Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eXiJWkp8OE.exe

Overview

General Information

Sample name:eXiJWkp8OE.exe
renamed because original name is a hash value
Original sample name:ad98db4c044bc51bd2d6b0df5050291dc589135794f798dbafdf720ac64112e2.exe
Analysis ID:1466879
MD5:1209391dff4079c9c796efb0af814c08
SHA1:695a11f6ba7fcae6e61f9eafa908c3cb4a6cd152
SHA256:ad98db4c044bc51bd2d6b0df5050291dc589135794f798dbafdf720ac64112e2
Tags:exe
Infos:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Machine Learning detection for sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • eXiJWkp8OE.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\eXiJWkp8OE.exe" MD5: 1209391DFF4079C9C796EFB0AF814C08)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: eXiJWkp8OE.exeAvira: detected
    Source: eXiJWkp8OE.exeReversingLabs: Detection: 52%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: eXiJWkp8OE.exeJoe Sandbox ML: detected
    Source: eXiJWkp8OE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: eXiJWkp8OE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_0040596F CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040596F
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004064C1 FindFirstFileW,FindClose,0_2_004064C1
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
    Source: eXiJWkp8OE.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: eXiJWkp8OE.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
    Source: eXiJWkp8OE.exeString found in binary or memory: http://s.symcd.com06
    Source: eXiJWkp8OE.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
    Source: eXiJWkp8OE.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
    Source: eXiJWkp8OE.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
    Source: eXiJWkp8OE.exeString found in binary or memory: https://d.symcb.com/cps0%
    Source: eXiJWkp8OE.exeString found in binary or memory: https://d.symcb.com/rpa0
    Source: eXiJWkp8OE.exeString found in binary or memory: https://d.symcb.com/rpa0.
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_0040541C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040541C
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_05128D05 NtAllocateVirtualMemory,0_2_05128D05
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B6
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004068460_2_00406846
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_00404C590_2_00404C59
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_050E0C720_2_050E0C72
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_050EE6130_2_050EE613
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_05128F250_2_05128F25
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_051259400_2_05125940
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_051256B50_2_051256B5
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_050E0BE80_2_050E0BE8
    Source: eXiJWkp8OE.exeStatic PE information: invalid certificate
    Source: eXiJWkp8OE.exe, 00000000.00000000.1704518392.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinanity.exe4 vs eXiJWkp8OE.exe
    Source: eXiJWkp8OE.exeBinary or memory string: OriginalFilenameinanity.exe4 vs eXiJWkp8OE.exe
    Source: eXiJWkp8OE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal80.troj.evad.winEXE@1/10@0/0
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004033B6
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004046DD GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046DD
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_00402095 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402095
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile created: C:\Users\user\tndingersJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile created: C:\Users\user\AppData\Local\Temp\nsv6735.tmpJump to behavior
    Source: eXiJWkp8OE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: eXiJWkp8OE.exeReversingLabs: Detection: 52%
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile read: C:\Users\user\Desktop\eXiJWkp8OE.exeJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile written: C:\Users\user\Forbydende173.iniJump to behavior
    Source: eXiJWkp8OE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_04BBFB98 push ds; retf 0_2_04BBFB9C
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_04BC2B98 push ds; retf 0_2_04BC2B9C
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeFile created: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeAPI/Special instruction interceptor: Address: 51283F1
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeRDTSC instruction interceptor: First address: 50E0BD2 second address: 50E0BD2 instructions: 0x00000000 rdtsc 0x00000002 test ebx, eax 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F1880B3DBA1h 0x00000008 cmp ax, cx 0x0000000b cmp edx, eax 0x0000000d inc ebp 0x0000000e inc ebx 0x0000000f cmp ch, dh 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_050E0A86 rdtsc 0_2_050E0A86
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_0040596F CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040596F
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004064C1 FindFirstFileW,FindClose,0_2_004064C1
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
    Source: eXiJWkp8OE.exe, 00000000.00000002.4161118192.00000000006F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\aP~}
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeAPI call chain: ExitProcess graph end nodegraph_0-5624
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeAPI call chain: ExitProcess graph end nodegraph_0-5626
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_050E0A86 rdtsc 0_2_050E0A86
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_00402E41 GetTempPathW,GetTickCount,GetModuleFileNameW,GetFileSize,LdrInitializeThunk,GlobalAlloc,CreateFileW,LdrInitializeThunk,0_2_00402E41
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\eXiJWkp8OE.exeCode function: 0_2_004061A0 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_004061A0
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping211
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager23
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    eXiJWkp8OE.exe53%ReversingLabsWin32.Trojan.Guloader
    eXiJWkp8OE.exe100%AviraTR/AD.NsisInject.edcss
    eXiJWkp8OE.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErroreXiJWkp8OE.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1466879
    Start date and time:2024-07-03 14:33:04 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:eXiJWkp8OE.exe
    renamed because original name is a hash value
    Original Sample Name:ad98db4c044bc51bd2d6b0df5050291dc589135794f798dbafdf720ac64112e2.exe
    Detection:MAL
    Classification:mal80.troj.evad.winEXE@1/10@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 53
    • Number of non-executed functions: 39
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: eXiJWkp8OE.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dllunexpressiveness.exeGet hashmaliciousFormBook, GuLoaderBrowse
      unexpressiveness.exeGet hashmaliciousGuLoaderBrowse
        Ballahoo.exeGet hashmaliciousFormBook, GuLoaderBrowse
          Ballahoo.exeGet hashmaliciousGuLoaderBrowse
            dhl_awb_shipping_invoice_21_05_2024_000000000000024.exeGet hashmaliciousGuLoader, RemcosBrowse
              dhl_awb_shipping_invoice_21_05_2024_000000000000024.exeGet hashmaliciousGuLoaderBrowse
                Forligsmnd.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  Forligsmnd.exeGet hashmaliciousGuLoaderBrowse
                    PEDIDO-0347.exeGet hashmaliciousGuLoaderBrowse
                      a.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):44
                        Entropy (8bit):4.81705292530797
                        Encrypted:false
                        SSDEEP:3:x41xmQQLQIfLBJXmgxv:xsxmQQkIP2I
                        MD5:698ACD9EC3D87696ABE82BB0D9970F28
                        SHA1:9ADB6617C95902BD10B05A82436C5AA61CBE14A0
                        SHA-256:8FC6E44C13EB046C8EA7424EA799A7E66AABC220B4CE6CD404ED160C996030D1
                        SHA-512:18715DF4EBAE19BA54F387988DED991816C9C96D8357FC9ED78B01897BAF2649C5D6E3A9B1A3B52FAF8660DB3A8BA3B89C7B0D7130C646F2912A1EE844B5CB60
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:[Ap]..CaNum=user32::EnumWindows(i r1 ,i 0)..
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.656060535507129
                        Encrypted:false
                        SSDEEP:192:eS24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OloSl:S8QIl975eXqlWBrz7YLOlo
                        MD5:FC3772787EB239EF4D0399680DCC4343
                        SHA1:DB2FA99EC967178CD8057A14A428A8439A961A73
                        SHA-256:9B93C61C9D63EF8EC80892CC0E4A0877966DCA9B0C3EB85555CEBD2DDF4D6EED
                        SHA-512:79E491CA4591A5DA70116114B7FBB66EE15A0532386035E980C9DFE7AFB59B1F9D9C758891E25BFB45C36B07AFD3E171BAC37A86C887387EF0E80B1EAF296C89
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: unexpressiveness.exe, Detection: malicious, Browse
                        • Filename: unexpressiveness.exe, Detection: malicious, Browse
                        • Filename: Ballahoo.exe, Detection: malicious, Browse
                        • Filename: Ballahoo.exe, Detection: malicious, Browse
                        • Filename: dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe, Detection: malicious, Browse
                        • Filename: dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe, Detection: malicious, Browse
                        • Filename: Forligsmnd.exe, Detection: malicious, Browse
                        • Filename: Forligsmnd.exe, Detection: malicious, Browse
                        • Filename: PEDIDO-0347.exe, Detection: malicious, Browse
                        • Filename: a.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....{.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1080082
                        Entropy (8bit):3.4676970575371584
                        Encrypted:false
                        SSDEEP:12288:vP70bFDaA44s1mjX5Nvyh+lCuEtf5NNuuU/dE:Xjf1mjX3e/fLNsE
                        MD5:AA52637846AE5788905B6E3C4B82342D
                        SHA1:9DD08619A0A930A8943B6408EE4484CFABC40E52
                        SHA-256:7E32E202AB2775D67FB76F3DE191C225BCC532E4EC2BBA2D5672F0A2AAD0A89A
                        SHA-512:A6146CEB90CDCF81A79605F51A080D4506CC0A9560D2227F09622DAE51561E3052051248B250BB41FEC140C826FA292FB44EFBBBCE3A42B9253CBB37822661E4
                        Malicious:false
                        Reputation:low
                        Preview:.:......,........................!.......9.......:............................................................ .............................................................................................................................................................................G...T...........M...j...............................................................................................................................|...........d...b.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):44
                        Entropy (8bit):4.126950016748872
                        Encrypted:false
                        SSDEEP:3:pGXDKI7WLhMGYDzOc3n:QOLhLYnr3n
                        MD5:91C4F98316BDDADC66FCF70398CE4C16
                        SHA1:B2B0CB16FDFCE2A8CB324750E4DB6A453BCC937A
                        SHA-256:CA353EE13D34DD61D6E15CF88789AFAB0E879F2C8F93CE58364D4B200C2C958B
                        SHA-512:022EBD6C5951C4F416C1D513BFAA91DE9F05AB7574289852B144F2B90FCD54C52EDDB44768C9FE4E012899B277D26C680D2356BED466FC2B0F6E0977379CF0EE
                        Malicious:false
                        Reputation:low
                        Preview:[demivol]..forfatningsndringers=frgelejets..
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):201209
                        Entropy (8bit):0.15441833754537992
                        Encrypted:false
                        SSDEEP:96:YGSXMOfcTWl2n5lb8gVsMZTisIrVPPBdV:YGSXMOfcTWs5lb8gVsMcsIrVHBdV
                        MD5:54CD663724ACFE5547D2A09D2D216502
                        SHA1:039B4D8D04CE14696DBAB075425B8BC5BF387F43
                        SHA-256:D551460BFE6F675E72B51F9B75CF2B6F464370CA3EF95F08F97582A30C157CCA
                        SHA-512:997F1E677440C523394B72EEE2E4456A1A82D867B434FE45D6E2C36D4607ED9B3E6F1DB3C4C6E46F2408A5BCDDEDEC1818F64571DE8B8DCD56A358ACACBB6607
                        Malicious:false
                        Reputation:low
                        Preview:.............................n..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................F......................................................................................................................................................................................................................................................F..........................................................................D....................1................................................................................................................................................................
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):356397
                        Entropy (8bit):7.693267485199153
                        Encrypted:false
                        SSDEEP:6144:Y5Z/ntOHbFa6VUB+f447HfSPxN1t8emN7vXXpNUGRiRbh+rBCuEX9flibgNNuuIr:vbFDaA44s1mjX5Nvyh+lCuEtf5NNuuU/
                        MD5:D0711BF286C31474C7D121502D8D4C7D
                        SHA1:EAD25C6191E47690C20092B5780A15C37EDF8EA1
                        SHA-256:98C643CF23ADF2A64CF38A129F328F029970BDF1C27E9EDDF18D8A5112CB8185
                        SHA-512:3DA7583DADA8FAA6CBB446E32B282292448E26689A57D634F8D1824CDC78CC690B431B988D4AA785E9D505A0A22DD4E8921785F9E5DA7AEB2385DFD4202DC324
                        Malicious:false
                        Reputation:low
                        Preview:...YYYYY........:.t......4......#.......................'..........................r....k.............o........................................^^.TT...........22.............B.^^....................../.....$.k.T............L......|..................ss...^^^^...&......q..jj..............^....5...............Q.........[.........A..m.....v..??............V.............jjj....3..eee................**...........B............;;.....................i.aa.........+........o...::..--........y.......n..z....|.......nn..................GGGG..xxxx..........aaa....Y.......?....................................MM.....................N..&&&.n..........w..........................II...eee..................\.......666.........$$.z.......%....................................>>.........!!...........{.,...........................vvvvvvv....................!!!!......TT....11...............4.a..........`................G.....Y.L.........................................p..OOOO.....@@....qqqq.............cc.RRRR
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):420
                        Entropy (8bit):4.279139119874913
                        Encrypted:false
                        SSDEEP:12:CSAqUxYS+QA/Ulb0+UsQw6Y57RW/dv8iHzxn:JAqUif/UlI+kNMYV8iHzx
                        MD5:D9513425BD0FA572C6870B8AE7EC6749
                        SHA1:9362F26597C73F909DD32CC0328450BA8A92137A
                        SHA-256:E53489D36794F21533560A90AA88E01E2C8BCB266313E660F540013870E2E33A
                        SHA-512:4FDC68103628E5F8E17AB1FD64E7EA16F9F4FA538007E4E8B818D0DFA8FFC0C163A5613B630B50775F9C07E53D41BB1C9BAD36146D0D12B5C6D6F25F3570C8B0
                        Malicious:false
                        Reputation:low
                        Preview:dezincs nedblnde jepsens records hidsigheders..fluoridation urocystic luskere selvbestaltet sponsorerendes unchokes orthometry strongbark fingervelsernes insufficience aanderddernes tripylean..landshjlpen unescaped blodsnkninger residensen statsraadssekretrernes stayeres.printproblemet veterans blaw counterwilling,smidth skibsllernes enfoldment twrchtrywth zabajone unmixed nongerundively.asterella jeanett cryalgesia.
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):185685
                        Entropy (8bit):0.15794109990694136
                        Encrypted:false
                        SSDEEP:48:3O9CNivRD191rH6pI3JI2PSiEzHGFJrRheiubPk7qYQiZ1BkTxSSysNsJCUv7flZ:+9BpFFZ1PStjqRluTBvK/uyTJCqNwEd
                        MD5:12F76E82DCE91459C7B810BB597635B0
                        SHA1:12AE593D6E8C0F2B9EBBB66509047571D0826444
                        SHA-256:DBEB677B4A46C7FABDB9F63F3BCB287C66730AB832FAE6B653EDF61B3FEA0ADD
                        SHA-512:DEA83DF51D397FAAD119B25D5DBC135A1C18B662C8D63C544C86443A9D27D1731328EEDC037F73140A80A0AE8A9B792C5ACEB9D988AED6271155FAA29D6F41D8
                        Malicious:false
                        Preview:...........................................+.....................................................................................................................................................................................................................|.......................................................................................................................................................................................................................................................................................................%.....................................................................................................................................................................................~........................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):109604
                        Entropy (8bit):0.15512892516699378
                        Encrypted:false
                        SSDEEP:48:dFa8OdJATAcKZ2JWbL6chUmv4p5m4BNYGmHNQiu:8AoYYbOchUmwjSGmS
                        MD5:6D474B2A2A52442BA06641B32BA9426A
                        SHA1:1C35D73A6882ADAC2D97DE79A1E0C3FEFE02E3B9
                        SHA-256:A959C155DD886C91F15FB50245965EA7869FC63FF3A8DAC89D30B7D83D6D3E0F
                        SHA-512:8A84D602C8FD88F862E808CA597FB3313A9D1C3F20963048703699CF38CA9D573459A3610B42D544B952EC7DAE864C4AAC8F048FB0A5029BC6CA360564EAFDB6
                        Malicious:false
                        Preview:.............................q............................................%.....................................*......................................................................................................................................................................................................................................................................................................................................................._.............................................#.............................(.................................................................................................................................................................................................................................................................................................................................._......................................................................B.........................................................................
                        Process:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):199937
                        Entropy (8bit):0.15680391851126443
                        Encrypted:false
                        SSDEEP:48:9DPUbZj8geR5P1YcSiOVv/fbQ0aC3kuN7AcD99HxjQMXOh+vQ+ofjk55u4dZYVMq:RMVjteRohzaK7A+6+Y+KjkurP2W8N
                        MD5:BB1F6067B4E96CE0CC0EE0D2FED548E3
                        SHA1:3CDBE6747ECCA5772B47B81D40F5E9D7E08739DD
                        SHA-256:404D41E5442D03925F740F9BEB168551C38F612977FE3DDC9DD64F0585BA60B6
                        SHA-512:1B57AA5E2016FC172E65C74ECF48E65157D0C6B67A8F8B72460888F16E2521FDFE209DA4EFB2E4F68DD43AFBA2A224CE98149C096F8701BE233BC2120EFAA12D
                        Malicious:false
                        Preview:.....................B.....................................................................................................................................................M...........................U....................................................................................."................................................................................................................................................................................f.....................................................................................................................................................................................................r................................................................................................................. .....................................................j..............................................................y............................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.499898717032478
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:eXiJWkp8OE.exe
                        File size:476'328 bytes
                        MD5:1209391dff4079c9c796efb0af814c08
                        SHA1:695a11f6ba7fcae6e61f9eafa908c3cb4a6cd152
                        SHA256:ad98db4c044bc51bd2d6b0df5050291dc589135794f798dbafdf720ac64112e2
                        SHA512:e6e21a3fe30ff34622aecd6636e64f5110b5cba13683873bb3f1b200ac59920fc4e9fdedb8bb2150e7b0c6ad0bd87982d704fb6bc30cc7dc9f01b0d5a6f7f432
                        SSDEEP:12288:+gEdT9KvsdBJUeABk+x12lUunkxkq2Ule:kdTQELJoBk+2yVxkqhe
                        TLSH:23A401AA7904E416D5BA0879C8B7D9F11A246E7CE9423E077751BF0F35B3503283A92F
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....{.W.................b...*.......3............@
                        Icon Hash:09080941072d1903
                        Entrypoint:0x4033b6
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x57807BD5 [Sat Jul 9 04:21:41 2016 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:4ea4df5d94204fc550be1874e1b77ea7
                        Signature Valid:false
                        Signature Issuer:E=Bistered@Overabundance23.St, O=Cibophobia, OU="Salthorste Brnefilm ", CN=Cibophobia, L=Imling, S=Grand Est, C=FR
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 10/05/2023 10:01:25 09/05/2026 10:01:25
                        Subject Chain
                        • E=Bistered@Overabundance23.St, O=Cibophobia, OU="Salthorste Brnefilm ", CN=Cibophobia, L=Imling, S=Grand Est, C=FR
                        Version:3
                        Thumbprint MD5:6C111DE33AF5D28B2956CE4E3B42918A
                        Thumbprint SHA-1:97168EB4EDB12FE15E824346D5C7E765A93D9BB2
                        Thumbprint SHA-256:798B4B1A09185B441FC9A288C2F6ADCD9F0194C57E94CF87D3042CE4ACA01FD9
                        Serial:2F9479FCCEDA7BF9644DD4914C20B56AF579CD3F
                        Instruction
                        sub esp, 000002D4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [esp+14h], ebx
                        mov dword ptr [esp+10h], 0040A230h
                        mov dword ptr [esp+1Ch], ebx
