs: 0040211C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID: kernel32::EnumResourceTypesW(i 0,i r1,i 0)
                              • API String ID: 2987980305-2481569558
                              • Opcode ID: aa48683f2b5658276c8777460aba322a09bfb4319b529873e90e1392fbc4e3c9
                              • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                              • Opcode Fuzzy Hash: aa48683f2b5658276c8777460aba322a09bfb4319b529873e90e1392fbc4e3c9
                              • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 974 405cbf-405cc9 975 405cca-405cf5 GetTickCount GetTempFileNameA 974->975 976 405d04-405d06 975->976 977 405cf7-405cf9 975->977 979 405cfe-405d01 976->979 977->975 978 405cfb 977->978 978->979
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405CD3
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CED
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC2
                              • nsa, xrefs: 00405CCA
                              • "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe", xrefs: 00405CBF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-3985938432
                              • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                              • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                              • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                              • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 980 402cd0-402cf9 call 405f7d 982 402cfe-402d02 980->982 983 402db3-402db7 982->983 984 402d08-402d0c 982->984 985 402d31-402d44 984->985 986 402d0e-402d2f RegEnumValueA 984->986 988 402d6d-402d74 RegEnumKeyA 985->988 986->985 987 402d98-402da6 RegCloseKey 986->987 987->983 989 402d46-402d48 988->989 990 402d76-402d88 RegCloseKey call 406500 988->990 989->987 992 402d4a-402d5e call 402cd0 989->992 996 402da8-402dae 990->996 997 402d8a-402d96 RegDeleteKeyA 990->997 992->990 998 402d60-402d6c 992->998 996->983 997->983 998->988
                              APIs
                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CloseEnum$DeleteValue
                              • String ID:
                              • API String ID: 1354259210-0
                              • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                              • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                              • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                              • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68
                              APIs
                                • Part of subcall function 6E7C1A98: GlobalFree.KERNEL32(?), ref: 6E7C1D09
                                • Part of subcall function 6E7C1A98: GlobalFree.KERNEL32(?), ref: 6E7C1D0E
                                • Part of subcall function 6E7C1A98: GlobalFree.KERNEL32(?), ref: 6E7C1D13
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C1786
                              • FreeLibrary.KERNEL32(?), ref: 6E7C1809
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C182E
                                • Part of subcall function 6E7C22AF: GlobalAlloc.KERNEL32(00000040,?), ref: 6E7C22E0
                                • Part of subcall function 6E7C26B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E7C1757,00000000), ref: 6E7C2782
                                • Part of subcall function 6E7C156B: wsprintfA.USER32 ref: 6E7C1599
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarywsprintf
                              • String ID:
                              • API String ID: 3962662361-3916222277
                              • Opcode ID: 71330d3e42ab26ace0d14014620ef41bffa7b2e1d23a634f4a4cfc7d5d68febd
                              • Instruction ID: 6cfc05a9595ae92376d6f85e0f86b6d1970672331e706061b0b14d8367433a94
                              • Opcode Fuzzy Hash: 71330d3e42ab26ace0d14014620ef41bffa7b2e1d23a634f4a4cfc7d5d68febd
                              • Instruction Fuzzy Hash: 6741F2710046059FCB40AFE49F98BD937FCBF01B24F0088B4E8159A1A2DB74C58ACBA2
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                              • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                              • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                              • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28
                              APIs
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz8290.tmp,00000023,00000011,00000002), ref: 004024C1
                              • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsz8290.tmp,00000000,00000011,00000002), ref: 00402501
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz8290.tmp,00000000,00000011,00000002), ref: 004025E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CloseValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsz8290.tmp
                              • API String ID: 2655323295-3545180335
                              • Opcode ID: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                              • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                              • Opcode Fuzzy Hash: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                              • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                              APIs
                                • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\skolebetjents\Unbegrudged,00000000,00000000,000000F0), ref: 0040163C
                              Strings
                              • C:\Users\user\AppData\Local\skolebetjents\Unbegrudged, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Local\skolebetjents\Unbegrudged
                              • API String ID: 1892508949-732890835
                              • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                              • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                              • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                              • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                              APIs
                              • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,00406293,80000002), ref: 00406024
                              • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll), ref: 0040602F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID: Call
                              • API String ID: 3356406503-1824292864
                              • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                              • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                              • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                              • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                              APIs
                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                              • CloseHandle.KERNEL32(?), ref: 004057CC
                              Strings
                              • Error launching installer, xrefs: 004057A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                              • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                              • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                              • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                              APIs
                              • GlobalFree.KERNEL32(05BC5E70), ref: 00401BF6
                              • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401C08
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$AllocFree
                              • String ID: Call
                              • API String ID: 3394109436-1824292864
                              • Opcode ID: 4f6e99611feb600a1a309dae17313cb646ed486db5988612a5590cb9f56acaba
                              • Instruction ID: e4cc8bcb7752a4f6b3811e2611bd1e0fa57f8e281b648bd21e3e74c9503b19de
                              • Opcode Fuzzy Hash: 4f6e99611feb600a1a309dae17313cb646ed486db5988612a5590cb9f56acaba
                              • Instruction Fuzzy Hash: 74219673644101EBDB20EB65DE88E5E73E8EB44318711413BF602B72D1DB78D8529B5D
