Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HJEbEB40vP.exe

Overview

General Information

Sample name:HJEbEB40vP.exe
renamed because original name is a hash value
Original sample name:9bbb84ccd33a3fca342b03d58b3f2c47410b00872c57e4d9cba8039b21752c57.exe
Analysis ID:1502975
MD5:4f7955fcf2f05ff0e47c6d21bc951c95
SHA1:8826dec44dcba2791ae3508d635ba39212770040
SHA256:9bbb84ccd33a3fca342b03d58b3f2c47410b00872c57e4d9cba8039b21752c57
Tags:exeFormbook
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files

Classification

  • System is w10x64
  • HJEbEB40vP.exe (PID: 7376 cmdline: "C:\Users\user\Desktop\HJEbEB40vP.exe" MD5: 4F7955FCF2F05FF0E47C6D21BC951C95)
    • HJEbEB40vP.exe (PID: 4112 cmdline: "C:\Users\user\Desktop\HJEbEB40vP.exe" MD5: 4F7955FCF2F05FF0E47C6D21BC951C95)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.3750298982.0000000006E62000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    0000000B.00000002.3748534429.0000000004022000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: HJEbEB40vP.exe PID: 7376JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: HJEbEB40vP.exeReversingLabs: Detection: 48%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: HJEbEB40vP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: HJEbEB40vP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: mshtml.pdbUGP source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmp
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,1_2_00405A4F
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406620 FindFirstFileA,FindClose,1_2_00406620
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004027CF FindFirstFileA,1_2_004027CF
        Source: HJEbEB40vP.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: HJEbEB40vP.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
        Source: HJEbEB40vP.exeString found in binary or memory: http://www.skinstudio.netG
        Source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.00000000005F2000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
        Source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.00000000005F2000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
        Source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,1_2_0040550F
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,1_2_004033D8
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004072D11_2_004072D1
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406AFA1_2_00406AFA
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_71C21B281_2_71C21B28
        Source: HJEbEB40vP.exe, 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs HJEbEB40vP.exe
        Source: HJEbEB40vP.exe, 0000000B.00000000.3743127490.0000000000443000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs HJEbEB40vP.exe
        Source: HJEbEB40vP.exeBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs HJEbEB40vP.exe
        Source: HJEbEB40vP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal76.troj.evad.winEXE@3/17@0/0
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,1_2_004033D8
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004047BF GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,1_2_004047BF
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00402198 LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,1_2_00402198
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nsoD476.tmpJump to behavior
        Source: HJEbEB40vP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: HJEbEB40vP.exeReversingLabs: Detection: 48%
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile read: C:\Users\user\Desktop\HJEbEB40vP.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: HJEbEB40vP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmp
        Source: Binary string: mshtml.pdbUGP source: HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: HJEbEB40vP.exe PID: 7376, type: MEMORYSTR
        Source: Yara matchFile source: 00000001.00000002.3750298982.0000000006E62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.3748534429.0000000004022000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_71C21B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,1_2_71C21B28
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\BgImage.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\UserInfo.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\nsExec.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Monotonien152.AllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Inversor.SpoJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Charting.skrJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\chokoladeforretning.marJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\doubling.regJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\hmoriderne.nerJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\lvens.flbJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\materialiter.sigJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\preinvest.priJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\ridningen.txtJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI/Special instruction interceptor: Address: 739573E
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeRDTSC instruction interceptor: First address: 736089C second address: 736089C instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF38D2586A8h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 cmp dl, cl 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeRDTSC instruction interceptor: First address: 452089C second address: 452089C instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF38CB1BF08h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 cmp dl, cl 0x0000000a rdtsc
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\BgImage.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\UserInfo.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\nsExec.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,1_2_00405A4F
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406620 FindFirstFileA,FindClose,1_2_00406620
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004027CF FindFirstFileA,1_2_004027CF
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI call chain: ExitProcess graph end nodegraph_1-4504
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI call chain: ExitProcess graph end nodegraph_1-4653
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406647 LdrInitializeThunk,GetSystemDirectoryA,LdrInitializeThunk,LdrInitializeThunk,wsprintfA,LdrInitializeThunk,LoadLibraryExA,1_2_00406647
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_71C21B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,1_2_71C21B28
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,1_2_004033D8
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        1
        Masquerading
        OS Credential Dumping2
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        DLL Side-Loading
        11
        Process Injection
        1
        Access Token Manipulation
        LSASS Memory3
        File and Directory Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Junk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Registry Run Keys / Startup Folder
        11
        Process Injection
        Security Account Manager23
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        DLL Side-Loading
        1
        DLL Side-Loading
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        HJEbEB40vP.exe48%ReversingLabsWin32.Trojan.GuLoader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\BgImage.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\UserInfo.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\nsExec.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
        http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
        http://www.ftp.ftp://ftp.gopher.0%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
        http://www.skinstudio.netG0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.210.172
        truefalse
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdHJEbEB40vP.exe, 0000000B.00000001.3744653473.00000000005F2000.00000020.00000001.01000000.0000000A.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ftp.ftp://ftp.gopher.HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdHJEbEB40vP.exe, 0000000B.00000001.3744653473.00000000005F2000.00000020.00000001.01000000.0000000A.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorHJEbEB40vP.exefalse
          • URL Reputation: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorHJEbEB40vP.exefalse
          • URL Reputation: safe
          unknown
          http://www.skinstudio.netGHJEbEB40vP.exefalse
          • Avira URL Cloud: safe
          unknown
          https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214HJEbEB40vP.exe, 0000000B.00000001.3744653473.0000000000649000.00000020.00000001.01000000.0000000A.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1502975
          Start date and time:2024-09-02 16:12:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 35s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:12
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:HJEbEB40vP.exe
          renamed because original name is a hash value
          Original Sample Name:9bbb84ccd33a3fca342b03d58b3f2c47410b00872c57e4d9cba8039b21752c57.exe
          Detection:MAL
          Classification:mal76.troj.evad.winEXE@3/17@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 50
          • Number of non-executed functions: 31
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe, UsoClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: HJEbEB40vP.exe
          No simulations
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          bg.microsoft.map.fastly.nethttps://fish-container.vercel.app/Get hashmaliciousUnknownBrowse
          • 199.232.214.172
          1Td9Py5FAy.xlsGet hashmaliciousUnknownBrowse
          • 199.232.214.172
          1Td9Py5FAy.xlsGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          http://cache.cloudswiftcdn.comGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          http://indepahote.comGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          http://unfortunatelydroopinglying.comGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          http://click.pstmrk.it/3s/link.sbstck.com%2Fredirect%2Fec5e61d5-d909-47a4-a5c5-29abb53cce07%3Fj%3DeyJ1IjoiNGFmZ282In0.z_t-M2j-7Tb2juoGCLHWfJk0lpODDoxEZ5Rgn3ZZK8M/YI-Q/0Fm3AQ/AQ/6f640929-45a9-498c-bbc7-80c3f748ceb6/1/l_UfKAanwFGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          https://q7ke.glitch.me/?e=mthatha@africawsp.co.zaGet hashmaliciousUnknownBrowse
          • 199.232.214.172
          https://rgbegx.blogspot.pe/Get hashmaliciousGRQ ScamBrowse
          • 199.232.214.172
          http://10eurodisconto.com?rid=iVbb6XlGet hashmaliciousUnknownBrowse
          • 199.232.210.172
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\BgImage.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
            DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
              Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                  004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                    DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                      Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                        004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                          P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                            P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                              C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dllUdspecialiser45.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                Botulismus56.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  Hebdomcad.exeGet hashmaliciousGuLoaderBrowse
                                    Udspecialiser45.exeGet hashmaliciousGuLoaderBrowse
                                      Hebdomcad.exeGet hashmaliciousGuLoaderBrowse
                                        Botulismus56.exeGet hashmaliciousGuLoaderBrowse
                                          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                            DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                                              Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                                                004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):49
                                                  Entropy (8bit):4.75216571132969
                                                  Encrypted:false
                                                  SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                                  MD5:797DA95245047A54F125FBF3B19FA295
                                                  SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                                  SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                                  SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):7680
                                                  Entropy (8bit):5.188410641489526
                                                  Encrypted:false
                                                  SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                                  MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                                  SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                                  SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                                  SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                  • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                                  • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                                  • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                  • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                  • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                                  • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                                  • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                  • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                  • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):12288
                                                  Entropy (8bit):5.744994954995265
                                                  Encrypted:false
                                                  SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                                  MD5:12B140583E3273EE1F65016BECEA58C4
                                                  SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                                  SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                                  SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: Udspecialiser45.exe, Detection: malicious, Browse
                                                  • Filename: Botulismus56.exe, Detection: malicious, Browse
                                                  • Filename: Hebdomcad.exe, Detection: malicious, Browse
                                                  • Filename: Udspecialiser45.exe, Detection: malicious, Browse
                                                  • Filename: Hebdomcad.exe, Detection: malicious, Browse
                                                  • Filename: Botulismus56.exe, Detection: malicious, Browse
                                                  • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                  • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                                  • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                                  • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4096
                                                  Entropy (8bit):3.327532764383977
                                                  Encrypted:false
                                                  SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                                  MD5:90228DD140188EC0CA02F7F52E4C9A30
                                                  SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                                  SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                                  SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):6656
                                                  Entropy (8bit):5.178709395875687
                                                  Encrypted:false
                                                  SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                                  MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                                  SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                                  SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                                  SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):25
                                                  Entropy (8bit):4.163856189774724
                                                  Encrypted:false
                                                  SSDEEP:3:+gMn:8
                                                  MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                                  SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                                  SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                                  SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                                  Malicious:false
                                                  Preview:[Caps]..Setting=Enabled..
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3011
                                                  Entropy (8bit):4.875614577841428
                                                  Encrypted:false
                                                  SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                                  MD5:6103DF2AF52F53D95AF61664D1866FFE
                                                  SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                                  SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                                  SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                                  Malicious:false
                                                  Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3794
                                                  Entropy (8bit):4.876163305802233
                                                  Encrypted:false
                                                  SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                                  MD5:0629DF955F60990975A3C8EF199B57E9
                                                  SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                                  SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                                  SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                                  Malicious:false
                                                  Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):12324
                                                  Entropy (8bit):4.506527734456382
                                                  Encrypted:false
                                                  SSDEEP:192:vBBtswqg7AJ6AcdUzvlL1qRY5AtG+ftEmmbx92x00:vBBtmg7a63Ujbqynambv0
                                                  MD5:6A70EE29DFE37723C644213A5B41E3FC
                                                  SHA1:AF966E8B806882BF8BB7841E74646AC728A53E75
                                                  SHA-256:F76544A52CCA074E85EB691D9FB7A9BE4E2376F29D027A880329AA6186176894
                                                  SHA-512:172F6D55D086DC05F0CA9FAB61F594C5D3834060295FE0FC9ADEFCE04772C5F6C459E9DBB86CD2FC38363F4CB5A48F67BB5BD5B9EB71F05FCC2848B9CBA0D1F8
                                                  Malicious:false
                                                  Preview:.......................................H.OO...................hh.---.@@......`.................k...e.9.r...n...e...l..>3...2...:..6:...C...r...e...a...t...e...F...i...l...e...A...(...m..g ...r..y4... ...,... ...i... ...0...x...8...0..U0...0...0...0...0...0.3.,..' ...i... ..#0.uu,... ...p... ...0...,.r. ...i.." ...4...,..8 .'.i... ...0...x...8...0...,... ...i... ...0. .)...i.......r.zz8...q...k...e.^^r...n...e...l..t3...2.YY:...:...S...e...t...F...i...l...e...P...o...i...n...t...e...r...(...i... .".r...8...,... ...i... ...2...3.ff0..T1...2... ...,... ...i... ...0.*.,..vi... ...0...)...i..R....r...4...q...k.z.e.\\r...n...e...l..J3...2..;:...:...V...i..<r...t..5u...a...l...A...l...l...o.IIc...(...i... ...0...,...i... .k.5...8.."2...3...6...9...2.h.8..`,... ...i.G. ...0...x...3...0...0...0...,..d ...i... ...0...x...4...0...)...p.H.....r...2...q.@.k...e...r...n...e...l..*3.zz2...:...:...R...e...a...d..GF...i...l...e...(...i... ...r...8.DD,..( ..8i... ...r...2...,... ...i... ...5..&8...2...3
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):247013
                                                  Entropy (8bit):7.52878297101555
                                                  Encrypted:false
                                                  SSDEEP:3072:356Nef7kQPwRCWb321NX0ALxD8SS5K4gyY7VCEr93uB3ide2dkF20oW8aQHQJK:36KjwRC1NXdZS8vyYQszddde20qaQHf
                                                  MD5:C6BD02E86A07F3CFBA4F7A11A050B922
                                                  SHA1:15BA4301164AD4FBD27D84F1A50ED71FE411EC31
                                                  SHA-256:9EBB31BB1928D6784DB09E0C0F044D309C208ADC9856B92D40C955F43D2379A4
                                                  SHA-512:5CA39C401CC0CFFF8093867BE3F2F2516E8E92E08245EE278D17C19524593B7635E037004CA5698858C28E1618DCA2648A5F8D0B31ABE23D8943B52108EDA9B6
                                                  Malicious:false
                                                  Preview:......~.......\\\\\..$.........................................................111.&&&&..................p............O..._............ll...>....N.\.jjj.O......x......##..L..........mmm....................v...........>..............................=.......................................b...................ss.........J..Z..........VVVVVV........GG.............C.&&...a....K..........o..((......... .........................................]....V..rrrrr........i.....ee............ZZZ.W...................@@@@@@@...........z................##..........UU......#.....NN..........l.^...TT...[.......--....}...|.....iii....5..............................zzz.......+++.....................Z..##.......c...........rr. ................&&.........[.........99......vv........4.....P...............m.v....XX..............................zz....1......................l.......*...nn..O....;......(..SS.G..HH....G....................QQ..............]....Y...........zzz.....)..R...................==.((((