                        call dword ptr [004080B4h]
                        call dword ptr [004080B0h]
                        cmp ax, 00000006h
                        je 00007F18807EB283h
                        push ebx
                        call 00007F18807EE3DCh
                        cmp eax, ebx
                        je 00007F18807EB279h
                        push 00000C00h
                        call eax
                        mov esi, 004082B8h
                        push esi
                        call 00007F18807EE356h
                        push esi
                        call dword ptr [0040815Ch]
                        lea esi, dword ptr [esi+eax+01h]
                        cmp byte ptr [esi], 00000000h
                        jne 00007F18807EB25Ch
                        push ebp
                        push 00000009h
                        call 00007F18807EE3AEh
                        push 00000007h
                        call 00007F18807EE3A7h
                        mov dword ptr [0042A244h], eax
                        call dword ptr [0040803Ch]
                        push ebx
                        call dword ptr [004082A4h]
                        mov dword ptr [0042A2F8h], eax
                        push ebx
                        lea eax, dword ptr [esp+34h]
                        push 000002B4h
                        push eax
                        push ebx
                        push 004216E8h
                        call dword ptr [00408188h]
                        push 0040A384h
                        push 00429240h
                        call 00007F18807EDF90h
                        call dword ptr [004080ACh]
                        mov ebp, 00435000h
                        push eax
                        push ebp
                        call 00007F18807EDF7Eh
                        push ebx
                        call dword ptr [00408174h]
                        add word ptr [eax], 0000h
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x18a88.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x722300x2278
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x615d0x62000b0812166ebbd0109e7f5e007b182949False0.6616709183673469data6.450231726170125IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x13a40x14004ac891d4ddf58633f14436f9f80ac6b6False0.4529296875data5.163001655755973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x203380x60066b45fceba0f24d768fb09e0afe23c99False0.5026041666666666data3.9824009583068882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2b0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x550000x18a880x18c0022de74f39c108d279067eb856b03e0a7False0.27538076073232326data4.262327938416955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x554480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.16749970424701288
                        RT_ICON0x65c700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.383195020746888
                        RT_ICON0x682180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.45614446529080677
                        RT_ICON0x692c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.5906183368869936
                        RT_ICON0x6a1680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.5504098360655738
                        RT_ICON0x6aaf00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.6787003610108303
                        RT_ICON0x6b3980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishUnited States0.7021889400921659
                        RT_ICON0x6ba600x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.4451219512195122
                        RT_ICON0x6c0c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6380057803468208
                        RT_ICON0x6c6300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.699468085106383
                        RT_ICON0x6ca980x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.5295698924731183
                        RT_ICON0x6cd800x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 0EnglishUnited States0.6127049180327869
                        RT_ICON0x6cf680x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.6858108108108109
                        RT_DIALOG0x6d0900x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x6d1900x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x6d2b00xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x6d3780x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x6d3d80xbcdataEnglishUnited States0.601063829787234
                        RT_VERSION0x6d4980x2b0dataEnglishUnited States0.5
                        RT_MANIFEST0x6d7480x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                        DLLImport
                        KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                        USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                        ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:08:33:58
                        Start date:03/07/2024
                        Path:C:\Users\user\Desktop\eXiJWkp8OE.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\eXiJWkp8OE.exe"
                        Imagebase:0x400000
                        File size:476'328 bytes
                        MD5 hash:1209391DFF4079C9C796EFB0AF814C08
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:14.8%
                          Dynamic/Decrypted Code Coverage:21%
                          Signature Coverage:24.2%
                          Total number of Nodes:1713
                          Total number of Limit Nodes:50
                          execution_graph 6095 402840 6096 402bbf 18 API calls 6095->6096 6098 40284e 6096->6098 6097 402864 6100 405d2e 2 API calls 6097->6100 6098->6097 6099 402bbf 18 API calls 6098->6099 6099->6097 6101 40286a 6100->6101 6123 405d53 GetFileAttributesW CreateFileW 6101->6123 6103 402877 6104 402883 GlobalAlloc 6103->6104 6105 40291a 6103->6105 6108 402911 CloseHandle 6104->6108 6109 40289c 6104->6109 6106 402922 DeleteFileW 6105->6106 6107 402935 6105->6107 6106->6107 6108->6105 6124 40336e SetFilePointer 6109->6124 6111 4028a2 6112 403358 ReadFile 6111->6112 6113 4028ab GlobalAlloc 6112->6113 6114 4028bb 6113->6114 6115 4028ef 6113->6115 6116 4030e7 45 API calls 6114->6116 6117 405e05 WriteFile 6115->6117 6118 4028c8 6116->6118 6119 4028fb GlobalFree 6117->6119 6121 4028e6 GlobalFree 6118->6121 6120 4030e7 45 API calls 6119->6120 6122 40290e 6120->6122 6121->6115 6122->6108 6123->6103 6124->6111 6125 10001000 6128 1000101b 6125->6128 6135 10001516 6128->6135 6130 10001020 6131 10001024 6130->6131 6132 10001027 GlobalAlloc 6130->6132 6133 1000153d 3 API calls 6131->6133 6132->6131 6134 10001019 6133->6134 6137 1000151c 6135->6137 6136 10001522 6136->6130 6137->6136 6138 1000152e GlobalFree 6137->6138 6138->6130 6535 401cc0 6536 402ba2 18 API calls 6535->6536 6537 401cc7 6536->6537 6538 402ba2 18 API calls 6537->6538 6539 401ccf GetDlgItem 6538->6539 6540 402531 6539->6540 6541 4029c0 6542 402ba2 18 API calls 6541->6542 6543 4029c6 6542->6543 6544 40281e 6543->6544 6545 4029f9 6543->6545 6547 4029d4 6543->6547 6545->6544 6546 4061a0 18 API calls 6545->6546 6546->6544 6547->6544 6549 4060c5 wsprintfW 6547->6549 6549->6544 4903 401fc3 4904 401fd5 4903->4904 4905 402087 4903->4905 4926 402bbf 4904->4926 4907 401423 25 API calls 4905->4907 4914 4021e1 4907->4914 4909 402bbf 18 API calls 4910 401fe5 4909->4910 4911 401ffb LoadLibraryExW 4910->4911 4912 401fed GetModuleHandleW 4910->4912 4911->4905 4913 40200c 4911->4913 4912->4911 4912->4913 4932 4065c7 WideCharToMultiByte 4913->4932 4917 402056 4980 4052dd 4917->4980 4918 40201d 4919 402025 4918->4919 4920 40203c 4918->4920 4977 401423 4919->4977 4935 10001759 4920->4935 4923 40202d 4923->4914 4924 402079 FreeLibrary 4923->4924 4924->4914 4927 402bcb 4926->4927 4991 4061a0 4927->4991 4930 401fdc 4930->4909 4933 4065f1 GetProcAddress 4932->4933 4934 402017 4932->4934 4933->4934 4934->4917 4934->4918 4936 10001789 4935->4936 5030 10001b18 4936->5030 4938 10001790 4939 100018a6 4938->4939 4940 100017a1 4938->4940 4941 100017a8 4938->4941 4939->4923 5079 10002286 4940->5079 5062 100022d0 4941->5062 4946 1000180c 4950 10001812 4946->4950 4951 1000184e 4946->4951 4947 100017ee 5092 100024a9 4947->5092 4948 100017d7 4964 100017cd 4948->4964 5089 10002b5f 4948->5089 4949 100017be 4953 100017c4 4949->4953 4958 100017cf 4949->4958 4954 100015b4 3 API calls 4950->4954 4956 100024a9 10 API calls 4951->4956 4953->4964 5073 100028a4 4953->5073 4961 10001828 4954->4961 4962 10001840 4956->4962 4957 100017f4 5103 100015b4 4957->5103 5083 10002645 4958->5083 4966 100024a9 10 API calls 4961->4966 4976 10001895 4962->4976 5114 1000246c 4962->5114 4964->4946 4964->4947 4965 100017d5 4965->4964 4966->4962 4969 1000189f GlobalFree 4969->4939 4973 10001881 4973->4976 5118 1000153d wsprintfW 4973->5118 4975 1000187a FreeLibrary 4975->4973 4976->4939 4976->4969 4978 4052dd 25 API calls 4977->4978 4979 401431 4978->4979 4979->4923 4981 4052f8 4980->4981 4982 40539a 4980->4982 4983 405314 lstrlenW 4981->4983 4984 4061a0 18 API calls 4981->4984 4982->4923 4985 405322 lstrlenW 4983->4985 4986 40533d 4983->4986 4984->4983 4985->4982 4987 405334 lstrcatW 4985->4987 4988 405350 4986->4988 4989 405343 SetWindowTextW 4986->4989 4987->4986 4988->4982 4990 405356 SendMessageW SendMessageW SendMessageW 4988->4990 4989->4988 4990->4982 5006 4061ad 4991->5006 4992 4063f8 4993 402bec 4992->4993 5025 40617e lstrcpynW 4992->5025 4993->4930 5009 406412 4993->5009 4995 406260 GetVersion 4995->5006 4996 4063c6 lstrlenW 4996->5006 4997 4061a0 10 API calls 4997->4996 5000 4062db GetSystemDirectoryW 5000->5006 5002 4062ee GetWindowsDirectoryW 5002->5006 5003 406412 5 API calls 5003->5006 5004 4061a0 10 API calls 5004->5006 5005 406367 lstrcatW 5005->5006 5006->4992 5006->4995 5006->4996 5006->4997 5006->5000 5006->5002 5006->5003 5006->5004 5006->5005 5007 406322 SHGetSpecialFolderLocation 5006->5007 5018 40604b RegOpenKeyExW 5006->5018 5023 4060c5 wsprintfW 5006->5023 5024 40617e lstrcpynW 5006->5024 5007->5006 5008 40633a SHGetPathFromIDListW CoTaskMemFree 5007->5008 5008->5006 5015 40641f 5009->5015 5010 40649a CharPrevW 5011 406495 5010->5011 5011->5010 5013 4064bb 5011->5013 5012 406488 CharNextW 5012->5011 5012->5015 5013->4930 5015->5011 5015->5012 5016 406474 CharNextW 5015->5016 5017 406483 CharNextW 5015->5017 5026 405b5f 5015->5026 5016->5015 5017->5012 5019 4060bf 5018->5019 5020 40607f RegQueryValueExW 5018->5020 5019->5006 5021 4060a0 RegCloseKey 5020->5021 5021->5019 5023->5006 5024->5006 5025->4993 5027 405b65 5026->5027 5028 405b7b 5027->5028 5029 405b6c CharNextW 5027->5029 5028->5015 5029->5027 5121 1000121b GlobalAlloc 5030->5121 5032 10001b3c 5122 1000121b GlobalAlloc 5032->5122 5034 10001d7a GlobalFree GlobalFree GlobalFree 5036 10001d97 5034->5036 5041 10001de1 5034->5041 5035 10001b47 5035->5034 5039 10001c1d GlobalAlloc 5035->5039 5035->5041 5044 10001c68 lstrcpyW 5035->5044 5045 10001c86 GlobalFree 5035->5045 5047 10001c72 lstrcpyW 5035->5047 5051 10002048 5035->5051 5055 10001cc4 5035->5055 5056 10001f37 GlobalFree 5035->5056 5060 1000122c 2 API calls 5035->5060 5128 1000121b GlobalAlloc 5035->5128 5037 10001dac 5036->5037 5038 100020ee 5036->5038 5036->5041 5037->5041 5125 1000122c 5037->5125 5040 10002110 GetModuleHandleW 5038->5040 5038->5041 5039->5035 5042 10002121 LoadLibraryW 5040->5042 5043 10002136 5040->5043 5041->4938 5042->5041 5042->5043 5129 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5043->5129 5044->5047 5045->5035 5047->5035 5048 10002188 5048->5041 5049 10002195 lstrlenW 5048->5049 5130 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5049->5130 5051->5041 5054 10002090 lstrcpyW 5051->5054 5054->5041 5055->5035 5123 1000158f GlobalSize GlobalAlloc 5055->5123 5056->5035 5057 100021af 5057->5041 5058 10002148 5058->5048 5061 10002172 GetProcAddress 5058->5061 5060->5035 5061->5048 5063 100022e8 5062->5063 5065 10002415 GlobalFree 5063->5065 5067 100023d3 lstrlenW 5063->5067 5068 100023ba GlobalAlloc 5063->5068 5069 1000238f GlobalAlloc WideCharToMultiByte 5063->5069 5070 1000122c GlobalAlloc lstrcpynW 5063->5070 5132 100012ba 5063->5132 5065->5063 5066 100017ae 5065->5066 5066->4948 5066->4949 5066->4964 5067->5065 5071 100023d1 5067->5071 5068->5071 5069->5065 5070->5063 5071->5065 5136 100025d9 5071->5136 5075 100028b6 5073->5075 5074 1000295b CreateFileA 5076 10002979 5074->5076 5075->5074 5077 10002a75 5076->5077 5078 10002a6a GetLastError 5076->5078 5077->4964 5078->5077 5080 10002296 5079->5080 5081 100017a7 5079->5081 5080->5081 5082 100022a8 GlobalAlloc 5080->5082 5081->4941 5082->5080 5087 10002661 5083->5087 5084 100026b2 GlobalAlloc 5088 100026d4 5084->5088 5085 100026c5 5086 100026ca GlobalSize 5085->5086 5085->5088 5086->5088 5087->5084 5087->5085 5088->4965 5090 10002b6a 5089->5090 5091 10002baa GlobalFree 5090->5091 5139 1000121b GlobalAlloc 5092->5139 5094 10002530 StringFromGUID2 5099 100024b3 5094->5099 5095 10002541 lstrcpynW 5095->5099 5096 1000250b MultiByteToWideChar 5096->5099 5097 10002571 GlobalFree 5097->5099 5098 10002554 wsprintfW 5098->5099 5099->5094 5099->5095 5099->5096 5099->5097 5099->5098 5100 100025ac GlobalFree 5099->5100 5101 10001272 2 API calls 5099->5101 5140 100012e1 5099->5140 5100->4957 5101->5099 5144 1000121b GlobalAlloc 5103->5144 5105 100015ba 5107 100015e1 5105->5107 5108 100015c7 lstrcpyW 5105->5108 5109 100015e6 wsprintfW 5107->5109 5110 100015fb 5107->5110 5108->5110 5109->5110 5111 10001272 5110->5111 5112 100012b5 GlobalFree 5111->5112 5113 1000127b GlobalAlloc lstrcpynW 5111->5113 5112->4962 5113->5112 5115 10001861 5114->5115 5116 1000247a 5114->5116 5115->4973 5115->4975 5116->5115 5117 10002496 GlobalFree 5116->5117 5117->5116 5119 10001272 2 API calls 5118->5119 5120 1000155e 5119->5120 5120->4976 5121->5032 5122->5035 5124 100015ad 5123->5124 5124->5055 5131 1000121b GlobalAlloc 5125->5131 5127 1000123b lstrcpynW 5127->5041 5128->5035 5129->5058 5130->5057 5131->5127 5133 100012c1 5132->5133 5134 1000122c 2 API calls 5133->5134 5135 100012df 5134->5135 5135->5063 5137 100025e7 VirtualAlloc 5136->5137 5138 1000263d 5136->5138 5137->5138 5138->5071 5139->5099 5141 100012ea 5140->5141 5142 1000130c 5140->5142 5141->5142 5143 100012f0 lstrcpyW 5141->5143 5142->5099 5143->5142 5144->5105 6550 4016c4 6551 402bbf 18 API calls 6550->6551 6552 4016ca GetFullPathNameW 6551->6552 6553 4016e4 6552->6553 6554 401706 6552->6554 6553->6554 6557 4064c1 2 API calls 6553->6557 6555 40171b GetShortPathNameW 6554->6555 6556 402a4c 6554->6556 6555->6556 6558 4016f6 6557->6558 6558->6554 6560 40617e lstrcpynW 6558->6560 6560->6554 6139 406846 6141 4066ca 6139->6141 6140 407035 6141->6140 6141->6141 6142 406754 GlobalAlloc 6141->6142 6143 40674b GlobalFree 6141->6143 6144 4067c2 GlobalFree 6141->6144 6145 4067cb GlobalAlloc 6141->6145 6142->6140 6142->6141 6143->6142 6144->6145 6145->6140 6145->6141 5279 50e0a86 5282 50e0aa7 5279->5282 5280 5128d00 5285 5128ff4 5280->5285 5315 5128d05 5280->5315 5282->5280 5291 5129550 5282->5291 5284 50e0b6c 5284->5280 5286 50e0b7e 5284->5286 5319 50f7ab2 5285->5319 5298 50e0be8 5286->5298 5289 5124fde 5290 50edb09 5293 5128d00 5291->5293 5292 5128d05 NtAllocateVirtualMemory 5292->5293 5293->5292 5294 51295c9 5293->5294 5295 5128ff4 5293->5295 5294->5284 5296 50f7ab2 NtAllocateVirtualMemory 5295->5296 5297 50edb09 5296->5297 5297->5284 5334 51256b5 5298->5334 5300 50e0c01 5301 5128d00 5300->5301 5343 5124d5a 5300->5343 5303 5128d05 NtAllocateVirtualMemory 5301->5303 5307 5128ff4 5301->5307 5314 5129392 5301->5314 5303->5301 5304 50e0c4b 5305 5124d5a NtAllocateVirtualMemory 5304->5305 5306 50e0c61 5305->5306 5306->5301 5358 50e0c72 5306->5358 5309 50f7ab2 NtAllocateVirtualMemory 5307->5309 5310 50edb09 5309->5310 5310->5289 5311 51291b5 5311->5301 5313 51292ec 5311->5313 5379 512942d 5311->5379 5313->5289 5314->5289 5316 5128d44 5315->5316 5316->5316 5317 5128d53 NtAllocateVirtualMemory 5316->5317 5318 5128d76 5317->5318 5318->5318 5323 50edcf8 5319->5323 5320 5124fb6 5320->5290 5321 5128d05 NtAllocateVirtualMemory 5320->5321 5324 5128ff4 5320->5324 5321->5320 5322 51256b5 NtAllocateVirtualMemory 5322->5323 5323->5319 5323->5320 5323->5322 5325 5124ff1 NtAllocateVirtualMemory 5323->5325 5326 5128ec4 5323->5326 5329 5124ed1 5323->5329 5331 50edb09 5323->5331 5327 50f7ab2 NtAllocateVirtualMemory 5324->5327 5325->5323 5326->5320 5328 5128f0f 5326->5328 5327->5331 5330 5128f25 NtAllocateVirtualMemory 5328->5330 5329->5320 5329->5331 5333 5124ff1 NtAllocateVirtualMemory 5329->5333 5332 5128f20 5330->5332 5331->5290 5333->5320 5335 51258cf 5334->5335 5338 5125713 5334->5338 5335->5300 5336 5128d05 NtAllocateVirtualMemory 5335->5336 5337 5128ff4 5335->5337 5341 512592c 5335->5341 5336->5335 5340 50f7ab2 NtAllocateVirtualMemory 5337->5340 5338->5335 5386 5125940 5338->5386 5342 50edb09 5340->5342 5341->5300 5342->5300 5344 5124fb6 5343->5344 5351 50edcf8 5343->5351 5344->5304 5345 5128d05 NtAllocateVirtualMemory 5344->5345 5347 5128ff4 5344->5347 5345->5344 5346 51256b5 NtAllocateVirtualMemory 5346->5351 5349 50f7ab2 NtAllocateVirtualMemory 5347->5349 5348 5124ff1 NtAllocateVirtualMemory 5348->5351 5352 50edb09 5349->5352 5350 5124ed1 5350->5344 5350->5352 5353 5124ff1 NtAllocateVirtualMemory 5350->5353 5351->5343 5351->5344 5351->5346 5351->5348 5351->5350 5351->5352 5354 5128ec4 5351->5354 5352->5304 5353->5344 5354->5344 5355 5128f0f 5354->5355 5356 5128f25 NtAllocateVirtualMemory 5355->5356 5357 5128f20 5356->5357 5359 5124fb6 5358->5359 5369 50e0c9d 5358->5369 5359->5311 5360 5128d05 NtAllocateVirtualMemory 5359->5360 5361 5128ff4 5359->5361 5360->5359 5362 50f7ab2 NtAllocateVirtualMemory 5361->5362 5363 50edb09 5362->5363 5363->5311 5364 51256b5 NtAllocateVirtualMemory 5365 50e1028 5364->5365 5365->5359 5365->5363 5365->5364 5366 5124ff1 NtAllocateVirtualMemory 5365->5366 5368 5128ec4 5365->5368 5371 5124ed1 5365->5371 5366->5365 5367 51256b5 NtAllocateVirtualMemory 5367->5369 5368->5359 5370 5128f0f 5368->5370 5369->5311 5369->5365 5369->5367 5378 50e0f28 5369->5378 5372 5128f25 NtAllocateVirtualMemory 5370->5372 5371->5359 5371->5363 5374 5124ff1 NtAllocateVirtualMemory 5371->5374 5373 5128f20 5372->5373 5374->5359 5375 5124d5a NtAllocateVirtualMemory 5376 50e1061 5375->5376 5377 5124d5a NtAllocateVirtualMemory 5376->5377 5377->5365 5378->5365 5378->5375 5380 5128d00 5379->5380 5381 5128d05 NtAllocateVirtualMemory 5380->5381 5382 5128ff4 5380->5382 5384 51293f5 5380->5384 5381->5380 5383 50f7ab2 NtAllocateVirtualMemory 5382->5383 5385 50edb09 5383->5385 5384->5301 5385->5301 5396 50edcf8 5386->5396 5387 5128ec4 5388 5128f0f 5387->5388 5390 5124fb6 5387->5390 5418 5128f25 5388->5418 5389 5128d05 NtAllocateVirtualMemory 5389->5390 5390->5338 5390->5389 5392 5128ff4 5390->5392 5395 50f7ab2 NtAllocateVirtualMemory 5392->5395 5393 5128f20 5394 51256b5 NtAllocateVirtualMemory 5394->5396 5398 50edb09 5395->5398 5396->5386 5396->5387 5396->5390 5396->5394 5396->5398 5399 5124ed1 5396->5399 5401 5124ff1 5396->5401 5398->5338 5399->5390 5399->5398 5400 5124ff1 NtAllocateVirtualMemory 5399->5400 5400->5390 5403 5125026 5401->5403 5405 50edb09 5403->5405 5408 50edcf8 5403->5408 5424 5128be4 5403->5424 5404 5128d05 NtAllocateVirtualMemory 5406 5124fb6 5404->5406 5405->5396 5406->5396 5406->5404 5409 5128ff4 5406->5409 5407 51256b5 NtAllocateVirtualMemory 5407->5408 5408->5405 5408->5406 5408->5407 5410 5124ff1 NtAllocateVirtualMemory 5408->5410 5411 5128ec4 5408->5411 5412 5124ed1 5408->5412 5413 50f7ab2 NtAllocateVirtualMemory 5409->5413 5410->5408 5411->5406 5414 5128f0f 5411->5414 5412->5405 5412->5406 5417 5124ff1 NtAllocateVirtualMemory 5412->5417 5413->5405 5415 5128f25 NtAllocateVirtualMemory 5414->5415 5416 5128f20 5415->5416 5417->5406 5419 5128d00 5418->5419 5420 5128ff4 5419->5420 5421 5128d05 NtAllocateVirtualMemory 5419->5421 5422 50f7ab2 NtAllocateVirtualMemory 5420->5422 5421->5418 5423 50edb09 5422->5423 5423->5393 5433 50edcf8 5424->5433 5425 5128ec4 5426 5128f0f 5425->5426 5428 5124fb6 5425->5428 5429 5128f25 NtAllocateVirtualMemory 5426->5429 5427 5128d05 NtAllocateVirtualMemory 5427->5428 5428->5403 5428->5427 5431 5128ff4 5428->5431 5430 5128f20 5429->5430 5434 50f7ab2 NtAllocateVirtualMemory 5431->5434 5432 51256b5 NtAllocateVirtualMemory 5432->5433 5433->5403 5433->5425 5433->5428 5433->5432 5435 5124ff1 NtAllocateVirtualMemory 5433->5435 5436 50edb09 5433->5436 5437 5124ed1 5433->5437 5434->5436 5435->5433 5436->5403 5437->5428 5437->5436 5438 5124ff1 NtAllocateVirtualMemory 5437->5438 5438->5428 6146 40194e 6147 402bbf 18 API calls 6146->6147 6148 401955 lstrlenW 6147->6148 6149 402531 6148->6149 6564 4027ce 6565 4027d6 6564->6565 6566 4027da FindNextFileW 6565->6566 6568 4027ec 6565->6568 6567 402833 6566->6567 6566->6568 6570 40617e lstrcpynW 6567->6570 6570->6568 6157 405251 6158 405261 6157->6158 6159 405275 6157->6159 6160 405267 6158->6160 6169 4052be 6158->6169 6161 40527d IsWindowVisible 6159->6161 6167 405294 6159->6167 6163 40428e SendMessageW 6160->6163 6164 40528a 6161->6164 6161->6169 6162 4052c3 CallWindowProcW 6165 405271 6162->6165 6163->6165 6170 404ba7 SendMessageW 6164->6170 6167->6162 6175 404c27 6167->6175 6169->6162 6171 404c06 SendMessageW 6170->6171 6172 404bca GetMessagePos ScreenToClient SendMessageW 6170->6172 6174 404bfe 6171->6174 6173 404c03 6172->6173 6172->6174 6173->6171 6174->6167 6184 40617e lstrcpynW 6175->6184 6177 404c3a 6185 4060c5 wsprintfW 6177->6185 6179 404c44 6180 40140b 2 API calls 6179->6180 6181 404c4d 6180->6181 6186 40617e lstrcpynW 6181->6186 6183 404c54 6183->6169 6184->6177 6185->6179 6186->6183 5558 401754 5559 402bbf 18 API calls 5558->5559 5560 40175b 5559->5560 5564 405d82 5560->5564 5562 401762 5563 405d82 2 API calls 5562->5563 5563->5562 5565 405d8f GetTickCount GetTempFileNameW 5564->5565 5566 405dc9 5565->5566 5567 405dc5 5565->5567 5566->5562 5567->5565 5567->5566 5568 401d56 GetDC GetDeviceCaps 5576 402ba2 5568->5576 5570 401d74 MulDiv ReleaseDC 5571 402ba2 18 API calls 5570->5571 5572 401d93 5571->5572 5573 4061a0 18 API calls 5572->5573 5574 401dcc CreateFontIndirectW 5573->5574 5575 402531 5574->5575 5577 4061a0 18 API calls 5576->5577 5578 402bb6 5577->5578 5578->5570 6187 404356 lstrcpynW lstrlenW 5942 4014d7 5943 402ba2 18 API calls 5942->5943 5944 4014dd Sleep 5943->5944 5946 402a4c 5944->5946 6188 401a57 6189 402ba2 18 API calls 6188->6189 6190 401a5d 6189->6190 6191 402ba2 18 API calls 6190->6191 6192 401a05 6191->6192 6193 404c59 GetDlgItem GetDlgItem 6194 404cab 7 API calls 6193->6194 6201 404ec4 6193->6201 6195 404d41 SendMessageW 6194->6195 6196 404d4e DeleteObject 6194->6196 6195->6196 6197 404d57 6196->6197 6199 404d8e 6197->6199 6200 4061a0 18 API calls 6197->6200 6198 404fa8 6203 405054 6198->6203 6208 404eb7 6198->6208 6213 405001 SendMessageW 6198->6213 6202 404242 19 API calls 6199->6202 6204 404d70 SendMessageW SendMessageW 6200->6204 6201->6198 6211 404ba7 5 API calls 6201->6211 6227 404f35 6201->6227 6207 404da2 6202->6207 6205 405066 6203->6205 6206 40505e SendMessageW 6203->6206 6204->6197 6215 405078 ImageList_Destroy 6205->6215 6216 40507f 6205->6216 6224 40508f 6205->6224 6206->6205 6212 404242 19 API calls 6207->6212 6209 4042a9 8 API calls 6208->6209 6214 40524a 6209->6214 6210 404f9a