                              APIs
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz8290.tmp,00000000,00000011,00000002), ref: 004025E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Enum$CloseValue
                              • String ID:
                              • API String ID: 397863658-0
                              • Opcode ID: 4c016d6c2f3ab1e124f4193e20d8829cd250ab49b329f1a0790d135f9ad07b97
                              • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                              • Opcode Fuzzy Hash: 4c016d6c2f3ab1e124f4193e20d8829cd250ab49b329f1a0790d135f9ad07b97
                              • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                              APIs
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz8290.tmp,00000000,00000011,00000002), ref: 004025E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID:
                              • API String ID: 3356406503-0
                              • Opcode ID: 2ef09a9a702b63bf190a07099d6d1856d249049087cfb86ce3e8b1f22b1d0afe
                              • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                              • Opcode Fuzzy Hash: 2ef09a9a702b63bf190a07099d6d1856d249049087cfb86ce3e8b1f22b1d0afe
                              • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                              • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                              • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                              • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                              APIs
                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                              • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CloseDeleteValue
                              • String ID:
                              • API String ID: 2831762973-0
                              • Opcode ID: 3ec462def41d79965063c97be9dd4531427da1f66958383902fa6c2f68692ee0
                              • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                              • Opcode Fuzzy Hash: 3ec462def41d79965063c97be9dd4531427da1f66958383902fa6c2f68692ee0
                              • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                              APIs
                              • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                              • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Window$EnableShow
                              • String ID:
                              • API String ID: 1136574915-0
                              • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                              • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                              • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                              • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                                • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                              • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                              • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                              • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,80000000,00000003), ref: 00405C94
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                              • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                              • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                              • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405767
                              • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405775
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                              • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                              • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                              • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                              • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                              • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                              • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                              APIs
                              • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: PathSearch
                              • String ID:
                              • API String ID: 2203818243-0
                              • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                              • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                              • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                              • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                              • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                              • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                              • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,00000004,00000000,00000000,00000000), ref: 00405D1C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                              • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                              • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                              • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                              APIs
                              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,00000004,00000000), ref: 00405D4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                              • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                              • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                              • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                              APIs
                              • VirtualProtect.KERNELBASE(6E7C404C,00000004,00000040,6E7C403C), ref: 6E7C293F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 2fa09d86e08c2bf810e321acee761cc871046793fd93da0b3550f5ebb486b9b0
                              • Instruction ID: b7b5aee2cf67945bfd8b5077d144301f9772aab74cb3d21cc5dc27316eaeecbc
                              • Opcode Fuzzy Hash: 2fa09d86e08c2bf810e321acee761cc871046793fd93da0b3550f5ebb486b9b0
                              • Instruction Fuzzy Hash: C1F092B2588A80DECBA0CFA8A6487053EFCB31AF54F0155BAE158D7251F33448C6AB16
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,0040600B,?,?,?,?,00000002,Call), ref: 00405FA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                              • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                              • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                              • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                              • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                              • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                              • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                              APIs
                              • SendMessageA.USER32(00010410,00000000,00000000,00000000), ref: 004041D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: b93bfa62a0d17583d47994c5deeb5958d6a7eb45b0bac583054f51af99654720
                              • Instruction ID: 4f5bfb943ccb7372f266285400f959559a3f08b639bcfa815988f1d16fb7a589
                              • Opcode Fuzzy Hash: b93bfa62a0d17583d47994c5deeb5958d6a7eb45b0bac583054f51af99654720
                              • Instruction Fuzzy Hash: A5C09BB17447017FEE20CB659D49F0777586750700F2544397755F60D4C674E461D61C
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                              • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                              • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                              • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                              APIs
                              • SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 52ed36bf426171ca8e77ff219833bebd4cd9702e05723d5fb87fa54f4c2163d0