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3861
                                                  Entropy (8bit):4.8950653795254695
                                                  Encrypted:false
                                                  SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                                  MD5:2B5A33F2637CE6016495BE603413514E
                                                  SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                                  SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                                  SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                                  Malicious:false
                                                  Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3435
                                                  Entropy (8bit):4.910328234136937
                                                  Encrypted:false
                                                  SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                                  MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                                  SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                                  SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                                  SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                                  Malicious:false
                                                  Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1618
                                                  Entropy (8bit):4.660461986408
                                                  Encrypted:false
                                                  SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                                  MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                                  SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                                  SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                                  SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                                  Malicious:false
                                                  Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2322
                                                  Entropy (8bit):4.685927571910316
                                                  Encrypted:false
                                                  SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                                  MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                                  SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                                  SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                                  SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                                  Malicious:false
                                                  Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2438
                                                  Entropy (8bit):4.834166284053989
                                                  Encrypted:false
                                                  SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                                  MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                                  SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                                  SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                                  SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                                  Malicious:false
                                                  Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3194
                                                  Entropy (8bit):4.87998401204962
                                                  Encrypted:false
                                                  SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                                  MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                                  SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                                  SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                                  SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                                  Malicious:false
                                                  Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                                  Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):434
                                                  Entropy (8bit):4.287029634434794
                                                  Encrypted:false
                                                  SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                                  MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                                  SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                                  SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                                  SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                                  Malicious:false
                                                  Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                  Entropy (8bit):7.435255044103252
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:HJEbEB40vP.exe
                                                  File size:504'318 bytes
                                                  MD5:4f7955fcf2f05ff0e47c6d21bc951c95
                                                  SHA1:8826dec44dcba2791ae3508d635ba39212770040
                                                  SHA256:9bbb84ccd33a3fca342b03d58b3f2c47410b00872c57e4d9cba8039b21752c57
                                                  SHA512:a11ac10434ea13da397f16122429f7a553685d6d365f6b9e5813c8e514ae413f35e3aee9c61bd70503665d8c39297e3c68a58af4df75b2e28e61974871aef438
                                                  SSDEEP:12288:c19+dlfwYKZWegJFLyYjKm/g21SQSfkL4nsiP:PdloYK7g3+IMz7sL4ns
                                                  TLSH:7BB4DF13FB27C8DBDA7D13F1A8A2D73B1EE411195871D4DCE7E5AE877000A262B09369
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                                  Icon Hash:eb9b9b2bbb9be371
                                                  Entrypoint:0x4033d8
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:671f2a1f8aee14d336bab98fea93d734
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  sub esp, 00000224h
                                                  push esi
                                                  push edi
                                                  xor edi, edi
                                                  push 00008001h
                                                  mov dword ptr [ebp-14h], edi
                                                  mov dword ptr [ebp-0Ch], 0040A188h
                                                  mov dword ptr [ebp-08h], edi
                                                  mov byte ptr [ebp-04h], 00000020h
                                                  call dword ptr [0040809Ch]
                                                  mov esi, dword ptr [004080A0h]
                                                  lea eax, dword ptr [ebp-000000C4h]
                                                  push eax
                                                  mov dword ptr [ebp-000000B0h], edi
                                                  mov dword ptr [ebp-30h], edi
                                                  mov dword ptr [ebp-2Ch], edi
                                                  mov dword ptr [ebp-000000C4h], 0000009Ch
                                                  call esi
                                                  test eax, eax
                                                  jne 00007FF38C7F9F41h
                                                  lea eax, dword ptr [ebp-000000C4h]
                                                  mov dword ptr [ebp-000000C4h], 00000094h
                                                  push eax
                                                  call esi
                                                  cmp dword ptr [ebp-000000B4h], 02h
                                                  jne 00007FF38C7F9F2Ch
                                                  movsx cx, byte ptr [ebp-000000A3h]
                                                  mov al, byte ptr [ebp-000000B0h]
                                                  sub ecx, 30h
                                                  sub al, 53h
                                                  mov byte ptr [ebp-2Ah], 00000004h
                                                  neg al
                                                  sbb eax, eax
                                                  not eax
                                                  and eax, ecx
                                                  mov word ptr [ebp-30h], ax
                                                  cmp dword ptr [ebp-000000B4h], 02h
                                                  jnc 00007FF38C7F9F24h
                                                  and byte ptr [ebp-2Ah], 00000000h
                                                  cmp byte ptr [ebp-000000AFh], 00000041h
                                                  jl 00007FF38C7F9F13h
                                                  movsx ax, byte ptr [ebp-000000AFh]
                                                  sub eax, 40h
                                                  mov word ptr [ebp-30h], ax
                                                  jmp 00007FF38C7F9F06h
                                                  mov word ptr [ebp-30h], di
                                                  cmp dword ptr [ebp-000000C0h], 0Ah
                                                  jnc 00007FF38C7F9F0Ah
                                                  and word ptr [ebp+00000000h], 0000h
                                                  Programming Language:
                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                                  RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                                  RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                                  RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                                  RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                                  RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                                  RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                                  RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                                  RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                                  RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                                  RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                                  RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                                  RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                                  RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                                  RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                                  RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                  DLLImport
                                                  ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                                  SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                                  ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                                  COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                  USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                                  GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                                  KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Sep 2, 2024 16:12:49.107732058 CEST1.1.1.1192.168.2.90x8507No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                  Sep 2, 2024 16:12:49.107732058 CEST1.1.1.1192.168.2.90x8507No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Target ID:1
                                                  Start time:10:12:52
                                                  Start date:02/09/2024
                                                  Path:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\HJEbEB40vP.exe"
                                                  Imagebase:0x400000
                                                  File size:504'318 bytes
                                                  MD5 hash:4F7955FCF2F05FF0E47C6D21BC951C95
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.3750298982.0000000006E62000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:11
                                                  Start time:10:16:57
                                                  Start date:02/09/2024
                                                  Path:C:\Users\user\Desktop\HJEbEB40vP.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\HJEbEB40vP.exe"
                                                  Imagebase:0x400000
                                                  File size:504'318 bytes
                                                  MD5 hash:4F7955FCF2F05FF0E47C6D21BC951C95
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.3748534429.0000000004022000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:21.3%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:16.3%
                                                    Total number of Nodes:1543
                                                    Total number of Limit Nodes:40
                                                    execution_graph 3895 4015c2 3899 402c5e 3895->3899 3898 4015db 3900 402c6a 3899->3900 3905 406320 3900->3905 3903 4015c9 SetFileAttributesA 3903->3898 3920 40632d 3905->3920 3906 40656e 3907 402c8b 3906->3907 3944 40628d lstrcpynA 3906->3944 3907->3903 3922 406587 3907->3922 3909 406545 lstrlenA 3909->3920 3912 406320 15 API calls 3912->3909 3914 40644c GetSystemDirectoryA 3914->3920 3915 406462 GetWindowsDirectoryA 3915->3920 3916 406587 5 API calls 3916->3920 3917 406320 15 API calls 3917->3920 3918 4064ee lstrcatA 3918->3920 3920->3906 3920->3909 3920->3912 3920->3914 3920->3915 3920->3916 3920->3917 3920->3918 3921 4064c5 SHGetPathFromIDListA CoTaskMemFree 3920->3921 3931 406174 3920->3931 3936 4066b5 GetModuleHandleA 3920->3936 3942 4061eb wsprintfA 3920->3942 3943 40628d lstrcpynA 3920->3943 3921->3920 3923 406593 3922->3923 3925 4065f0 CharNextA 3923->3925 3926 4065fb 3923->3926 3929 4065de CharNextA 3923->3929 3930 4065eb CharNextA 3923->3930 3952 405c4a 3923->3952 3924 4065ff CharPrevA 3924->3926 3925->3923 3925->3926 3926->3924 3927 40661a 3926->3927 3927->3903 3929->3923 3930->3925 3945 406113 3931->3945 3934 4061d7 3934->3920 3935 4061a8 RegQueryValueExA RegCloseKey 3935->3934 3937 4066d1 3936->3937 3938 4066db GetProcAddress 3936->3938 3949 406647 GetSystemDirectoryA 3937->3949 3940 4066ea 3938->3940 3940->3920 3941 4066d7 3941->3938 3941->3940 3942->3920 3943->3920 3944->3907 3946 406122 3945->3946 3947 40612b RegOpenKeyExA 3946->3947 3948 406126 3946->3948 3947->3948 3948->3934 3948->3935 3950 406669 wsprintfA LoadLibraryExA 3949->3950 3950->3941 3953 405c50 3952->3953 3954 405c63 3953->3954 3955 405c56 CharNextA 3953->3955 3954->3923 3955->3953 3956 402543 3967 402c9e 3956->3967 3959 402c5e 21 API calls 3960 402556 3959->3960 3961 402560 RegQueryValueExA 3960->3961 3965 4027ed 3960->3965 3962 402580 3961->3962 3963 402586 RegCloseKey 3961->3963 3962->3963 3972 4061eb wsprintfA 3962->3972 3963->3965 3968 402c5e 21 API calls 3967->3968 3969 402cb5 3968->3969 3970 406113 RegOpenKeyExA 3969->3970 3971 40254d 3970->3971 3971->3959 3972->3963 5009 401a43 5010 402c5e 21 API calls 5009->5010 5011 401a4c ExpandEnvironmentStringsA 5010->5011 5012 401a60 5011->5012 5014 401a73 5011->5014 5013 401a65 lstrcmpA 5012->5013 5012->5014 5013->5014 5020 401744 5021 402c5e 21 API calls 5020->5021 5022 40174b SearchPathA 5021->5022 5023 401766 5022->5023 5024 401d44 5025 402c3c 21 API calls 5024->5025 5026 401d4b 5025->5026 5027 402c3c 21 API calls 5026->5027 5028 401d57 GetDlgItem 5027->5028 5029 40264d 5028->5029 5030 402ac5 SendMessageA 5031 402adf InvalidateRect 5030->5031 5032 402aea 5030->5032 5031->5032 5033 405345 5034 405355 5033->5034 5035 405369 5033->5035 5036 4053b2 5034->5036 5037 40535b 5034->5037 5038 405371 IsWindowVisible 5035->5038 5044 405388 5035->5044 5039 4053b7 CallWindowProcA 5036->5039 5040 404379 SendMessageA 5037->5040 5038->5036 5041 40537e 5038->5041 5042 405365 5039->5042 5040->5042 5046 404c80 SendMessageA 5041->5046 5044->5039 5051 404d00 5044->5051 5047 404ca3 GetMessagePos ScreenToClient SendMessageA 5046->5047 5048 404cdf SendMessageA 5046->5048 5049 404cdc 5047->5049 5050 404cd7 5047->5050 5048->5050 5049->5048 5050->5044 5060 40628d lstrcpynA 5051->5060 5053 404d13 5061 4061eb wsprintfA 5053->5061 5055 404d1d 5056 40140b 2 API calls 5055->5056 5057 404d26 5056->5057 5062 40628d lstrcpynA 5057->5062 5059 404d2d 5059->5036 5060->5053 5061->5055 5062->5059 5063 71c218c7 5064 71c218ea 5063->5064 5065 71c2192c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5064->5065 5066 71c2191a GlobalFree 5064->5066 5067 71c212f6 2 API calls 5065->5067 5066->5065 5068 71c21aae GlobalFree GlobalFree 5067->5068 3973 4023c9 3974 4023d1 3973->3974 3975 4023d7 3973->3975 3976 402c5e 21 API calls 3974->3976 3977 402c5e 21 API calls 3975->3977 3979 4023e7 3975->3979 3976->3975 3977->3979 3978 4023f5 3981 402c5e 21 API calls 3978->3981 3979->3978 3980 402c5e 21 API calls 3979->3980 3980->3978 3982 4023fe WritePrivateProfileStringA 3981->3982 3983 4020ca 3984 40218a 3983->3984 3985 4020dc 3983->3985 3988 401423 28 API calls 3984->3988 3986 402c5e 21 API calls 3985->3986 3987 4020e3 3986->3987 3989 402c5e 21 API calls 3987->3989 3993 40230f 3988->3993 3990 4020ec 3989->3990 3991 402101 LoadLibraryExA 3990->3991 3992 4020f4 GetModuleHandleA 3990->3992 3991->3984 3994 402111 GetProcAddress 3991->3994 3992->3991 3992->3994 3995 402120 3994->3995 3996 40215d 3994->3996 3998 402128 3995->3998 3999 40213f 3995->3999 4049 4053d1 3996->4049 4046 401423 3998->4046 4004 71c2176b 3999->4004 4000 402130 4000->3993 4002 40217e FreeLibrary 4000->4002 4002->3993 4005 71c2179b 4004->4005 4060 71c21b28 4005->4060 4007 71c217a2 4008 71c218c4 4007->4008 4009 71c217b3 4007->4009 4010 71c217ba 4007->4010 4008->4000 4108 71c2233f 4009->4108 4092 71c22381 4010->4092 4015 71c21800 4121 71c22568 4015->4121 4016 71c2181e 4019 71c21824 4016->4019 4020 71c2186c 4016->4020 4017 71c217d0 4022 71c217d6 4017->4022 4027 71c217e1 4017->4027 4018 71c217e9 4033 71c217df 4018->4033 4118 71c22d53 4018->4118 4140 71c215fb 4019->4140 4025 71c22568 11 API calls 4020->4025 4022->4033 4102 71c22ac8 4022->4102 4031 71c2185d 4025->4031 4026 71c21806 4132 71c215e9 4026->4132 4112 71c22742 4027->4112 4037 71c218b3 4031->4037 4146 71c2252e 4031->4146 4033->4015 4033->4016 4034 71c217e7 4034->4033 4035 71c22568 11 API calls 4035->4031 4037->4008 4039 71c218bd GlobalFree 4037->4039 4039->4008 4043 71c2189f 4043->4037 4150 71c21572 wsprintfA 4043->4150 4045 71c21898 FreeLibrary 4045->4043 4047 4053d1 28 API calls 4046->4047 4048 401431 4047->4048 4048->4000 4050 4053ec 4049->4050 4059 40548f 4049->4059 4051 405409 lstrlenA 4050->4051 4054 406320 21 API calls 4050->4054 4052 405432 4051->4052 4053 405417 lstrlenA 4051->4053 4056 405445 4052->4056 4057 405438 SetWindowTextA 4052->4057 4055 405429 lstrcatA 4053->4055 4053->4059 4054->4051 4055->4052 4058 40544b SendMessageA SendMessageA SendMessageA 4056->4058 4056->4059 4057->4056 4058->4059 4059->4000 4153 71c212a5 GlobalAlloc 4060->4153 4062 71c21b4f 4154 71c212a5 GlobalAlloc 4062->4154 4064 71c21d90 GlobalFree GlobalFree GlobalFree 4065 71c21dad 4064->4065 4082 71c21df7 4064->4082 4067 71c22181 4065->4067 4075 71c21dc2 4065->4075 4065->4082 4066 71c21c4d GlobalAlloc 4078 71c21b5a 4066->4078 4068 71c221a3 GetModuleHandleA 4067->4068 4067->4082 4071 71c221b4 LoadLibraryA 4068->4071 4072 71c221c9 4068->4072 4069 71c21c98 lstrcpyA 4074 71c21ca2 lstrcpyA 4069->4074 4070 71c21cb6 GlobalFree 4070->4078 4071->4072 4071->4082 4161 71c21652 GetProcAddress 4072->4161 4074->4078 4075->4082 4157 71c212b4 4075->4157 4076 71c2221a 4081 71c22227 lstrlenA 4076->4081 4076->4082 4077 71c22047 4160 71c212a5 GlobalAlloc 4077->4160 4078->4064 4078->4066 4078->4069 4078->4070 4078->4074 4078->4077 4078->4082 4085 71c21f89 GlobalFree 4078->4085 4086 71c220c3 4078->4086 4087 71c212b4 2 API calls 4078->4087 4155 71c215c4 GlobalSize GlobalAlloc 4078->4155 4162 71c21652 GetProcAddress 4081->4162 4082->4007 4083 71c221db 4083->4076 4090 71c22204 GetProcAddress 4083->4090 4085->4078 4086->4082 4089 71c2211c lstrcpyA 4086->4089 4087->4078 4089->4082 4090->4076 4091 71c2204f 4091->4007 4094 71c2239a 4092->4094 4093 71c212b4 GlobalAlloc lstrcpynA 4093->4094 4094->4093 4096 71c224d6 GlobalFree 4094->4096 4097 71c22448 GlobalAlloc MultiByteToWideChar 4094->4097 4100 71c22495 4094->4100 4164 71c2133d 4094->4164 4096->4094 4098 71c217c0 4096->4098 4099 71c22474 GlobalAlloc CLSIDFromString GlobalFree 4097->4099 4097->4100 4098->4017 4098->4018 4098->4033 4099->4096 4100->4096 4168 71c226d6 4100->4168 4104 71c22ada 4102->4104 4103 71c22b7f EnumWindows 4107 71c22b9d 4103->4107 4104->4103 4106 71c22c69 4106->4033 4171 71c22a74 4107->4171 4109 71c22354 4108->4109 4110 71c2235f GlobalAlloc 4109->4110 4111 71c217b9 4109->4111 4110->4109 4111->4010 4116 71c22772 4112->4116 4113 71c22820 4115 71c22826 GlobalSize 4113->4115 4117 71c22830 4113->4117 4114 71c2280d GlobalAlloc 4114->4117 4115->4117 4116->4113 4116->4114 4117->4034 4120 71c22d5e 4118->4120 4119 71c22d9e GlobalFree 4120->4119 4175 71c212a5 GlobalAlloc 4121->4175 4123 71c225f3 lstrcpynA 4129 71c22574 4123->4129 4124 71c22604 StringFromGUID2 WideCharToMultiByte 4124->4129 4125 71c22628 WideCharToMultiByte 4125->4129 4126 71c22649 wsprintfA 4126->4129 4127 71c2266d GlobalFree 4127->4129 4128 71c226a7 GlobalFree 4128->4026 4129->4123 4129->4124 4129->4125 4129->4126 4129->4127 4129->4128 4130 71c212f6 2 API calls 4129->4130 4176 71c21361 4129->4176 4130->4129 4180 71c212a5 GlobalAlloc 4132->4180 4134 71c215ee 4135 71c215fb 2 API calls 4134->4135 4136 71c215f8 4135->4136 4137 71c212f6 4136->4137 4138 71c21338 GlobalFree 4137->4138 4139 71c212ff GlobalAlloc lstrcpynA 4137->4139 4138->4031 4139->4138 4141 71c21607 wsprintfA 4140->4141 4142 71c21634 lstrcpyA 4140->4142 4145 71c2164d 4141->4145 4142->4145 4145->4035 4147 71c2187f 4146->4147 4148 71c2253c 4146->4148 4147->4043 4147->4045 4148->4147 4149 71c22555 GlobalFree 4148->4149 4149->4148 4151 71c212f6 2 