SendMessageW 6210->6198 6211->6227 6228 404db0 6212->6228 6213->6208 6218 405016 SendMessageW 6213->6218 6215->6216 6219 405088 GlobalFree 6216->6219 6216->6224 6217 4051fe 6217->6208 6222 405210 ShowWindow GetDlgItem ShowWindow 6217->6222 6221 405029 6218->6221 6219->6224 6220 404e85 GetWindowLongW SetWindowLongW 6223 404e9e 6220->6223 6229 40503a SendMessageW 6221->6229 6222->6208 6225 404ea4 ShowWindow 6223->6225 6226 404ebc 6223->6226 6224->6217 6236 404c27 4 API calls 6224->6236 6240 4050ca 6224->6240 6244 404277 SendMessageW 6225->6244 6245 404277 SendMessageW 6226->6245 6227->6198 6227->6210 6228->6220 6230 404e7f 6228->6230 6233 404e00 SendMessageW 6228->6233 6234 404e3c SendMessageW 6228->6234 6235 404e4d SendMessageW 6228->6235 6229->6203 6230->6220 6230->6223 6233->6228 6234->6228 6235->6228 6236->6240 6237 4051d4 InvalidateRect 6237->6217 6238 4051ea 6237->6238 6246 404b62 6238->6246 6239 4050f8 SendMessageW 6243 40510e 6239->6243 6240->6239 6240->6243 6242 405182 SendMessageW SendMessageW 6242->6243 6243->6237 6243->6242 6244->6208 6245->6201 6249 404a99 6246->6249 6248 404b77 6248->6217 6250 404ab2 6249->6250 6251 4061a0 18 API calls 6250->6251 6252 404b16 6251->6252 6253 4061a0 18 API calls 6252->6253 6254 404b21 6253->6254 6255 4061a0 18 API calls 6254->6255 6256 404b37 lstrlenW wsprintfW SetDlgItemTextW 6255->6256 6256->6248 6257 40155b 6258 4029f2 6257->6258 6261 4060c5 wsprintfW 6258->6261 6260 4029f7 6261->6260 6571 401ddc 6572 402ba2 18 API calls 6571->6572 6573 401de2 6572->6573 6574 402ba2 18 API calls 6573->6574 6575 401deb 6574->6575 6576 401df2 ShowWindow 6575->6576 6577 401dfd EnableWindow 6575->6577 6578 402a4c 6576->6578 6577->6578 6579 4046dd 6580 404709 6579->6580 6581 40471a 6579->6581 6640 4058a7 GetDlgItemTextW 6580->6640 6583 404726 GetDlgItem 6581->6583 6589 404785 6581->6589 6586 40473a 6583->6586 6584 404869 6590 404a18 6584->6590 6642 4058a7 GetDlgItemTextW 6584->6642 6585 404714 6587 406412 5 API calls 6585->6587 6588 40474e SetWindowTextW 6586->6588 6593 405bdd 4 API calls 6586->6593 6587->6581 6594 404242 19 API calls 6588->6594 6589->6584 6589->6590 6595 4061a0 18 API calls 6589->6595 6592 4042a9 8 API calls 6590->6592 6597 404a2c 6592->6597 6598 404744 6593->6598 6599 40476a 6594->6599 6600 4047f9 SHBrowseForFolderW 6595->6600 6596 404899 6601 405c3a 18 API calls 6596->6601 6598->6588 6605 405b32 3 API calls 6598->6605 6602 404242 19 API calls 6599->6602 6600->6584 6603 404811 CoTaskMemFree 6600->6603 6604 40489f 6601->6604 6606 404778 6602->6606 6607 405b32 3 API calls 6603->6607 6643 40617e lstrcpynW 6604->6643 6605->6588 6641 404277 SendMessageW 6606->6641 6609 40481e 6607->6609 6612 404855 SetDlgItemTextW 6609->6612 6616 4061a0 18 API calls 6609->6616 6611 40477e 6614 406558 5 API calls 6611->6614 6612->6584 6613 4048b6 6615 406558 5 API calls 6613->6615 6614->6589 6622 4048bd 6615->6622 6618 40483d lstrcmpiW 6616->6618 6617 4048fe 6644 40617e lstrcpynW 6617->6644 6618->6612 6619 40484e lstrcatW 6618->6619 6619->6612 6621 404905 6623 405bdd 4 API calls 6621->6623 6622->6617 6627 405b7e 2 API calls 6622->6627 6628 404956 6622->6628 6624 40490b GetDiskFreeSpaceW 6623->6624 6626 40492f MulDiv 6624->6626 6624->6628 6626->6628 6627->6622 6629 4049c7 6628->6629 6631 404b62 21 API calls 6628->6631 6630 4049ea 6629->6630 6632 40140b 2 API calls 6629->6632 6645 404264 KiUserCallbackDispatcher 6630->6645 6633 4049b4 6631->6633 6632->6630 6635 4049c9 SetDlgItemTextW 6633->6635 6636 4049b9 6633->6636 6635->6629 6638 404a99 21 API calls 6636->6638 6637 404a06 6637->6590 6646 404672 6637->6646 6638->6629 6640->6585 6641->6611 6642->6596 6643->6613 6644->6621 6645->6637 6647 404680 6646->6647 6648 404685 SendMessageW 6646->6648 6647->6648 6648->6590 6088 4022df 6089 402bbf 18 API calls 6088->6089 6090 4022ee 6089->6090 6091 402bbf 18 API calls 6090->6091 6092 4022f7 6091->6092 6093 402bbf 18 API calls 6092->6093 6094 402301 GetPrivateProfileStringW 6093->6094 6649 4043df 6650 404511 6649->6650 6652 4043f7 6649->6652 6651 40457b 6650->6651 6654 40464d 6650->6654 6658 40454c GetDlgItem SendMessageW 6650->6658 6653 404585 GetDlgItem 6651->6653 6651->6654 6655 404242 19 API calls 6652->6655 6656 40460e 6653->6656 6657 40459f 6653->6657 6660 4042a9 8 API calls 6654->6660 6659 40445e 6655->6659 6656->6654 6664 404620 6656->6664 6657->6656 6663 4045c5 6 API calls 6657->6663 6680 404264 KiUserCallbackDispatcher 6658->6680 6662 404242 19 API calls 6659->6662 6671 404648 6660->6671 6666 40446b CheckDlgButton 6662->6666 6663->6656 6667 404636 6664->6667 6668 404626 SendMessageW 6664->6668 6665 404576 6669 404672 SendMessageW 6665->6669 6678 404264 KiUserCallbackDispatcher 6666->6678 6667->6671 6672 40463c SendMessageW 6667->6672 6668->6667 6669->6651 6672->6671 6673 404489 GetDlgItem 6679 404277 SendMessageW 6673->6679 6675 40449f SendMessageW 6676 4044c5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 6675->6676 6677 4044bc GetSysColor 6675->6677 6676->6671 6677->6676 6678->6673 6679->6675 6680->6665 6681 401bdf 6682 402ba2 18 API calls 6681->6682 6683 401be6 6682->6683 6684 402ba2 18 API calls 6683->6684 6685 401bf0 6684->6685 6686 401c00 6685->6686 6687 402bbf 18 API calls 6685->6687 6688 401c10 6686->6688 6689 402bbf 18 API calls 6686->6689 6687->6686 6690 401c1b 6688->6690 6691 401c5f 6688->6691 6689->6688 6692 402ba2 18 API calls 6690->6692 6693 402bbf 18 API calls 6691->6693 6694 401c20 6692->6694 6695 401c64 6693->6695 6696 402ba2 18 API calls 6694->6696 6697 402bbf 18 API calls 6695->6697 6698 401c29 6696->6698 6699 401c6d FindWindowExW 6697->6699 6700 401c31 SendMessageTimeoutW 6698->6700 6701 401c4f SendMessageW 6698->6701 6702 401c8f 6699->6702 6700->6702 6701->6702 6262 401960 6263 402ba2 18 API calls 6262->6263 6264 401967 6263->6264 6265 402ba2 18 API calls 6264->6265 6266 401971 6265->6266 6267 402bbf 18 API calls 6266->6267 6268 40197a 6267->6268 6269 40198e lstrlenW 6268->6269 6271 4019ca 6268->6271 6270 401998 6269->6270 6270->6271 6275 40617e lstrcpynW 6270->6275 6273 4019b3 6273->6271 6274 4019c0 lstrlenW 6273->6274 6274->6271 6275->6273 6276 401662 6277 402bbf 18 API calls 6276->6277 6278 401668 6277->6278 6279 4064c1 2 API calls 6278->6279 6280 40166e 6279->6280 6703 4019e4 6704 402bbf 18 API calls 6703->6704 6705 4019eb 6704->6705 6706 402bbf 18 API calls 6705->6706 6707 4019f4 6706->6707 6708 4019fb lstrcmpiW 6707->6708 6709 401a0d lstrcmpW 6707->6709 6710 401a01 6708->6710 6709->6710 6711 406ae5 6712 4066ca 6711->6712 6713 407035 6712->6713 6714 406754 GlobalAlloc 6712->6714 6715 40674b GlobalFree 6712->6715 6716 4067c2 GlobalFree 6712->6716 6717 4067cb GlobalAlloc 6712->6717 6714->6712 6714->6713 6715->6714 6716->6717 6717->6712 6717->6713 6718 4025e5 6719 402ba2 18 API calls 6718->6719 6720 4025f4 6719->6720 6721 40263a ReadFile 6720->6721 6722 405dd6 ReadFile 6720->6722 6723 405e34 5 API calls 6720->6723 6724 40267a MultiByteToWideChar 6720->6724 6725 40272f 6720->6725 6727 4026a0 SetFilePointer MultiByteToWideChar 6720->6727 6728 402740 6720->6728 6730 40272d 6720->6730 6721->6720 6721->6730 6722->6720 6723->6720 6724->6720 6731 4060c5 wsprintfW 6725->6731 6727->6720 6729 402761 SetFilePointer 6728->6729 6728->6730 6729->6730 6731->6730 6281 401e66 6282 402bbf 18 API calls 6281->6282 6283 401e6c 6282->6283 6284 4052dd 25 API calls 6283->6284 6285 401e76 6284->6285 6286 40585e 2 API calls 6285->6286 6287 401e7c 6286->6287 6288 401edb CloseHandle 6287->6288 6289 401e8c WaitForSingleObject 6287->6289 6291 40281e 6287->6291 6288->6291 6290 401e9e 6289->6290 6292 401eb0 GetExitCodeProcess 6290->6292 6293 406594 2 API calls 6290->6293 6294 401ec2 6292->6294 6295 401ecd 6292->6295 6296 401ea5 WaitForSingleObject 6293->6296 6298 4060c5 wsprintfW 6294->6298 6295->6288 6296->6290 6298->6295 5145 401767 5146 402bbf 18 API calls 5145->5146 5147 40176e 5146->5147 5148 401796 5147->5148 5149 40178e 5147->5149 5203 40617e lstrcpynW 5148->5203 5202 40617e lstrcpynW 5149->5202 5152 401794 5155 406412 5 API calls 5152->5155 5153 4017a1 5204 405b32 lstrlenW CharPrevW 5153->5204 5173 4017b3 5155->5173 5160 4017c5 CompareFileTime 5160->5173 5161 401885 5162 4052dd 25 API calls 5161->5162 5164 40188f 5162->5164 5163 40185c 5165 4052dd 25 API calls 5163->5165 5172 401871 5163->5172 5187 4030e7 5164->5187 5165->5172 5167 40617e lstrcpynW 5167->5173 5169 4018b6 SetFileTime 5171 4018c8 FindCloseChangeNotification 5169->5171 5170 4061a0 18 API calls 5170->5173 5171->5172 5174 4018d9 5171->5174 5173->5160 5173->5161 5173->5163 5173->5167 5173->5170 5183 405d2e GetFileAttributesW 5173->5183 5186 405d53 GetFileAttributesW CreateFileW 5173->5186 5207 4064c1 FindFirstFileW 5173->5207 5210 4058c3 5173->5210 5175 4018f1 5174->5175 5176 4018de 5174->5176 5178 4061a0 18 API calls 5175->5178 5177 4061a0 18 API calls 5176->5177 5180 4018e6 lstrcatW 5177->5180 5181 4018f9 5178->5181 5180->5181 5182 4058c3 MessageBoxIndirectW 5181->5182 5182->5172 5184 405d40 SetFileAttributesW 5183->5184 5185 405d4d 5183->5185 5184->5185 5185->5173 5186->5173 5188 403112 5187->5188 5189 4030f6 SetFilePointer 5187->5189 5214 4031ef GetTickCount 5188->5214 5189->5188 5192 4018a2 5192->5169 5192->5171 5195 4031ef 43 API calls 5196 403149 5195->5196 5196->5192 5197 4031b5 ReadFile 5196->5197 5199 403158 5196->5199 5197->5192 5199->5192 5200 405dd6 ReadFile 5199->5200 5229 405e05 WriteFile 5199->5229 5200->5199 5202->5152 5203->5153 5205 4017a7 lstrcatW 5204->5205 5206 405b4e lstrcatW 5204->5206 5205->5152 5206->5205 5208 4064e2 5207->5208 5209 4064d7 FindClose 5207->5209 5208->5173 5209->5208 5211 4058d8 5210->5211 5212 405924 5211->5212 5213 4058ec MessageBoxIndirectW 5211->5213 5212->5173 5213->5212 5215 403347 5214->5215 5216 40321d 5214->5216 5217 402d9f 33 API calls 5215->5217 5231 40336e SetFilePointer 5216->5231 5223 403119 5217->5223 5219 403228 SetFilePointer 5225 40324d 5219->5225 5223->5192 5227 405dd6 ReadFile 5223->5227 5224 405e05 WriteFile 5224->5225 5225->5223 5225->5224 5226 403328 SetFilePointer 5225->5226 5232 403358 5225->5232 5235 406697 5225->5235 5242 402d9f 5225->5242 5226->5215 5228 403132 5227->5228 5228->5192 5228->5195 5230 405e23 5229->5230 5230->5199 5231->5219 5233 405dd6 ReadFile 5232->5233 5234 40336b 5233->5234 5234->5225 5236 4066bc 5235->5236 5237 4066c4 5235->5237 5236->5225 5237->5236 5238 406754 GlobalAlloc 5237->5238 5239 40674b GlobalFree 5237->5239 5240 4067c2 GlobalFree 5237->5240 5241 4067cb GlobalAlloc 5237->5241 5238->5236 5238->5237 5239->5238 5240->5241 5241->5236 5241->5237 5243 402db0 5242->5243 5244 402dc8 5242->5244 5245 402dc0 5243->5245 5246 402db9 DestroyWindow 5243->5246 5247 402dd0 5244->5247 5248 402dd8 GetTickCount 5244->5248 5245->5225 5246->5245 5257 406594 5247->5257 5248->5245 5249 402de6 5248->5249 5251 402e1b CreateDialogParamW ShowWindow 5249->5251 5252 402dee 5249->5252 5251->5245 5252->5245 5261 402d83 5252->5261 5254 402dfc wsprintfW 5255 4052dd 25 API calls 5254->5255 5256 402e19 5255->5256 5256->5245 5258 4065b1 PeekMessageW 5257->5258 5259 4065c1 5258->5259 5260 4065a7 DispatchMessageW 5258->5260 5259->5245 5260->5258 5262 402d92 5261->5262 5263 402d94 MulDiv 5261->5263 5262->5263 5263->5254 6732 401ee9 6733 402bbf 18 API calls 6732->6733 6734 401ef0 6733->6734 6735 4064c1 2 API calls 6734->6735 6736 401ef6 6735->6736 6738 401f07 6736->6738 6739 4060c5 wsprintfW 6736->6739 6739->6738 6740 100018a9 6741 100018cc 6740->6741 6742 100018ff GlobalFree 6741->6742 6743 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 6741->6743 6742->6743 6744 10001272 2 API calls 6743->6744 6745 10001a87 GlobalFree GlobalFree 6744->6745 5439 403d6a 5440 403d82 5439->5440 5441 403ebd 5439->5441 5440->5441 5442 403d8e 5440->5442 5443 403ece GetDlgItem GetDlgItem 5441->5443 5461 403f0e 5441->5461 5444 403d99 SetWindowPos 5442->5444 5445 403dac 5442->5445 5446 404242 19 API calls 5443->5446 5444->5445 5449 403db1 ShowWindow 5445->5449 5450 403dc9 5445->5450 5451 403ef8 SetClassLongW 5446->5451 5447 403f68 5453 403eb8 5447->5453 5509 40428e 5447->5509 5449->5450 5454 403dd1 DestroyWindow 5450->5454 5455 403deb 5450->5455 5456 40140b 2 API calls 5451->5456 5452 401389 2 API calls 5459 403f40 5452->5459 5460 4041cb 5454->5460 5457 403df0 SetWindowLongW 5455->5457 5458 403e01 5455->5458 5456->5461 5457->5453 5462 403eaa 5458->5462 5463 403e0d GetDlgItem 5458->5463 5459->5447 5464 403f44 SendMessageW 5459->5464 5460->5453 5470 4041fc ShowWindow 5460->5470 5461->5447 5461->5452 5528 4042a9 5462->5528 5467 403e20 SendMessageW IsWindowEnabled 5463->5467 5468 403e3d 5463->5468 5464->5453 5465 40140b 2 API calls 5477 403f7a 5465->5477 5466 4041cd DestroyWindow EndDialog 5466->5460 5467->5453 5467->5468 5472 403e4a 5468->5472 5474 403e91 SendMessageW 5468->5474 5475 403e5d 5468->5475 5484 403e42 5468->5484 5470->5453 5471 4061a0 18 API calls 5471->5477 5472->5474 5472->5484 5474->5462 5478 403e65 5475->5478 5479 403e7a 5475->5479 5476 403e78 5476->5462 5477->5453 5477->5465 5477->5466 5477->5471 5480 404242 19 API calls 5477->5480 5500 40410d DestroyWindow 5477->5500 5512 404242 5477->5512 5522 40140b 5478->5522 5481 40140b 2 API calls 5479->5481 5480->5477 5483 403e81 5481->5483 5483->5462 5483->5484 5525 40421b 5484->5525 5486 403ff5 GetDlgItem 5487 404012 ShowWindow KiUserCallbackDispatcher 5486->5487 5488 40400a 5486->5488 5515 404264 KiUserCallbackDispatcher 5487->5515 5488->5487 5490 40403c EnableWindow 5493 404050 5490->5493 5491 404055 GetSystemMenu EnableMenuItem SendMessageW 5492 404085 SendMessageW 5491->5492 5491->5493 5492->5493 5493->5491 5516 404277 SendMessageW 5493->5516 5517 40617e lstrcpynW 5493->5517 5496 4040b3 lstrlenW 5497 4061a0 18 API calls 5496->5497 5498 4040c9 SetWindowTextW 5497->5498 5518 401389 5498->5518 5500->5460 5501 404127 CreateDialogParamW 5500->5501 5501->5460 5502 40415a 5501->5502 5503 404242 19 API calls 5502->5503 5504 404165 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5503->5504 5505 401389 2 API calls 5504->5505 5506 4041ab 5505->5506 5506->5453 5507 4041b3 ShowWindow 5506->5507 5508 40428e SendMessageW 5507->5508 5508->5460 5510 4042a6 5509->5510 5511 404297 SendMessageW 5509->5511 5510->5477 5511->5510 5513 4061a0 18 API calls 5512->5513 5514 40424d SetDlgItemTextW 5513->5514 5514->5486 5515->5490 5516->5493 5517->5496 5520 401390 5518->5520 5519 4013fe 5519->5477 5520->5519 5521 4013cb MulDiv SendMessageW 5520->5521 5521->5520 5523 401389 2 API calls 5522->5523 5524 401420 5523->5524 5524->5484 5526 404222 5525->5526 5527 404228 SendMessageW 5525->5527 5526->5527 5527->5476 5529 4042c1 GetWindowLongW 5528->5529 5539 40434a 5528->5539 5530 4042d2 5529->5530 5529->5539 5531 4042e1 GetSysColor 5530->5531 5532 4042e4 5530->5532 5531->5532 5533 4042f4 SetBkMode 5532->5533 5534 4042ea SetTextColor 5532->5534 5535 404312 5533->5535 5536 40430c GetSysColor 5533->5536 5534->5533 5537 404323 5535->5537 5538 404319 SetBkColor 5535->5538 5536->5535 5537->5539 5540 404336 DeleteObject 5537->5540 5541 40433d CreateBrushIndirect 5537->5541 5538->5537 5539->5453 5540->5541 5541->5539 6746 4021ea 6747 402bbf 18 API calls 6746->6747 6748 4021f0 6747->6748 6749 402bbf 18 API calls 6748->6749 6750 4021f9 6749->6750 6751 402bbf 18 API calls 6750->6751 6752 402202 6751->6752 6753 4064c1 2 API calls 6752->6753 6754 40220b 6753->6754 6755 40221c lstrlenW lstrlenW 6754->6755 6756 40220f 6754->6756 6758 4052dd 25 API calls 6755->6758 6757 4052dd 25 API calls 6756->6757 6760 402217 6756->6760 6757->6760 6759 40225a SHFileOperationW 6758->6759 6759->6756 6759->6760 6299 40156b 6300 401584 6299->6300 6301 40157b ShowWindow 6299->6301 6302 401592 ShowWindow 6300->6302 6303 402a4c 6300->6303 6301->6300 6302->6303 6304 40226e 6305 402288 6304->6305 6306 402275 6304->6306 6307 4061a0 18 API calls 6306->6307 6308 402282 6307->6308 6309 4058c3 MessageBoxIndirectW 6308->6309 6309->6305 6761 4014f1 SetForegroundWindow 6762 402a4c 6761->6762 6310 401673 6311 402bbf 18 API calls 6310->6311 6312 40167a 6311->6312 6313 402bbf 18 API calls 6312->6313 6314 401683 6313->6314 6315 402bbf 18 API calls 6314->6315 6316 40168c MoveFileW 6315->6316 6317 401698 6316->6317 6318 40169f 6316->6318 6319 401423 25 API calls 6317->6319 6320 4064c1 2 API calls 6318->6320 6322 4021e1 6318->6322 6319->6322 6321 4016ae 6320->6321 6321->6322 6323 40601f 38 API calls 6321->6323 6323->6317 6763 100016b6 6764 100016e5 6763->6764 6765 10001b18 22 API calls 6764->6765 6766 100016ec 6765->6766 6767 100016f3 6766->6767 6768 100016ff 6766->6768 6769 10001272 2 API calls 6767->6769 6770 10001726 6768->6770 6771 10001709 6768->6771 6775 100016fd 6769->6775 6773 10001750 6770->6773 6774 1000172c 6770->6774 6772 1000153d 3 API calls 6771->6772 6776 1000170e 6772->6776 6778 1000153d 3 API calls 6773->6778 6777 100015b4 3 API calls 6774->6777 6779 100015b4 3 API calls 6776->6779 6780 10001731 6777->6780 6778->6775 6781 10001714 6779->6781 6782 10001272 2 API calls 6780->6782 6783 10001272 2 API calls 6781->6783 6784 10001737 GlobalFree 6782->6784 6785 1000171a GlobalFree 6783->6785 6784->6775 6786 1000174b GlobalFree 6784->6786 6785->6775 6786->6775 6324 10002238 6325 10002296 6324->6325 6326 100022cc 6324->6326 6325->6326 6327 100022a8 GlobalAlloc 6325->6327 6327->6325 6787 401cfa GetDlgItem GetClientRect 6788 402bbf 18 API calls 6787->6788 6789 401d2c LoadImageW SendMessageW 6788->6789 6790 401d4a DeleteObject 6789->6790 6791 402a4c 6789->6791 6790->6791 5973 40237b 5974 402381 5973->5974 5975 402bbf 18 API calls 5974->5975 5976 402393 5975->5976 5977 402bbf 18 API calls 5976->5977 5978 40239d RegCreateKeyExW 5977->5978 5979 4023c7 5978->5979 5980 40281e 5978->5980 5981 402bbf 18 API calls 5979->5981 5982 4023e2 5979->5982 5985 4023d8 lstrlenW 5981->5985 5984 4023ee 5982->5984 5986 402ba2 18 API calls 5982->5986 5983 402409 RegSetValueExW 5988 40241f RegCloseKey 5983->5988 5984->5983 5987 4030e7 45 API calls 5984->5987 5985->5982 5986->5984 5987->5983 5988->5980 6792 4027fb 6793 402bbf 18 API calls 6792->6793 6794 402802 FindFirstFileW 6793->6794 6795 402815 6794->6795 6796 40282a 6794->6796 6797 402833 6796->6797 6800 4060c5 wsprintfW 6796->6800 6801 40617e lstrcpynW 6797->6801 6800->6797 6801->6795 6342 1000103d 6343 1000101b 5 API calls 6342->6343 6344 10001056 6343->6344 6802 4014ff 6803 401507 6802->6803 6805 40151a 6802->6805 6804 402ba2 18 API calls 6803->6804 6804->6805 6345 401000 6346 401037 BeginPaint GetClientRect 6345->6346 6347 40100c DefWindowProcW 6345->6347 6349 4010f3 6346->6349 6352 401179 6347->6352 6350 401073 CreateBrushIndirect FillRect DeleteObject 6349->6350 6351 4010fc 6349->6351 6350->6349 6353 401102 CreateFontIndirectW 6351->6353 6354 401167 EndPaint 6351->6354 6353->6354 6355 401112 6 API calls 6353->6355 6354->6352 6355->6354 6363 401904 6364 40193b 6363->6364 6365 402bbf 18 API calls 6364->6365 6366 401940 6365->6366 6367 40596f 69 API calls 6366->6367 6368 401949 6367->6368 6369 402d04 6370 402d16 SetTimer 6369->6370 6371 402d2f 6369->6371 6370->6371 6372 402d7d 6371->6372 6373 402d83 MulDiv 6371->6373 6374 402d3d wsprintfW SetWindowTextW SetDlgItemTextW 6373->6374 6374->6372 6806 403985 6807 403990 6806->6807 6808 403994 6807->6808 6809 403997 GlobalAlloc 6807->6809 6809->6808 6810 402786 6811 40278d 6810->6811 6814 4029f7 6810->6814 6812 402ba2 18 API calls 6811->6812 6813 402798 6812->6813 6815 40279f SetFilePointer 6813->6815 6815->6814 6816 4027af 6815->6816 6818 4060c5 wsprintfW 6816->6818 6818->6814 5264 100027c7 5265 10002817 5264->5265 5266 100027d7 VirtualProtect 5264->5266 5266->5265 6376 401907 6377 402bbf 18 API calls 6376->6377 6378 40190e 6377->6378 6379 4058c3 MessageBoxIndirectW 6378->6379 6380 401917 6379->6380 5267 401e08 5268 402bbf 18 API calls 5267->5268 5269 401e0e 5268->5269 5270 402bbf 18 API calls 5269->5270 5271 401e17 5270->5271 5272 402bbf 18 API calls 5271->5272 5273 401e20 5272->5273 5274 402bbf 18 API calls 5273->5274 5275 401e29 5274->5275 5276 401423 25 API calls 5275->5276 5277 401e30 ShellExecuteW 5276->5277 5278 401e61 5277->5278 6381 1000164f 6382 10001516 GlobalFree 6381->6382 6384 10001667 6382->6384 6383 100016ad GlobalFree 6384->6383 6385 10001682 6384->6385 6386 10001699 VirtualFree 6384->6386 6385->6383 6386->6383 6824 404390 lstrlenW 6825 4043b1 WideCharToMultiByte 6824->6825 6826 4043af 6824->6826 6826->6825 6827 401491 6828 4052dd 25 API calls 6827->6828 6829 401498 6828->6829 6387 401a15 6388 402bbf 18 API calls 6387->6388 6389 401a1e ExpandEnvironmentStringsW 6388->6389 6390 401a32 6389->6390 6392 401a45 6389->6392 6391 401a37 lstrcmpW 6390->6391 6390->6392 6391->6392 6393 402515 6394 402bbf 18 API calls 6393->6394 6395 40251c 6394->6395 6398 405d53 GetFileAttributesW CreateFileW 6395->6398 6397 402528 6398->6397 6837 402095 6838 402bbf 18 API calls 6837->6838 6839 40209c 6838->6839 6840 402bbf 18 API calls 6839->6840 6841 4020a6 6840->6841 6842 402bbf 18 API calls 6841->6842 6843 4020b0 6842->6843 6844 402bbf 18 API calls 6843->6844 6845 4020ba 6844->6845 6846 402bbf 18 API calls 6845->6846 6848 4020c4 6846->6848 6847 402103 CoCreateInstance 6850 402122 6847->6850 6848->6847 6849 402bbf 18 API calls 6848->6849 6849->6847 6851 401423 25 API calls 6850->6851 6852 4021e1 6850->6852 6851->6852 6399 401b16 6400 402bbf 18 API calls 6399->6400 6401 401b1d 6400->6401 6402 402ba2 18 API calls 6401->6402 6403 401b26 wsprintfW 6402->6403 6404 402a4c 6403->6404 6853 404696 6854 4046a6 6853->6854 6855 4046cc 6853->6855 6857 404242 19 API calls 6854->6857 6856 4042a9 8 API calls 6855->6856 6858 4046d8 6856->6858 6859 4046b3 SetDlgItemTextW 6857->6859 6859->6855 6405 10001058 6407 10001074 6405->6407 6406 100010dd 6407->6406 6408 10001516 GlobalFree 6407->6408 6409 10001092 6407->6409 6408->6409 6410 10001516 GlobalFree 6409->6410 6411 100010a2 6410->6411 6412 100010b2 6411->6412 6413 100010a9 GlobalSize 6411->6413 6414 100010b6 GlobalAlloc 6412->6414 6415 100010c7 6412->6415 6413->6412 6416 1000153d 3 API calls 6414->6416 6417 100010d2 GlobalFree 6415->6417 6416->6415 6417->6406 5990 40159b 5991 402bbf 18 API calls 5990->5991 5992 4015a2 SetFileAttributesW 5991->5992 5993 4015b4 5992->5993 5994 40541c 5995 4055c6 5994->5995 5996 40543d GetDlgItem GetDlgItem GetDlgItem 5994->5996 5998 4055f7 5995->5998 5999 4055cf GetDlgItem CreateThread FindCloseChangeNotification 5995->5999 6040 404277 SendMessageW 5996->6040 6000 405622 5998->6000 6002 405647 5998->6002 6003 40560e ShowWindow ShowWindow 5998->6003 5999->5998 6043 4053b0 5 API calls 5999->6043 6004 405682 6000->6004 6005 40562e 6000->6005 6001 4054ad 6010 4054b4 GetClientRect GetSystemMetrics SendMessageW SendMessageW 6001->6010 6009 4042a9 8 API calls 6002->6009 6042 404277 SendMessageW 6003->6042 6004->6002 6013 405690 SendMessageW 6004->6013 6007 405636 6005->6007 6008 40565c ShowWindow 6005->6008 6014 40421b SendMessageW 6007->6014 6016 40567c 6008->6016 6017 40566e 6008->6017 6015 405655 6009->6015 6011 405522 6010->6011 6012 405506 SendMessageW SendMessageW 6010->6012 6018 405535 6011->6018 6019 405527 SendMessageW 6011->6019 6012->6011 6013->6015 6020 4056a9 CreatePopupMenu 6013->6020 6014->6002 6022 40421b SendMessageW 6016->6022 6021 4052dd 25 API calls 6017->6021 6024 404242 19 API calls 6018->6024 6019->6018 6023 4061a0 18 API calls 6020->6023 6021->6016 6022->6004 6025 4056b9 AppendMenuW 6023->6025 6026 405545 6024->6026 6027 4056d6 GetWindowRect 6025->6027 6028 4056e9 TrackPopupMenu 6025->6028 6029 