                              • Instruction ID: 1318e1a831b13f4a694e23e2858010ee9933afb9cbbae162fbad06e3603bfc21
                              • Opcode Fuzzy Hash: 52ed36bf426171ca8e77ff219833bebd4cd9702e05723d5fb87fa54f4c2163d0
                              • Instruction Fuzzy Hash: A9B09236284A00ABDA215B50DE09F4A7A72A768701F408039B240250B0CAB200A5EB18
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,00403F79), ref: 004041A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CallbackDispatcherUser
                              • String ID:
                              • API String ID: 2492992576-0
                              • Opcode ID: 79f4c344832d221aace4b62902680fcbf7870811690861caeb07dff72c7a6dc1
                              • Instruction ID: f9921b4c88a1a0ed6e9c6eedf741b01f94502565facb500019f25752580a62db
                              • Opcode Fuzzy Hash: 79f4c344832d221aace4b62902680fcbf7870811690861caeb07dff72c7a6dc1
                              • Instruction Fuzzy Hash: C5A011B2000000AFCB02AB00EF08C0ABBA2ABA0300B008838A280800388B320832EB0A
                              APIs
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00403233,00403233,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,00000000,00424248,762323A0), ref: 0040527A
                                • Part of subcall function 0040521E: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz8290.tmp\System.dll), ref: 0040528C
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406586
                                • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                              • String ID:
                              • API String ID: 2972824698-0
                              • Opcode ID: d9e451cc79eab79a1af679e8d88f1dc4dd97fd96b8bc802c5400ef5df8be1ecc
                              • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                              • Opcode Fuzzy Hash: d9e451cc79eab79a1af679e8d88f1dc4dd97fd96b8bc802c5400ef5df8be1ecc
                              • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                              APIs
                              • GlobalAlloc.KERNELBASE(00000040,?,6E7C1019,00000001), ref: 6E7C102F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: 2d03e14f914a6cd31b3289b28edd9c1d8b400aaf86cbeb4618d1361e9b10e656
                              • Instruction ID: ace744b217e6d7c504018b478220143e29382b3aeb1b37364f6e59c056fa6a18
                              • Opcode Fuzzy Hash: 2d03e14f914a6cd31b3289b28edd9c1d8b400aaf86cbeb4618d1361e9b10e656
                              • Instruction Fuzzy Hash: 67C08CA2004201BED510DAF86B0DE1A62BC8B49F56F108870FA02C50A0DB24C2890633
                              APIs
                              • GlobalAlloc.KERNELBASE(00000040,6E7C1233,?,6E7C12CF,-6E7C404B,6E7C11AB,-000000A0), ref: 6E7C121D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: cc9709c71dd42264fca0f87e467aa614d662b3a2035c950c1211133b125250b2
                              • Instruction ID: 3fb3c7084fac55aea7e87222cce15163656a702006b14aeaec08c7b3dc0314f7
                              • Opcode Fuzzy Hash: cc9709c71dd42264fca0f87e467aa614d662b3a2035c950c1211133b125250b2
                              • Instruction Fuzzy Hash: E0A00272984D00EFDE41ABE0A90EF143B2EE74AF01F0080E1E31594194D6764491EB39
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                              • SetWindowTextA.USER32(00000000,?), ref: 00404686
                              • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                              • CoTaskMemFree.OLE32(00000000), ref: 00404742
                              • lstrcmpiA.KERNEL32(Call,Gomerec Setup: Installing), ref: 00404774
                              • lstrcatA.KERNEL32(?,Call), ref: 00404780
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                                • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                                • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                                • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                                • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                                • Part of subcall function 004063D2: CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                              • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,00000001,00429860,?,?,000003FB,?), ref: 00404850
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                                • Part of subcall function 004049C4: lstrlenA.KERNEL32(Gomerec Setup: Installing,Gomerec Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                                • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,Gomerec Setup: Installing), ref: 00404A7D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: <J$A$C:\Users\user\AppData\Local\skolebetjents$Call$Gomerec Setup: Installing$kernel32::EnumResourceTypesW(i 0,i r1,i 0)
                              • API String ID: 2624150263-2908758192
                              • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                              • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                              • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                              • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                              • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                              • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                              • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                              • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                              • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                              • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                              • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BF3
                              • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C0A
                              • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C36
                              • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C60
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C7C
                              • DeleteObject.GDI32(00000110), ref: 00404C81
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                              • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D82
                                • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                              • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                              • ShowWindow.USER32(?,00000005), ref: 00404DE2
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F7B
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404FB0
                              • GlobalFree.KERNEL32(00000000), ref: 00404FC0
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                              • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040511B
                              • ShowWindow.USER32(?,00000000), ref: 00405169
                              • GetDlgItem.USER32(?,000003FE), ref: 00405174
                              • ShowWindow.USER32(00000000), ref: 0040517B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 2564846305-813528018
                              • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                              • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                              • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                              • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404371
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404385
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043A3
                              • GetSysColor.USER32(?), ref: 004043B4
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                              • lstrlenA.KERNEL32(?), ref: 004043D5
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                              • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                              • SendMessageA.USER32(00000000), ref: 0040445E
                              • GetDlgItem.USER32(?,000003E8), ref: 00404489