API calls 4150->4151 4152 71c21593 4151->4152 4152->4037 4153->4062 4154->4078 4156 71c215e2 4155->4156 4156->4078 4163 71c212a5 GlobalAlloc 4157->4163 4159 71c212c3 lstrcpynA 4159->4082 4160->4091 4161->4083 4162->4082 4163->4159 4165 71c21344 4164->4165 4166 71c212b4 2 API calls 4165->4166 4167 71c2135f 4166->4167 4167->4094 4169 71c226e4 VirtualAlloc 4168->4169 4170 71c2273a 4168->4170 4169->4170 4170->4100 4172 71c22a7f 4171->4172 4173 71c22a84 GetLastError 4172->4173 4174 71c22a8f 4172->4174 4173->4174 4174->4106 4175->4129 4177 71c2136a 4176->4177 4178 71c21389 4176->4178 4177->4178 4179 71c21370 lstrcpyA 4177->4179 4178->4129 4179->4178 4180->4134 5069 402e4a 5070 402e72 5069->5070 5071 402e59 SetTimer 5069->5071 5072 402ec7 5070->5072 5073 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5070->5073 5071->5070 5073->5072 5077 71c216c8 5078 71c216f7 5077->5078 5079 71c21b28 18 API calls 5078->5079 5080 71c216fe 5079->5080 5081 71c21711 5080->5081 5082 71c21705 5080->5082 5084 71c2171b 5081->5084 5085 71c21738 5081->5085 5083 71c212f6 2 API calls 5082->5083 5092 71c2170f 5083->5092 5088 71c21572 3 API calls 5084->5088 5086 71c21762 5085->5086 5087 71c2173e 5085->5087 5091 71c21572 3 API calls 5086->5091 5090 71c215e9 3 API calls 5087->5090 5089 71c21720 5088->5089 5093 71c215e9 3 API calls 5089->5093 5094 71c21743 5090->5094 5091->5092 5095 71c21726 5093->5095 5096 71c212f6 2 API calls 5094->5096 5097 71c212f6 2 API calls 5095->5097 5098 71c21749 GlobalFree 5096->5098 5099 71c2172c GlobalFree 5097->5099 5098->5092 5100 71c2175d GlobalFree 5098->5100 5099->5092 5100->5092 4188 40244e 4189 402480 4188->4189 4190 402455 4188->4190 4192 402c5e 21 API calls 4189->4192 4191 402c9e 21 API calls 4190->4191 4193 40245c 4191->4193 4194 402487 4192->4194 4195 402466 4193->4195 4199 402494 4193->4199 4200 402d1c 4194->4200 4197 402c5e 21 API calls 4195->4197 4198 40246d RegDeleteValueA RegCloseKey 4197->4198 4198->4199 4201 402d28 4200->4201 4202 402d2f 4200->4202 4201->4199 4202->4201 4204 402d60 4202->4204 4205 406113 RegOpenKeyExA 4204->4205 4206 402d8e 4205->4206 4207 402e43 4206->4207 4208 402d98 4206->4208 4207->4201 4209 402d9e RegEnumValueA 4208->4209 4214 402dc1 4208->4214 4210 402e28 RegCloseKey 4209->4210 4209->4214 4210->4207 4211 402dfd RegEnumKeyA 4212 402e06 RegCloseKey 4211->4212 4211->4214 4213 4066b5 5 API calls 4212->4213 4215 402e16 4213->4215 4214->4210 4214->4211 4214->4212 4216 402d60 6 API calls 4214->4216 4217 402e38 4215->4217 4218 402e1a RegDeleteKeyA 4215->4218 4216->4214 4217->4207 4218->4207 5101 4027cf 5102 402c5e 21 API calls 5101->5102 5103 4027d6 FindFirstFileA 5102->5103 5104 4027f9 5103->5104 5108 4027e9 5103->5108 5109 4061eb wsprintfA 5104->5109 5106 402800 5110 40628d lstrcpynA 5106->5110 5109->5106 5110->5108 5111 401c53 5112 402c3c 21 API calls 5111->5112 5113 401c5a 5112->5113 5114 402c3c 21 API calls 5113->5114 5115 401c67 5114->5115 5116 401c7c 5115->5116 5117 402c5e 21 API calls 5115->5117 5118 401c8c 5116->5118 5119 402c5e 21 API calls 5116->5119 5117->5116 5120 401ce3 5118->5120 5121 401c97 5118->5121 5119->5118 5123 402c5e 21 API calls 5120->5123 5122 402c3c 21 API calls 5121->5122 5125 401c9c 5122->5125 5124 401ce8 5123->5124 5126 402c5e 21 API calls 5124->5126 5127 402c3c 21 API calls 5125->5127 5128 401cf1 FindWindowExA 5126->5128 5129 401ca8 5127->5129 5132 401d0f 5128->5132 5130 401cd3 SendMessageA 5129->5130 5131 401cb5 SendMessageTimeoutA 5129->5131 5130->5132 5131->5132 5133 402653 5134 402658 5133->5134 5135 40266c 5133->5135 5136 402c3c 21 API calls 5134->5136 5137 402c5e 21 API calls 5135->5137 5139 402661 5136->5139 5138 402673 lstrlenA 5137->5138 5138->5139 5140 405ec7 WriteFile 5139->5140 5141 402695 5139->5141 5140->5141 5142 403a54 5143 403a5f 5142->5143 5144 403a66 GlobalAlloc 5143->5144 5145 403a63 5143->5145 5144->5145 4361 4014d6 4366 402c3c 4361->4366 4363 4014dc Sleep 4365 402aea 4363->4365 4367 406320 21 API calls 4366->4367 4368 402c51 4367->4368 4368->4363 4369 401957 4370 401959 4369->4370 4371 402c5e 21 API calls 4370->4371 4372 40195e 4371->4372 4375 405a4f 4372->4375 4415 405d0d 4375->4415 4378 405a77 DeleteFileA 4380 401967 4378->4380 4379 405a8e 4383 405bc6 4379->4383 4429 40628d lstrcpynA 4379->4429 4382 405ab4 4384 405ac7 4382->4384 4385 405aba lstrcatA 4382->4385 4383->4380 4386 406620 2 API calls 4383->4386 4430 405c66 lstrlenA 4384->4430 4387 405acd 4385->4387 4389 405be0 4386->4389 4390 405adb lstrcatA 4387->4390 4391 405ae6 lstrlenA FindFirstFileA 4387->4391 4389->4380 4392 405be4 4389->4392 4390->4391 4393 405bbc 4391->4393 4413 405b0a 4391->4413 4443 405c1f lstrlenA CharPrevA 4392->4443 4393->4383 4395 405c4a CharNextA 4395->4413 4397 405a07 5 API calls 4398 405bf6 4397->4398 4399 405c10 4398->4399 4400 405bfa 4398->4400 4401 4053d1 28 API calls 4399->4401 4400->4380 4405 4053d1 28 API calls 4400->4405 4401->4380 4402 405b9b FindNextFileA 4404 405bb3 FindClose 4402->4404 4402->4413 4404->4393 4406 405c07 4405->4406 4407 406066 40 API calls 4406->4407 4409 405c0e 4407->4409 4409->4380 4410 405a4f 64 API calls 4410->4413 4411 4053d1 28 API calls 4411->4402 4412 4053d1 28 API calls 4412->4413 4413->4395 4413->4402 4413->4410 4413->4411 4413->4412 4414 406066 40 API calls 4413->4414 4434 40628d lstrcpynA 4413->4434 4435 405a07 4413->4435 4414->4413 4446 40628d lstrcpynA 4415->4446 4417 405d1e 4447 405cb8 CharNextA CharNextA 4417->4447 4420 405a6f 4420->4378 4420->4379 4421 406587 5 API calls 4424 405d34 4421->4424 4422 405d5f lstrlenA 4423 405d6a 4422->4423 4422->4424 4426 405c1f 3 API calls 4423->4426 4424->4420 4424->4422 4425 406620 2 API calls 4424->4425 4428 405c66 2 API calls 4424->4428 4425->4424 4427 405d6f GetFileAttributesA 4426->4427 4427->4420 4428->4422 4429->4382 4431 405c73 4430->4431 4432 405c84 4431->4432 4433 405c78 CharPrevA 4431->4433 4432->4387 4433->4431 4433->4432 4434->4413 4453 405dfb GetFileAttributesA 4435->4453 4438 405a34 4438->4413 4439 405a22 RemoveDirectoryA 4441 405a30 4439->4441 4440 405a2a DeleteFileA 4440->4441 4441->4438 4442 405a40 SetFileAttributesA 4441->4442 4442->4438 4444 405bea 4443->4444 4445 405c39 lstrcatA 4443->4445 4444->4397 4445->4444 4446->4417 4448 405ce3 4447->4448 4449 405cd3 4447->4449 4450 405d03 4448->4450 4452 405c4a CharNextA 4448->4452 4449->4448 4451 405cde CharNextA 4449->4451 4450->4420 4450->4421 4451->4450 4452->4448 4454 405a13 4453->4454 4455 405e0d SetFileAttributesA 4453->4455 4454->4438 4454->4439 4454->4440 4455->4454 4456 4033d8 SetErrorMode GetVersionExA 4457 40342a GetVersionExA 4456->4457 4459 403469 4456->4459 4458 403446 4457->4458 4457->4459 4458->4459 4460 4034ed 4459->4460 4461 4066b5 5 API calls 4459->4461 4462 406647 3 API calls 4460->4462 4461->4460 4463 403503 lstrlenA 4462->4463 4463->4460 4464 403513 4463->4464 4465 4066b5 5 API calls 4464->4465 4466 40351a 4465->4466 4467 4066b5 5 API calls 4466->4467 4468 403521 4467->4468 4469 4066b5 5 API calls 4468->4469 4470 40352d #17 OleInitialize SHGetFileInfoA 4469->4470 4545 40628d lstrcpynA 4470->4545 4473 40357b GetCommandLineA 4546 40628d lstrcpynA 4473->4546 4475 40358d 4476 405c4a CharNextA 4475->4476 4477 4035b4 CharNextA 4476->4477 4483 4035c3 4477->4483 4478 403689 4479 40369d GetTempPathA 4478->4479 4547 4033a7 4479->4547 4481 4036b5 4484 4036b9 GetWindowsDirectoryA lstrcatA 4481->4484 4485 40370f DeleteFileA 4481->4485 4482 405c4a CharNextA 4482->4483 4483->4478 4483->4482 4488 40368b 4483->4488 4487 4033a7 12 API calls 4484->4487 4557 402f31 GetTickCount GetModuleFileNameA 4485->4557 4490 4036d5 4487->4490 4641 40628d lstrcpynA 4488->4641 4489 403722 4494 4037a7 4489->4494 4498 405c4a CharNextA 4489->4498 4536 4037b7 4489->4536 4490->4485 4492 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4490->4492 4493 4033a7 12 API calls 4492->4493 4496 403707 4493->4496 4585 403a96 4494->4585 4496->4485 4496->4536 4500 40373c 4498->4500 4509 403781 4500->4509 4510 4037e6 4500->4510 4501 4037d1 4651 4059a3 4501->4651 4502 403928 4503 403930 GetCurrentProcess OpenProcessToken 4502->4503 4504 4039a6 ExitProcess 4502->4504 4507 403976 4503->4507 4508 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4503->4508 4512 4066b5 5 API calls 4507->4512 4508->4507 4513 405d0d 18 API calls 4509->4513 4655 40590e 4510->4655 4516 40397d 4512->4516 4517 40378d 4513->4517 4519 403992 ExitWindowsEx 4516->4519 4521 40399f 4516->4521 4517->4536 4642 40628d lstrcpynA 4517->4642 4519->4504 4519->4521 4669 40140b 4521->4669 4522 403803 4525 40381b 4522->4525 4659 40628d lstrcpynA 4522->4659 4523 40379c 4643 40628d lstrcpynA 4523->4643 4528 403839 wsprintfA 4525->4528 4542 403867 4525->4542 4529 406320 21 API calls 4528->4529 4529->4525 4532 403877 GetFileAttributesA 4534 403883 DeleteFileA 4532->4534 4532->4542 4533 4038af SetCurrentDirectoryA 4535 406066 40 API calls 4533->4535 4534->4542 4537 4038be CopyFileA 4535->4537 4644 4039bc 4536->4644 4537->4536 4537->4542 4538 405a4f 71 API calls 4538->4542 4539 406066 40 API calls 4539->4542 4540 406320 21 API calls 4540->4542 4542->4525 4542->4528 4542->4532 4542->4533 4542->4536 4542->4538 4542->4539 4542->4540 4543 403918 CloseHandle 4542->4543 4544 406620 2 API calls 4542->4544 4660 405897 CreateDirectoryA 4542->4660 4663 4058f1 CreateDirectoryA 4542->4663 4666 405926 CreateProcessA 4542->4666 4543->4536 4544->4542 4545->4473 4546->4475 4548 406587 5 API calls 4547->4548 4550 4033b3 4548->4550 4549 4033bd 4549->4481 4550->4549 4551 405c1f 3 API calls 4550->4551 4552 4033c5 4551->4552 4553 4058f1 2 API calls 4552->4553 4554 4033cb 4553->4554 4672 405e4f 4554->4672 4676 405e20 GetFileAttributesA CreateFileA 4557->4676 4559 402f71 4583 402f81 4559->4583 4677 40628d lstrcpynA 4559->4677 4561 402f97 4562 405c66 2 API calls 4561->4562 4563 402f9d 4562->4563 4678 40628d lstrcpynA 4563->4678 4565 402fa8 GetFileSize 4566 4030a2 4565->4566 4584 402fbf 4565->4584 4679 402ecd 4566->4679 4568 4030ab 4570 4030db GlobalAlloc 4568->4570 4568->4583 4714 403390 SetFilePointer 4568->4714 4690 403390 SetFilePointer 4570->4690 4571 40310e 4575 402ecd 6 API calls 4571->4575 4574 4030f6 4691 403168 4574->4691 4575->4583 4576 4030c4 4578 40337a ReadFile 4576->4578 4580 4030cf 4578->4580 4579 402ecd 6 API calls 4579->4584 4580->4570 4580->4583 4581 403102 4581->4581 4582 40313f SetFilePointer 4581->4582 4581->4583 4582->4583 4583->4489 4584->4566 4584->4571 4584->4579 4584->4583 4711 40337a 4584->4711 4586 4066b5 5 API calls 4585->4586 4587 403aaa 4586->4587 4588 403ab0 4587->4588 4589 403ac2 4587->4589 4728 4061eb wsprintfA 4588->4728 4590 406174 3 API calls 4589->4590 4591 403aed 4590->4591 4593 403b0b lstrcatA 4591->4593 4595 406174 3 API calls 4591->4595 4594 403ac0 4593->4594 4720 403d5b 4594->4720 4595->4593 4598 405d0d 18 API calls 4600 403b3d 4598->4600 4599 403bc6 4601 405d0d 18 API calls 4599->4601 4600->4599 4602 406174 3 API calls 4600->4602 4603 403bcc 4601->4603 4604 403b69 4602->4604 4605 403bdc LoadImageA 4603->4605 4606 406320 21 API calls 4603->4606 4604->4599 4609 403b85 lstrlenA 4604->4609 4612 405c4a CharNextA 4604->4612 4607 403c82 4605->4607 4608 403c03 RegisterClassA 4605->4608 4606->4605 4611 40140b 2 API calls 4607->4611 4610 403c39 SystemParametersInfoA CreateWindowExA 4608->4610 4640 403c8c 4608->4640 4613 403b93 lstrcmpiA 4609->4613 4614 403bb9 4609->4614 4610->4607 4615 403c88 4611->4615 4617 403b83 4612->4617 4613->4614 4618 403ba3 GetFileAttributesA 4613->4618 4616 405c1f 3 API calls 4614->4616 4619 403d5b 22 API calls 4615->4619 4615->4640 4620 403bbf 4616->4620 4617->4609 4621 403baf 4618->4621 4622 403c99 4619->4622 4729 40628d lstrcpynA 4620->4729 4621->4614 4624 405c66 2 API calls 4621->4624 4625 403ca5 ShowWindow 4622->4625 4626 403d28 4622->4626 4624->4614 4627 406647 3 API calls 4625->4627 4628 4054a3 5 API calls 4626->4628 4630 403cbd 4627->4630 4629 403d2e 4628->4629 4631 403d32 4629->4631 4632 403d4a 4629->4632 4633 403ccb GetClassInfoA 4630->4633 4635 406647 3 API calls 4630->4635 4638 40140b 2 API calls 4631->4638 4631->4640 4634 40140b 2 API calls 4632->4634 4636 403cf5 DialogBoxParamA 4633->4636 4637 403cdf GetClassInfoA RegisterClassA 4633->4637 4634->4640 4635->4633 4639 40140b 2 API calls 4636->4639 4637->4636 4638->4640 4639->4640 4640->4536 4641->4479 4642->4523 4643->4494 4645 4039d4 4644->4645 4646 4039c6 CloseHandle 4644->4646 4734 403a01 4645->4734 4646->4645 4649 405a4f 71 API calls 4650 4037bf OleUninitialize 4649->4650 4650->4501 4650->4502 4652 4059b8 4651->4652 4653 4037de ExitProcess 4652->4653 4654 4059cc MessageBoxIndirectA 4652->4654 4654->4653 4656 4066b5 5 API calls 4655->4656 4657 4037eb lstrlenA 4656->4657 4658 40628d lstrcpynA 4657->4658 4658->4522 4659->4525 4661 4058e3 4660->4661 4662 4058e7 GetLastError 4660->4662 4661->4542 4662->4661 4664 405901 4663->4664 4665 405905 GetLastError 4663->4665 4664->4542 4665->4664 4667 405965 4666->4667 4668 405959 CloseHandle 4666->4668 4667->4542 4668->4667 4670 401389 2 API calls 4669->4670 4671 401420 4670->4671 4671->4504 4673 405e5a GetTickCount GetTempFileNameA 4672->4673 4674 4033d6 4673->4674 4675 405e87 4673->4675 4674->4481 4675->4673 4675->4674 4676->4559 4677->4561 4678->4565 4680 402ed6 4679->4680 4681 402eee 4679->4681 4682 402ee6 4680->4682 4683 402edf DestroyWindow 4680->4683 4684 402ef6 4681->4684 4685 402efe GetTickCount 4681->4685 4682->4568 4683->4682 4715 4066f1 4684->4715 4686 402f0c CreateDialogParamA ShowWindow 4685->4686 4687 402f2f 4685->4687 4686->4687 4687->4568 4690->4574 4692 40317e 4691->4692 4693 4031ac 4692->4693 4719 403390 SetFilePointer 4692->4719 4695 40337a ReadFile 4693->4695 4696 4031b7 4695->4696 4697 403313 4696->4697 4698 4031c9 GetTickCount 4696->4698 4705 4032fd 4696->4705 4699 403355 4697->4699 4704 403317 4697->4704 4698->4705 4710 403218 4698->4710 4700 40337a ReadFile 4699->4700 4700->4705 4701 40337a ReadFile 4701->4710 4702 40337a ReadFile 4702->4704 4703 405ec7 WriteFile 4703->4704 4704->4702 4704->4703 4704->4705 4705->4581 4706 40326e GetTickCount 4706->4710 4707 403293 MulDiv wsprintfA 4708 4053d1 28 API calls 4707->4708 4708->4710 4709 405ec7 WriteFile 4709->4710 4710->4701 4710->4705 4710->4706 4710->4707 4710->4709 4712 405e98 ReadFile 4711->4712 4713 40338d 4712->4713 4713->4584 4714->4576 4716 40670e PeekMessageA 4715->4716 4717 406704 DispatchMessageA 4716->4717 4718 402efc 4716->4718 4717->4716 4718->4568 4719->4693 4721 403d6f 4720->4721 4730 4061eb wsprintfA 4721->4730 4723 403de0 4731 403e14 4723->4731 4725 403b1b 4725->4598 4726 403de5 4726->4725 4727 406320 21 API calls 4726->4727 4727->4726 4728->4594 4729->4599 4730->4723 4732 406320 21 API calls 4731->4732 4733 403e22 SetWindowTextA 4732->4733 4733->4726 4735 403a0f 4734->4735 4736 4039d9 4735->4736 4737 403a14 FreeLibrary GlobalFree 4735->4737 4736->4649 4737->4736 4737->4737 4738 402758 4739 40275f 4738->4739 4741 402a6c 4738->4741 4740 402c3c 21 API calls 4739->4740 4742 402766 4740->4742 4743 402775 SetFilePointer 4742->4743 4743->4741 4744 402785 4743->4744 4746 4061eb wsprintfA 4744->4746 4746->4741 5146 401e5a GetDC 5147 402c3c 21 API calls 5146->5147 5148 401e6c GetDeviceCaps MulDiv ReleaseDC 5147->5148 5149 402c3c 21 API calls 5148->5149 5150 401e9d 5149->5150 5151 406320 21 API calls 5150->5151 5152 401eda CreateFontIndirectA 5151->5152 5153 40264d 5152->5153 5154 71c21058 5156 71c21074 5154->5156 5155 71c210dc 5156->5155 5158 71c21091 5156->5158 5167 71c2154b 5156->5167 5159 71c2154b GlobalFree 5158->5159 5160 71c210a1 5159->5160 5161 71c210b1 5160->5161 5162 71c210a8 GlobalSize 5160->5162 5163 71c210c6 5161->5163 5164 71c210b5 GlobalAlloc 5161->5164 5162->5161 5166 71c210d1 GlobalFree 5163->5166 5165 71c21572 3 API calls 5164->5165 5165->5163 5166->5155 5169 71c21551 5167->5169 5168 71c21557 5168->5158 5169->5168 5170 71c21563 GlobalFree 5169->5170 5170->5158 4772 4015e0 4773 402c5e 21 API calls 4772->4773 4774 4015e7 4773->4774 4775 405cb8 4 API calls 4774->4775 4780 4015ef 4775->4780 4776 401649 4778 401677 4776->4778 4779 40164e 4776->4779 4777 405c4a CharNextA 4777->4780 4783 401423 28 API calls 4778->4783 4781 401423 28 API calls 4779->4781 4780->4776 4780->4777 4785 4058f1 2 API calls 4780->4785 4786 40590e 5 API calls 4780->4786 4789 401631 GetFileAttributesA 4780->4789 4790 405897 2 API calls 4780->4790 4782 401655 4781->4782 4791 40628d lstrcpynA 4782->4791 4788 40166f 4783->4788 4785->4780 4786->4780 4787 401660 SetCurrentDirectoryA 4787->4788 4789->4780 4790->4780 4791->4787 5171 4016e0 5172 402c5e 21 API calls 5171->5172 5173 4016e6 GetFullPathNameA 5172->5173 5174 4016fd 5173->5174 5180 40171e 5173->5180 5177 406620 2 API calls 5174->5177 5174->5180 5175 401732 GetShortPathNameA 5176 402aea 5175->5176 5178 40170e 5177->5178 5178->5180 5181 40628d lstrcpynA 5178->5181 5180->5175 5180->5176 5181->5180 5182 71c210e0 5183 71c21110 5182->5183 5184 71c2129a GlobalFree 5183->5184 5185 71c211cd GlobalAlloc 5183->5185 5186 71c21286 GlobalFree 5183->5186 5187 71c2133d 2 API calls 5183->5187 5188 71c21295 5183->5188 5189 71c212f6 2 API calls 5183->5189 5190 71c21165 GlobalAlloc 5183->5190 5191 71c21361 lstrcpyA 5183->5191 5185->5183 5186->5183 5187->5183 5188->5184 5189->5183 5190->5183 5191->5183 5192 404463 lstrcpynA lstrlenA 5193 71c21661 5194 71c2154b GlobalFree 5193->5194 5196 71c21679 5194->5196 5195 71c216bf GlobalFree 5196->5195 5197 71c21694 5196->5197 5198 71c216ab VirtualFree 5196->5198 5197->5195 5198->5195 5199 71c222ea 5200 71c22354 5199->5200 5201 71c2235f GlobalAlloc 5200->5201 5202 71c2237e 5200->5202 5201->5200 4838 405969 ShellExecuteExA 4839 401eea 4840 402c3c 21 API calls 4839->4840 4841 401ef0 4840->4841 4842 402c3c 21 API calls 4841->4842 4843 401efc 4842->4843 4844 401f13 EnableWindow 4843->4844 4845 401f08 ShowWindow 4843->4845 4846 402aea 4844->4846 4845->4846 4847 40176b 4848 402c5e 21 API calls 4847->4848 4849 401772 4848->4849 4850 405e4f 2 API calls 4849->4850 4851 401779 4850->4851 4852 405e4f 2 API calls 4851->4852 4852->4851 5203 40196c 5204 402c5e 21 API calls 5203->5204 5205 401973 lstrlenA 5204->5205 5206 40264d 5205->5206 5207 401ff0 5208 402c5e 21 API calls 5207->5208 5209 401ff7 5208->5209 5210 406620 2 API calls 5209->5210 5211 401ffd 5210->5211 5213 40200f 5211->5213 5214 4061eb wsprintfA 5211->5214 5214->5213 5215 71c22c73 5216 71c22c8b 5215->5216 5217 71c215c4 2 API calls 5216->5217 5218 71c22ca6 5217->5218 5219 4014f4 SetForegroundWindow 5220 402aea 5219->5220 5221 404778 5222 404788 5221->5222 5223 4047ae 5221->5223 5224 40432d 22 API calls 5222->5224 5225 404394 8 API calls 5223->5225 5226 404795 SetDlgItemTextA 5224->5226 5227 4047ba 5225->5227 5226->5223 4967 40177e 4968 402c5e 21 API calls 4967->4968 4969 401785 4968->4969 4970 4017a3 4969->4970 4971 4017ab 4969->4971 5007 40628d lstrcpynA 4970->5007 5008 40628d lstrcpynA 4971->5008 4974 4017a9 4978 406587 5 API calls 4974->4978 4975 4017b6 4976 405c1f 3 API calls 4975->4976 4977 4017bc lstrcatA 4976->4977 4977->4974 4999 4017c8 4978->4999 4979 406620 2 API calls 4979->4999 4980 401809 4981 405dfb 2 API calls 4980->4981 4981->4999 4983 4017df CompareFileTime 4983->4999 4984 4018a3 4985 4053d1 28 API calls 4984->4985 4987 4018ad 4985->4987 4986 40187a 4988 4053d1 28 API calls 4986->4988 4995 40188f 4986->4995 4989 403168 35 API calls 4987->4989 4988->4995 4991 4018c0 4989->4991 4990 40628d lstrcpynA 4990->4999 4992 4018d4 SetFileTime 4991->4992 4994 4018e6 CloseHandle 4991->4994 4992->4994 4993 406320 21 API calls 4993->4999 4994->4995 4996 4018f7 4994->4996 4997 4018fc 4996->4997 4998 40190f 4996->4998 5000 406320 21 API calls 4997->5000 5001 406320 21 API calls 4998->5001 4999->4979 4999->4980 4999->4983 4999->4984 4999->4986 4999->4990 4999->4993 5002 4059a3 MessageBoxIndirectA 4999->5002 5006 405e20 GetFileAttributesA CreateFileA 4999->5006 5003 401904 lstrcatA 5000->5003 5004 401917 5001->5004 5002->4999 5003->5004 5004->4995 5005 4059a3 MessageBoxIndirectA 5004->5005 5005->4995 5006->4999 5007->4974 5008->4975 5228 40167e 5229 402c5e 21 API calls 5228->5229 5230 401684 5229->5230 5231 406620 2 API calls 5230->5231 5232 40168a 5231->5232 5233 40197e 5234 402c3c 21 API calls 5233->5234 5235 401985 5234->5235 5236 402c3c 21 API calls 5235->5236 5237 401992 5236->5237 5238 402c5e 21 API calls 5237->5238 5239 4019a9 lstrlenA 5238->5239 5241 4019b9 5239->5241 5240 4019f9 5241->5240 5245 40628d lstrcpynA 5241->5245 5243 4019e9 5243->5240 5244 4019ee lstrlenA 5243->5244 5244->5240 5245->5243 5246 401000 5247 401037 BeginPaint GetClientRect 5246->5247 5248 40100c DefWindowProcA 5246->5248 5250 4010f3 5247->5250 5253 401179 5248->5253 5251 401073 CreateBrushIndirect FillRect DeleteObject 5250->5251 5252 4010fc 5250->5252 5251->5250 5254 401102 CreateFontIndirectA 5252->5254 5255 401167 EndPaint 5252->5255 5254->5255 5256 401112 6 API calls 5254->5256 5255->5253 5256->5255 5257 401502 5258 401507 5257->5258 5259 40152d 5257->5259 5260 402c3c 21 API calls 5258->5260 5260->5259 5261 71c21000 5264 71c2101b 5261->5264 5265 71c2154b GlobalFree 5264->5265 5266 71c21020 5265->5266 5267 71c21027 GlobalAlloc 5266->5267 5268 71c21024 5266->5268 5267->5268 5269 71c21572 3 API calls 5268->5269 5270 71c21019 5269->5270 5271 401a83 5272 402c3c 21 API calls 5271->5272 5273 401a8c 5272->5273 5274 402c3c 21 API calls 5273->5274 5275 401a33 5274->5275 5276 401588 5277 402a67 5276->5277 5280 4061eb wsprintfA 5277->5280 5279 402a6c 5280->5279 5281 401b88 5282 402c5e 21 API calls 5281->5282 5283 401b8f 5282->5283 5284 402c3c 21 API calls 5283->5284 5285 401b98 wsprintfA 5284->5285 5286 402aea 5285->5286 5287 401d8a 5288 401d90 5287->5288 5289 401d9d GetDlgItem 5287->5289 5290 402c3c 21 API calls 5288->5290 5291 401d97 5289->5291 5290->5291 5292 401dde GetClientRect LoadImageA SendMessageA 5291->5292 5293 402c5e 21 API calls 5291->5293 5295 401e3f 5292->5295 5297 401e4b 5292->5297 5293->5292 5296 401e44 DeleteObject 5295->5296 5295->5297 5296->5297 5298 40278b 5299 402791 5298->5299 5300 402799 FindClose 5299->5300 5301 402aea 5299->5301 5300->5301 4181 40240d 4182 402c5e 21 API calls 4181->4182 4183 40241e 4182->4183 4184 402c5e 21 API calls 4183->4184 4185 402427 4184->4185 4186 402c5e 21 API calls 4185->4186 4187 402431 GetPrivateProfileStringA 4186->4187 4219 40550f 4220 405531 GetDlgItem GetDlgItem GetDlgItem 4219->4220 4221 4056ba 4219->4221 4265 404362 SendMessageA 4220->4265 4223 4056c2 GetDlgItem CreateThread CloseHandle 4221->4223 4224 4056ea 4221->4224 4223->4224 4288 4054a3 OleInitialize 4223->4288 4226 405718 4224->4226 4227 405700 ShowWindow ShowWindow 4224->4227 4228 405739 4224->4228 4225 4055a1 4235 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4225->4235 4229 405720 4226->4229 4230 405773 4226->4230 4270 404362 SendMessageA 4227->4270 4274 404394 4228->4274 4232 405728 4229->4232 4233 40574c ShowWindow 4229->4233 4230->4228 4236 405780 SendMessageA 4230->4236 4271 404306 4232->4271 4239 40576c 4233->4239 4240 40575e 4233->4240 4241 405616 4235->4241 4242 4055fa SendMessageA SendMessageA 4235->4242 4238 405745 4236->4238 4243 405799 CreatePopupMenu 4236->4243 4247 404306 SendMessageA 4239->4247 4246 4053d1 28 API calls 4240->4246 4244 405629 4241->4244 4245 40561b SendMessageA 4241->4245 4242->4241 4248 406320 21 API calls 4243->4248 4266 40432d 4244->4266 4245->4244 4246->4239 4247->4230 4250 4057a9 AppendMenuA 4248->4250 4252 4057c7 GetWindowRect 4250->4252 4253 4057da TrackPopupMenu 4250->4253 