405582 GetDlgItem SendMessageW 6026->6029 6030 40554e ShowWindow 6026->6030 6027->6028 6028->6015 6031 405704 6028->6031 6029->6015 6034 4055a9 SendMessageW SendMessageW 6029->6034 6032 405571 6030->6032 6033 405564 ShowWindow 6030->6033 6035 405720 SendMessageW 6031->6035 6041 404277 SendMessageW 6032->6041 6033->6032 6034->6015 6035->6035 6036 40573d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 6035->6036 6038 405762 SendMessageW 6036->6038 6038->6038 6039 40578b GlobalUnlock SetClipboardData CloseClipboard 6038->6039 6039->6015 6040->6001 6041->6029 6042->6000 6044 40229d 6045 4022a5 6044->6045 6046 4022ab 6044->6046 6047 402bbf 18 API calls 6045->6047 6048 402bbf 18 API calls 6046->6048 6051 4022b9 6046->6051 6047->6046 6048->6051 6049 4022c7 6050 402bbf 18 API calls 6049->6050 6053 4022d0 WritePrivateProfileStringW 6050->6053 6051->6049 6052 402bbf 18 API calls 6051->6052 6052->6049 6418 401f1d 6419 402bbf 18 API calls 6418->6419 6420 401f24 6419->6420 6421 406558 5 API calls 6420->6421 6422 401f33 6421->6422 6423 401fb7 6422->6423 6424 401f4f GlobalAlloc 6422->6424 6424->6423 6425 401f63 6424->6425 6426 406558 5 API calls 6425->6426 6427 401f6a 6426->6427 6428 406558 5 API calls 6427->6428 6429 401f74 6428->6429 6429->6423 6433 4060c5 wsprintfW 6429->6433 6431 401fa9 6434 4060c5 wsprintfW 6431->6434 6433->6431 6434->6423 6054 40249e 6055 402cc9 19 API calls 6054->6055 6056 4024a8 6055->6056 6057 402ba2 18 API calls 6056->6057 6058 4024b1 6057->6058 6059 4024bc 6058->6059 6063 40281e 6058->6063 6060 4024d5 RegEnumValueW 6059->6060 6061 4024c9 RegEnumKeyW 6059->6061 6062 4024ee RegCloseKey 6060->6062 6060->6063 6061->6062 6062->6063 6860 40149e 6861 402288 6860->6861 6862 4014ac PostQuitMessage 6860->6862 6862->6861 6065 40231f 6066 402324 6065->6066 6067 40234f 6065->6067 6068 402cc9 19 API calls 6066->6068 6069 402bbf 18 API calls 6067->6069 6070 40232b 6068->6070 6071 402356 6069->6071 6072 402335 6070->6072 6076 40236c 6070->6076 6077 402bff RegOpenKeyExW 6071->6077 6073 402bbf 18 API calls 6072->6073 6074 40233c RegDeleteValueW RegCloseKey 6073->6074 6074->6076 6078 402c93 6077->6078 6081 402c2a 6077->6081 6078->6076 6079 402c50 RegEnumKeyW 6080 402c62 RegCloseKey 6079->6080 6079->6081 6083 406558 5 API calls 6080->6083 6081->6079 6081->6080 6082 402c87 RegCloseKey 6081->6082 6086 402bff 5 API calls 6081->6086 6085 402c76 6082->6085 6084 402c72 6083->6084 6084->6085 6087 402ca2 RegDeleteKeyW 6084->6087 6085->6078 6086->6081 6087->6085 6863 100010e1 6872 10001111 6863->6872 6864 100011d8 GlobalFree 6865 100012ba 2 API calls 6865->6872 6866 100011d3 6866->6864 6867 10001164 GlobalAlloc 6867->6872 6868 100011f8 GlobalFree 6868->6872 6869 10001272 2 API calls 6870 100011c4 GlobalFree 6869->6870 6870->6872 6871 100012e1 lstrcpyW 6871->6872 6872->6864 6872->6865 6872->6866 6872->6867 6872->6868 6872->6869 6872->6870 6872->6871 6873 401ca3 6874 402ba2 18 API calls 6873->6874 6875 401ca9 IsWindow 6874->6875 6876 401a05 6875->6876 6435 402a27 SendMessageW 6436 402a41 InvalidateRect 6435->6436 6437 402a4c 6435->6437 6436->6437 5542 40242a 5553 402cc9 5542->5553 5544 402434 5545 402bbf 18 API calls 5544->5545 5546 40243d 5545->5546 5547 402448 RegQueryValueExW 5546->5547 5551 40281e 5546->5551 5548 40246e RegCloseKey 5547->5548 5549 402468 5547->5549 5548->5551 5549->5548 5557 4060c5 wsprintfW 5549->5557 5554 402bbf 18 API calls 5553->5554 5555 402ce2 5554->5555 5556 402cf0 RegOpenKeyExW 5555->5556 5556->5544 5557->5548 6445 40172d 6446 402bbf 18 API calls 6445->6446 6447 401734 SearchPathW 6446->6447 6448 40174f 6447->6448 6449 404a33 6450 404a43 6449->6450 6451 404a5f 6449->6451 6460 4058a7 GetDlgItemTextW 6450->6460 6453 404a92 6451->6453 6454 404a65 SHGetPathFromIDListW 6451->6454 6456 404a7c SendMessageW 6454->6456 6457 404a75 6454->6457 6455 404a50 SendMessageW 6455->6451 6456->6453 6458 40140b 2 API calls 6457->6458 6458->6456 6460->6455 6877 4027b4 6878 4027ba 6877->6878 6879 4027c2 FindClose 6878->6879 6880 402a4c 6878->6880 6879->6880 5579 4033b6 SetErrorMode GetVersion 5580 4033eb 5579->5580 5581 4033f1 5579->5581 5582 406558 5 API calls 5580->5582 5667 4064e8 GetSystemDirectoryW 5581->5667 5582->5581 5584 403407 lstrlenA 5584->5581 5585 403417 5584->5585 5670 406558 GetModuleHandleA 5585->5670 5588 406558 5 API calls 5589 403426 #17 OleInitialize SHGetFileInfoW 5588->5589 5676 40617e lstrcpynW 5589->5676 5591 403463 GetCommandLineW 5677 40617e lstrcpynW 5591->5677 5593 403475 GetModuleHandleW 5594 40348d 5593->5594 5595 405b5f CharNextW 5594->5595 5596 40349c CharNextW 5595->5596 5597 4035c6 GetTempPathW 5596->5597 5605 4034b5 5596->5605 5678 403385 5597->5678 5599 4035de 5600 4035e2 GetWindowsDirectoryW lstrcatW 5599->5600 5601 403638 DeleteFileW 5599->5601 5602 403385 12 API calls 5600->5602 5688 402e41 GetTickCount GetModuleFileNameW 5601->5688 5606 4035fe 5602->5606 5603 405b5f CharNextW 5603->5605 5605->5603 5611 4035b1 5605->5611 5612 4035af 5605->5612 5606->5601 5608 403602 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 5606->5608 5607 40364c 5609 4036ff 5607->5609 5613 4036ef 5607->5613 5618 405b5f CharNextW 5607->5618 5610 403385 12 API calls 5608->5610 5791 4038d5 5609->5791 5616 403630 5610->5616 5774 40617e lstrcpynW 5611->5774 5612->5597 5718 4039c7 5613->5718 5616->5601 5616->5609 5634 40366b 5618->5634 5620 403839 5623 403841 GetCurrentProcess OpenProcessToken 5620->5623 5624 4038bd ExitProcess 5620->5624 5621 403719 5622 4058c3 MessageBoxIndirectW 5621->5622 5626 403727 ExitProcess 5622->5626 5629 403859 LookupPrivilegeValueW AdjustTokenPrivileges 5623->5629 5630 40388d 5623->5630 5627 4036c9 5775 405c3a 5627->5775 5628 40372f 5800 405846 5628->5800 5629->5630 5633 406558 5 API calls 5630->5633 5637 403894 5633->5637 5634->5627 5634->5628 5640 4038a9 ExitWindowsEx 5637->5640 5643 4038b6 5637->5643 5638 403750 lstrcatW lstrcmpiW 5638->5609 5642 40376c 5638->5642 5639 403745 lstrcatW 5639->5638 5640->5624 5640->5643 5646 403771 5642->5646 5647 403778 5642->5647 5644 40140b 2 API calls 5643->5644 5644->5624 5645 4036e4 5790 40617e lstrcpynW 5645->5790 5803 4057ac CreateDirectoryW 5646->5803 5808 405829 CreateDirectoryW 5647->5808 5652 40377d SetCurrentDirectoryW 5653 403798 5652->5653 5654 40378d 5652->5654 5812 40617e lstrcpynW 5653->5812 5811 40617e lstrcpynW 5654->5811 5657 4061a0 18 API calls 5658 4037d7 DeleteFileW 5657->5658 5659 4037e4 CopyFileW 5658->5659 5664 4037a6 5658->5664 5659->5664 5660 40382d 5661 40601f 38 API calls 5660->5661 5661->5609 5663 4061a0 18 API calls 5663->5664 5664->5657 5664->5660 5664->5663 5666 403818 CloseHandle 5664->5666 5813 40601f MoveFileExW 5664->5813 5817 40585e CreateProcessW 5664->5817 5666->5664 5669 40650a wsprintfW LoadLibraryExW 5667->5669 5669->5584 5671 406574 5670->5671 5672 40657e GetProcAddress 5670->5672 5673 4064e8 3 API calls 5671->5673 5674 40341f 5672->5674 5675 40657a 5673->5675 5674->5588 5675->5672 5675->5674 5676->5591 5677->5593 5679 406412 5 API calls 5678->5679 5681 403391 5679->5681 5680 40339b 5680->5599 5681->5680 5682 405b32 3 API calls 5681->5682 5683 4033a3 5682->5683 5684 405829 2 API calls 5683->5684 5685 4033a9 5684->5685 5686 405d82 2 API calls 5685->5686 5687 4033b4 5686->5687 5687->5599 5820 405d53 GetFileAttributesW CreateFileW 5688->5820 5690 402e84 5717 402e91 5690->5717 5821 40617e lstrcpynW 5690->5821 5692 402ea7 5822 405b7e lstrlenW 5692->5822 5696 402eb8 GetFileSize 5697 402fb9 5696->5697 5716 402ecf 5696->5716 5698 402d9f 33 API calls 5697->5698 5700 402fc0 5698->5700 5699 403358 ReadFile 5699->5716 5701 402ffc GlobalAlloc 5700->5701 5700->5717 5828 40336e SetFilePointer 5700->5828 5704 403013 5701->5704 5702 403054 5705 402d9f 33 API calls 5702->5705 5709 405d82 2 API calls 5704->5709 5705->5717 5706 402fdd 5707 403358 ReadFile 5706->5707 5710 402fe8 5707->5710 5708 402d9f 33 API calls 5708->5716 5711 403024 CreateFileW 5709->5711 5710->5701 5710->5717 5712 40305e 5711->5712 5711->5717 5827 40336e SetFilePointer 5712->5827 5714 40306c 5715 4030e7 45 API calls 5714->5715 5715->5717 5716->5697 5716->5699 5716->5702 5716->5708 5716->5717 5717->5607 5719 406558 5 API calls 5718->5719 5720 4039db 5719->5720 5721 4039f3 5720->5721 5724 4039e1 5720->5724 5722 40604b 3 API calls 5721->5722 5723 403a23 5722->5723 5725 403a42 lstrcatW 5723->5725 5727 40604b 3 API calls 5723->5727 5845 4060c5 wsprintfW 5724->5845 5728 4039f1 5725->5728 5727->5725 5829 403c9d 5728->5829 5731 405c3a 18 API calls 5732 403a74 5731->5732 5733 403b08 5732->5733 5735 40604b 3 API calls 5732->5735 5734 405c3a 18 API calls 5733->5734 5736 403b0e 5734->5736 5738 403aa6 5735->5738 5737 403b1e LoadImageW 5736->5737 5739 4061a0 18 API calls 5736->5739 5740 403bc4 5737->5740 5741 403b45 RegisterClassW 5737->5741 5738->5733 5742 403ac7 lstrlenW 5738->5742 5746 405b5f CharNextW 5738->5746 5739->5737 5745 40140b 2 API calls 5740->5745 5743 403bce 5741->5743 5744 403b7b SystemParametersInfoW CreateWindowExW 5741->5744 5747 403ad5 lstrcmpiW 5742->5747 5748 403afb 5742->5748 5743->5609 5744->5740 5749 403bca 5745->5749 5750 403ac4 5746->5750 5747->5748 5751 403ae5 GetFileAttributesW 5747->5751 5752 405b32 3 API calls 5748->5752 5749->5743 5754 403c9d 19 API calls 5749->5754 5750->5742 5753 403af1 5751->5753 5755 403b01 5752->5755 5753->5748 5756 405b7e 2 API calls 5753->5756 5757 403bdb 5754->5757 5846 40617e lstrcpynW 5755->5846 5756->5748 5759 403be7 ShowWindow 5757->5759 5760 403c6a 5757->5760 5762 4064e8 3 API calls 5759->5762 5838 4053b0 OleInitialize 5760->5838 5764 403bff 5762->5764 5763 403c70 5765 403c74 5763->5765 5766 403c8c 5763->5766 5767 403c0d GetClassInfoW 5764->5767 5769 4064e8 3 API calls 5764->5769 5765->5743 5773 40140b 2 API calls 5765->5773 5768 40140b 2 API calls 5766->5768 5770 403c21 GetClassInfoW RegisterClassW 5767->5770 5771 403c37 DialogBoxParamW 5767->5771 5768->5743 5769->5767 5770->5771 5772 40140b 2 API calls 5771->5772 5772->5743 5773->5743 5774->5612 5848 40617e lstrcpynW 5775->5848 5777 405c4b 5849 405bdd CharNextW CharNextW 5777->5849 5780 4036d5 5780->5609 5789 40617e lstrcpynW 5780->5789 5781 406412 5 API calls 5787 405c61 5781->5787 5782 405c92 lstrlenW 5783 405c9d 5782->5783 5782->5787 5785 405b32 3 API calls 5783->5785 5784 4064c1 2 API calls 5784->5787 5786 405ca2 GetFileAttributesW 5785->5786 5786->5780 5787->5780 5787->5782 5787->5784 5788 405b7e 2 API calls 5787->5788 5788->5782 5789->5645 5790->5613 5792 4038f0 5791->5792 5793 4038e6 CloseHandle 5791->5793 5794 403904 5792->5794 5795 4038fa CloseHandle 5792->5795 5793->5792 5855 403932 5794->5855 5795->5794 5801 406558 5 API calls 5800->5801 5802 403734 lstrcatW 5801->5802 5802->5638 5802->5639 5804 403776 5803->5804 5805 4057fd GetLastError 5803->5805 5804->5652 5805->5804 5806 40580c SetFileSecurityW 5805->5806 5806->5804 5807 405822 GetLastError 5806->5807 5807->5804 5809 405839 5808->5809 5810 40583d GetLastError 5808->5810 5809->5652 5810->5809 5811->5653 5812->5664 5814 406040 5813->5814 5815 406033 5813->5815 5814->5664 5908 405ead lstrcpyW 5815->5908 5818 405891 CloseHandle 5817->5818 5819 40589d 5817->5819 5818->5819 5819->5664 5820->5690 5821->5692 5823 405b8c 5822->5823 5824 405b92 CharPrevW 5823->5824 5825 402ead 5823->5825 5824->5823 5824->5825 5826 40617e lstrcpynW 5825->5826 5826->5696 5827->5714 5828->5706 5830 403cb1 5829->5830 5847 4060c5 wsprintfW 5830->5847 5832 403d22 5833 4061a0 18 API calls 5832->5833 5834 403d2e SetWindowTextW 5833->5834 5835 403a52 5834->5835 5836 403d4a 5834->5836 5835->5731 5836->5835 5837 4061a0 18 API calls 5836->5837 5837->5836 5839 40428e SendMessageW 5838->5839 5843 4053d3 5839->5843 5840 4053fa 5841 40428e SendMessageW 5840->5841 5842 40540c OleUninitialize 5841->5842 5842->5763 5843->5840 5844 401389 2 API calls 5843->5844 5844->5843 5845->5728 5846->5733 5847->5832 5848->5777 5850 405bfa 5849->5850 5853 405c0c 5849->5853 5852 405c07 CharNextW 5850->5852 5850->5853 5851 405c30 5851->5780 5851->5781 5852->5851 5853->5851 5854 405b5f CharNextW 5853->5854 5854->5853 5856 403940 5855->5856 5857 403909 5856->5857 5858 403945 FreeLibrary GlobalFree 5856->5858 5859 40596f 5857->5859 5858->5857 5858->5858 5860 405c3a 18 API calls 5859->5860 5861 40598f 5860->5861 5862 405997 DeleteFileW 5861->5862 5863 4059ae 5861->5863 5864 403708 OleUninitialize 5862->5864 5865 405ad9 5863->5865 5898 40617e lstrcpynW 5863->5898 5864->5620 5864->5621 5865->5864 5872 4064c1 2 API calls 5865->5872 5867 4059d4 5868 4059e7 5867->5868 5869 4059da lstrcatW 5867->5869 5871 405b7e 2 API calls 5868->5871 5870 4059ed 5869->5870 5873 4059fd lstrcatW 5870->5873 5875 405a08 lstrlenW FindFirstFileW 5870->5875 5871->5870 5874 405af3 5872->5874 5873->5875 5874->5864 5876 405af7 5874->5876 5877 405ace 5875->5877 5896 405a2a 5875->5896 5878 405b32 3 API calls 5876->5878 5877->5865 5879 405afd 5878->5879 5881 405927 5 API calls 5879->5881 5880 405ab1 FindNextFileW 5883 405ac7 FindClose 5880->5883 5880->5896 5884 405b09 5881->5884 5883->5877 5885 405b23 5884->5885 5886 405b0d 5884->5886 5888 4052dd 25 API calls 5885->5888 5886->5864 5889 4052dd 25 API calls 5886->5889 5888->5864 5891 405b1a 5889->5891 5890 40596f 62 API calls 5890->5896 5892 40601f 38 API calls 5891->5892 5894 405b21 5892->5894 5893 4052dd 25 API calls 5893->5880 5894->5864 5895 4052dd 25 API calls 5895->5896 5896->5880 5896->5890 5896->5893 5896->5895 5897 40601f 38 API calls 5896->5897 5899 40617e lstrcpynW 5896->5899 5900 405927 5896->5900 5897->5896 5898->5867 5899->5896 5901 405d2e 2 API calls 5900->5901 5902 405933 5901->5902 5903 405942 RemoveDirectoryW 5902->5903 5904 40594a DeleteFileW 5902->5904 5905 405954 5902->5905 5906 405950 5903->5906 5904->5906 5905->5896 5906->5905 5907 405960 SetFileAttributesW 5906->5907 5907->5905 5909 405ed5 5908->5909 5910 405efb GetShortPathNameW 5908->5910 5935 405d53 GetFileAttributesW CreateFileW 5909->5935 5912 405f10 5910->5912 5913 40601a 5910->5913 5912->5913 5915 405f18 wsprintfA 5912->5915 5913->5814 5914 405edf CloseHandle GetShortPathNameW 5914->5913 5916 405ef3 5914->5916 5917 4061a0 18 API calls 5915->5917 5916->5910 5916->5913 5918 405f40 5917->5918 5936 405d53 GetFileAttributesW CreateFileW 5918->5936 5920 405f4d 5920->5913 5921 405f5c GetFileSize GlobalAlloc 5920->5921 5922 406013 CloseHandle 5921->5922 5923 405f7e 5921->5923 5922->5913 5924 405dd6 ReadFile 5923->5924 5925 405f86 5924->5925 5925->5922 5937 405cb8 lstrlenA 5925->5937 5928 405fb1 5930 405cb8 4 API calls 5928->5930 5929 405f9d lstrcpyA 5932 405fbf 5929->5932 5930->5932 5931 405ff6 SetFilePointer 5933 405e05 WriteFile 5931->5933 5932->5931 5934 40600c GlobalFree 5933->5934 5934->5922 5935->5914 5936->5920 5938 405cf9 lstrlenA 5937->5938 5939 405d01 5938->5939 5940 405cd2 lstrcmpiA 5938->5940 5939->5928 5939->5929 5940->5939 5941 405cf0 CharNextA 5940->5941 5941->5938 6461 401b37 6462 401b44 6461->6462 6463 401b88 6461->6463 6466 401bcd 6462->6466 6471 401b5b 6462->6471 6464 401bb2 GlobalAlloc 6463->6464 6465 401b8d 6463->6465 6468 4061a0 18 API calls 6464->6468 6479 402288 6465->6479 6482 40617e lstrcpynW 6465->6482 6467 4061a0 18 API calls 6466->6467 6466->6479 6470 402282 6467->6470 6468->6466 6475 4058c3 MessageBoxIndirectW 6470->6475 6480 40617e lstrcpynW 6471->6480 6473 401b9f GlobalFree 6473->6479 6474 401b6a 6481 40617e lstrcpynW 6474->6481 6475->6479 6477 401b79 6483 40617e lstrcpynW 6477->6483 6480->6474 6481->6477 6482->6473 6483->6479 6484 402537 6485 402562 6484->6485 6486 40254b 6484->6486 6488 402596 6485->6488 6489 402567 6485->6489 6487 402ba2 18 API calls 6486->6487 6496 402552 6487->6496 6491 402bbf 18 API calls 6488->6491 6490 402bbf 18 API calls 6489->6490 6492 40256e WideCharToMultiByte lstrlenA 6490->6492 6493 40259d lstrlenW 6491->6493 6492->6496 6493->6496 6494 4025ca 6495 4025e0 6494->6495 6497 405e05 WriteFile 6494->6497 6496->6494 6496->6495 6499 405e34 SetFilePointer 6496->6499 6497->6495 6500 405e50 6499->6500 6507 405e6c 6499->6507 6501 405dd6 ReadFile 6500->6501 6502 405e5c 6501->6502 6503 405e75 SetFilePointer 6502->6503 6504 405e9d SetFilePointer 6502->6504 6502->6507 6503->6504 6505 405e80 6503->6505 6504->6507 6506 405e05 WriteFile 6505->6506 6506->6507 6507->6494 6881 4014b8 6882 4014be 6881->6882 6883 401389 2 API calls 6882->6883 6884 4014c6 6883->6884 5953 4015b9 5954 402bbf 18 API calls 5953->5954 5955 4015c0 5954->5955 5956 405bdd 4 API calls 5955->5956 5968 4015c9 5956->5968 5957 401629 5959 40165b 5957->5959 5960 40162e 5957->5960 5958 405b5f CharNextW 5958->5968 5962 401423 25 API calls 5959->5962 5961 401423 25 API calls 5960->5961 5963 401635 5961->5963 5969 401653 5962->5969 5972 40617e lstrcpynW 5963->5972 5964 405829 2 API calls 5964->5968 5966 405846 5 API calls 5966->5968 5967 401642 SetCurrentDirectoryW 5967->5969 5968->5957 5968->5958 5968->5964 5968->5966 5970 40160f GetFileAttributesW 5968->5970 5971 4057ac 4 API calls 5968->5971 5970->5968 5971->5968 5972->5967 6515 40293b 6516 402ba2 18 API calls 6515->6516 6517 402941 6516->6517 6518 402964 6517->6518 6519 40297d 6517->6519 6524 40281e 6517->6524 6520 402969 6518->6520 6521 40297a 6518->6521 6522 402993 6519->6522 6523 402987 6519->6523 6529 40617e lstrcpynW 6520->6529 6530 4060c5 wsprintfW 6521->6530 6526 4061a0 18 API calls 6522->6526 6525 402ba2 18 API calls 6523->6525 6525->6524 6526->6524 6529->6524 6530->6524 6531 10002a7f 6532 10002a97 6531->6532 6533 1000158f 2 API calls 6532->6533 6534 10002ab2 6533->6534

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 4033b6-4033e9 SetErrorMode GetVersion 1 4033eb-4033f3 call 406558 0->1 2 4033fc 0->2 1->2 7 4033f5 1->7 3 403401-403415 call 4064e8 lstrlenA 2->3 9 403417-40348b call 406558 * 2 #17 OleInitialize SHGetFileInfoW call 40617e GetCommandLineW call 40617e GetModuleHandleW 3->9 7->2 18 403495-4034af call 405b5f CharNextW 9->18 19 40348d-403494 9->19 22 4034b5-4034bb 18->22 23 4035c6-4035e0 GetTempPathW call 403385 18->23 19->18 24 4034c4-4034c8 22->24 25 4034bd-4034c2 22->25 30 4035e2-403600 GetWindowsDirectoryW lstrcatW call 403385 23->30 31 403638-403652 DeleteFileW call 402e41 23->31 27 4034ca-4034ce 24->27 28 4034cf-4034d3 24->28 25->24 25->25 27->28 32 403592-40359f call 405b5f 28->32 33 4034d9-4034df 28->33 30->31 46 403602-403632 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403385 30->46 50 403703-403713 call 4038d5 OleUninitialize 31->50 51 403658-40365e 31->51 48 4035a1-4035a2 32->48 49 4035a3-4035a9 32->49 37 4034e1-4034e9 33->37 38 4034fa-403533 33->38 42 4034f0 37->42 43 4034eb-4034ee 37->43 44 403550-40358a 38->44 45 403535-40353a 38->45 42->38 43->38 43->42 44->32 47 40358c-403590 44->47 45->44 52 40353c-403544 45->52 46->31 46->50 47->32 56 4035b1-4035bf call 40617e 47->56 48->49 49->22 57 4035af 49->57 67 403839-40383f 50->67 68 403719-403729 call 4058c3 ExitProcess 50->68 58 4036f3-4036fa call 4039c7 51->58 59 403664-40366f call 405b5f 51->59 53 403546-403549 52->53 54 40354b 52->54 53->44 53->54 54->44 63 4035c4 56->63 57->63 70 4036ff 58->70 74 403671-4036a6 59->74 75 4036bd-4036c7 59->75 63->23 72 403841-403857 GetCurrentProcess OpenProcessToken 67->72 73 4038bd-4038c5 67->73 70->50 81 403859-403887 LookupPrivilegeValueW AdjustTokenPrivileges 72->81 82 40388d-40389b call 406558 72->82 76 4038c7 73->76 77 4038cb-4038cf ExitProcess 73->77 83 4036a8-4036ac 74->83 79 4036c9-4036d7 call 405c3a 75->79 80 40372f-403743 call 405846 lstrcatW 75->80 76->77 79->50 93 4036d9-4036ef call 40617e * 2 79->93 94 403750-40376a lstrcatW lstrcmpiW 80->94 95 403745-40374b lstrcatW 80->95 81->82 96 4038a9-4038b4 ExitWindowsEx 82->96 97 40389d-4038a7 82->97 87 4036b5-4036b9 83->87 88 4036ae-4036b3 83->88 87->83 89 4036bb 87->89 88->87 88->89 89->75 93->58 94->50 99 40376c-40376f 94->99 95->94 96->73 100 4038b6-4038b8 call 40140b 96->100 97->96 97->100 103 403771-403776 call 4057ac 99->103 104 403778 call 405829 99->104 100->73 111 40377d-40378b SetCurrentDirectoryW 103->111 104->111 112 403798-4037c1 call 40617e 111->112 113 40378d-403793 call 40617e 111->113 117 4037c6-4037e2 call 4061a0 DeleteFileW 112->117 113->112 120 403823-40382b 117->120 121 4037e4-4037f4 CopyFileW 117->121 120->117 122 40382d-403834 call 40601f 120->122 121->120 123 4037f6-403816 call 40601f call 4061a0 call 40585e 121->123 122->50 123->120 132 403818-40381f CloseHandle 123->132 132->120
                          APIs
                          • SetErrorMode.KERNELBASE ref: 004033D9
                          • GetVersion.KERNEL32 ref: 004033DF
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403408
                          • #17.COMCTL32(00000007,00000009), ref: 0040342B
                          • OleInitialize.OLE32(00000000), ref: 00403432
                          • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 0040344E
                          • GetCommandLineW.KERNEL32(00429240,NSIS Error), ref: 00403463
                          • GetModuleHandleW.KERNEL32(00000000,00435000,00000000), ref: 00403476
                          • CharNextW.USER32(00000000,00435000,00000020), ref: 0040349D
                            • Part of subcall function 00406558: GetModuleHandleA.KERNEL32(?,00000020,?,0040341F,00000009), ref: 0040656A
                            • Part of subcall function 00406558: GetProcAddress.KERNEL32(00000000,?), ref: 00406585
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004035D7
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004035E8
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004035F4
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403608
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403610
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403621
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403629
                          • DeleteFileW.KERNELBASE(1033), ref: 0040363D
                            • Part of subcall function 0040617E: lstrcpynW.KERNEL32(?,?,00000400,00403463,00429240,NSIS Error), ref: 0040618B
                          • OleUninitialize.OLE32(?), ref: 00403708
                          • ExitProcess.KERNEL32 ref: 00403729
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 0040373C
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328), ref: 0040374B
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403756
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,?), ref: 00403762
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040377E
                          • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,?), ref: 004037D8
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\eXiJWkp8OE.exe,00420EE8,?), ref: 004037EC
                          • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000), ref: 00403819
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403848
                          • OpenProcessToken.ADVAPI32(00000000), ref: 0040384F
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403864
                          • AdjustTokenPrivileges.ADVAPI32 ref: 00403887
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 004038AC
                          • ExitProcess.KERNEL32 ref: 004038CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                          • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\eXiJWkp8OE.exe$C:\Users\user\tndingers\idyllion\Hexagonet121$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                          • API String ID: 2488574733-306226163