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                              • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                              • SetCursor.USER32(00000000), ref: 004044E1
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                              • SetCursor.USER32(00000000), ref: 004044FA
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404526
                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040453A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: <J$Call$N
                              • API String ID: 3103080414-3865907118
                              • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                              • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                              • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                              • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,Gomerec Setup,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F$Gomerec Setup
                              • API String ID: 941294808-83801025
                              • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                              • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                              • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                              • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                              • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                                • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                              • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                              • wsprintfA.USER32 ref: 00405DDB
                              • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,00000004,0042CA20,?,?,?,?,?), ref: 00405E16
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E25
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                              • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                              • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,80000000,00000003), ref: 00405C94
                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                              • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                              • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                              • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                              • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                              • CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004063D3
                              • *?|<>/":, xrefs: 0040641A
                              • "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe", xrefs: 0040640E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-308735876
                              • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                              • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                              • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                              • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                              • GetSysColor.USER32(00000000), ref: 0040423D
                              • SetTextColor.GDI32(?,00000000), ref: 00404249
                              • SetBkMode.GDI32(?,?), ref: 00404255
                              • GetSysColor.USER32(?), ref: 00404268
                              • SetBkColor.GDI32(?,?), ref: 00404278
                              • DeleteObject.GDI32(?), ref: 00404292
                              • CreateBrushIndirect.GDI32(?), ref: 0040429C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                              • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                              • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                              • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                              APIs
                                • Part of subcall function 6E7C1215: GlobalAlloc.KERNELBASE(00000040,6E7C1233,?,6E7C12CF,-6E7C404B,6E7C11AB,-000000A0), ref: 6E7C121D
                              • GlobalFree.KERNEL32(?), ref: 6E7C25DE
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C2618
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: ff13a7d9d8c89933e86ec2e9963758d11993022668a9f5efa8c150be62a8de2d
                              • Instruction ID: cf969ec06decc7842ad2697456d647df26259931138f552041020158d5a8d03b
                              • Opcode Fuzzy Hash: ff13a7d9d8c89933e86ec2e9963758d11993022668a9f5efa8c150be62a8de2d
                              • Instruction Fuzzy Hash: CA41C272104A81EFD7018F94EE9CC6B77BEEB8AB04B0049B9F50197120E7319945EB73
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE9
                              • GetMessagePos.USER32 ref: 00404AF1
                              • ScreenToClient.USER32(?,?), ref: 00404B0B
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                              • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                              • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                              • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                              APIs
                              • GetDC.USER32(?), ref: 00401E38
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                              • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                              • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID: Times New Roman
                              • API String ID: 3808545654-927190056
                              • Opcode ID: 34521723c529513f9d2f25f2c915d7e6e1bbb21449fac5a346249fa94324e5da
                              • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                              • Opcode Fuzzy Hash: 34521723c529513f9d2f25f2c915d7e6e1bbb21449fac5a346249fa94324e5da
                              • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                              • MulDiv.KERNEL32(0004F95A,00000064,0004F95E), ref: 00402E00
                              • wsprintfA.USER32 ref: 00402E10
                              • SetWindowTextA.USER32(?,?), ref: 00402E20
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                              Strings
                              • verifying installer: %d%%, xrefs: 00402E0A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                              • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                              • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                              • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C2447
                                • Part of subcall function 6E7C1224: lstrcpynA.KERNEL32(00000000,?,6E7C12CF,-6E7C404B,6E7C11AB,-000000A0), ref: 6E7C1234
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 6E7C23C2
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6E7C23D7
                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6E7C23E8
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 6E7C23F6
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C23FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID:
                              • API String ID: 3730416702-0
                              • Opcode ID: bb8014a1bf899145dbfcea5f3a37b4796d5e8793352282deb6a24152b931aa72
                              • Instruction ID: a1fcb20d88bd93de72461dc8873a0f693429e04857d3ef3f94d499018332019b
                              • Opcode Fuzzy Hash: bb8014a1bf899145dbfcea5f3a37b4796d5e8793352282deb6a24152b931aa72
                              • Instruction Fuzzy Hash: 82418DB1508B81EFD7108FA59A48B6AB7FCFB41B11F00587AE955CB1A0D7309A46CB63
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                              • GlobalFree.KERNEL32(?), ref: 0040288E
                              • GlobalFree.KERNEL32(00000000), ref: 004028A1
                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                              • Instruction ID: 50ad9526884773a844389ca9465edd1da2989015e588fa45899e7f45ead5980e