4251 405639 4254 405642 ShowWindow 4251->4254 4255 405676 GetDlgItem SendMessageA 4251->4255 4252->4253 4253->4238 4256 4057f6 4253->4256 4257 405665 4254->4257 4258 405658 ShowWindow 4254->4258 4255->4238 4259 40569d SendMessageA SendMessageA 4255->4259 4260 405815 SendMessageA 4256->4260 4269 404362 SendMessageA 4257->4269 4258->4257 4259->4238 4260->4260 4261 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4260->4261 4263 405854 SendMessageA 4261->4263 4263->4263 4264 405876 GlobalUnlock SetClipboardData CloseClipboard 4263->4264 4264->4238 4265->4225 4267 406320 21 API calls 4266->4267 4268 404338 SetDlgItemTextA 4267->4268 4268->4251 4269->4255 4270->4226 4272 404313 SendMessageA 4271->4272 4273 40430d 4271->4273 4272->4228 4273->4272 4275 404457 4274->4275 4276 4043ac GetWindowLongA 4274->4276 4275->4238 4276->4275 4277 4043c1 4276->4277 4277->4275 4278 4043f1 4277->4278 4279 4043ee GetSysColor 4277->4279 4280 404401 SetBkMode 4278->4280 4281 4043f7 SetTextColor 4278->4281 4279->4278 4282 404419 GetSysColor 4280->4282 4283 40441f 4280->4283 4281->4280 4282->4283 4284 404430 4283->4284 4285 404426 SetBkColor 4283->4285 4284->4275 4286 404443 DeleteObject 4284->4286 4287 40444a CreateBrushIndirect 4284->4287 4285->4284 4286->4287 4287->4275 4295 404379 4288->4295 4290 4054c6 4294 4054ed 4290->4294 4298 401389 4290->4298 4291 404379 SendMessageA 4292 4054ff OleUninitialize 4291->4292 4294->4291 4296 404391 4295->4296 4297 404382 SendMessageA 4295->4297 4296->4290 4297->4296 4300 401390 4298->4300 4299 4013fe 4299->4290 4300->4299 4301 4013cb MulDiv SendMessageA 4300->4301 4301->4300 4302 40168f 4303 402c5e 21 API calls 4302->4303 4304 401696 4303->4304 4305 402c5e 21 API calls 4304->4305 4306 40169f 4305->4306 4307 402c5e 21 API calls 4306->4307 4308 4016a8 MoveFileA 4307->4308 4309 4016b4 4308->4309 4310 4016bb 4308->4310 4312 401423 28 API calls 4309->4312 4314 40230f 4310->4314 4316 406620 FindFirstFileA 4310->4316 4312->4314 4317 4016ca 4316->4317 4318 406636 FindClose 4316->4318 4317->4314 4319 406066 MoveFileExA 4317->4319 4318->4317 4320 406087 4319->4320 4321 40607a 4319->4321 4320->4309 4323 405ef6 4321->4323 4324 405f42 GetShortPathNameA 4323->4324 4325 405f1c 4323->4325 4327 406061 4324->4327 4328 405f57 4324->4328 4350 405e20 GetFileAttributesA CreateFileA 4325->4350 4327->4320 4328->4327 4330 405f5f wsprintfA 4328->4330 4329 405f26 CloseHandle GetShortPathNameA 4329->4327 4331 405f3a 4329->4331 4332 406320 21 API calls 4330->4332 4331->4324 4331->4327 4333 405f87 4332->4333 4351 405e20 GetFileAttributesA CreateFileA 4333->4351 4335 405f94 4335->4327 4336 405fa3 GetFileSize GlobalAlloc 4335->4336 4337 405fc5 4336->4337 4338 40605a CloseHandle 4336->4338 4352 405e98 ReadFile 4337->4352 4338->4327 4343 405fe4 lstrcpyA 4345 406006 4343->4345 4344 405ff8 4346 405d85 4 API calls 4344->4346 4347 40603d SetFilePointer 4345->4347 4346->4345 4359 405ec7 WriteFile 4347->4359 4350->4329 4351->4335 4353 405eb6 4352->4353 4353->4338 4354 405d85 lstrlenA 4353->4354 4355 405dc6 lstrlenA 4354->4355 4356 405d9f lstrcmpiA 4355->4356 4358 405dce 4355->4358 4357 405dbd CharNextA 4356->4357 4356->4358 4357->4355 4358->4343 4358->4344 4360 405ee5 GlobalFree 4359->4360 4360->4338 5302 401490 5303 4053d1 28 API calls 5302->5303 5304 401497 5303->5304 5305 404b10 5306 404b20 5305->5306 5307 404b3c 5305->5307 5316 405987 GetDlgItemTextA 5306->5316 5308 404b42 SHGetPathFromIDListA 5307->5308 5309 404b6f 5307->5309 5311 404b59 SendMessageA 5308->5311 5312 404b52 5308->5312 5311->5309 5314 40140b 2 API calls 5312->5314 5313 404b2d SendMessageA 5313->5307 5314->5311 5316->5313 5317 401a12 5318 402c5e 21 API calls 5317->5318 5319 401a19 5318->5319 5320 402c5e 21 API calls 5319->5320 5321 401a22 5320->5321 5322 401a29 lstrcmpiA 5321->5322 5323 401a3b lstrcmpA 5321->5323 5324 401a2f 5322->5324 5323->5324 5325 401594 5326 4015a4 ShowWindow 5325->5326 5327 4015ab 5325->5327 5326->5327 5328 4015b9 ShowWindow 5327->5328 5329 402aea 5327->5329 5328->5329 4747 402318 4748 402c5e 21 API calls 4747->4748 4749 40231e 4748->4749 4750 402c5e 21 API calls 4749->4750 4751 402327 4750->4751 4752 402c5e 21 API calls 4751->4752 4753 402330 4752->4753 4754 406620 2 API calls 4753->4754 4755 402339 4754->4755 4756 40234a lstrlenA lstrlenA 4755->4756 4760 40233d 4755->4760 4758 4053d1 28 API calls 4756->4758 4757 4053d1 28 API calls 4761 402345 4757->4761 4759 402386 SHFileOperationA 4758->4759 4759->4760 4759->4761 4760->4757 4760->4761 5330 404498 5331 4044ae 5330->5331 5336 4045ba 5330->5336 5334 40432d 22 API calls 5331->5334 5332 404629 5333 4046f3 5332->5333 5335 404633 GetDlgItem 5332->5335 5342 404394 8 API calls 5333->5342 5337 404504 5334->5337 5338 4046b1 5335->5338 5339 404649 5335->5339 5336->5332 5336->5333 5340 4045fe GetDlgItem SendMessageA 5336->5340 5341 40432d 22 API calls 5337->5341 5338->5333 5343 4046c3 5338->5343 5339->5338 5346 40466f SendMessageA LoadCursorA SetCursor 5339->5346 5363 40434f KiUserCallbackDispatcher 5340->5363 5345 404511 CheckDlgButton 5341->5345 5353 4046ee 5342->5353 5347 4046c9 SendMessageA 5343->5347 5348 4046da 5343->5348 5361 40434f KiUserCallbackDispatcher 5345->5361 5367 40473c 5346->5367 5347->5348 5352 4046e0 SendMessageA 5348->5352 5348->5353 5349 404624 5364 404718 5349->5364 5352->5353 5355 40452f GetDlgItem 5362 404362 SendMessageA 5355->5362 5358 404545 SendMessageA 5359 404563 GetSysColor 5358->5359 5360 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5358->5360 5359->5360 5360->5353 5361->5355 5362->5358 5363->5349 5365 404726 5364->5365 5366 40472b SendMessageA 5364->5366 5365->5366 5366->5332 5370 405969 ShellExecuteExA 5367->5370 5369 4046a2 LoadCursorA SetCursor 5369->5338 5370->5369 5371 402198 5372 402c5e 21 API calls 5371->5372 5373 40219f 5372->5373 5374 402c5e 21 API calls 5373->5374 5375 4021a9 5374->5375 5376 402c5e 21 API calls 5375->5376 5377 4021b3 5376->5377 5378 402c5e 21 API calls 5377->5378 5379 4021c0 5378->5379 5380 402c5e 21 API calls 5379->5380 5381 4021ca 5380->5381 5382 40220c CoCreateInstance 5381->5382 5383 402c5e 21 API calls 5381->5383 5386 40222b 5382->5386 5388 4022d9 5382->5388 5383->5382 5384 401423 28 API calls 5385 40230f 5384->5385 5387 4022b9 MultiByteToWideChar 5386->5387 5386->5388 5387->5388 5388->5384 5388->5385 4762 40269a 4763 402c3c 21 API calls 4762->4763 4765 4026a4 4763->4765 4764 405e98 ReadFile 4764->4765 4765->4764 4766 402714 4765->4766 4767 402724 4765->4767 4770 402712 4765->4770 4771 4061eb wsprintfA 4766->4771 4769 40273a SetFilePointer 4767->4769 4767->4770 4769->4770 4771->4770 5389 40239a 5390 4023a1 5389->5390 5391 4023b4 5389->5391 5392 406320 21 API calls 5390->5392 5393 4023ae 5392->5393 5393->5391 5394 4059a3 MessageBoxIndirectA 5393->5394 5394->5391 5395 402a1b 5396 402a22 5395->5396 5397 402a6e 5395->5397 5400 402c3c 21 API calls 5396->5400 5405 402a6c 5396->5405 5398 4066b5 5 API calls 5397->5398 5399 402a75 5398->5399 5401 402c5e 21 API calls 5399->5401 5402 402a30 5400->5402 5403 402a7e 5401->5403 5404 402c3c 21 API calls 5402->5404 5403->5405 5413 4062e0 5403->5413 5407 402a3f 5404->5407 5412 4061eb wsprintfA 5407->5412 5408 402a8c 5408->5405 5417 4062ca 5408->5417 5412->5405 5414 4062eb 5413->5414 5415 40630e IIDFromString 5414->5415 5416 406307 5414->5416 5415->5408 5416->5408 5420 4062af WideCharToMultiByte 5417->5420 5419 402aad CoTaskMemFree 5419->5405 5420->5419 5421 40149d 5422 4023b4 5421->5422 5423 4014ab PostQuitMessage 5421->5423 5423->5422 5424 401f1e 5425 402c5e 21 API calls 5424->5425 5426 401f24 5425->5426 5427 402c5e 21 API calls 5426->5427 5428 401f2d 5427->5428 5429 402c5e 21 API calls 5428->5429 5430 401f36 5429->5430 5431 402c5e 21 API calls 5430->5431 5432 401f3f 5431->5432 5433 401423 28 API calls 5432->5433 5434 401f46 5433->5434 5441 405969 ShellExecuteExA 5434->5441 5436 401f81 5437 40672a 5 API calls 5436->5437 5438 4027ed 5436->5438 5439 401f9b CloseHandle 5437->5439 5439->5438 5441->5436 4792 401fa0 4793 402c5e 21 API calls 4792->4793 4794 401fa6 4793->4794 4795 4053d1 28 API calls 4794->4795 4796 401fb0 4795->4796 4797 405926 2 API calls 4796->4797 4798 401fb6 4797->4798 4799 401fd7 CloseHandle 4798->4799 4803 4027ed 4798->4803 4807 40672a WaitForSingleObject 4798->4807 4799->4803 4802 401fcb 4804 401fd0 4802->4804 4805 401fd9 4802->4805 4812 4061eb wsprintfA 4804->4812 4805->4799 4808 406744 4807->4808 4809 406756 GetExitCodeProcess 4808->4809 4810 4066f1 2 API calls 4808->4810 4809->4802 4811 40674b WaitForSingleObject 4810->4811 4811->4808 4812->4799 5442 402020 5443 402c5e 21 API calls 5442->5443 5444 402027 5443->5444 5445 4066b5 5 API calls 5444->5445 5446 402036 5445->5446 5447 4020be 5446->5447 5448 40204e GlobalAlloc 5446->5448 5448->5447 5449 402062 5448->5449 5450 4066b5 5 API calls 5449->5450 5451 402069 5450->5451 5452 4066b5 5 API calls 5451->5452 5453 402073 5452->5453 5453->5447 5457 4061eb wsprintfA 5453->5457 5455 4020ae 5458 4061eb wsprintfA 5455->5458 5457->5455 5458->5447 5459 401922 5460 401959 5459->5460 5461 402c5e 21 API calls 5460->5461 5462 40195e 5461->5462 5463 405a4f 71 API calls 5462->5463 5464 401967 5463->5464 4813 4024a3 4814 402c5e 21 API calls 4813->4814 4815 4024b5 4814->4815 4816 402c5e 21 API calls 4815->4816 4817 4024bf 4816->4817 4830 402cee 4817->4830 4820 402aea 4821 4024f4 4823 402500 4821->4823 4825 402c3c 21 API calls 4821->4825 4822 402c5e 21 API calls 4824 4024ed lstrlenA 4822->4824 4826 402522 RegSetValueExA 4823->4826 4827 403168 35 API calls 4823->4827 4824->4821 4825->4823 4828 402538 RegCloseKey 4826->4828 4827->4826 4828->4820 4831 402d09 4830->4831 4834 406141 4831->4834 4835 406150 4834->4835 4836 4024cf 4835->4836 4837 40615b RegCreateKeyExA 4835->4837 4836->4820 4836->4821 4836->4822 4837->4836 5465 401d23 5466 402c3c 21 API calls 5465->5466 5467 401d29 IsWindow 5466->5467 5468 401a33 5467->5468 5469 401925 5470 402c5e 21 API calls 5469->5470 5471 40192c 5470->5471 5472 4059a3 MessageBoxIndirectA 5471->5472 5473 401935 5472->5473 5474 4027a5 5475 4027ab 5474->5475 5476 4027af FindNextFileA 5475->5476 5478 4027c1 5475->5478 5477 402800 5476->5477 5476->5478 5480 40628d lstrcpynA 5477->5480 5480->5478 4853 401bac 4854 401bfd 4853->4854 4856 401bb9 4853->4856 4857 401c01 4854->4857 4858 401c26 GlobalAlloc 4854->4858 4855 401c41 4860 406320 21 API calls 4855->4860 4866 4023b4 4855->4866 4856->4855 4863 401bd0 4856->4863 4857->4866 4874 40628d lstrcpynA 4857->4874 4859 406320 21 API calls 4858->4859 4859->4855 4862 4023ae 4860->4862 4862->4866 4867 4059a3 MessageBoxIndirectA 4862->4867 4872 40628d lstrcpynA 4863->4872 4864 401c13 GlobalFree 4864->4866 4867->4866 4868 401bdf 4873 40628d lstrcpynA 4868->4873 4870 401bee 4875 40628d lstrcpynA 4870->4875 4872->4868 4873->4870 4874->4864 4875->4866 5481 4029af 5482 402c3c 21 API calls 5481->5482 5483 4029b5 5482->5483 5484 406320 21 API calls 5483->5484 5485 4027ed 5483->5485 5484->5485 5486 402631 5487 402c5e 21 API calls 5486->5487 5488 402638 5487->5488 5491 405e20 GetFileAttributesA CreateFileA 5488->5491 5490 402644 5491->5490 5492 404d32 GetDlgItem GetDlgItem 5493 404d88 7 API calls 5492->5493 5505 404faf 5492->5505 5494 404e30 DeleteObject 5493->5494 5495 404e24 SendMessageA 5493->5495 5496 404e3b 5494->5496 5495->5494 5498 404e72 5496->5498 5500 406320 21 API calls 5496->5500 5497 405091 5499 40513d 5497->5499 5508 4050ea SendMessageA 5497->5508 5531 404fa2 5497->5531 5501 40432d 22 API calls 5498->5501 5503 405147 SendMessageA 5499->5503 5504 40514f 5499->5504 5506 404e54 SendMessageA SendMessageA 5500->5506 5502 404e86 5501->5502 5507 40432d 22 API calls 5502->5507 5503->5504 5511 405178 5504->5511 5517 405161 ImageList_Destroy 5504->5517 5518 405168 5504->5518 5505->5497 5512 404c80 5 API calls 5505->5512 5535 40501e 5505->5535 5506->5496 5513 404e97 5507->5513 5515 4050ff SendMessageA 5508->5515 5508->5531 5509 405083 SendMessageA 5509->5497 5510 404394 8 API calls 5516 40533e 5510->5516 5514 4052f2 5511->5514 5534 404d00 4 API calls 5511->5534 5539 4051b3 5511->5539 5512->5535 5520 404f71 GetWindowLongA SetWindowLongA 5513->5520 5527 404ee9 SendMessageA 5513->5527 5529 404f6c 5513->5529 5532 404f27 SendMessageA 5513->5532 5533 404f3b SendMessageA 5513->5533 5521 405304 ShowWindow GetDlgItem ShowWindow 5514->5521 5514->5531 5523 405112 5515->5523 5517->5518 5518->5511 5519 405171 GlobalFree 5518->5519 5519->5511 5522 404f8a 5520->5522 5521->5531 5524 404fa7 5522->5524 5525 404f8f ShowWindow 5522->5525 5528 405123 SendMessageA 5523->5528 5545 404362 SendMessageA 5524->5545 5544 404362 SendMessageA 5525->5544 5527->5513 5528->5499 5529->5520 5529->5522 5531->5510 5532->5513 5533->5513 5534->5539 5535->5497 5535->5509 5536 4052bd 5537 4052c8 InvalidateRect 5536->5537 5540 4052d4 5536->5540 5537->5540 5538 4051e1 SendMessageA 5543 4051f7 5538->5543 5539->5538 5539->5543 5540->5514 5546 404c3b 5540->5546 5542 40526b SendMessageA SendMessageA 5542->5543 5543->5536 5543->5542 5544->5531 5545->5505 5549 404b76 5546->5549 5548 404c50 5548->5514 5550 404b8c 5549->5550 5551 406320 21 API calls 5550->5551 5552 404bf0 5551->5552 5553 406320 21 API calls 5552->5553 5554 404bfb 5553->5554 5555 406320 21 API calls 5554->5555 5556 404c11 lstrlenA wsprintfA SetDlgItemTextA 5555->5556 5556->5548 4876 71c229b1 4877 71c22a01 4876->4877 4878 71c229c1 VirtualProtect 4876->4878 4878->4877 4879 403e33 4880 403e4b 4879->4880 4881 403fac 4879->4881 4880->4881 4884 403e57 4880->4884 4882 403ffd 4881->4882 4883 403fbd GetDlgItem GetDlgItem 4881->4883 4886 404057 4882->4886 4898 401389 2 API calls 4882->4898 4885 40432d 22 API calls 4883->4885 4887 403e62 SetWindowPos 4884->4887 4888 403e75 4884->4888 4889 403fe7 SetClassLongA 4885->4889 4890 404379 SendMessageA 4886->4890 4908 403fa7 4886->4908 4887->4888 4891 403ec0 4888->4891 4892 403e7e ShowWindow 4888->4892 4895 40140b 2 API calls 4889->4895 4942 404069 4890->4942 4896 403ec8 DestroyWindow 4891->4896 4897 403edf 4891->4897 4893 403f99 4892->4893 4894 403e9e GetWindowLongA 4892->4894 4903 404394 8 API calls 4893->4903 4894->4893 4899 403eb7 ShowWindow 4894->4899 4895->4882 4951 4042b6 4896->4951 4900 403ee4 SetWindowLongA 4897->4900 4901 403ef5 4897->4901 4902 40402f 4898->4902 4899->4891 4900->4908 4901->4893 4906 403f01 GetDlgItem 4901->4906 4902->4886 4907 404033 SendMessageA 4902->4907 4903->4908 4904 40140b 2 API calls 4904->4942 4905 4042b8 DestroyWindow EndDialog 4905->4951 4910 403f12 SendMessageA IsWindowEnabled 4906->4910 4912 403f2f 4906->4912 4907->4908 4909 4042e7 ShowWindow 4909->4908 4910->4908 4910->4912 4911 406320 21 API calls 4911->4942 4913 403f34 4912->4913 4914 403f3c 4912->4914 4916 403f83 SendMessageA 4912->4916 4917 403f4f 4912->4917 4915 404306 SendMessageA 4913->4915 4914->4913 4914->4916 4920 403f6a 4915->4920 4916->4893 4918 403f57 4917->4918 4919 403f6c 4917->4919 4921 40140b 2 API calls 4918->4921 4922 40140b 2 API calls 4919->4922 4920->4893 4921->4913 4924 403f73 4922->4924 4923 40432d 22 API calls 4923->4942 4924->4893 4924->4913 4925 40432d 22 API calls 4926 4040e4 GetDlgItem 4925->4926 4927 404101 ShowWindow KiUserCallbackDispatcher 4926->4927 4928 4040f9 4926->4928 4952 40434f KiUserCallbackDispatcher 4927->4952 4928->4927 4930 40412b EnableWindow 4935 40413f 4930->4935 4931 404144 GetSystemMenu EnableMenuItem SendMessageA 4932 404174 SendMessageA 4931->4932 4931->4935 4932->4935 4934 403e14 22 API calls 4934->4935 4935->4931 4935->4934 4953 404362 SendMessageA 4935->4953 4954 40628d lstrcpynA 4935->4954 4937 4041a3 lstrlenA 4938 406320 21 API calls 4937->4938 4939 4041b4 SetWindowTextA 4938->4939 4940 401389 2 API calls 4939->4940 4940->4942 4941 4041f8 DestroyWindow 4943 404212 CreateDialogParamA 4941->4943 4941->4951 4942->4904 4942->4905 4942->4908 4942->4911 4942->4923 4942->4925 4942->4941 4944 404245 4943->4944 4943->4951 4945 40432d 22 API calls 4944->4945 4946 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4945->4946 4947 401389 2 API calls 4946->4947 4948 404296 4947->4948 4948->4908 4949 40429e ShowWindow 4948->4949 4950 404379 SendMessageA 4949->4950 4950->4951 4951->4908 4951->4909 4952->4930 4953->4935 4954->4937 4955 4025b5 4956 402c9e 21 API calls 4955->4956 4957 4025bf 4956->4957 4958 402c3c 21 API calls 4957->4958 4959 4025c8 4958->4959 4960 4025d6 4959->4960 4961 4027ed 4959->4961 4962 4025e3 RegEnumKeyA 4960->4962 4963 4025ef RegEnumValueA 4960->4963 4965 40260b RegCloseKey 4962->4965 4964 402604 4963->4964 4963->4965 4964->4965 4965->4961 5557 4014b7 5558 4014bd 5557->5558 5559 401389 2 API calls 5558->5559 5560 4014c5 5559->5560 5561 40283b 5583 405e20 GetFileAttributesA CreateFileA 5561->5583 5563 402842 5564 4028fe 5563->5564 5565 4028e6 5563->5565 5566 40285d GlobalAlloc 5563->5566 5567 402905 DeleteFileA 5564->5567 5568 402918 5564->5568 5570 403168 35 API calls 5565->5570 5566->5565 5569 402876 5566->5569 5567->5568 5584 403390 SetFilePointer 5569->5584 5572 4028f3 CloseHandle 5570->5572 5572->5564 5573 40287c 5574 40337a ReadFile 5573->5574 5575 402885 GlobalAlloc 5574->5575 5576 402895 5575->5576 5577 4028cf 5575->5577 5578 403168 35 API calls 5576->5578 5579 405ec7 WriteFile 5577->5579 5582 4028a2 5578->5582 5580 4028db GlobalFree 5579->5580 5580->5565 5581 4028c6 GlobalFree 5581->5577 5582->5581 5583->5563 5584->5573 5585 4047bf 5586 4047eb 5585->5586 5587 4047fc 5585->5587 5646 405987 GetDlgItemTextA 5586->5646 5588 404808 GetDlgItem 5587->5588 5592 404867 5587->5592 5591 40481c 5588->5591 5590 4047f6 5594 406587 5 API calls 5590->5594 5595 404830 SetWindowTextA 5591->5595 5598 405cb8 4 API calls 5591->5598 5593 40494b 5592->5593 5600 406320 21 API calls 5592->5600 5644 404af5 5592->5644 5593->5644 5648 405987 GetDlgItemTextA 5593->5648 5594->5587 5599 40432d 22 API calls 5595->5599 5597 404394 8 API calls 5602 404b09 5597->5602 5603 404826 5598->5603 5604 40484c 5599->5604 5605 4048db SHBrowseForFolderA 5600->5605 5601 40497b 5606 405d0d 18 API calls 5601->5606 5603->5595 5610 405c1f 3 API calls 5603->5610 5607 40432d 22 API calls 5604->5607 5605->5593 5608 4048f3 CoTaskMemFree 5605->5608 5609 404981 5606->5609 5611 40485a 5607->5611 5612 405c1f 3 API calls 5608->5612 5649 40628d lstrcpynA 5609->5649 5610->5595 5647 404362 SendMessageA 5611->5647 5614 404900 5612->5614 5617 404937 SetDlgItemTextA 5614->5617 5621 406320 21 API calls 5614->5621 5616 404860 5619 4066b5 5 API calls 5616->5619 5617->5593 5618 404998 5620 4066b5 5 API calls 5618->5620 5619->5592 5628 40499f 5620->5628 5622 40491f lstrcmpiA 5621->5622 5622->5617 5624 404930 lstrcatA 5622->5624 5623 4049db 5650 40628d lstrcpynA 5623->5650 5624->5617 5626 4049e2 5627 405cb8 4 API calls 5626->5627 5629 4049e8 GetDiskFreeSpaceA 5627->5629 5628->5623 5632 405c66 2 API calls 5628->5632 5634 404a33 5628->5634 5631 404a0c MulDiv 5629->5631 5629->5634 5631->5634 5632->5628 5633 404aa4 5636 404ac7 5633->5636 5638 40140b 2 API calls 5633->5638 5634->5633 5635 404c3b 24 API calls 5634->5635 5637 404a91 5635->5637 5651 40434f KiUserCallbackDispatcher 5636->5651 5639 404aa6 SetDlgItemTextA 5637->5639 5640 404a96 5637->5640 5638->5636 5639->5633 5642 404b76 24 API calls 5640->5642 5642->5633 5643 404ae3 5643->5644 5645 404718 SendMessageA 5643->5645 5644->5597 5645->5644 5646->5590 5647->5616 5648->5601 5649->5618 5650->5626 5651->5643 5652 71c2103d 5653 71c2101b 5 API calls 5652->5653 5654 71c21056 5653->5654

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 7 403490 5->7 8 40347f-40348e 5->8 9 4034a5-4034e5 6->9 10 40349d 6->10 7->6 8->6 11 4034e7-4034ef call 4066b5 9->11 12 4034f8 9->12 10->9 11->12 17 4034f1 11->17 14 4034fd-403511 call 406647 lstrlenA 12->14 19 403513-40352f call 4066b5 * 3 14->19 17->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 31 403539 27->31 31->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 41 4035c8-4035cc 39->41 42 4035ce-4035d5 39->42 43 40369d-4036b7 GetTempPathA call 4033a7 40->43 41->41 41->42 44 4035d7-4035d8 42->44 45 4035dc-4035df 42->45 53 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 43->53 54 40370f-403727 DeleteFileA call 402f31 43->54 44->45 47 403670-40367c call 405c4a 45->47 48 4035e5-4035e9 45->48 47->38 63 40367e 47->63 51 403601-40362e 48->51 52 4035eb-4035f1 48->52 59 403640-40366e 51->59 60 403630-403636 51->60 57 4035f3-4035f5 52->57 58 4035f7 52->58 53->54 71 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 53->71 68 4037ba-4037cb call 4039bc OleUninitialize 54->68 69 40372d-403733 54->69 57->51 57->58 58->51 59->47 62 40368b-403698 call 40628d 59->62 65 403638-40363a 60->65 66 40363c 60->66 62->43 63->38 65->59 65->66 66->59 82 4037d1-4037e0 call 4059a3 ExitProcess 68->82 83 403928-40392e 68->83 73 403735-403740 call 405c4a 69->73 74 4037ab-4037b2 call 403a96 69->74 71->54 71->68 86 403742-40376b 73->86 87 403776-40377f 73->87 80 4037b7 74->80 80->68 84 403930-403945 GetCurrentProcess OpenProcessToken 83->84 85 4039a6-4039ae 83->85 91 403976-403984 call 4066b5 84->91 92 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 84->92 89 4039b0 85->89 90 4039b3-4039b6 ExitProcess 85->90 93 40376d-40376f 86->93 94 403781-40378f call 405d0d 87->94 95 4037e6-40380a call 40590e lstrlenA call 40628d 87->95 89->90 106 403992-40399d ExitWindowsEx 91->106 107 403986-403990 91->107 92->91 93->87 98 403771-403774 93->98 94->68 104 403791-4037a7 call 40628d * 2 94->104 113 40381b-403830 95->113 114 40380c-403816 call 40628d 95->114 98->87 98->93 104->74 106->85 109 40399f-4039a1 call 40140b 106->109 107->106 107->109 109->85 118 403835 113->118 114->113 120 403839-403865 wsprintfA call 406320 118->120 123 403867-40386c call 405897 120->123 124 40386e call 4058f1 120->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 131 4038a0-4038a8 129->131 132 403883-40388c DeleteFileA 129->132 130->68 138 4038d4-4038f5 call 406066 call 406320 call 405926 130->138 131->118 135 4038aa 131->135 132->131 134 40388e-40389e call 405a4f 132->134 134->120 134->131 135->68 146 4038f7-4038ff 138->146 147 403918-403923 CloseHandle 138->147 146->68 148 403905-40390d call 406620 146->148 147->68 148->120 151 403913 148->151 151->68
                                                    APIs
                                                    • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                                    • GetVersionExA.KERNEL32(?), ref: 00403424
                                                    • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                                    • #17.COMCTL32(?,?,0000000A,?), ref: 00403541
                                                    • OleInitialize.OLE32(00000000), ref: 00403548
                                                    • SHGetFileInfoA.SHELL32(00429448,00000000,?,?,00000000,?,?,0000000A,?), ref: 00403566
                                                    • GetCommandLineA.KERNEL32(forholdsordren Setup,NSIS Error,?,?,0000000A,?), ref: 0040357B
                                                    • CharNextA.USER32(00000000,"C:\Users\user\Desktop\HJEbEB40vP.exe",00000020,"C:\Users\user\Desktop\HJEbEB40vP.exe",00000000,?,?,0000000A,?), ref: 004035B5
                                                    • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,?,0000000A,?), ref: 004036AE
                                                    • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?), ref: 004036BF