                          • Opcode ID: adc4d748d9836f5a15988fa3e2f94b2f0245c9efab62edd68d6b1bb0daacd0ec
                          • Instruction ID: be8551fa6605ebbbfda7487142ffb020be8bd547a3943651712312bea09c5587
                          • Opcode Fuzzy Hash: adc4d748d9836f5a15988fa3e2f94b2f0245c9efab62edd68d6b1bb0daacd0ec
                          • Instruction Fuzzy Hash: AED10571200300ABE7207F659D49A2B3AEDEB4074AF50443FF881B62D2DB7C8956876E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 133 40541c-405437 134 4055c6-4055cd 133->134 135 40543d-405504 GetDlgItem * 3 call 404277 call 404b7a GetClientRect GetSystemMetrics SendMessageW * 2 133->135 137 4055f7-405604 134->137 138 4055cf-4055f1 GetDlgItem CreateThread FindCloseChangeNotification 134->138 153 405522-405525 135->153 154 405506-405520 SendMessageW * 2 135->154 139 405622-40562c 137->139 140 405606-40560c 137->140 138->137 144 405682-405686 139->144 145 40562e-405634 139->145 142 405647-405650 call 4042a9 140->142 143 40560e-40561d ShowWindow * 2 call 404277 140->143 157 405655-405659 142->157 143->139 144->142 147 405688-40568e 144->147 149 405636-405642 call 40421b 145->149 150 40565c-40566c ShowWindow 145->150 147->142 155 405690-4056a3 SendMessageW 147->155 149->142 158 40567c-40567d call 40421b 150->158 159 40566e-405677 call 4052dd 150->159 160 405535-40554c call 404242 153->160 161 405527-405533 SendMessageW 153->161 154->153 162 4057a5-4057a7 155->162 163 4056a9-4056d4 CreatePopupMenu call 4061a0 AppendMenuW 155->163 158->144 159->158 172 405582-4055a3 GetDlgItem SendMessageW 160->172 173 40554e-405562 ShowWindow 160->173 161->160 162->157 170 4056d6-4056e6 GetWindowRect 163->170 171 4056e9-4056fe TrackPopupMenu 163->171 170->171 171->162 174 405704-40571b 171->174 172->162 177 4055a9-4055c1 SendMessageW * 2 172->177 175 405571 173->175 176 405564-40556f ShowWindow 173->176 178 405720-40573b SendMessageW 174->178 179 405577-40557d call 404277 175->179 176->179 177->162 178->178 180 40573d-405760 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 178->180 179->172 182 405762-405789 SendMessageW 180->182 182->182 183 40578b-40579f GlobalUnlock SetClipboardData CloseClipboard 182->183 183->162
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 0040547A
                          • GetDlgItem.USER32(?,000003EE), ref: 00405489
                          • GetClientRect.USER32(?,?), ref: 004054C6
                          • GetSystemMetrics.USER32(00000002), ref: 004054CD
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004054EE
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004054FF
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405512
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405520
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405533
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405555
                          • ShowWindow.USER32(?,00000008), ref: 00405569
                          • GetDlgItem.USER32(?,000003EC), ref: 0040558A
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040559A
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055B3
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055BF
                          • GetDlgItem.USER32(?,000003F8), ref: 00405498
                            • Part of subcall function 00404277: SendMessageW.USER32(00000028,?,?,004040A3), ref: 00404285
                          • GetDlgItem.USER32(?,000003EC), ref: 004055DC
                          • CreateThread.KERNELBASE(00000000,00000000,Function_000053B0,00000000), ref: 004055EA
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004055F1
                          • ShowWindow.USER32(00000000), ref: 00405615
                          • ShowWindow.USER32(?,00000008), ref: 0040561A
                          • ShowWindow.USER32(00000008), ref: 00405664
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405698
                          • CreatePopupMenu.USER32 ref: 004056A9
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056BD
                          • GetWindowRect.USER32(?,?), ref: 004056DD
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004056F6
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040572E
                          • OpenClipboard.USER32(00000000), ref: 0040573E
                          • EmptyClipboard.USER32 ref: 00405744
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405750
                          • GlobalLock.KERNEL32(00000000), ref: 0040575A
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040576E
                          • GlobalUnlock.KERNEL32(00000000), ref: 0040578E
                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405799
                          • CloseClipboard.USER32 ref: 0040579F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                          • String ID: (7B${
                          • API String ID: 4154960007-525222780
                          • Opcode ID: f6d2915a6587b586d239fbd17ad2b43bc111d577791281636ac7451dba1aac6c
                          • Instruction ID: 916ab36d0f469a383f2c04aed4d67e33a9af93c646c7432e75c1414f8414c4dc
                          • Opcode Fuzzy Hash: f6d2915a6587b586d239fbd17ad2b43bc111d577791281636ac7451dba1aac6c
                          • Instruction Fuzzy Hash: 44B15670900608FFDB119FA0DD89EAE3B79FB48354F40847AFA45A61A0CB754E52DF68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 361 402e41-402e8f GetTickCount GetModuleFileNameW call 405d53 364 402e91-402e96 361->364 365 402e9b-402ec9 call 40617e call 405b7e call 40617e GetFileSize 361->365 366 4030e0-4030e4 364->366 373 402fb9-402fc7 call 402d9f 365->373 374 402ecf-402ee6 365->374 381 403098-40309d 373->381 382 402fcd-402fd0 373->382 375 402ee8 374->375 376 402eea-402ef7 call 403358 374->376 375->376 385 403054-40305c call 402d9f 376->385 386 402efd-402f03 376->386 381->366 383 402fd2-402fea call 40336e call 403358 382->383 384 402ffc-403048 GlobalAlloc call 406677 call 405d82 CreateFileW 382->384 383->381 409 402ff0-402ff6 383->409 411 40304a-40304f 384->411 412 40305e-40308e call 40336e call 4030e7 384->412 385->381 389 402f83-402f87 386->389 390 402f05-402f1d call 405d0e 386->390 393 402f90-402f96 389->393 394 402f89-402f8f call 402d9f 389->394 390->393 408 402f1f-402f26 390->408 400 402f98-402fa6 call 406609 393->400 401 402fa9-402fb3 393->401 394->393 400->401 401->373 401->374 408->393 413 402f28-402f2f 408->413 409->381 409->384 411->366 420 403093-403096 412->420 413->393 415 402f31-402f38 413->415 415->393 417 402f3a-402f41 415->417 417->393 419 402f43-402f63 417->419 419->381 421 402f69-402f6d 419->421 420->381 424 40309f-4030b0 420->424 422 402f75-402f7d 421->422 423 402f6f-402f73 421->423 422->393 425 402f7f-402f81 422->425 423->373 423->422 426 4030b2 424->426 427 4030b8-4030bd 424->427 425->393 426->427 428 4030be-4030c4 427->428 428->428 429 4030c6-4030de call 405d0e 428->429 429->366
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402E55
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\eXiJWkp8OE.exe,00000400), ref: 00402E71
                            • Part of subcall function 00405D53: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\eXiJWkp8OE.exe,80000000,00000003), ref: 00405D57
                            • Part of subcall function 00405D53: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405D79
                          • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\eXiJWkp8OE.exe,C:\Users\user\Desktop\eXiJWkp8OE.exe,80000000,00000003), ref: 00402EBA
                          • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 00403001
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\eXiJWkp8OE.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-3026155795
                          • Opcode ID: cc8dbefb85167051c5f544e5004306f35bb35ae70e2c75d84afc589ab8111160
                          • Instruction ID: e866f1dd798e5fb15c0a347603bcfded6ce2f229c2e481af73dd86df93422dd6
                          • Opcode Fuzzy Hash: cc8dbefb85167051c5f544e5004306f35bb35ae70e2c75d84afc589ab8111160
                          • Instruction Fuzzy Hash: 9761C431A00215ABDB209F75DD49B9E7BB8EB00359F20817FF500F62D1DABD9A448B5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 432 4061a0-4061ab 433 4061ad-4061bc 432->433 434 4061be-4061d4 432->434 433->434 435 4061da-4061e7 434->435 436 4063ec-4063f2 434->436 435->436 439 4061ed-4061f4 435->439 437 4063f8-406403 436->437 438 4061f9-406206 436->438 441 406405-406409 call 40617e 437->441 442 40640e-40640f 437->442 438->437 440 40620c-406218 438->440 439->436 443 4063d9 440->443 444 40621e-40625a 440->444 441->442 446 4063e7-4063ea 443->446 447 4063db-4063e5 443->447 448 406260-40626b GetVersion 444->448 449 40637a-40637e 444->449 446->436 447->436 450 406285 448->450 451 40626d-406271 448->451 452 406380-406384 449->452 453 4063b3-4063b7 449->453 457 40628c-406293 450->457 451->450 454 406273-406277 451->454 455 406394-4063a1 call 40617e 452->455 456 406386-406392 call 4060c5 452->456 458 4063c6-4063d7 lstrlenW 453->458 459 4063b9-4063c1 call 4061a0 453->459 454->450 461 406279-40627d 454->461 470 4063a6-4063af 455->470 456->470 463 406295-406297 457->463 464 406298-40629a 457->464 458->436 459->458 461->450 466 40627f-406283 461->466 463->464 468 4062d6-4062d9 464->468 469 40629c-4062c2 call 40604b 464->469 466->457 471 4062e9-4062ec 468->471 472 4062db-4062e7 GetSystemDirectoryW 468->472 480 406361-406365 469->480 483 4062c8-4062d1 call 4061a0 469->483 470->458 474 4063b1 470->474 476 406357-406359 471->476 477 4062ee-4062fc GetWindowsDirectoryW 471->477 475 40635b-40635f 472->475 479 406372-406378 call 406412 474->479 475->479 475->480 476->475 482 4062fe-406308 476->482 477->476 479->458 480->479 485 406367-40636d lstrcatW 480->485 487 406322-406338 SHGetSpecialFolderLocation 482->487 488 40630a-40630d 482->488 483->475 485->479 491 406353 487->491 492 40633a-406351 SHGetPathFromIDListW CoTaskMemFree 487->492 488->487 490 40630f-406316 488->490 493 40631e-406320 490->493 491->476 492->475 492->491 493->475 493->487
                          APIs
                          • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,?,00405314,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000), ref: 00406263
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004062E1
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004062F4
                          • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406330
                          • SHGetPathFromIDListW.SHELL32(?,Call), ref: 0040633E
                          • CoTaskMemFree.OLE32(?), ref: 00406349
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040636D
                          • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,?,00405314,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000), ref: 004063C7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                          • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 900638850-2853146127
                          • Opcode ID: 978d560dfc87019ac3657ebba0841bd774ce65c1ae89d16051c02eb976f42344
                          • Instruction ID: 57c77dc533264c97ace6329bd87f7d674c2bea75a5b3d90d15d675b8bae5a73d
                          • Opcode Fuzzy Hash: 978d560dfc87019ac3657ebba0841bd774ce65c1ae89d16051c02eb976f42344
                          • Instruction Fuzzy Hash: 1E611571A00104EBDF209F24CC40AAE37A5AF15314F56817FED56BA2D0D73D8AA2CB9D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 494 40596f-405995 call 405c3a 497 405997-4059a9 DeleteFileW 494->497 498 4059ae-4059b5 494->498 499 405b2b-405b2f 497->499 500 4059b7-4059b9 498->500 501 4059c8-4059d8 call 40617e 498->501 502 405ad9-405ade 500->502 503 4059bf-4059c2 500->503 507 4059e7-4059e8 call 405b7e 501->507 508 4059da-4059e5 lstrcatW 501->508 502->499 506 405ae0-405ae3 502->506 503->501 503->502 509 405ae5-405aeb 506->509 510 405aed-405af5 call 4064c1 506->510 511 4059ed-4059f1 507->511 508->511 509->499 510->499 518 405af7-405b0b call 405b32 call 405927 510->518 514 4059f3-4059fb 511->514 515 4059fd-405a03 lstrcatW 511->515 514->515 517 405a08-405a24 lstrlenW FindFirstFileW 514->517 515->517 519 405a2a-405a32 517->519 520 405ace-405ad2 517->520 534 405b23-405b26 call 4052dd 518->534 535 405b0d-405b10 518->535 523 405a52-405a66 call 40617e 519->523 524 405a34-405a3c 519->524 520->502 522 405ad4 520->522 522->502 536 405a68-405a70 523->536 537 405a7d-405a88 call 405927 523->537 526 405ab1-405ac1 FindNextFileW 524->526 527 405a3e-405a46 524->527 526->519 530 405ac7-405ac8 FindClose 526->530 527->523 531 405a48-405a50 527->531 530->520 531->523 531->526 534->499 535->509 541 405b12-405b21 call 4052dd call 40601f 535->541 536->526 538 405a72-405a7b call 40596f 536->538 547 405aa9-405aac call 4052dd 537->547 548 405a8a-405a8d 537->548 538->526 541->499 547->526 550 405aa1-405aa7 548->550 551 405a8f-405a9f call 4052dd call 40601f 548->551 550->526 551->526
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,74DF3420,74DF2EE0,00000000), ref: 00405998
                          • lstrcatW.KERNEL32(00425730,\*.*), ref: 004059E0
                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405A03
                          • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,74DF3420,74DF2EE0,00000000), ref: 00405A09
                          • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,74DF3420,74DF2EE0,00000000), ref: 00405A19
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405AB9
                          • FindClose.KERNEL32(00000000), ref: 00405AC8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: 0WB$\*.*
                          • API String ID: 2035342205-351390296
                          • Opcode ID: 650d65efca721ae95f05fec5e6387b525ef9089e97d219b3eee7621c95804d20
                          • Instruction ID: 6c547db7f4d1248ed83a6ec2b2b7cf99957869ea0eb35c9edb1a86952611c1c3
                          • Opcode Fuzzy Hash: 650d65efca721ae95f05fec5e6387b525ef9089e97d219b3eee7621c95804d20
                          • Instruction Fuzzy Hash: 5A41B530A40914A6CB21AB659CC9AAF7678EF41724F20427FF801711D1D77C5986DE6E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ead38b7015f9474378dd182d16c601773bd961a48b8ca1aefc3332049c463b86
                          • Instruction ID: 84f5b91c3f937eb173619b21672ae23043901769df73ed9f159891f0fc81c8d0
                          • Opcode Fuzzy Hash: ead38b7015f9474378dd182d16c601773bd961a48b8ca1aefc3332049c463b86
                          • Instruction Fuzzy Hash: 72F18671D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7385A8ACF45
                          APIs
                          • FindFirstFileW.KERNELBASE(74DF3420,00426778,00425F30,00405C83,00425F30,00425F30,00000000,00425F30,00425F30,74DF3420,?,74DF2EE0,0040598F,?,74DF3420,74DF2EE0), ref: 004064CC
                          • FindClose.KERNEL32(00000000), ref: 004064D8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: xgB
                          • API String ID: 2295610775-399326502
                          • Opcode ID: 4403a27f78f835125bd15cd158b53f866fd18ebbb8f54cd400289453990cbd04
                          • Instruction ID: 909a2899cbbcfc21b24ab628f9350e7a3c7b3772aa6d432f74911df6ac2d0bb5
                          • Opcode Fuzzy Hash: 4403a27f78f835125bd15cd158b53f866fd18ebbb8f54cd400289453990cbd04
                          • Instruction Fuzzy Hash: 8BD0C9315045209BC2111778AE4C85B7A98AF553317628A36B466F12A0C674CC22869C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: }/
                          • API String ID: 0-1889085469
                          • Opcode ID: a282f498cce8434c3dfac7f7a06f3fc385222e501470d9d58d9383a16510e594
                          • Instruction ID: 1a074323b44e9b443231f9a5c00c73f88b4c96c43fe4b32ed2e4f9b787238f27
                          • Opcode Fuzzy Hash: a282f498cce8434c3dfac7f7a06f3fc385222e501470d9d58d9383a16510e594
                          • Instruction Fuzzy Hash: 99B120B650C3525FD722CF3998556EBBFE2EFD2660328815DD8809B725D2708887C7A1
                          APIs
                          • NtAllocateVirtualMemory.NTDLL ref: 05128D56
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateMemoryVirtual
                          • String ID:
                          • API String ID: 2167126740-0
                          • Opcode ID: 9db9e6ca3993a3071a12c4260637110b8abb0b01d70ab72922ae3bfd0e20b32f
                          • Instruction ID: 6d71d76b881a8e449ebb030d02332b9401eed8f948e313c6961aec4582efee1c
                          • Opcode Fuzzy Hash: 9db9e6ca3993a3071a12c4260637110b8abb0b01d70ab72922ae3bfd0e20b32f
                          • Instruction Fuzzy Hash: A501A27570075A8BCF34EE388DD43CC33A3AF95350FA18226CC85CB648D730D9868A00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 184 403d6a-403d7c 185 403d82-403d88 184->185 186 403ebd-403ecc 184->186 185->186 187 403d8e-403d97 185->187 188 403f1b-403f30 186->188 189 403ece-403f16 GetDlgItem * 2 call 404242 SetClassLongW call 40140b 186->189 192 403d99-403da6 SetWindowPos 187->192 193 403dac-403daf 187->193 190 403f70-403f75 call 40428e 188->190 191 403f32-403f35 188->191 189->188 203 403f7a-403f95 190->203 195 403f37-403f42 call 401389 191->195 196 403f68-403f6a 191->196 192->193 198 403db1-403dc3 ShowWindow 193->198 199 403dc9-403dcf 193->199 195->196 217 403f44-403f63 SendMessageW 195->217 196->190 202 40420f 196->202 198->199 204 403dd1-403de6 DestroyWindow 199->204 205 403deb-403dee 199->205 212 404211-404218 202->212 210 403f97-403f99 call 40140b 203->210 211 403f9e-403fa4 203->211 213 4041ec-4041f2 204->213 207 403df0-403dfc SetWindowLongW 205->207 208 403e01-403e07 205->208 207->212 215 403eaa-403eb8 call 4042a9 208->215 216 403e0d-403e1e GetDlgItem 208->216 210->211 220 403faa-403fb5 211->220 221 4041cd-4041e6 DestroyWindow EndDialog 211->221 213->202 218 4041f4-4041fa 213->218 215->212 222 403e20-403e37 SendMessageW IsWindowEnabled 216->222 223 403e3d-403e40 216->223 217->212 218->202 225 4041fc-404205 ShowWindow 218->225 220->221 226 403fbb-404008 call 4061a0 call 404242 * 3 GetDlgItem 220->226 221->213 222->202 222->223 227 403e42-403e43 223->227 228 403e45-403e48 223->228 225->202 254 404012-40404e ShowWindow KiUserCallbackDispatcher call 404264 EnableWindow 226->254 255 40400a-40400f 226->255 232 403e73-403e78 call 40421b 227->232 233 403e56-403e5b 228->233 234 403e4a-403e50 228->234 232->215 237 403e91-403ea4 SendMessageW 233->237 239 403e5d-403e63 233->239 234->237 238 403e52-403e54 234->238 237->215 238->232 242 403e65-403e6b call 40140b 239->242 243 403e7a-403e83 call 40140b 239->243 252 403e71 242->252 243->215 251 403e85-403e8f 243->251 251->252 252->232 258 404050-404051 254->258 259 404053 254->259 255->254 260 404055-404083 GetSystemMenu EnableMenuItem SendMessageW 258->260 259->260 261 404085-404096 SendMessageW 260->261 262 404098 260->262 263 40409e-4040dc call 404277 call 40617e lstrlenW call 4061a0 SetWindowTextW call 401389 261->263 262->263 263->203 272 4040e2-4040e4 263->272 272->203 273 4040ea-4040ee 272->273 274 4040f0-4040f6 273->274 275 40410d-404121 DestroyWindow 273->275 274->202 276 4040fc-404102 274->276 275->213 277 404127-404154 CreateDialogParamW 275->277 276->203 279 404108 276->279 277->213 278 40415a-4041b1 call 404242 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 277->278 278->202 284 4041b3-4041c6 ShowWindow call 40428e 278->284 279->202 286 4041cb 284->286 286->213
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403DA6
                          • ShowWindow.USER32(?), ref: 00403DC3
                          • DestroyWindow.USER32 ref: 00403DD7
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DF3
                          • GetDlgItem.USER32(?,?), ref: 00403E14
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E28
                          • IsWindowEnabled.USER32(00000000), ref: 00403E2F
                          • GetDlgItem.USER32(?,?), ref: 00403EDD
                          • GetDlgItem.USER32(?,00000002), ref: 00403EE7
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403F01
                          • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403F52
                          • GetDlgItem.USER32(?,00000003), ref: 00403FF8
                          • ShowWindow.USER32(00000000,?), ref: 00404019
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040402B
                          • EnableWindow.USER32(?,?), ref: 00404046
                          • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040405C
                          • EnableMenuItem.USER32(00000000), ref: 00404063
                          • SendMessageW.USER32(?,000000F4,00000000,?), ref: 0040407B
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040408E
                          • lstrlenW.KERNEL32(00423728,?,00423728,00429240), ref: 004040B7
                          • SetWindowTextW.USER32(?,00423728), ref: 004040CB
                          • ShowWindow.USER32(?,0000000A), ref: 004041FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                          • String ID: (7B
                          • API String ID: 3282139019-3251261122
                          • Opcode ID: dd9405652fbbb87ab488d8a14d0aeb81f33be68f6094b2cdc8f2b1d388c01c08
                          • Instruction ID: 4530f9416eb169af0d44378ddba5762a1eee688012323a74912104aead4a3b33
                          • Opcode Fuzzy Hash: dd9405652fbbb87ab488d8a14d0aeb81f33be68f6094b2cdc8f2b1d388c01c08
                          • Instruction Fuzzy Hash: A5C1FFB1640200FFCB206F61EE84E2B3AA8EB95745F40057EF641B21F1CB7999529B6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 287 4039c7-4039df call 406558 290 4039e1-4039f1 call 4060c5 287->290 291 4039f3-403a2a call 40604b 287->291 299 403a4d-403a76 call 403c9d call 405c3a 290->299 295 403a42-403a48 lstrcatW 291->295 296 403a2c-403a3d call 40604b 291->296 295->299 296->295 305 403b08-403b10 call 405c3a 299->305 306 403a7c-403a81 299->306 311 403b12-403b19 call 4061a0 305->311 312 403b1e-403b43 LoadImageW 305->312 306->305 307 403a87-403aaf call 40604b 306->307 307->305 317 403ab1-403ab5 307->317 311->312 315 403bc4-403bcc call 40140b 312->315 316 403b45-403b75 RegisterClassW 312->316 330 403bd6-403be1 call 403c9d 315->330 331 403bce-403bd1 315->331 320 403c93 316->320 321 403b7b-403bbf SystemParametersInfoW CreateWindowExW 316->321 318 403ac7-403ad3 lstrlenW 317->318 319 403ab7-403ac4 call 405b5f 317->319 325 403ad5-403ae3 lstrcmpiW 318->325 326 403afb-403b03 call 405b32 call 40617e 318->326 319->318 324 403c95-403c9c 320->324 321->315 325->326 329 403ae5-403aef GetFileAttributesW 325->329 326->305 333 403af1-403af3 329->333 334 403af5-403af6 call 405b7e 329->334 340 403be7-403c01 ShowWindow call 4064e8 330->340 341 403c6a-403c6b call 4053b0 330->341 331->324 333->326 333->334 334->326 348 403c03-403c08 call 4064e8 340->348 349 403c0d-403c1f GetClassInfoW 340->349 344 403c70-403c72 341->344 346 403c74-403c7a 344->346 347 403c8c-403c8e call 40140b 344->347 346->331 354 403c80-403c87 call 40140b 346->354 347->320 348->349 352 403c21-403c31 GetClassInfoW RegisterClassW 349->352 353 403c37-403c5a DialogBoxParamW call 40140b 349->353 352->353 357 403c5f-403c68 call 403917 353->357 354->331 357->324
                          APIs
                            • Part of subcall function 00406558: GetModuleHandleA.KERNEL32(?,00000020,?,0040341F,00000009), ref: 0040656A