                              • Opcode Fuzzy Hash: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                              • Instruction Fuzzy Hash: 78216D72800128BBDF217FA5CE49D9E7A79EF09364F24423EF550762D1CA794D418FA8
                              APIs
                              • lstrlenA.KERNEL32(Gomerec Setup: Installing,Gomerec Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                              • wsprintfA.USER32 ref: 00404A6A
                              • SetDlgItemTextA.USER32(?,Gomerec Setup: Installing), ref: 00404A7D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$Gomerec Setup: Installing
                              • API String ID: 3540041739-1024788690
                              • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                              • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                              • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                              • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: c7a71b06a63f44cc895b2ae5ce368f4cd4ff181c0fa07c6bfb51a76af49b2186
                              • Instruction ID: 78c1828044f6b9e0fa46f026811d12990f3bfbde96e6be2690a7d5dd11bed762
                              • Opcode Fuzzy Hash: c7a71b06a63f44cc895b2ae5ce368f4cd4ff181c0fa07c6bfb51a76af49b2186
                              • Instruction Fuzzy Hash: 03510532D48199AEDB40CFF9CB486AEBBBDAF46F55F0454BAD401A3230C73199498B53
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 00401D7E
                              • GetClientRect.USER32(?,?), ref: 00401DCC
                              • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                              • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                              • DeleteObject.GDI32(00000000), ref: 00401E20
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                              • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                              • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                              • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A95
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A9E
                              • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405AAF
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A8F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-3936084776
                              • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                              • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                              • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                              • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                              APIs
                              • DestroyWindow.USER32(00000000,00000000,0040301B,00000001), ref: 00402E50
                              • GetTickCount.KERNEL32 ref: 00402E6E
                              • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                              • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                              • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                              • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                              • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                              APIs
                                • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,Gomerec Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                              • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405BD0
                              • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,76233410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,76233410,C:\Users\user\AppData\Local\Temp\), ref: 00405BE0
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B7D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 3248276644-3936084776
                              • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                              • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                              • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                              • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                              APIs
                              • IsWindowVisible.USER32(?), ref: 004051C1
                              • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                                • Part of subcall function 004041C7: SendMessageA.USER32(00010410,00000000,00000000,00000000), ref: 004041D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                              • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                              • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                              • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                              APIs
                              • FreeLibrary.KERNEL32(?,76233410,00000000,C:\Users\user\AppData\Local\Temp\,0040384D,00403667,?,?,00000007,00000009,0000000B), ref: 0040388F
                              • GlobalFree.KERNEL32(004D9E98), ref: 00403896
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403875
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 1100898210-3936084776
                              • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                              • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                              • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                              • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,80000000,00000003), ref: 00405ADC
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,C:\Users\user\Desktop\Benefits-Signature-RequestsPlan#241205.com.exe,80000000,00000003), ref: 00405AEA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-3125694417
                              • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                              • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                              • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                              • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 6E7C115B
                              • GlobalFree.KERNEL32(00000000), ref: 6E7C11B4
                              • GlobalFree.KERNEL32(?), ref: 6E7C11C7
                              • GlobalFree.KERNEL32(?), ref: 6E7C11F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4572978622.000000006E7C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E7C0000, based on PE: true
                              • Associated: 00000000.00000002.4572955086.000000006E7C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573000396.000000006E7C3000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 00000000.00000002.4573021250.000000006E7C5000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6e7c0000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 31640277c3cdb1ef4396d4e02a3aec0526a4581ef1cb5780c0036a7b36b2e997
                              • Instruction ID: d8943b60dc38ecd2543801060679a665cdb35e5c4bb17f8c88643079a9c34cb2
                              • Opcode Fuzzy Hash: 31640277c3cdb1ef4396d4e02a3aec0526a4581ef1cb5780c0036a7b36b2e997
                              • Instruction Fuzzy Hash: 3C31A1B1544945AFEB01CFE8EA5CA657FFDEB06F50B0444B5E848C6260E7388C46DF12
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                              • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                              Memory Dump Source
                              • Source File: 00000000.00000002.4511252528.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4511240224.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511265816.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4511290242.000000000044D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4513061924.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Benefits-Signature-RequestsPlan#241205.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                              • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                              • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                              • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8