                                                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036CB
                                                    • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036DF
                                                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036E7
                                                    • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036F8
                                                    • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?), ref: 00403700
                                                    • DeleteFileA.KERNELBASE(1033,?,?,0000000A,?), ref: 00403714
                                                    • OleUninitialize.OLE32(?,?,?,0000000A,?), ref: 004037BF
                                                    • ExitProcess.KERNEL32 ref: 004037E0
                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",00000000,?,?,?,0000000A,?), ref: 004037EF
                                                    • wsprintfA.USER32 ref: 00403846
                                                    • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 00403878
                                                    • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                                    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 004038B0
                                                    • CopyFileA.KERNEL32(C:\Users\user\Desktop\HJEbEB40vP.exe,00431400,?), ref: 004038C6
                                                    • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                                    • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?), ref: 00403936
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                                    • ExitProcess.KERNEL32 ref: 004039B6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                                    • String ID: "$"C:\Users\user\Desktop\HJEbEB40vP.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\Desktop$C:\Users\user\Desktop\HJEbEB40vP.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$forholdsordren Setup$~nsu%X.tmp
                                                    • API String ID: 2956269667-1850281370
                                                    • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                                    • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                                    • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                                    • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 177 405616-405619 153->177 178 4055fa-405614 SendMessageA * 2 153->178 156 4056c2-4056e4 GetDlgItem CreateThread CloseHandle 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 163 405720-405726 159->163 164 405773-405776 159->164 161 405700-405713 ShowWindow * 2 call 404362 160->161 162 405739-405740 call 404394 160->162 161->159 174 405745-405749 162->174 167 405728-405734 call 404306 163->167 168 40574c-40575c ShowWindow 163->168 164->162 171 405778-40577e 164->171 167->162 175 40576c-40576e call 404306 168->175 176 40575e-405767 call 4053d1 168->176 171->162 172 405780-405793 SendMessageA 171->172 179 405890-405892 172->179 180 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 172->180 175->164 176->175 181 405629-405640 call 40432d 177->181 182 40561b-405627 SendMessageA 177->182 178->177 179->174 189 4057c7-4057d7 GetWindowRect 180->189 190 4057da-4057f0 TrackPopupMenu 180->190 191 405642-405656 ShowWindow 181->191 192 405676-405697 GetDlgItem SendMessageA 181->192 182->181 189->190 190->179 193 4057f6-405810 190->193 194 405665 191->194 195 405658-405663 ShowWindow 191->195 192->179 196 40569d-4056b5 SendMessageA * 2 192->196 197 405815-405830 SendMessageA 193->197 198 40566b-405671 call 404362 194->198 195->198 196->179 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->179
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                                    • GetClientRect.USER32(?,?), ref: 004055BA
                                                    • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                                    • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                                    • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                                    • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                                    • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                                    • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                                    • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                                    • ShowWindow.USER32(?,?), ref: 0040565D
                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                                    • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                                    • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                                    • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                                    • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                                      • Part of subcall function 00404362: SendMessageA.USER32(?,?,?,00404192), ref: 00404370
                                                    • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                                    • CloseHandle.KERNELBASE(00000000), ref: 004056E4
                                                    • ShowWindow.USER32(00000000), ref: 00405707
                                                    • ShowWindow.USER32(?,?), ref: 0040570E
                                                    • ShowWindow.USER32(?), ref: 00405754
                                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                                    • CreatePopupMenu.USER32 ref: 00405799
                                                    • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004057AE
                                                    • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                                    • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004057E7
                                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                                    • OpenClipboard.USER32(00000000), ref: 00405833
                                                    • EmptyClipboard.USER32 ref: 00405839
                                                    • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                                    • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                                    • SetClipboardData.USER32(?,00000000), ref: 00405884
                                                    • CloseClipboard.USER32 ref: 0040588A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                    • String ID:
                                                    • API String ID: 590372296-0
                                                    • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                                    • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                                    • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                                    • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 516 405a4f-405a75 call 405d0d 519 405a77-405a89 DeleteFileA 516->519 520 405a8e-405a95 516->520 521 405c18-405c1c 519->521 522 405a97-405a99 520->522 523 405aa8-405ab8 call 40628d 520->523 524 405bc6-405bcb 522->524 525 405a9f-405aa2 522->525 531 405ac7-405ac8 call 405c66 523->531 532 405aba-405ac5 lstrcatA 523->532 524->521 527 405bcd-405bd0 524->527 525->523 525->524 529 405bd2-405bd8 527->529 530 405bda-405be2 call 406620 527->530 529->521 530->521 540 405be4-405bf8 call 405c1f call 405a07 530->540 534 405acd-405ad0 531->534 532->534 537 405ad2-405ad9 534->537 538 405adb-405ae1 lstrcatA 534->538 537->538 539 405ae6-405b04 lstrlenA FindFirstFileA 537->539 538->539 541 405b0a-405b21 call 405c4a 539->541 542 405bbc-405bc0 539->542 555 405c10-405c13 call 4053d1 540->555 556 405bfa-405bfd 540->556 549 405b23-405b27 541->549 550 405b2c-405b2f 541->550 542->524 544 405bc2 542->544 544->524 549->550 552 405b29 549->552 553 405b31-405b36 550->553 554 405b42-405b50 call 40628d 550->554 552->550 558 405b38-405b3a 553->558 559 405b9b-405bad FindNextFileA 553->559 566 405b52-405b5a 554->566 567 405b67-405b72 call 405a07 554->567 555->521 556->529 561 405bff-405c0e call 4053d1 call 406066 556->561 558->554 562 405b3c-405b40 558->562 559->541 564 405bb3-405bb6 FindClose 559->564 561->521 562->554 562->559 564->542 566->559 571 405b5c-405b65 call 405a4f 566->571 576 405b93-405b96 call 4053d1 567->576 577 405b74-405b77 567->577 571->559 576->559 578 405b79-405b89 call 4053d1 call 406066 577->578 579 405b8b-405b91 577->579 578->559 579->559
                                                    APIs
                                                    • DeleteFileA.KERNELBASE(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405A78
                                                    • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AC0
                                                    • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AE1
                                                    • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AE7
                                                    • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AF8
                                                    • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                                    • FindClose.KERNEL32(00000000), ref: 00405BB6
                                                    Strings
                                                    • \*.*, xrefs: 00405ABA
                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                                    • "C:\Users\user\Desktop\HJEbEB40vP.exe", xrefs: 00405A58
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                    • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                    • API String ID: 2035342205-2048216031
                                                    • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                                    • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                                    • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                                    • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 729 406647-406667 GetSystemDirectoryA 730 406669 729->730 731 40666b-40666d 729->731 730->731 732 40667d-40667f 731->732 733 40666f-406677 731->733 735 406680-4066b2 wsprintfA LoadLibraryExA 732->735 733->732 734 406679-40667b 733->734 734->735
                                                    APIs
                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                    • wsprintfA.USER32 ref: 00406697
                                                    • LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                    • String ID: %s%s.dll$UXTHEME$\
                                                    • API String ID: 2200240437-4240819195
                                                    • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                    • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                                    • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                    • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                                    APIs
                                                    • FindFirstFileA.KERNELBASE(76F93410,0042BCD8,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                                    • FindClose.KERNEL32(00000000), ref: 00406637
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Temp\nscDCA5.tmp, xrefs: 00406620
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileFirst
                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp
                                                    • API String ID: 2295610775-2778696829
                                                    • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                                    • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                                    • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                                    • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 208 403e57-403e60 204->208 206 40400a-40401f 205->206 207 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->207 210 404021-404024 206->210 211 40405f-404064 call 404379 206->211 207->206 212 403e62-403e6f SetWindowPos 208->212 213 403e75-403e7c 208->213 215 404026-404031 call 401389 210->215 216 404057-404059 210->216 227 404069-404084 211->227 212->213 218 403ec0-403ec6 213->218 219 403e7e-403e98 ShowWindow 213->219 215->216 243 404033-404052 SendMessageA 215->243 216->211 226 4042fa 216->226 223 403ec8-403eda DestroyWindow 218->223 224 403edf-403ee2 218->224 220 403f99-403fa7 call 404394 219->220 221 403e9e-403eb1 GetWindowLongA 219->221 231 4042fc-404303 220->231 221->220 228 403eb7-403eba ShowWindow 221->228 230 4042d7-4042dd 223->230 232 403ee4-403ef0 SetWindowLongA 224->232 233 403ef5-403efb 224->233 226->231 236 404086-404088 call 40140b 227->236 237 40408d-404093 227->237 228->218 230->226 239 4042df-4042e5 230->239 232->231 233->220 242 403f01-403f10 GetDlgItem 233->242 236->237 240 4042b8-4042d1 DestroyWindow EndDialog 237->240 241 404099-4040a4 237->241 239->226 245 4042e7-4042f0 ShowWindow 239->245 240->230 241->240 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 241->246 247 403f12-403f29 SendMessageA IsWindowEnabled 242->247 248 403f2f-403f32 242->248 243->231 245->226 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->226 247->248 250 403f34-403f35 248->250 251 403f37-403f3a 248->251 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->220 258 403f83-403f93 SendMessageA 254->258 260 403f4f-403f55 254->260 255->258 259 403f44-403f46 255->259 258->220 259->253 261 403f57-403f5d call 40140b 260->261 262 403f6c-403f75 call 40140b 260->262 271 403f63 261->271 262->220 272 403f77-403f81 262->272 271->253 272->271 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->227 295 4041cd-4041cf 284->295 295->227 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->230 300 404212-40423f CreateDialogParamA 297->300 298->226 299 4041e7-4041ed 298->299 299->227 301 4041f3 299->301 300->230 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->226 302->226 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->230
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                                    • ShowWindow.USER32(?), ref: 00403E8F
                                                    • GetWindowLongA.USER32(?,?), ref: 00403EA1
                                                    • ShowWindow.USER32(?,?), ref: 00403EBA
                                                    • DestroyWindow.USER32 ref: 00403ECE
                                                    • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                                    • GetDlgItem.USER32(?,?), ref: 00403F06
                                                    • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                                    • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                                    • GetDlgItem.USER32(?,?), ref: 00403FCC
                                                    • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                                    • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                                    • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00404041
                                                    • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                                    • ShowWindow.USER32(00000000,?), ref: 00404108
                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                                    • EnableWindow.USER32(?,?), ref: 00404135
                                                    • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040414B
                                                    • EnableMenuItem.USER32(00000000), ref: 00404152
                                                    • SendMessageA.USER32(?,?,00000000,?), ref: 0040416A
                                                    • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                                    • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                                    • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                                    • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                    • String ID:
                                                    • API String ID: 121052019-0
                                                    • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                                    • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                                    • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                                    • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 323 403b16-403b3f call 403d5b call 405d0d 313->323 319 403af5-403b06 call 406174 314->319 320 403b0b-403b11 lstrcatA 314->320 319->320 320->323 328 403b45-403b4a 323->328 329 403bc6-403bce call 405d0d 323->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 337 403b72-403b74 330->337 335->336 339 403c82-403c8a call 40140b 336->339 340 403c03-403c33 RegisterClassA 336->340 341 403b85-403b91 lstrlenA 337->341 342 403b76-403b83 call 405c4a 337->342 354 403c94-403c9f call 403d5b 339->354 355 403c8c-403c8f 339->355 343 403d51 340->343 344 403c39-403c7d SystemParametersInfoA CreateWindowExA 340->344 348 403b93-403ba1 lstrcmpiA 341->348 349 403bb9-403bc1 call 405c1f call 40628d 341->349 342->341 347 403d53-403d5a 343->347 344->339 348->349 353 403ba3-403bad GetFileAttributesA 348->353 349->329 358 403bb3-403bb4 call 405c66 353->358 359 403baf-403bb1 353->359 363 403ca5-403cbf ShowWindow call 406647 354->363 364 403d28-403d29 call 4054a3 354->364 355->347 358->349 359->349 359->358 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->355 373 403d3e-403d45 call 40140b 369->373 370->343 371->372 376 403cf5-403d18 DialogBoxParamA call 40140b 372->376 377 403cdf-403cef GetClassInfoA RegisterClassA 372->377 373->355 381 403d1d-403d26 call 4039e6 376->381 377->376 381->347
                                                    APIs
                                                      • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                                      • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                    • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,76F93410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\HJEbEB40vP.exe",0000000A,?), ref: 00403B11
                                                    • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,76F93410), ref: 00403B86
                                                    • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                                    • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\HJEbEB40vP.exe",0000000A,?), ref: 00403BA4
                                                    • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                                      • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                    • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                                    • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403C42
                                                    • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                                    • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\HJEbEB40vP.exe",0000000A,?), ref: 00403CAD
                                                    • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                                    • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                                    • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                                    • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                    • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                    • API String ID: 1975747703-146608984
                                                    • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                                    • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                                    • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                                    • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 389 403161-403165 387->389 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 409 40310e-403116 call 402ecd 402->409 410 402fee-402ff5 402->410 407 4030b9-4030d1 call 403390 call 40337a 403->407 408 4030db-403105 GlobalAlloc call 403390 call 403168 403->408 404->389 407->404 431 4030d3-4030d9 407->431 408->404 435 403118-403129 408->435 409->404 413 403071-403075 410->413 414 402ff7-40300b call 405ddb 410->414 421 403077-40307e call 402ecd 413->421 422 40307f-403085 413->422 414->422 433 40300d-403014 414->433 421->422 426 403094-40309c 422->426 427 403087-403091 call 40676c 422->427 426->399 434 4030a2 426->434 427->426 431->404 431->408 433->422 437 403016-40301d 433->437 434->396 438 403131-403136 435->438 439 40312b 435->439 437->422 440 40301f-403026 437->440 441 403137-40313d 438->441 439->438 440->422 442 403028-40302f 440->442 441->441 443 40313f-40315a SetFilePointer call 405ddb 441->443 442->422 445 403031-403051 442->445 446 40315f 443->446 445->404 447 403057-40305b 445->447 446->389 448 403063-40306b 447->448 449 40305d-403061 447->449 448->422 450 40306d-40306f 448->450 449->434 449->448 450->422
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 00402F42
                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\HJEbEB40vP.exe,00000400,?,?,00403722,?,?,?,0000000A,?), ref: 00402F5E
                                                      • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                      • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                    • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HJEbEB40vP.exe,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?), ref: 00402FAA
                                                    • GlobalAlloc.KERNELBASE(?,?,?,?,00403722,?,?,?,0000000A,?), ref: 004030E0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                    • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\HJEbEB40vP.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                    • API String ID: 2803837635-3051695983