                            • Part of subcall function 00406558: GetProcAddress.KERNEL32(00000000,?), ref: 00406585
                          • lstrcatW.KERNEL32(1033,00423728), ref: 00403A48
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,74DF3420), ref: 00403AC8
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403ADB
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403AE6
                          • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00435800), ref: 00403B2F
                            • Part of subcall function 004060C5: wsprintfW.USER32 ref: 004060D2
                          • RegisterClassW.USER32(004291E0), ref: 00403B6C
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B84
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403BB9
                          • ShowWindow.USER32(00000005,00000000), ref: 00403BEF
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403C1B
                          • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403C28
                          • RegisterClassW.USER32(004291E0), ref: 00403C31
                          • DialogBoxParamW.USER32(?,00000000,00403D6A,00000000), ref: 00403C50
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: (7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-2335571965
                          • Opcode ID: d6eb97ecc45ceecdb0e2d203f76fda1198e4e833a1627c35b81ac0c75580ce77
                          • Instruction ID: e7f44595d902892b35b801f2f0c3734befc0b18a393fec54347386a87508d522
                          • Opcode Fuzzy Hash: d6eb97ecc45ceecdb0e2d203f76fda1198e4e833a1627c35b81ac0c75580ce77
                          • Instruction Fuzzy Hash: 8661C570244200BAD730AF669D49E2B3A7CEB84B49F40453FF981B62E2DB7D5912C63D

                          Control-flow Graph

                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 004017A8
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tndingers\idyllion\Hexagonet121,?,?,00000031), ref: 004017CD
                            • Part of subcall function 0040617E: lstrcpynW.KERNEL32(?,?,00000400,00403463,00429240,NSIS Error), ref: 0040618B
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 00405315
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(00402E19,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 00405325
                            • Part of subcall function 004052DD: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00402E19), ref: 00405338
                            • Part of subcall function 004052DD: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll), ref: 0040534A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405370
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405398
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp$C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll$C:\Users\user\tndingers\idyllion\Hexagonet121$Call
                          • API String ID: 1941528284-3905004143
                          • Opcode ID: adcefff22d6d35a46cade79b64999059c3ac28fc575844980da9404600bf010c
                          • Instruction ID: b64174440326d41e90dd14f1ad6608c73badddfa8ee8632f400ec40acf256ac3
                          • Opcode Fuzzy Hash: adcefff22d6d35a46cade79b64999059c3ac28fc575844980da9404600bf010c
                          • Instruction Fuzzy Hash: 0C41C431900515BACF117FB5CC46DAE3679EF05329B20827BF422F51E2DA3C86629A6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 624 4052dd-4052f2 625 4052f8-405309 624->625 626 4053a9-4053ad 624->626 627 405314-405320 lstrlenW 625->627 628 40530b-40530f call 4061a0 625->628 630 405322-405332 lstrlenW 627->630 631 40533d-405341 627->631 628->627 630->626 632 405334-405338 lstrcatW 630->632 633 405350-405354 631->633 634 405343-40534a SetWindowTextW 631->634 632->631 635 405356-405398 SendMessageW * 3 633->635 636 40539a-40539c 633->636 634->633 635->636 636->626 637 40539e-4053a1 636->637 637->626
                          APIs
                          • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 00405315
                          • lstrlenW.KERNEL32(00402E19,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 00405325
                          • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00402E19), ref: 00405338
                          • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll), ref: 0040534A
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405370
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538A
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405398
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll
                          • API String ID: 2531174081-207175003
                          • Opcode ID: e0d278b4f454602652d1392a5fb3045d02927be56822f9b38c604404e895085a
                          • Instruction ID: d14990956ab1253184f877e9e8298894284f42a30aea32824f5004b5108fa95f
                          • Opcode Fuzzy Hash: e0d278b4f454602652d1392a5fb3045d02927be56822f9b38c604404e895085a
                          • Instruction Fuzzy Hash: 62217F71900518BACF119FA6DD44ACFBFB8EF85354F10807AF904B62A1C7B94A51DFA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 638 4057ac-4057f7 CreateDirectoryW 639 4057f9-4057fb 638->639 640 4057fd-40580a GetLastError 638->640 641 405824-405826 639->641 640->641 642 40580c-405820 SetFileSecurityW 640->642 642->639 643 405822 GetLastError 642->643 643->641
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004057EF
                          • GetLastError.KERNEL32 ref: 00405803
                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405818
                          • GetLastError.KERNEL32 ref: 00405822
                          Strings
                          • C:\Users\user\Desktop, xrefs: 004057AC
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004057D2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                          • API String ID: 3449924974-2028306314
                          • Opcode ID: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                          • Instruction ID: b278f7ea68de5888e34302da86fdb06c438f4ef9b03e74a9ab654546e4f81ce2
                          • Opcode Fuzzy Hash: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                          • Instruction Fuzzy Hash: 89010871D00619DADF10DBA0D9447EFBFB8EB04304F00803ADA44B6190E7789618DFA9

                          Control-flow Graph

                          APIs
                          • GetDC.USER32(?), ref: 00401D59
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                          • ReleaseDC.USER32(?,00000000), ref: 00401D86
                          • CreateFontIndirectW.GDI32(0040CDE0), ref: 00401DD1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID: Tahoma
                          • API String ID: 3808545654-3580928618
                          • Opcode ID: 5b2dcaba1f29590e647e4d766e850e526c20589c7ac3325e144cde495e960a8b
                          • Instruction ID: 9e8fd183d3d9d3ef172346538d4b27734d94fdc92d2c471f4f64b2fa811a60c8
                          • Opcode Fuzzy Hash: 5b2dcaba1f29590e647e4d766e850e526c20589c7ac3325e144cde495e960a8b
                          • Instruction Fuzzy Hash: F601A271544641EFEB016BB0AF4AF9A3F75BB65301F104579F152B61E2CA7C0006AB2D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 653 4064e8-406508 GetSystemDirectoryW 654 40650a 653->654 655 40650c-40650e 653->655 654->655 656 406510-406519 655->656 657 40651f-406521 655->657 656->657 659 40651b-40651d 656->659 658 406522-406555 wsprintfW LoadLibraryExW 657->658 659->658
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004064FF
                          • wsprintfW.USER32 ref: 0040653A
                          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040654E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                          • Instruction ID: c6b4a3c42f63eea3762d57d51081eb848d485012b63e63803453d9912f42ff06
                          • Opcode Fuzzy Hash: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                          • Instruction Fuzzy Hash: 3AF0FC70500219BADB10AB64ED0DF9B366CAB00304F10403AA646F10D0EB7CD725CBA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 660 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 667 4023c7-4023cf 660->667 668 402a4c-402a5b 660->668 670 4023d1-4023de call 402bbf lstrlenW 667->670 671 4023e2-4023e5 667->671 670->671 674 4023f5-4023f8 671->674 675 4023e7-4023f4 call 402ba2 671->675 676 402409-40241d RegSetValueExW 674->676 677 4023fa-402404 call 4030e7 674->677 675->674 681 402422-4024fc RegCloseKey 676->681 682 40241f 676->682 677->676 681->668 685 40281e-402825 681->685 682->681 685->668
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                          • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CloseCreateValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp
                          • API String ID: 1356686001-4257373675
                          • Opcode ID: cd6d4c48b0c6b17b23d265fb4390c97c9a095f979bd604b51657a4d03f047cf7
                          • Instruction ID: d84b147cfae213de6894e87518a1957a70c03431d85ade02b305fde94438308f
                          • Opcode Fuzzy Hash: cd6d4c48b0c6b17b23d265fb4390c97c9a095f979bd604b51657a4d03f047cf7
                          • Instruction Fuzzy Hash: E511C071E00108BFEB10AFA4DE89DAE777DEB14358F11403AF904B71D1DBB85E409668

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 686 402bff-402c28 RegOpenKeyExW 687 402c93-402c97 686->687 688 402c2a-402c35 686->688 689 402c50-402c60 RegEnumKeyW 688->689 690 402c62-402c74 RegCloseKey call 406558 689->690 691 402c37-402c3a 689->691 698 402c76-402c85 690->698 699 402c9a-402ca0 690->699 692 402c87-402c8a RegCloseKey 691->692 693 402c3c-402c4e call 402bff 691->693 696 402c90-402c92 692->696 693->689 693->690 696->687 698->687 699->696 701 402ca2-402cb0 RegDeleteKeyW 699->701 701->696 703 402cb2 701->703 703->687
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                          • RegCloseKey.ADVAPI32(?), ref: 00402C65
                          • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumOpen
                          • String ID:
                          • API String ID: 1912718029-0
                          • Opcode ID: 58c60bd3f3897121054778c1da70f1d8408b3ab71b88223ff436e3f080a0af7a
                          • Instruction ID: b9f5b7c8593eadded22e2ca3cbb8d83d08b5e31647f9888e60cfbaa55d101d4e
                          • Opcode Fuzzy Hash: 58c60bd3f3897121054778c1da70f1d8408b3ab71b88223ff436e3f080a0af7a
                          • Instruction Fuzzy Hash: 66116A71504119FFEF10AF90DF8CEAE3B79FB14384B10007AF905E11A0D7B58E55AA69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 704 10001759-10001795 call 10001b18 708 100018a6-100018a8 704->708 709 1000179b-1000179f 704->709 710 100017a1-100017a7 call 10002286 709->710 711 100017a8-100017b5 call 100022d0 709->711 710->711 716 100017e5-100017ec 711->716 717 100017b7-100017bc 711->717 718 1000180c-10001810 716->718 719 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 716->719 720 100017d7-100017da 717->720 721 100017be-100017bf 717->721 722 10001812-1000184c call 100015b4 call 100024a9 718->722 723 1000184e-10001854 call 100024a9 718->723 744 10001855-10001859 719->744 720->716 724 100017dc-100017dd call 10002b5f 720->724 726 100017c1-100017c2 721->726 727 100017c7-100017c8 call 100028a4 721->727 722->744 723->744 737 100017e2 724->737 732 100017c4-100017c5 726->732 733 100017cf-100017d5 call 10002645 726->733 740 100017cd 727->740 732->716 732->727 743 100017e4 733->743 737->743 740->737 743->716 747 10001896-1000189d 744->747 748 1000185b-10001869 call 1000246c 744->748 747->708 750 1000189f-100018a0 GlobalFree 747->750 754 10001881-10001888 748->754 755 1000186b-1000186e 748->755 750->708 754->747 756 1000188a-10001895 call 1000153d 754->756 755->754 757 10001870-10001878 755->757 756->747 757->754 759 1000187a-1000187b FreeLibrary 757->759 759->754
                          APIs
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                          • FreeLibrary.KERNEL32(?), ref: 1000187B
                          • GlobalFree.KERNEL32(00000000), ref: 100018A0
                            • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                            • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                            • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020), ref: 100015CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                          • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                          • Opcode Fuzzy Hash: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                          • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405DA0
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00435000,004033B4,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00405DBB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-678247507
                          • Opcode ID: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                          • Instruction ID: a69a53d4b23f3d63feeda802a3e8a765614c71270742c911b33c62312df6cecc
                          • Opcode Fuzzy Hash: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                          • Instruction Fuzzy Hash: 32F06D76600608BBDB008B59DD09AABBBB8EF91710F10803BEE01F7190E6B09A548B64
                          APIs
                            • Part of subcall function 00405BDD: CharNextW.USER32(?,?,00425F30,?,00405C51,00425F30,00425F30,74DF3420,?,74DF2EE0,0040598F,?,74DF3420,74DF2EE0,00000000), ref: 00405BEB
                            • Part of subcall function 00405BDD: CharNextW.USER32(00000000), ref: 00405BF0
                            • Part of subcall function 00405BDD: CharNextW.USER32(00000000), ref: 00405C08
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                            • Part of subcall function 004057AC: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004057EF
                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\tndingers\idyllion\Hexagonet121,?,00000000,000000F0), ref: 00401645
                          Strings
                          • C:\Users\user\tndingers\idyllion\Hexagonet121, xrefs: 00401638
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID: C:\Users\user\tndingers\idyllion\Hexagonet121
                          • API String ID: 1892508949-2690288880
                          • Opcode ID: 73517b5d0da78be28060eaa35170b82405513a3442ab2227d9f24ad0b2409d52
                          • Instruction ID: 18abe7de9e9977a76830232601504265d2e6edcedfe07fce7f69d5744a4425eb
                          • Opcode Fuzzy Hash: 73517b5d0da78be28060eaa35170b82405513a3442ab2227d9f24ad0b2409d52
                          • Instruction Fuzzy Hash: F911E631500504EBCF207FA0CD0199E3AB2EF44364B25453BF906B61F2DA3D4A819E5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6748365695d0b60958ae2de605dce3010a9a46cb287cd8314348fa6e45a6e7ef
                          • Instruction ID: 95c87b37ce546c92696c349aad8761a6baa0f42cb897a758cf539d426e2a5a70
                          • Opcode Fuzzy Hash: 6748365695d0b60958ae2de605dce3010a9a46cb287cd8314348fa6e45a6e7ef
                          • Instruction Fuzzy Hash: 65A13471D00229CBDF28CFA8C844AADBBB1FF44305F15816AD956BB281D7785A86DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e6b96a49f958b7a8d2aa4cc917083ea926a28b83a61870a924df7985f049b653
                          • Instruction ID: dd225a6952a4a1885b566de7f95e3528e0c965b1b64db9b9769652e5c735704b
                          • Opcode Fuzzy Hash: e6b96a49f958b7a8d2aa4cc917083ea926a28b83a61870a924df7985f049b653
                          • Instruction Fuzzy Hash: 3D913370D04229CBDF28CFA8C844BADBBB1FF44305F15816AD856BB291C7789A86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 683f34e5330f3119535e65c3fcc014917b66dea9351a733ad05ad489270f429c
                          • Instruction ID: c728d5504c89e28601c55753f21d2f559f3974f1a6ce44cf054f885a45476dee
                          • Opcode Fuzzy Hash: 683f34e5330f3119535e65c3fcc014917b66dea9351a733ad05ad489270f429c
                          • Instruction Fuzzy Hash: 06813471D04228CFDF24CFA8C844BADBBB1FB44305F25816AD856BB291C7789A86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a646d1c18714c06b63ca95da94aa03745834858b299022791e2b3ebf89425e7d
                          • Instruction ID: 5389f57cfb4a3ea8b0a271fe5c21418892ef356aef38e154ca47b5156c43700c
                          • Opcode Fuzzy Hash: a646d1c18714c06b63ca95da94aa03745834858b299022791e2b3ebf89425e7d
                          • Instruction Fuzzy Hash: 37816831D04229CBDF24CFA8C844BADBBB0FF44305F11816AD956BB281D7785986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 96da27bd456154c1aedaa85bcfc68d0a261e277abb4cee4e4020ac7d50c7f0c5
                          • Instruction ID: 7cecadd07089ef5f508d2048bcf4206a214b5fe31ba49bd0cdf53ec9cfb3ce0b
                          • Opcode Fuzzy Hash: 96da27bd456154c1aedaa85bcfc68d0a261e277abb4cee4e4020ac7d50c7f0c5
                          • Instruction Fuzzy Hash: 35712175D04228CBDF28CFA8C844BADBBB1FB44305F15816AD806BB281D7789A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 29e3b149f88ae6fd458fdcc74d478f48b2ed7dfe8c3e809ea2d72e9fd2fa3729
                          • Instruction ID: f96eec566abe8136b7696836c8602221009d3abbc3cba5cf828ad5cd02611e0d
                          • Opcode Fuzzy Hash: 29e3b149f88ae6fd458fdcc74d478f48b2ed7dfe8c3e809ea2d72e9fd2fa3729
                          • Instruction Fuzzy Hash: 56713371D04228CBEF28CFA8C844BADBBB1FF44305F15816AD856BB281C7789996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b9c673c2534040230f9089defbd7d825788091a80835a4c341425c1e948b069d
                          • Instruction ID: 17f295adf0ba2181094cfffbed918b39bb4908eb68d6975640ddb9889f0749db
                          • Opcode Fuzzy Hash: b9c673c2534040230f9089defbd7d825788091a80835a4c341425c1e948b069d
                          • Instruction Fuzzy Hash: F2714531D04229CBEF28CF98C844BADBBB1FF44305F11816AD816BB291C7785A96DF44
                          APIs
                          • GetTickCount.KERNEL32 ref: 00403203
                            • Part of subcall function 0040336E: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403119,00000004,00000000,00000000,?,?,00403093,000000FF,00000000,00000000,0040A230,?), ref: 00403236
                          • SetFilePointer.KERNELBASE(000068AE,00000000,00000000,00414ED0,00004000,?,00000000,00403119,00000004,00000000,00000000,?,?,00403093,000000FF,00000000), ref: 00403331
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FilePointer$CountTick
                          • String ID:
                          • API String ID: 1092082344-0
                          • Opcode ID: 7f87ec3f3126c4afc5deb31522855fdbb853a78037bb661dde8e94ffc6001a55
                          • Instruction ID: 2fd669d0756999c0d63da40b5d988076205959dac08f3783f289fe1fafb1afdd
                          • Opcode Fuzzy Hash: 7f87ec3f3126c4afc5deb31522855fdbb853a78037bb661dde8e94ffc6001a55
                          • Instruction Fuzzy Hash: 19314B72500204DBD710DF69EEC49663FA9F74075A718423FE900F22E0CBB55D458B9D
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00401FEE
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 00405315
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(00402E19,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 00405325
                            • Part of subcall function 004052DD: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00402E19), ref: 00405338
                            • Part of subcall function 004052DD: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll), ref: 0040534A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405370
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405398
                          • LoadLibraryExW.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 00401FFF
                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 0040207C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: ffe8eb7601d8803f9210ac34113d856d3215e5729ed24176a0018f2e9fe48fdd
                          • Instruction ID: 135227bab5bbd0cb957ad13063370cb04025123e1843093ab7a3381522db9c00
                          • Opcode Fuzzy Hash: ffe8eb7601d8803f9210ac34113d856d3215e5729ed24176a0018f2e9fe48fdd
                          • Instruction Fuzzy Hash: 7D21A731900219EBCF20AFA5CE48A9E7E71BF00354F20427BF511B51E1DBBD8A81DA5D
                          APIs
                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,000000FB,00000000,00000022,00000000,?,?), ref: 00402CF1
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Enum$CloseOpenValue
                          • String ID:
                          • API String ID: 167947723-0
                          • Opcode ID: 7e3dc66a0c4e4db4557e30390ba759ccf808f2377b82121fb7e316e2894b98b5
                          • Instruction ID: c7ec42ec2a5b8cbcf97019b844e04a4f9c539befeef3331d530b96059407f5ff
                          • Opcode Fuzzy Hash: 7e3dc66a0c4e4db4557e30390ba759ccf808f2377b82121fb7e316e2894b98b5
                          • Instruction Fuzzy Hash: FCF03171A14204EBEB209F65DE8CABF767DEF80354B10843FF505B61D0DAB84D419B69
                          APIs
                          • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\tndingers\idyllion\Hexagonet121,?), ref: 00401E52
                          Strings
                          • C:\Users\user\tndingers\idyllion\Hexagonet121, xrefs: 00401E3B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ExecuteShell
                          • String ID: C:\Users\user\tndingers\idyllion\Hexagonet121
                          • API String ID: 587946157-2690288880
                          • Opcode ID: 2fa78ad9c9660c105e9ac96a33c10297d4a39a2e29479edcc52942774009f3ba
                          • Instruction ID: 7aca97ec9270bcac2266565e3bd1718053f2078ff1e9e7461c7936a93ee42730
                          • Opcode Fuzzy Hash: 2fa78ad9c9660c105e9ac96a33c10297d4a39a2e29479edcc52942774009f3ba
                          • Instruction Fuzzy Hash: 79F0C236B00100ABCB11AFB99D4AEAD33B9AB40724B244577F801F70D5DAFCC9419628
                          APIs
                          • CreateFileA.KERNELBASE(00000000), ref: 10002963
                          • GetLastError.KERNEL32 ref: 10002A6A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CreateErrorFileLast
                          • String ID:
                          • API String ID: 1214770103-0
                          • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                          • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                          • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                          • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                          APIs
                          • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403093,000000FF,00000000,00000000,0040A230,?), ref: 0040310C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 1aa85c7260de761b297061d79344dc340e95e4778a17b24641d9514d9a29d692
                          • Instruction ID: 040f2acbe5348ef8c996952313d322865bd2faa87b76d8d9ba7109e69b0e4b3d