                                                    • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                    • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                                    • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                    • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 451 406320-40632b 452 40632d-40633c 451->452 453 40633e-406353 451->453 452->453 454 406564-406568 453->454 455 406359-406364 453->455 457 406376-406380 454->457 458 40656e-406578 454->458 455->454 456 40636a-406371 455->456 456->454 457->458 461 406386-40638d 457->461 459 406583-406584 458->459 460 40657a-40657e call 40628d 458->460 460->459 463 406393-4063c9 461->463 464 406557 461->464 465 406501-406504 463->465 466 4063cf-4063d9 463->466 467 406561-406563 464->467 468 406559-40655f 464->468 471 406534-406537 465->471 472 406506-406509 465->472 469 4063f6 466->469 470 4063db-4063e4 466->470 467->454 468->454 478 4063fd-406405 469->478 470->469 477 4063e6-4063e9 470->477 475 406545-406555 lstrlenA 471->475 476 406539-406540 call 406320 471->476 473 406519-406525 call 40628d 472->473 474 40650b-406517 call 4061eb 472->474 488 40652a-406530 473->488 474->488 475->454 476->475 477->469 482 4063eb-4063ee 477->482 483 406407 478->483 484 40640e-406410 478->484 482->469 489 4063f0-4063f4 482->489 483->484 485 406412-40642d call 406174 484->485 486 406447-40644a 484->486 494 406432-406435 485->494 492 40644c-406458 GetSystemDirectoryA 486->492 493 40645d-406460 486->493 488->475 491 406532 488->491 489->478 495 4064f9-4064ff call 406587 491->495 496 4064e3-4064e6 492->496 497 406471-406474 493->497 498 406462-40646e GetWindowsDirectoryA 493->498 499 4064e8-4064ec 494->499 500 40643b-406442 call 406320 494->500 495->475 496->495 496->499 497->496 502 406476-406494 497->502 498->497 499->495 504 4064ee-4064f4 lstrcatA 499->504 500->496 506 406496-406499 502->506 507 4064ab-4064c3 call 4066b5 502->507 504->495 506->507 510 40649b-40649f 506->510 514 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 507->514 515 4064da-4064e1 507->515 512 4064a7-4064a9 510->512 512->496 512->507 514->496 514->515 515->496 515->502
                                                    APIs
                                                    • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                                    • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00000000), ref: 00406468
                                                    • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000), ref: 004064C7
                                                    • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000), ref: 004064D0
                                                    • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000), ref: 004064F4
                                                    • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00000000,00424440,76F923A0), ref: 00406546
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                    • String ID: T@$+uX$Call$Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                    • API String ID: 4024019347-3276675720
                                                    • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                                    • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                                    • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                                    • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 585 40177e-4017a1 call 402c5e call 405c8c 590 4017a3-4017a9 call 40628d 585->590 591 4017ab-4017bd call 40628d call 405c1f lstrcatA 585->591 596 4017c2-4017c8 call 406587 590->596 591->596 601 4017cd-4017d1 596->601 602 4017d3-4017dd call 406620 601->602 603 401804-401807 601->603 610 4017ef-401801 602->610 611 4017df-4017ed CompareFileTime 602->611 605 401809-40180a call 405dfb 603->605 606 40180f-40182b call 405e20 603->606 605->606 613 4018a3-4018cc call 4053d1 call 403168 606->613 614 40182d-401830 606->614 610->603 611->610 627 4018d4-4018e0 SetFileTime 613->627 628 4018ce-4018d2 613->628 616 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 614->616 617 401885-40188f call 4053d1 614->617 616->601 650 40187a-40187b 616->650 629 401898-40189e 617->629 632 4018e6-4018f1 CloseHandle 627->632 628->627 628->632 630 402af3 629->630 634 402af5-402af9 630->634 635 4018f7-4018fa 632->635 636 402aea-402aed 632->636 638 4018fc-40190d call 406320 lstrcatA 635->638 639 40190f-401912 call 406320 635->639 636->630 645 401917-4023af 638->645 639->645 648 4023b4-4023b9 645->648 649 4023af call 4059a3 645->649 648->634 649->648 650->629 651 40187d-40187e 650->651 651->617
                                                    APIs
                                                    • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,00000000,00000000,00000031), ref: 004017BD
                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,00000000,00000000,00000031), ref: 004017E7
                                                      • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,forholdsordren Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                                      • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                      • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                      • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0), ref: 0040542D
                                                      • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll), ref: 0040543F
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp$C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                                    • API String ID: 1941528284-1567750152
                                                    • Opcode ID: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                                    • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                                    • Opcode Fuzzy Hash: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                                    • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 652 4053d1-4053e6 653 40549c-4054a0 652->653 654 4053ec-4053fe 652->654 655 405400-405404 call 406320 654->655 656 405409-405415 lstrlenA 654->656 655->656 657 405432-405436 656->657 658 405417-405427 lstrlenA 656->658 661 405445-405449 657->661 662 405438-40543f SetWindowTextA 657->662 658->653 660 405429-40542d lstrcatA 658->660 660->657 663 40544b-40548d SendMessageA * 3 661->663 664 40548f-405491 661->664 662->661 663->664 664->653 665 405493-405496 664->665 665->653
                                                    APIs
                                                    • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                    • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                    • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0), ref: 0040542D
                                                    • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll), ref: 0040543F
                                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                    • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                    • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll
                                                    • API String ID: 2531174081-602063540
                                                    • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                                    • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                                    • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                                    • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 666 403168-40317c 667 403185-40318e 666->667 668 40317e 666->668 669 403190 667->669 670 403197-40319c 667->670 668->667 669->670 671 4031ac-4031b9 call 40337a 670->671 672 40319e-4031a7 call 403390 670->672 676 403368 671->676 677 4031bf-4031c3 671->677 672->671 678 40336a-40336b 676->678 679 403313-403315 677->679 680 4031c9-403212 GetTickCount 677->680 683 403373-403377 678->683 681 403355-403358 679->681 682 403317-40331a 679->682 684 403370 680->684 685 403218-403220 680->685 686 40335a 681->686 687 40335d-403366 call 40337a 681->687 682->684 688 40331c 682->688 684->683 689 403222 685->689 690 403225-403233 call 40337a 685->690 686->687 687->676 699 40336d 687->699 692 40331f-403325 688->692 689->690 690->676 698 403239-403242 690->698 695 403327 692->695 696 403329-403337 call 40337a 692->696 695->696 696->676 704 403339-403345 call 405ec7 696->704 701 403248-403268 call 4067da 698->701 699->684 708 40330b-40330d 701->708 709 40326e-403281 GetTickCount 701->709 710 403347-403351 704->710 711 40330f-403311 704->711 708->678 712 403283-40328b 709->712 713 4032c6-4032c8 709->713 710->692 714 403353 710->714 711->678 715 403293-4032be MulDiv wsprintfA call 4053d1 712->715 716 40328d-403291 712->716 717 4032ca-4032ce 713->717 718 4032ff-403303 713->718 714->684 724 4032c3 715->724 716->713 716->715 721 4032d0-4032d7 call 405ec7 717->721 722 4032e5-4032f0 717->722 718->685 719 403309 718->719 719->684 727 4032dc-4032de 721->727 723 4032f3-4032f7 722->723 723->701 726 4032fd 723->726 724->713 726->684 727->711 728 4032e0-4032e3 727->728 728->723
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CountTick$wsprintf
                                                    • String ID: ... %d%%$@DB
                                                    • API String ID: 551687249-1316549817
                                                    • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                                    • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                                    • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                                    • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 736 4020ca-4020d6 737 402191-402193 736->737 738 4020dc-4020f2 call 402c5e * 2 736->738 740 40230a-40230f call 401423 737->740 748 402101-40210f LoadLibraryExA 738->748 749 4020f4-4020ff GetModuleHandleA 738->749 745 402aea-402af9 740->745 751 402111-40211e GetProcAddress 748->751 752 40218a-40218c 748->752 749->748 749->751 753 402120-402126 751->753 754 40215d-402162 call 4053d1 751->754 752->740 756 402128-402134 call 401423 753->756 757 40213f-402156 call 71c2176b 753->757 758 402167-40216a 754->758 756->758 766 402136-40213d 756->766 760 402158-40215b 757->760 758->745 761 402170-402178 call 403a36 758->761 760->758 761->745 767 40217e-402185 FreeLibrary 761->767 766->758 767->745
                                                    APIs
                                                    • GetModuleHandleA.KERNELBASE(00000000,?,?), ref: 004020F5
                                                      • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                      • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                      • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0), ref: 0040542D
                                                      • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll), ref: 0040543F
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                    • LoadLibraryExA.KERNELBASE(00000000,?,?,?,?), ref: 00402105
                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                                    • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040217F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                    • String ID: P|\
                                                    • API String ID: 2987980305-1923800199
                                                    • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                                    • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                                    • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                                    • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 769 402d60-402d89 call 406113 771 402d8e-402d92 769->771 772 402e43-402e47 771->772 773 402d98-402d9c 771->773 774 402dc1-402dd4 773->774 775 402d9e-402dbf RegEnumValueA 773->775 777 402dfd-402e04 RegEnumKeyA 774->777 775->774 776 402e28-402e36 RegCloseKey 775->776 776->772 778 402dd6-402dd8 777->778 779 402e06-402e18 RegCloseKey call 4066b5 777->779 778->776 781 402dda-402dee call 402d60 778->781 785 402e38-402e3e 779->785 786 402e1a-402e26 RegDeleteKeyA 779->786 781->779 787 402df0-402dfc 781->787 785->772 786->772 787->777
                                                    APIs
                                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                                    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                                    • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CloseEnum$DeleteValue
                                                    • String ID:
                                                    • API String ID: 1354259210-0
                                                    • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                    • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                                    • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                    • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 788 71c2176b-71c217a7 call 71c21b28 792 71c218c4-71c218c6 788->792 793 71c217ad-71c217b1 788->793 794 71c217b3-71c217b9 call 71c2233f 793->794 795 71c217ba-71c217c7 call 71c22381 793->795 794->795 800 71c217f7-71c217fe 795->800 801 71c217c9-71c217ce 795->801 802 71c21800-71c2181c call 71c22568 call 71c215e9 call 71c212f6 GlobalFree 800->802 803 71c2181e-71c21822 800->803 804 71c217d0-71c217d1 801->804 805 71c217e9-71c217ec 801->805 828 71c21873-71c21877 802->828 806 71c21824-71c2186a call 71c215fb call 71c22568 803->806 807 71c2186c-71c21872 call 71c22568 803->807 810 71c217d3-71c217d4 804->810 811 71c217d9-71c217da call 71c22ac8 804->811 805->800 808 71c217ee-71c217ef call 71c22d53 805->808 806->828 807->828 821 71c217f4 808->821 816 71c217e1-71c217e7 call 71c22742 810->816 817 71c217d6-71c217d7 810->817 824 71c217df 811->824 827 71c217f6 816->827 817->800 817->811 821->827 824->821 827->800 831 71c218b4-71c218bb 828->831 832 71c21879-71c21887 call 71c2252e 828->832 831->792 834 71c218bd-71c218be GlobalFree 831->834 838 71c21889-71c2188c 832->838 839 71c2189f-71c218a6 832->839 834->792 838->839 841 71c2188e-71c21896 838->841 839->831 840 71c218a8-71c218b3 call 71c21572 839->840 840->831 841->839 843 71c21898-71c21899 FreeLibrary 841->843 843->839
                                                    APIs
                                                      • Part of subcall function 71C21B28: GlobalFree.KERNEL32(?), ref: 71C21D99
                                                      • Part of subcall function 71C21B28: GlobalFree.KERNEL32(?), ref: 71C21D9E
                                                      • Part of subcall function 71C21B28: GlobalFree.KERNEL32(?), ref: 71C21DA3
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C21816
                                                    • FreeLibrary.KERNEL32(?), ref: 71C21899
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C218BE
                                                      • Part of subcall function 71C2233F: GlobalAlloc.KERNEL32(?,?), ref: 71C22370
                                                      • Part of subcall function 71C22742: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,71C217E7,00000000), ref: 71C22812
                                                      • Part of subcall function 71C215FB: wsprintfA.USER32 ref: 71C21629
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Global$Free$Alloc$Librarywsprintf
                                                    • String ID:
                                                    • API String ID: 3962662361-3916222277
                                                    • Opcode ID: 0fc6c7ea522d49a76bd437203ae81a76e93f0709d554f14c1187c96f669e441b
                                                    • Instruction ID: d57fe190099d3a17112aa8fbed0bbdcc11731a3d0fe6f9391c45a9d3e415bcc6
                                                    • Opcode Fuzzy Hash: 0fc6c7ea522d49a76bd437203ae81a76e93f0709d554f14c1187c96f669e441b
                                                    • Instruction Fuzzy Hash: 8C417A72504246DBDB01DFF58CC4B9A3BBCBF01612F148475E9079E186DFB88189CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 845 4024a3-4024ca call 402c5e * 2 call 402cee 851 4024cf-4024d4 845->851 852 402aea-402af9 851->852 853 4024da-4024e4 851->853 855 4024f4-4024f7 853->855 856 4024e6-4024f3 call 402c5e lstrlenA 853->856 859 4024f9-40250d call 402c3c 855->859 860 40250e-402511 855->860 856->855 859->860 863 402522-402536 RegSetValueExA 860->863 864 402513-40251d call 403168 860->864 866 402538 863->866 867 40253b-402618 RegCloseKey 863->867 864->863 866->867 867->852
                                                    APIs
                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000023,00000011,00000002), ref: 004024EE
                                                    • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,00000011,00000002), ref: 0040252E
                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,00000011,00000002), ref: 00402612
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CloseValuelstrlen
                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp
                                                    • API String ID: 2655323295-2778696829
                                                    • Opcode ID: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                                    • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                                    • Opcode Fuzzy Hash: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                                    • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 00405E63
                                                    • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?), ref: 00405E7D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CountFileNameTempTick
                                                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                    • API String ID: 1716503409-2113348990
                                                    • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                    • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                                    • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                    • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                                    APIs
                                                    • GlobalFree.KERNEL32(005C7C50), ref: 00401C1B
                                                    • GlobalAlloc.KERNELBASE(?,00000404), ref: 00401C2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocFree
                                                    • String ID: Call$P|\
                                                    • API String ID: 3394109436-1857959335
                                                    • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                                    • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                                    • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                                    • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                                    APIs
                                                      • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405CC6
                                                      • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                                      • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                                    • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,?,00000000,?), ref: 00401632
                                                      • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                                    • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,00000000,00000000,?), ref: 00401661
                                                    Strings
                                                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes, xrefs: 00401656
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes
                                                    • API String ID: 1892508949-3981140411
                                                    • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                                    • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                                    • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                                    • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                                    APIs
                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                                    • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll), ref: 004061C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue
                                                    • String ID: Call
                                                    • API String ID: 3356406503-1824292864
                                                    • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                    • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                                    • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                    • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                                    APIs
                                                      • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(76F93410,0042BCD8,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                                      • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                                    • lstrlenA.KERNEL32 ref: 00402358
                                                    • lstrlenA.KERNEL32(00000000), ref: 00402362
                                                    • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileFindlstrlen$CloseFirstOperation
                                                    • String ID:
                                                    • API String ID: 1486964399-0
                                                    • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                                    • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                                    • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                                    • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                                    APIs
                                                    • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                                    • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,00000011,00000002), ref: 00402612
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Enum$CloseValue
                                                    • String ID:
                                                    • API String ID: 397863658-0