                          • Opcode Fuzzy Hash: 1aa85c7260de761b297061d79344dc340e95e4778a17b24641d9514d9a29d692
                          • Instruction Fuzzy Hash: 22316B30200219EBDB108F55ED84ADA3F68EB08359F20813AF905EA1D0DB79DF50DBA9
                          APIs
                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,000000FB,00000000,00000022,00000000,?,?), ref: 00402CF1
                          • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID:
                          • API String ID: 3677997916-0
                          • Opcode ID: fc0d1c261dc6cec8aab40022b61e73a429ebd427b24909dc8865f45a7e4b999a
                          • Instruction ID: a4ed2935f8c713a64b441f8b02302a8faa8aa65f3841d01997d269d515fb9b23
                          • Opcode Fuzzy Hash: fc0d1c261dc6cec8aab40022b61e73a429ebd427b24909dc8865f45a7e4b999a
                          • Instruction Fuzzy Hash: 9D119131911205EBDB10CFA0CA489AEB7B4EF44354B20843FE446B72D0D6B85A41DB19
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 3ee467f7d586eb782eae2bae36c3decf9d7e0780ea8b642ce91f4ebf2c7a7eb5
                          • Instruction ID: d65e0694727b7210e6f7bc09f77efd2c0147e56cffd904cd4a2c980f2ed28b93
                          • Opcode Fuzzy Hash: 3ee467f7d586eb782eae2bae36c3decf9d7e0780ea8b642ce91f4ebf2c7a7eb5
                          • Instruction Fuzzy Hash: 3D01D131724210EBEB195B789D04B2A3698E714314F1089BAF855F62F1DA788C128B5D
                          APIs
                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,000000FB,00000000,00000022,00000000,?,?), ref: 00402CF1
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CloseDeleteOpenValue
                          • String ID:
                          • API String ID: 849931509-0
                          • Opcode ID: f55f8466d1ee67195bc2617ca7d244c5e4cc0a6100a7b879bad854fc90e50fb4
                          • Instruction ID: b5033fe3495a5d5fbf66e52db86fe43622c16bf705f2fe0f4142c4154f9543e6
                          • Opcode Fuzzy Hash: f55f8466d1ee67195bc2617ca7d244c5e4cc0a6100a7b879bad854fc90e50fb4
                          • Instruction Fuzzy Hash: 45F04F32A04110ABEB11BFB59B4EABE726A9B40314F15807BF501B71D5D9FC99025629
                          APIs
                          • GetModuleHandleA.KERNEL32(?,00000020,?,0040341F,00000009), ref: 0040656A
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406585
                            • Part of subcall function 004064E8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004064FF
                            • Part of subcall function 004064E8: wsprintfW.USER32 ref: 0040653A
                            • Part of subcall function 004064E8: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040654E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: 31197a09b32f9822319ed056a1c078f96e3f7aaf520cdba8edd4f010bc886546
                          • Instruction ID: 8c1a5bb66f910ccc430fc34c4425cef617f316e2833151c7c1ff8c8a0ee84b40
                          • Opcode Fuzzy Hash: 31197a09b32f9822319ed056a1c078f96e3f7aaf520cdba8edd4f010bc886546
                          • Instruction Fuzzy Hash: C3E086326042206BD6105B706E0893762BC9ED8740302483EF946F2084D778DC329A6D
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\eXiJWkp8OE.exe,80000000,00000003), ref: 00405D57
                          • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405D79
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                          • Instruction ID: e98dd403a5e5432679a9d4e257ef455d3d6759c2e5ed6cf280caa05d5291d686
                          • Opcode Fuzzy Hash: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                          • Instruction Fuzzy Hash: B3D09E71654601EFEF098F20DF16F2E7AA2EB84B00F11562CB682940E0DA7158199B19
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,?,00405933,?,?,00000000,00405B09,?,?,?,?), ref: 00405D33
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D47
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                          • Instruction ID: 62c1218995ad43f24aa052634507c0d83541fa9dca801c4eab67991220ff17ac
                          • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                          • Instruction Fuzzy Hash: 40D01272504520AFC2513738EF0C89BBF95EB543B17028B35FAF9A22F0DB304C568A98
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,004033A9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 0040582F
                          • GetLastError.KERNEL32 ref: 0040583D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                          • Instruction ID: d963a2520b22da8993c1f0374a54a6368e12bf2bf52e26206a68f99a8800bbf8
                          • Opcode Fuzzy Hash: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                          • Instruction Fuzzy Hash: 1DC04C31204B029AD7506B609F097177954AB50781F11C8396946E00A0DE348465DE2D
                          APIs
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: 014b14aad264ab3d9278ecb8b720997d0a3792ab61640f4b6d401bffeacc1512
                          • Instruction ID: a822d11f1d05533bca3208a69e79300e3559a9020bae074bf72d5f6ed1f8f9d7
                          • Opcode Fuzzy Hash: 014b14aad264ab3d9278ecb8b720997d0a3792ab61640f4b6d401bffeacc1512
                          • Instruction Fuzzy Hash: BCE04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                          APIs
                          • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0040E7DC,0040CED0,004032EF,0040CED0,0040E7DC,00414ED0,00004000,?,00000000,00403119,00000004), ref: 00405E19
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                          • Instruction ID: dac0b8971ba2920abb5474f128329a0fa477ab7403896bbfc0984bb8014ca22f
                          • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                          • Instruction Fuzzy Hash: 4AE08632100119ABCF105F50DC00EEB376CEB00350F004832FA65E2040E230EA219BE4
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,000000FB,00000000,00000022,00000000,?,?), ref: 00402CF1
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 2cb17219caef5c2c057f25c6a0d5a563c17eea178cedf0001938d6a474f7be63
                          • Instruction ID: ef45ff86538a2d51f1b0222ec8c1b297abd10be8bd22699319dc95f068cee933
                          • Opcode Fuzzy Hash: 2cb17219caef5c2c057f25c6a0d5a563c17eea178cedf0001938d6a474f7be63
                          • Instruction Fuzzy Hash: CCE08676244108BFDB00DFA8DE47FD537ECAB14700F004031BA08D70D1C674E5508768
                          APIs
                          • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040336B,0040A230,0040A230,0040326F,00414ED0,00004000,?,00000000,00403119), ref: 00405DEA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                          • Instruction ID: f39de87387fc754cac4ceee649b5e38243fe2bf9183d254406dbd5143e25ae03
                          • Opcode Fuzzy Hash: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                          • Instruction Fuzzy Hash: 57E0EC3221125AABDF509F65DC08AEB7B6DEF05360F008837F955E6160D631E9219BE8
                          APIs
                          • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                          • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                          APIs
                          • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402310
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: 2412c5e6e38f405480bfb5068b9d3e64da5a88d06b16ee9e0a03aeafae2b93d0
                          • Instruction ID: 815fd251d1ef055c124add3867079dbd89389a2e6f50d5753089410e689aa70c
                          • Opcode Fuzzy Hash: 2412c5e6e38f405480bfb5068b9d3e64da5a88d06b16ee9e0a03aeafae2b93d0
                          • Instruction Fuzzy Hash: 91E04F30800208BBDF01AFA4CE49DBD3B79AF00344F14043AF940AB0D5E7F89A819749
                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: ba3b4c390174c241c579d37fedc31f062acef12686ac8f882cea17aec191ca18
                          • Instruction ID: b466977811d287c246b6c4bdd3c4099c205cff96c1e3616f4719a22f3098d0f0
                          • Opcode Fuzzy Hash: ba3b4c390174c241c579d37fedc31f062acef12686ac8f882cea17aec191ca18
                          • Instruction Fuzzy Hash: 4ED05B33704100D7CB10DFE89E0869D7775AB40334B208177D501F21E4D6B9C5515B1D
                          APIs
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: c2a25a807fea80bd58a61b321fa2af33aa5b35e52655131f61520799e32131e4
                          • Instruction ID: 8584b4a80e8197aea4c9dd325401cbfcfbe68695eba590e205f4256e4e85e437
                          • Opcode Fuzzy Hash: c2a25a807fea80bd58a61b321fa2af33aa5b35e52655131f61520799e32131e4
                          • Instruction Fuzzy Hash: 67C04C71740600BBDA20CB649D45F1677546754740F1448697640A60E0C674D420D62C
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                          • Instruction ID: 64c0fffafe8abe290eaf2022e63b776f1a4a3bd25e2fde741040b5855636c72c
                          • Opcode Fuzzy Hash: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                          • Instruction Fuzzy Hash: 70B01231140300BFDA214F00DF09F057B21AB90700F10C034B344780F086711075EB0D
                          APIs
                          • SendMessageW.USER32(00000028,?,?,004040A3), ref: 00404285
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 7bbf2f5232cd2574a5b007ccbcd78797cc8e3f4bb2dd07224d7ba7f17a9ad77c
                          • Instruction ID: 3e0bacd84e958153637e663f6e0df00a268db6e73930f78988907d41dcf2010e
                          • Opcode Fuzzy Hash: 7bbf2f5232cd2574a5b007ccbcd78797cc8e3f4bb2dd07224d7ba7f17a9ad77c
                          • Instruction Fuzzy Hash: 32B01235290A00FBDE214B00EE09F457E62F76C701F008478B340240F0CAB300B1DB19
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(?,0040403C), ref: 0040426E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: 8a62e99fe4a67b047fdc914663d327e58adf51456459288db10dd5d3044e9a2e
                          • Instruction ID: ea629541fdd2228df96855dc4de4e407fdbb002a66502a1a5a86269346c048a7
                          • Opcode Fuzzy Hash: 8a62e99fe4a67b047fdc914663d327e58adf51456459288db10dd5d3044e9a2e
                          • Instruction Fuzzy Hash: C0A001B6644500ABCE129F90EF49D0ABBB2EBE8742B518579A285900348A364961EB59
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014E6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: f9d451d74586546bbd407ca2e24b621689a583ca5f98dcf473e6f9f09c96531a
                          • Instruction ID: 98ea867d558ea3f6c4ea23e9af3ccb97d5497e9459daf2a95be3f4ba7839a378
                          • Opcode Fuzzy Hash: f9d451d74586546bbd407ca2e24b621689a583ca5f98dcf473e6f9f09c96531a
                          • Instruction Fuzzy Hash: E7D01277B14100DBD760EFB9BF89C6F73A9EB513293214837D902E11A2D57DC812462D
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404C71
                          • GetDlgItem.USER32(?,00000408), ref: 00404C7C
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CC6
                          • LoadBitmapW.USER32(0000006E), ref: 00404CD9
                          • SetWindowLongW.USER32(?,000000FC,00405251), ref: 00404CF2
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D06
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D18
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404D2E
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D3A
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D4C
                          • DeleteObject.GDI32(00000000), ref: 00404D4F
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D7A
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404D86
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E1C
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E47
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E5B
                          • GetWindowLongW.USER32(?,000000F0), ref: 00404E8A
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404E98
                          • ShowWindow.USER32(?,00000005), ref: 00404EA9
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FA6
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040500B
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405020
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405044
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405064
                          • ImageList_Destroy.COMCTL32(?), ref: 00405079
                          • GlobalFree.KERNEL32(?), ref: 00405089
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405102
                          • SendMessageW.USER32(?,00001102,?,?), ref: 004051AB
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051BA
                          • InvalidateRect.USER32(?,00000000,?), ref: 004051DA
                          • ShowWindow.USER32(?,00000000), ref: 00405228
                          • GetDlgItem.USER32(?,000003FE), ref: 00405233
                          • ShowWindow.USER32(00000000), ref: 0040523A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: 2479b366cad44d8d2a02fbd124e29c277f71441e1411fda8dea8c44bba4244d6
                          • Instruction ID: ce840dee0c3a5b827351c7f25dbf2e3605d0905f5c54158640504e6bfb71dde6
                          • Opcode Fuzzy Hash: 2479b366cad44d8d2a02fbd124e29c277f71441e1411fda8dea8c44bba4244d6
                          • Instruction Fuzzy Hash: 4C023EB0A00209EFDF209F64CD45AAE7BB5FB84355F10817AE610BA2E1C7799D52CF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 0040472C
                          • SetWindowTextW.USER32(00000000,-0042B000), ref: 00404756
                          • SHBrowseForFolderW.SHELL32(?), ref: 00404807
                          • CoTaskMemFree.OLE32(00000000), ref: 00404812
                          • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,-0042B000), ref: 00404844
                          • lstrcatW.KERNEL32(-0042B000,Call), ref: 00404850
                          • SetDlgItemTextW.USER32(?,000003FB,-0042B000), ref: 00404862
                            • Part of subcall function 004058A7: GetDlgItemTextW.USER32(?,?,00000400,00404899), ref: 004058BA
                            • Part of subcall function 00406412: CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00406475
                            • Part of subcall function 00406412: CharNextW.USER32(?,?,?,00000000), ref: 00406484
                            • Part of subcall function 00406412: CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00406489
                            • Part of subcall function 00406412: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 0040649C
                          • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,-0042B000,?,004216F8,-0042B000,-0042B000,000003FB,-0042B000), ref: 00404925
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404940
                            • Part of subcall function 00404A99: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,-0042B000), ref: 00404B3A
                            • Part of subcall function 00404A99: wsprintfW.USER32 ref: 00404B43
                            • Part of subcall function 00404A99: SetDlgItemTextW.USER32(?,00423728), ref: 00404B56
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: (7B$A$Call
                          • API String ID: 2624150263-413618503
                          • Opcode ID: b1c988a2c75076f1e590c134e256cc95cfc43452e7a67f3061b6eea54995cb3a
                          • Instruction ID: d5aaf60bd55b21875b9c8b9a8d0b3d7e01f34e6f89f3adcbdcc63617e1d21faf
                          • Opcode Fuzzy Hash: b1c988a2c75076f1e590c134e256cc95cfc43452e7a67f3061b6eea54995cb3a
                          • Instruction Fuzzy Hash: B7A191F1A00209ABDB11AFA5CC45AAF77B8EF84354F10847BF601B62D1D77C99418B6D
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                          • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                          • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                          • GlobalFree.KERNEL32(00000000), ref: 10001C89
                          • GlobalFree.KERNEL32(?), ref: 10001D83
                          • GlobalFree.KERNEL32(?), ref: 10001D88
                          • GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001F38
                          • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc
                          • String ID:
                          • API String ID: 4227406936-0
                          • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                          • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                          • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                          • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                          APIs
                          • CoCreateInstance.OLE32(004084E4,?,?,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                          Strings
                          • C:\Users\user\tndingers\idyllion\Hexagonet121, xrefs: 00402154
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\tndingers\idyllion\Hexagonet121
                          • API String ID: 542301482-2690288880
                          • Opcode ID: 4186039756558c631eee119f4fdf18c30d8387add4dff58370c0f886253180e0
                          • Instruction ID: a109dbacb2976faa502b9a92b0b1fafcf02ea9b6fb783d383e2774f19d5eba59
                          • Opcode Fuzzy Hash: 4186039756558c631eee119f4fdf18c30d8387add4dff58370c0f886253180e0
                          • Instruction Fuzzy Hash: FA412C75A00209AFCF00DFA4CD88AAD7BB6FF48314B20457AF515EB2D1DBB99A41CB54
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: 2$]
                          • API String ID: 0-2170925925
                          • Opcode ID: e6b39b5eb98dc6cc88b5ad903e39de04acdee442d2ee44519b9ff4df1d1311cc
                          • Instruction ID: aa6e3c8a55403725dc56617894e996424e20cea0f52434ef5f2e0aac78d3dcf4
                          • Opcode Fuzzy Hash: e6b39b5eb98dc6cc88b5ad903e39de04acdee442d2ee44519b9ff4df1d1311cc
                          • Instruction Fuzzy Hash: F7517A352093879FDF388F38CDA53EA77A2AF52360F5A466DCC8A4B185E7344546C712
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 697524d3f53bd4141666a7acbda8ce38f50fd87c4c23088896125ab23c91ff0b
                          • Instruction ID: ca82d2f7608ddbe9a9db451b4e667c54ef54e9945bbc135f2cbc761c4928cd6d
                          • Opcode Fuzzy Hash: 697524d3f53bd4141666a7acbda8ce38f50fd87c4c23088896125ab23c91ff0b
                          • Instruction Fuzzy Hash: 3CF08275600114DBC711EBE4DD49AAEB374FF00324F2045BBE105F31E1D7B499559B2A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: }'r
                          • API String ID: 0-330848256
                          • Opcode ID: a00ede726542e166a3bb544edcd2f271523ca26654201686f56243a6aa3c43e7
                          • Instruction ID: 7086f8cd85ae40c1af2f95b891671dec25b8c182e4a426b4f32ff6c54f7afcb6
                          • Opcode Fuzzy Hash: a00ede726542e166a3bb544edcd2f271523ca26654201686f56243a6aa3c43e7
                          • Instruction Fuzzy Hash: 63413A72744316AFCB349E28CAE47DF73E79FA5390FAA402ACD498F215E7704D468611
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fb1718fc9060749cd7488a95130cf8d2bdd0af76f49d506d8f12c5907d1dcd3e
                          • Instruction ID: f46c0765d9a5c6182843a0033f5a6c3c0767976b96feeb5d00567361a5de333a
                          • Opcode Fuzzy Hash: fb1718fc9060749cd7488a95130cf8d2bdd0af76f49d506d8f12c5907d1dcd3e
                          • Instruction Fuzzy Hash: A051D1B21483859FD71A8F34EC996997FE5FF63310F3901AED0928B6A3E3258442C791
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 903723b7f147ded9cbfa5637d80333a496296ecc7381f7128599e496b2ea2da5
                          • Instruction ID: 8e2aa2a69e559233dd4f9961df814d372d228802fe6c863a3ad8f32ffab0002f
                          • Opcode Fuzzy Hash: 903723b7f147ded9cbfa5637d80333a496296ecc7381f7128599e496b2ea2da5
                          • Instruction Fuzzy Hash: A25167297003165B9F6CA83C45F53EF12935FA65D0FA9822F8C93C76D9DB3584DB8602
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf77606df573a97009a9dbaad1d537da9103021493dc616b668f25a5c8553c66
                          • Instruction ID: 074c6d903b7eb7078c7dcac88eb9a6a5fd89d41b3664615c0200b89dcd54a628
                          • Opcode Fuzzy Hash: cf77606df573a97009a9dbaad1d537da9103021493dc616b668f25a5c8553c66
                          • Instruction Fuzzy Hash: DB41CC776086155FEB268E399D887DE77A3FFDA310F64812DC8820BA4AD331008BC754
                          Memory Dump Source
                          • Source File: 00000000.00000002.4161831024.0000000004BBF000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BBF000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_4bbf000_eXiJWkp8OE.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: df5d8bfc0196bad6c3795a2e08ab02ac949addaf2669023d39583419a2ac9a87
                          • Instruction ID: 85bc2ec8a8acedc93b6f5ea9497e3ac68a2c0d6570439398427e167f4846ba9b
                          • Opcode Fuzzy Hash: df5d8bfc0196bad6c3795a2e08ab02ac949addaf2669023d39583419a2ac9a87
                          • Instruction Fuzzy Hash: FB318C2A60471A4FDF246D7C95FD3EE23D66F63790F99823ECDC683592E71684478201
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040447D
                          • GetDlgItem.USER32(?,000003E8), ref: 00404491
                          • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004044AE
                          • GetSysColor.USER32(?), ref: 004044BF
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044CD
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044DB
                          • lstrlenW.KERNEL32(?), ref: 004044E0
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044ED
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404502
                          • GetDlgItem.USER32(?,0000040A), ref: 0040455B
                          • SendMessageW.USER32(00000000), ref: 00404562
                          • GetDlgItem.USER32(?,000003E8), ref: 0040458D
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045D0
                          • LoadCursorW.USER32(00000000,00007F02), ref: 004045DE
                          • SetCursor.USER32(00000000), ref: 004045E1
                          • ShellExecuteW.SHELL32(0000070B,open,004281E0,00000000,00000000,?), ref: 004045F6
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00404602
                          • SetCursor.USER32(00000000), ref: 00404605
                          • SendMessageW.USER32(00000111,?,00000000), ref: 00404634
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404646
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                          • String ID: Call$N$VC@$open
                          • API String ID: 3615053054-2503634124
                          • Opcode ID: 33f5e1601642234e7e85cd0b58378a626179fffef457767216124dc14c27a8cd
                          • Instruction ID: ef28e404984a924d02769b335405a58d84a4f5c10dd13b46e9d300bde90bb2c1
                          • Opcode Fuzzy Hash: 33f5e1601642234e7e85cd0b58378a626179fffef457767216124dc14c27a8cd
                          • Instruction Fuzzy Hash: 717191B1A00209BFDB10AF60DD45E6A7B69FB94344F00843AFB05B62E0D779AD51CF98
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,?), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: 709e975422cda7ccbb1a7a25ffea5b6ea87087be701c8afe7ff27c60fd663942
                          • Instruction ID: fbc3582f0be17511ef24b6208279bd62f68a22b1f89f17edcf88e24f0ff4dafb
                          • Opcode Fuzzy Hash: 709e975422cda7ccbb1a7a25ffea5b6ea87087be701c8afe7ff27c60fd663942
                          • Instruction Fuzzy Hash: 8E418A71800209AFCF058F95DE459AFBBB9FF44310F00842EF991AA1A0C738EA55DFA4
                          APIs
                          • lstrcpyW.KERNEL32(00426DC8,NUL), ref: 00405EBC
                          • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,00406040,?,?), ref: 00405EE0
                          • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00405EE9
                            • Part of subcall function 00405CB8: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F99,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CC8
                            • Part of subcall function 00405CB8: lstrlenA.KERNEL32(00000000,?,00000000,00405F99,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CFA
                          • GetShortPathNameW.KERNEL32(004275C8,004275C8,00000400), ref: 00405F06
                          • wsprintfA.USER32 ref: 00405F24
                          • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 00405F5F
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405F6E
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA6
                          • SetFilePointer.KERNEL32(0040A588,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A588,00000000,[Rename],00000000,00000000,00000000), ref: 00405FFC
                          • GlobalFree.KERNEL32(00000000), ref: 0040600D
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406014
                            • Part of subcall function 00405D53: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\eXiJWkp8OE.exe,80000000,00000003), ref: 00405D57
                            • Part of subcall function 00405D53: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405D79
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                          • String ID: %ls=%ls$NUL$[Rename]
                          • API String ID: 222337774-899692902
                          • Opcode ID: b79c81f05b1b833d126071e3cf8f1dbc038624686787cc5f02dad872694d8803
                          • Instruction ID: 52ae09e4e2a5e81e4d5588e003ad531eff1fe7f7ae6e2de5146a23cae23f7ad9
                          • Opcode Fuzzy Hash: b79c81f05b1b833d126071e3cf8f1dbc038624686787cc5f02dad872694d8803
                          • Instruction Fuzzy Hash: EB315330241B19BBD2206B209D08F2B3A5CEF85758F15043BF942F62C2EA7CC9118EBD
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 10002416
                            • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                          • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID: @Hmu
                          • API String ID: 4216380887-887474944
                          • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                          • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                          • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                          • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 004042C6
                          • GetSysColor.USER32(00000000), ref: 004042E2
                          • SetTextColor.GDI32(?,00000000), ref: 004042EE
                          • SetBkMode.GDI32(?,?), ref: 004042FA
                          • GetSysColor.USER32(?), ref: 0040430D
                          • SetBkColor.GDI32(?,?), ref: 0040431D
                          • DeleteObject.GDI32(?), ref: 00404337
                          • CreateBrushIndirect.GDI32(?), ref: 00404341
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                          • Instruction ID: 2a82f640caf94e13ad52f77eccc7f6a005bf570db5d4005cc44859485eb84fad
                          • Opcode Fuzzy Hash: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                          • Instruction Fuzzy Hash: 9F215171600704ABCB219F68DE08B4BBBF8AF81714F04892DED95E26A0D738E904CB64
                          APIs
                          • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402688
                          • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 004026AB
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004026C1
                            • Part of subcall function 00405E34: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405E4A
                          • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040276D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 01588cc1e6d12b9eb48a34a041857950361e167f935f48975bd7f3d5c8a3ade6
                          • Instruction ID: fbd7f9394f7a40dbbdef10ea3a20ac1ae57b35180e29dd1ddeb30b88b5afce05
                          • Opcode Fuzzy Hash: 01588cc1e6d12b9eb48a34a041857950361e167f935f48975bd7f3d5c8a3ade6
                          • Instruction Fuzzy Hash: 19510774D00219ABDF209F94CA88AAEB779FF04344F50447BE501B72E0D7B99982DB69
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00406475
                          • CharNextW.USER32(?,?,?,00000000), ref: 00406484
                          • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00406489
                          • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00435000,00403391,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 0040649C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-4010320282
                          • Opcode ID: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                          • Instruction ID: c1b46f2de1f90aebbf911330ce555e940da56993e608f70b6a8db31027969b8c
                          • Opcode Fuzzy Hash: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                          • Instruction Fuzzy Hash: 5311C85680121299DB307B588C40AB7A2B8EF55754F52803FEDCA732C1E77C5C9286BD
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00402DBA
                          • GetTickCount.KERNEL32 ref: 00402DD8
                          • wsprintfW.USER32 ref: 00402E06
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 00405315
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(00402E19,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 00405325
                            • Part of subcall function 004052DD: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00402E19), ref: 00405338
                            • Part of subcall function 004052DD: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll), ref: 0040534A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405370
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405398
                          • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402E2A
                          • ShowWindow.USER32(00000000,00000005), ref: 00402E38
                            • Part of subcall function 00402D83: MulDiv.KERNEL32(00028000,00000064,00029904), ref: 00402D98
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 2598da54cc89f43c600d8ada73a31ae54370e6bdc16888383da25aa760d7781d
                          • Instruction ID: 67f39cb704aca6262626a7976268bb3bb8a333bdab68892006d91dd8afb4411f
                          • Opcode Fuzzy Hash: 2598da54cc89f43c600d8ada73a31ae54370e6bdc16888383da25aa760d7781d
                          • Instruction Fuzzy Hash: 96016D70541614EBC721AB60EF4DA9B7A68AF00706B14417FF885F12E0CBF85865CBEE
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BC2
                          • GetMessagePos.USER32 ref: 00404BCA
                          • ScreenToClient.USER32(?,?), ref: 00404BE4
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404BF6
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C1C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                          • Instruction ID: 45e0f6331f39cfe7836e80c9775163861a3897288b26a0b158bc224782e9bc0b
                          • Opcode Fuzzy Hash: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                          • Instruction Fuzzy Hash: C9015271901218BAEB00DB94DD45FFEBBBCAF54711F10012BBA51B61D0C7B495018B54
                          APIs
                          • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402D22
                          • wsprintfW.USER32 ref: 00402D56
                          • SetWindowTextW.USER32(?,?), ref: 00402D66
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D78
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: f920e2d473a8442ab140d7cb001c2dea54e1cd42605ecc10fb631262ba466dce
                          • Instruction ID: 006a23aec332b8a1771af90dfa9c1e08c84c5b856183a3bf167901723993fe13
                          • Opcode Fuzzy Hash: f920e2d473a8442ab140d7cb001c2dea54e1cd42605ecc10fb631262ba466dce
                          • Instruction Fuzzy Hash: 2FF0367050020CABEF206F50DD49BEA3B69FF44305F00803AFA55B51D0DBF959558F59
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalFree.KERNEL32(?), ref: 10002572
                          • GlobalFree.KERNEL32(00000000), ref: 100025AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                          • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                          • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                          • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                          • GlobalFree.KERNEL32(?), ref: 004028E9
                          • GlobalFree.KERNEL32(00000000), ref: 004028FC
                          • CloseHandle.KERNEL32(?), ref: 00402914
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: 268536b817805fd7c6aa0ddf0c0313c96854f1d95891718e15f9d7c13f840f6f
                          • Instruction ID: 9003099e8900d80eaa65f9bf21adae6f43ee9946aaa6f9d478ae9c17af360c06
                          • Opcode Fuzzy Hash: 268536b817805fd7c6aa0ddf0c0313c96854f1d95891718e15f9d7c13f840f6f
                          • Instruction Fuzzy Hash: D6216F72801118BBCF216FA5CE49D9E7F79EF09364F24423AF550762E0CB794E419B98
                          APIs
                          • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,-0042B000), ref: 00404B3A
                          • wsprintfW.USER32 ref: 00404B43
                          • SetDlgItemTextW.USER32(?,00423728), ref: 00404B56
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$(7B
                          • API String ID: 3540041739-1320723960
                          • Opcode ID: 97f8edb7a0e5a20212aa5a449d05d7effc420c8931a1b74a790ae22a69f051c3
                          • Instruction ID: 8555a1dc09e6b234f76c08cd80d60a8511de1cbf1cdbca66d7a603e4fd23a7b2
                          • Opcode Fuzzy Hash: 97f8edb7a0e5a20212aa5a449d05d7effc420c8931a1b74a790ae22a69f051c3
                          • Instruction Fuzzy Hash: E911EB736441283BDB0095AD9C45F9E3298DB85378F150237FA26F71D1DA79D82286EC
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ByteCharMultiWidelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp$C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll
                          • API String ID: 3109718747-1750533306
                          • Opcode ID: bb355eb68794bd2602c597a740da7e4d176c02171e7b39124c1bbb2a5b8fb8b9
                          • Instruction ID: 4789cac02ba757069cd1743e95fa376523a080456913a55bd7acca95e4ec0b97
                          • Opcode Fuzzy Hash: bb355eb68794bd2602c597a740da7e4d176c02171e7b39124c1bbb2a5b8fb8b9
                          • Instruction Fuzzy Hash: CA11E772A01204BADB10AFB18F4EE9E32659F54355F20403BF502F65C1DAFC8E51576E
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                          • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                          • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                          • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                          • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                          • GlobalFree.KERNEL32(00000000), ref: 10001642
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                          • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D00
                          • GetClientRect.USER32(00000000,?), ref: 00401D0D
                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                          • DeleteObject.GDI32(00000000), ref: 00401D4B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: e9a49c003a36b0eb28a273a175e07ec8c4f33fa7e287ce0211e56fd96ac5525b
                          • Instruction ID: c287ee2e14a47dfcdc45124cadc9b4dd0eb33b5564dd8f2f51e592e83ba53e14
                          • Opcode Fuzzy Hash: e9a49c003a36b0eb28a273a175e07ec8c4f33fa7e287ce0211e56fd96ac5525b
                          • Instruction Fuzzy Hash: 33F0E172600504AFD701DBE4DE88CEEBBBDEB48311B104476F541F51A1CA749D018B38
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 298dafdcb9fb76c6349735f3086c7c7de60bc97eebb8a6152003ba88438aff8e
                          • Instruction ID: 9ab6cbc1baff8286944736a18d7265b6422843b7a732a624d4201333bc7942cf
                          • Opcode Fuzzy Hash: 298dafdcb9fb76c6349735f3086c7c7de60bc97eebb8a6152003ba88438aff8e
                          • Instruction Fuzzy Hash: F2219071940209BEEF01AFB5CE4AABE7B75EF44744F10403EFA01B61D1D6B88A409B69
                          APIs
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,004062BE,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00406075
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,004062BE,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00406096
                          • RegCloseKey.ADVAPI32(?,?,004062BE,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 004060B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Call
                          • API String ID: 3677997916-1824292864
                          • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                          • Instruction ID: 0186f18981595c0b19feb364ea02d5f95392918b8fa258a18f8687652683a575
                          • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                          • Instruction Fuzzy Hash: 4501483115020AEADF21CF66ED08E9B3BA8EF84390B01402AF845D2220D735D964DBA5
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033A3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00405B38
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033A3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004035DE), ref: 00405B42
                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405B54
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B32
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3081826266
                          • Opcode ID: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                          • Instruction ID: 1c34604f245f66d13fb295c2dca74b2082213948d97efa3850964b8affffb698
                          • Opcode Fuzzy Hash: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                          • Instruction Fuzzy Hash: 57D05E31101934AAC2116B448C04DDB73AC9E46304341442AF201B70A6C778695286FD
                          APIs
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 00405315
                            • Part of subcall function 004052DD: lstrlenW.KERNEL32(00402E19,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 00405325
                            • Part of subcall function 004052DD: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,00402E19), ref: 00405338
                            • Part of subcall function 004052DD: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsr69D8.tmp\System.dll), ref: 0040534A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405370
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538A
                            • Part of subcall function 004052DD: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405398
                            • Part of subcall function 0040585E: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 00405887
                            • Part of subcall function 0040585E: CloseHandle.KERNEL32(?), ref: 00405894
                          • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                          • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                          • String ID:
                          • API String ID: 3585118688-0
                          • Opcode ID: aad72d5f43a9630fd6dcb24be017385a9fc46da2bdcc89da63940828f32bb322
                          • Instruction ID: 5702df78c33f9bd13decba52644e1012fe72a42f767711efff684f6f7274af03
                          • Opcode Fuzzy Hash: aad72d5f43a9630fd6dcb24be017385a9fc46da2bdcc89da63940828f32bb322
                          • Instruction Fuzzy Hash: FF11A131900508EBCF21AF91CD4499E7AB6AF40314F21407BFA05B61F1D7798A92DB99
                          APIs
                          • CloseHandle.KERNEL32(00000238,C:\Users\user\AppData\Local\Temp\,00403708,?), ref: 004038E7
                          • CloseHandle.KERNEL32(000002CC,C:\Users\user\AppData\Local\Temp\,00403708,?), ref: 004038FB
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsr69D8.tmp, xrefs: 0040390B
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004038DA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsr69D8.tmp
                          • API String ID: 2962429428-3288989980
                          • Opcode ID: f084a8137c272c7609008576fb265960e9ac12256820a4da339362f4de570230
                          • Instruction ID: 23b98c188a40640ee87c89e263e7d2a3484f90a0975adae1b2ea6fd77d705eba
                          • Opcode Fuzzy Hash: f084a8137c272c7609008576fb265960e9ac12256820a4da339362f4de570230
                          • Instruction Fuzzy Hash: 78E086B14407149AC124AF7CAD495853A185F453357248726F178F20F0C778996B5E9D
                          APIs
                            • Part of subcall function 0040617E: lstrcpynW.KERNEL32(?,?,00000400,00403463,00429240,NSIS Error), ref: 0040618B
                            • Part of subcall function 00405BDD: CharNextW.USER32(?,?,00425F30,?,00405C51,00425F30,00425F30,74DF3420,?,74DF2EE0,0040598F,?,74DF3420,74DF2EE0,00000000), ref: 00405BEB
                            • Part of subcall function 00405BDD: CharNextW.USER32(00000000), ref: 00405BF0
                            • Part of subcall function 00405BDD: CharNextW.USER32(00000000), ref: 00405C08
                          • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,74DF3420,?,74DF2EE0,0040598F,?,74DF3420,74DF2EE0,00000000), ref: 00405C93
                          • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,74DF3420,?,74DF2EE0,0040598F,?,74DF3420,74DF2EE0), ref: 00405CA3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: 0_B
                          • API String ID: 3248276644-2128305573
                          • Opcode ID: 8c509004bd2409bcc8bce800ca11afa93321ed7f3e6ee2afcf27be4b7ee26805
                          • Instruction ID: 790be11e20efdccda9c73cacd4945748764c6204d4d0b11914a12a4c94a1ccfd
                          • Opcode Fuzzy Hash: 8c509004bd2409bcc8bce800ca11afa93321ed7f3e6ee2afcf27be4b7ee26805
                          • Instruction Fuzzy Hash: 41F0F925108F6515F62233790D05EAF2554CF82394755067FF891B12D1DB3C9D938C7D
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00405280
                          • CallWindowProcW.USER32(?,?,?,?), ref: 004052D1
                            • Part of subcall function 0040428E: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 1c38682ff548693de77d02b4aeee144e7a7efb8abd51762e205331c359b10038
                          • Instruction ID: 35360b72f4910b777185a6264b25dc7760dbd7dc789205491e41d57b326ac1ec
                          • Opcode Fuzzy Hash: 1c38682ff548693de77d02b4aeee144e7a7efb8abd51762e205331c359b10038
                          • Instruction Fuzzy Hash: 6B019E71210708ABDF208F11DD84E9B3A35EF94321F60443AFA00761D1C77A8D529E6A
                          APIs
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 00405887
                          • CloseHandle.KERNEL32(?), ref: 00405894
                          Strings
                          • Error launching installer, xrefs: 00405871
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: 03ab27a360793ac613c0483ba4ee8f6366951212bcf32abb356d437eb8ce57e6
                          • Instruction ID: 0fb7bd0647ee639374dbc29985885c8cd5f4694ddcbbc5ba66c50ad851a9a680
                          • Opcode Fuzzy Hash: 03ab27a360793ac613c0483ba4ee8f6366951212bcf32abb356d437eb8ce57e6
                          • Instruction Fuzzy Hash: 22E04FB0A002097FEB009B64ED45F7B77ACEB04208F408431BD00F2150D77498248A78
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\eXiJWkp8OE.exe,C:\Users\user\Desktop\eXiJWkp8OE.exe,80000000,00000003), ref: 00405B84
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\eXiJWkp8OE.exe,C:\Users\user\Desktop\eXiJWkp8OE.exe,80000000,00000003), ref: 00405B94
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-224404859
                          • Opcode ID: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                          • Instruction ID: 87bbc210c64b19a6b78a00595756172ded5dec919d443e3f73ce50da7c0279be
                          • Opcode Fuzzy Hash: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                          • Instruction Fuzzy Hash: D4D05EB24009209AD312AB04DD00DAF77ACEF163007464426E841AB166D778BC8186BC
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                          • GlobalFree.KERNEL32(00000000), ref: 100011C7
                          • GlobalFree.KERNEL32(00000000), ref: 100011D9
                          • GlobalFree.KERNEL32(?), ref: 10001203
                          Memory Dump Source
                          • Source File: 00000000.00000002.4163005975.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4162990408.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163020529.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4163037051.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                          • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F99,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CC8
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405CE0
                          • CharNextA.USER32(00000000,?,00000000,00405F99,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CF1
                          • lstrlenA.KERNEL32(00000000,?,00000000,00405F99,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CFA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4160724188.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4160707434.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160744364.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160761159.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4160902070.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_eXiJWkp8OE.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                          • Instruction ID: b09c91cad7c2282b041c35ea214dbdd3f15ee75aa50bf55fe933874c09a5e2ef
                          • Opcode Fuzzy Hash: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                          • Instruction Fuzzy Hash: BFF0F631104954FFD702DFA5DD04E9FBBA8EF06350B2180BAE841F7210D674DE01ABA8