                                                    • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                                    • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                                    • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                                    • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,00000011,00000002), ref: 00402612
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue
                                                    • String ID:
                                                    • API String ID: 3356406503-0
                                                    • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                                    • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                                    • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                                    • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                                    APIs
                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                    • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                                    • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                                    • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                                    • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                                    APIs
                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CloseDeleteValue
                                                    • String ID:
                                                    • API String ID: 2831762973-0
                                                    • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                                    • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                                    • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                                    • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                                    APIs
                                                    • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                                    • GetLastError.KERNEL32 ref: 004058E7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID:
                                                    • API String ID: 1375471231-0
                                                    • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                                    • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                                    • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                                    • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                                    APIs
                                                    • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableShow
                                                    • String ID:
                                                    • API String ID: 1136574915-0
                                                    • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                                    • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                                    • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                                    • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                                    • CloseHandle.KERNEL32(?), ref: 0040595C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateHandleProcess
                                                    • String ID:
                                                    • API String ID: 3712363035-0
                                                    • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                                    • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                                    • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                                    • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                      • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                      • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                                      • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                    • String ID:
                                                    • API String ID: 2547128583-0
                                                    • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                                    • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                                    • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                                    • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                                    APIs
                                                    • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                    • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesCreate
                                                    • String ID:
                                                    • API String ID: 415043291-0
                                                    • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                                    • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                                    • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                                    • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                                    APIs
                                                    • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004058F7
                                                    • GetLastError.KERNEL32(?,?,0000000A,?), ref: 00405905
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID:
                                                    • API String ID: 1375471231-0
                                                    • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                    • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                                    • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                    • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                                    APIs
                                                    • EnumWindows.USER32(00000000), ref: 71C22B87
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: EnumWindows
                                                    • String ID:
                                                    • API String ID: 1129996299-0
                                                    • Opcode ID: 079dc41e4c24fb0595c4cdc3d97c440f36d76fc689ca4532df3b0a50bbf9c64b
                                                    • Instruction ID: 60d7cf87693e0a7cdf1d3a01fa9ba6ea07badff9239ad2ceafa2693b80e66b22
                                                    • Opcode Fuzzy Hash: 079dc41e4c24fb0595c4cdc3d97c440f36d76fc689ca4532df3b0a50bbf9c64b
                                                    • Instruction Fuzzy Hash: 7D41BF73914245EFEB21DFE5DC82B9A77B4FB14312F20882AE607C7611CA7C9591CB91
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: wsprintf
                                                    • String ID:
                                                    • API String ID: 2111968516-0
                                                    • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                                    • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                                    • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                                    • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                                    APIs
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileMove
                                                    • String ID:
                                                    • API String ID: 3562171763-0
                                                    • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                                    • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                                    • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                                    • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                                      • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FilePointerwsprintf
                                                    • String ID:
                                                    • API String ID: 327478801-0
                                                    • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                                    • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                                    • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                                    • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                                    APIs
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringWrite
                                                    • String ID:
                                                    • API String ID: 390214022-0
                                                    • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                                    • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                                    • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                                    • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                                    APIs
                                                    • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                    • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                                    • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                    • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                                    APIs
                                                    • WriteFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,?,00000000), ref: 00405EDB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                                    • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                                    • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                                    • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                                    APIs
                                                    • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,?,00000000,00000000,00000000), ref: 00405EAC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                                    • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                                    • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                                    • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                                    APIs
                                                    • VirtualProtect.KERNELBASE(71C2504C,?,?,71C2503C), ref: 71C229CF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 7a6afeab33bd1fd57139242201ae4fa55ae72deb3fdebed9846e7bd5df009b2a
                                                    • Instruction ID: 40cd4cbfcdabd897f5863e084a17440ca5a96d01df994256c5cb0e0fc5d9a61e
                                                    • Opcode Fuzzy Hash: 7a6afeab33bd1fd57139242201ae4fa55ae72deb3fdebed9846e7bd5df009b2a
                                                    • Instruction Fuzzy Hash: 44F0ACB25282C0DFC360CFAA8C847873FF1B724355B20452AE78ADA242E3BC40448B95
                                                    APIs
                                                    • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileString
                                                    • String ID:
                                                    • API String ID: 1096422788-0
                                                    • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                                    • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                                    • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                                    • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                                    APIs
                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                    • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                                    • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                    • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                                    APIs
                                                    • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015CD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                                    • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                                    • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                                    • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                                    APIs
                                                    • SendMessageA.USER32(000103E2,00000000,00000000,00000000), ref: 0040438B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                                    • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                                    • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                                    • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                                    APIs
                                                    • SendMessageA.USER32(?,?,?,00404192), ref: 00404370
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                                    • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                                    • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                                    • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                                    APIs
                                                    • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: ExecuteShell
                                                    • String ID:
                                                    • API String ID: 587946157-0
                                                    • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                                    • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                                    • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                                    • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FilePointer
                                                    • String ID:
                                                    • API String ID: 973152223-0
                                                    • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                                    • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                                    • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                                    • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                                    • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                                    • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                                    • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                                    APIs
                                                      • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                      • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                      • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,00000000,00424440,76F923A0), ref: 0040542D
                                                      • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp\System.dll), ref: 0040543F
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                      • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                      • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                                      • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                                      • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,?), ref: 0040673B
                                                      • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                                      • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                    • String ID:
                                                    • API String ID: 2972824698-0
                                                    • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                                    • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                                    • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                                    • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                                    APIs
                                                    • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                                    • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                                    • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                                    • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                                    • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                                    • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                                    • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                                    • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                                    • lstrcatA.KERNEL32(?,Call), ref: 00404932
                                                    • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                                      • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                                      • Part of subcall function 00406587: CharNextA.USER32(?,*?|<>/":,00000000,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                                      • Part of subcall function 00406587: CharNextA.USER32(?,?,?,00000000,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                                      • Part of subcall function 00406587: CharNextA.USER32(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                                      • Part of subcall function 00406587: CharPrevA.USER32(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                                    • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,?,00429458,?,?,000003FB,?), ref: 00404A02
                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                                      • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                      • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                                      • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                    • String ID: +uX$A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                                    • API String ID: 2624150263-931392684
                                                    • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                                    • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                                    • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                                    • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                                    APIs
                                                      • Part of subcall function 71C212A5: GlobalAlloc.KERNEL32(?,71C212C3,?,71C2135F,-71C2504B,71C211C0,-000000A0), ref: 71C212AD
                                                    • GlobalAlloc.KERNEL32(?,000014A4), ref: 71C21C54
                                                    • lstrcpyA.KERNEL32(00000008,?), ref: 71C21C9C
                                                    • lstrcpyA.KERNEL32(00000408,?), ref: 71C21CA6
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C21CB9
                                                    • GlobalFree.KERNEL32(?), ref: 71C21D99
                                                    • GlobalFree.KERNEL32(?), ref: 71C21D9E
                                                    • GlobalFree.KERNEL32(?), ref: 71C21DA3
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C21F8A
                                                    • lstrcpyA.KERNEL32(?,?), ref: 71C22128
                                                    • GetModuleHandleA.KERNEL32(00000008), ref: 71C221A4
                                                    • LoadLibraryA.KERNEL32(00000008), ref: 71C221B5
                                                    • GetProcAddress.KERNEL32(?,?), ref: 71C2220E
                                                    • lstrlenA.KERNEL32(00000408), ref: 71C22228
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                    • String ID:
                                                    • API String ID: 245916457-0
                                                    • Opcode ID: 3a192e48cce891c924628712f71c9e04b744e36c78ed6f243d4111b2643213a8
                                                    • Instruction ID: 17c38df0b6455c61f21b06039335d6e9f7fd4e5a0939c0b0539729e9030b886f
                                                    • Opcode Fuzzy Hash: 3a192e48cce891c924628712f71c9e04b744e36c78ed6f243d4111b2643213a8
                                                    • Instruction Fuzzy Hash: 8122C971D0424ADFDB12CFE5CC847AEBBF5BB05316F21852AD1A6A3280CB749A85CB51
                                                    APIs
                                                    • CoCreateInstance.OLE32(0040851C,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040221D
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 004022CF
                                                    Strings
                                                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes, xrefs: 0040225D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: ByteCharCreateInstanceMultiWide
                                                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes
                                                    • API String ID: 123533781-3981140411
                                                    • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                                    • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                                    • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                                    • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileFindFirst
                                                    • String ID:
                                                    • API String ID: 1974802433-0
                                                    • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                                    • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                                    • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                                    • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                                    • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                                    • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                                    • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                                    • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                                    • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                                    • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                                    • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                                    • GlobalAlloc.KERNEL32(?,?), ref: 00404DA5
                                                    • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                                    • SetWindowLongA.USER32(?,?,00405345), ref: 00404DD6
                                                    • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404DE8
                                                    • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                                    • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                                    • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                                    • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404E2E
                                                    • DeleteObject.GDI32(00000110), ref: 00404E33
                                                    • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                                    • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                                    • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                                      • Part of subcall function 00404362: SendMessageA.USER32(?,?,?,00404192), ref: 00404370
                                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                                    • GetWindowLongA.USER32(?,?), ref: 00404F76
                                                    • SetWindowLongA.USER32(?,?,00000000), ref: 00404F84
                                                    • ShowWindow.USER32(?,00000005), ref: 00404F94
                                                    • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                                    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                                    • SendMessageA.USER32(?,?,00000000,00000000), ref: 00405109
                                                    • SendMessageA.USER32(?,00000420,00000000,?), ref: 0040512D
                                                    • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                                    • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                                    • GlobalFree.KERNEL32(?), ref: 00405172
                                                    • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                                    • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                                    • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                                    • InvalidateRect.USER32(?,00000000,?), ref: 004052CE
                                                    • ShowWindow.USER32(?,00000000), ref: 0040531C
                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                                    • ShowWindow.USER32(00000000), ref: 0040532E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                    • String ID: $+uX$M$N
                                                    • API String ID: 2564846305-2959877236
                                                    • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                                    • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                                    • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                                    • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                                    APIs
                                                    • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404523
                                                    • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                                    • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404555
                                                    • GetSysColor.USER32(?), ref: 00404566
                                                    • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                                    • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                                    • lstrlenA.KERNEL32(?), ref: 00404587
                                                    • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                                    • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                                    • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                                    • SendMessageA.USER32(00000000), ref: 00404610
                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                                    • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                                    • SetCursor.USER32(00000000), ref: 00404693
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                                    • SetCursor.USER32(00000000), ref: 004046AC
                                                    • SendMessageA.USER32(00000111,?,00000000), ref: 004046D8
                                                    • SendMessageA.USER32(?,00000000,00000000), ref: 004046EC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                    • String ID: +uX$Call$N$cD@
                                                    • API String ID: 3103080414-4047485034
                                                    • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                                    • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                                    • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                                    • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                                    APIs
                                                    • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                    • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                    • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                    • DrawTextA.USER32(00000000,forholdsordren Setup,000000FF,00000010,00000820), ref: 00401156
                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                    • String ID: F$forholdsordren Setup
                                                    • API String ID: 941294808-4059315213
                                                    • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                    • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                                    • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                    • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                                    APIs
                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                                    • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                                      • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                      • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                    • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                                    • wsprintfA.USER32 ref: 00405F6B
                                                    • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,?,0042C618,?,?,?,?,?), ref: 00405FA6
                                                    • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405FB5
                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                                    • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                                    • GlobalFree.KERNEL32(00000000), ref: 00406054
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                                      • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                      • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                    • String ID: %s=%s$[Rename]
                                                    • API String ID: 2171350718-1727408572
                                                    • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                                    • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                                    • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                                    • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                                    APIs
                                                    • CharNextA.USER32(?,*?|<>/":,00000000,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                                    • CharNextA.USER32(?,?,?,00000000,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                                    • CharNextA.USER32(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                                    • CharPrevA.USER32(?,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                                    • *?|<>/":, xrefs: 004065CF
                                                    • "C:\Users\user\Desktop\HJEbEB40vP.exe", xrefs: 00406587
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Char$Next$Prev
                                                    • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                    • API String ID: 589700163-1552901405
                                                    • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                    • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                                    • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                    • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                                    APIs
                                                    • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                                    • GetSysColor.USER32(00000000), ref: 004043EF
                                                    • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                                    • SetBkMode.GDI32(?,?), ref: 00404407
                                                    • GetSysColor.USER32(?), ref: 0040441A
                                                    • SetBkColor.GDI32(?,?), ref: 0040442A
                                                    • DeleteObject.GDI32(?), ref: 00404444
                                                    • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                    • String ID:
                                                    • API String ID: 2320649405-0
                                                    • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                    • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                                    • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                    • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                                    APIs
                                                      • Part of subcall function 71C212A5: GlobalAlloc.KERNEL32(?,71C212C3,?,71C2135F,-71C2504B,71C211C0,-000000A0), ref: 71C212AD
                                                    • GlobalFree.KERNEL32(?), ref: 71C2266E
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C226A8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Global$Free$Alloc
                                                    • String ID:
                                                    • API String ID: 1780285237-0
                                                    • Opcode ID: 0cba7cce9845e699f891f5fbfa4bfc81d39bfcdeb8bf7d1a68d3951eba43e0de
                                                    • Instruction ID: 54212e51767a33f1d1c5d11ae5aa12aa3b4339186f73c18170862c1ccd6ae62a
                                                    • Opcode Fuzzy Hash: 0cba7cce9845e699f891f5fbfa4bfc81d39bfcdeb8bf7d1a68d3951eba43e0de
                                                    • Instruction Fuzzy Hash: DC41AD73508281EFD326CFD5CC84D2F7BBAFB95202B514529F6428B211CB3998488BA2
                                                    APIs
                                                    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                                    • GetMessagePos.USER32 ref: 00404CA3
                                                    • ScreenToClient.USER32(?,?), ref: 00404CBD
                                                    • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                                    • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Message$Send$ClientScreen
                                                    • String ID: f
                                                    • API String ID: 41195575-1993550816
                                                    • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                    • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                                    • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                    • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                                    APIs
                                                    • GetDC.USER32(?), ref: 00401E5D
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                                    • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                                    • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                    • String ID: Tahoma
                                                    • API String ID: 3808545654-3580928618
                                                    • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                                    • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                                    • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                                    • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                                    APIs
                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E65
                                                    • MulDiv.KERNEL32(0007AFFA,?,0007B1FE), ref: 00402E90
                                                    • wsprintfA.USER32 ref: 00402EA0
                                                    • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                                    • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                                    Strings
                                                    • verifying installer: %d%%, xrefs: 00402E9A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                    • String ID: verifying installer: %d%%
                                                    • API String ID: 1451636040-82062127
                                                    • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                    • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                                    • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                    • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                                    APIs
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C224D7
                                                      • Part of subcall function 71C212B4: lstrcpynA.KERNEL32(00000000,?,71C2135F,-71C2504B,71C211C0,-000000A0), ref: 71C212C4
                                                    • GlobalAlloc.KERNEL32(?,?), ref: 71C22452
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 71C22467
                                                    • GlobalAlloc.KERNEL32(?,?), ref: 71C22478
                                                    • CLSIDFromString.OLE32(00000000,00000000), ref: 71C22486
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C2248D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                    • String ID:
                                                    • API String ID: 3730416702-0
                                                    • Opcode ID: 057221ea3fa3ad4dbc9e4eb159407e4229cbcb6cb2e3c947ab527b811f90f17b
                                                    • Instruction ID: ec58f68d30d574ca4e422587fdc55bd8e643f21eb5644ad76833cc83df180228
                                                    • Opcode Fuzzy Hash: 057221ea3fa3ad4dbc9e4eb159407e4229cbcb6cb2e3c947ab527b811f90f17b
                                                    • Instruction Fuzzy Hash: C0419CB2508341DFD311CFA69C44B6AB7F8FF50713F21892AF546CA581DB74A588CBA1
                                                    APIs
                                                      • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                      • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                    • GlobalAlloc.KERNEL32(?,?), ref: 0040286E
                                                      • Part of subcall function 00403390: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                                    • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040288A
                                                    • GlobalFree.KERNEL32(?), ref: 004028C9
                                                    • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                                      • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 004031CF
                                                      • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 00403276
                                                      • Part of subcall function 00403168: MulDiv.KERNEL32(7FFFFFFF,?,?), ref: 0040329F
                                                      • Part of subcall function 00403168: wsprintfA.USER32 ref: 004032AF
                                                    • CloseHandle.KERNEL32(?,?,?), ref: 004028F8
                                                    • DeleteFileA.KERNEL32(?), ref: 0040290B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                                    • String ID:
                                                    • API String ID: 2082585436-0
                                                    • Opcode ID: 4de34a0584c9f07ca01e631d387470c66e36086a4f72a89d30526263dc69d697
                                                    • Instruction ID: ef30041e15382934485b3a1dbcd939e881a8f40863dcc9ce189fd72ebc1ad175
                                                    • Opcode Fuzzy Hash: 4de34a0584c9f07ca01e631d387470c66e36086a4f72a89d30526263dc69d697
                                                    • Instruction Fuzzy Hash: B8213972C00128BBDF216FA5DD8899EBE79BF04364F10823AF554B62E0CB7949419F68
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: FreeGlobal
                                                    • String ID:
                                                    • API String ID: 2979337801-0
                                                    • Opcode ID: f360fdca83e22c169a302dac16201b5f8c187d853028b75fc477e7661238b632
                                                    • Instruction ID: a5e687b351c2f40bd98d9d2d4d3b57d4e95ddf305c14fe2219c863ff10d67703
                                                    • Opcode Fuzzy Hash: f360fdca83e22c169a302dac16201b5f8c187d853028b75fc477e7661238b632
                                                    • Instruction Fuzzy Hash: 2751E472E0419AEFDB12DFF98D425BEBFFAAF45253F11016AD407E3104C6319A858791
                                                    APIs
                                                    • GetDlgItem.USER32(?,?), ref: 00401DA3
                                                    • GetClientRect.USER32(?,?), ref: 00401DF1
                                                    • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                                    • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                                    • DeleteObject.GDI32(00000000), ref: 00401E45
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                    • String ID:
                                                    • API String ID: 1849352358-0
                                                    • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                    • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                                    • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                    • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                                    APIs
                                                    • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                                    • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Timeout
                                                    • String ID: !
                                                    • API String ID: 1777923405-2657877971
                                                    • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                    • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                                    • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                    • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                                    APIs
                                                    • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                    • wsprintfA.USER32 ref: 00404C1C
                                                    • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: ItemTextlstrlenwsprintf
                                                    • String ID: %u.%u%s%s
                                                    • API String ID: 3540041739-3551169577
                                                    • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                                    • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                                    • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                                    • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                                    APIs
                                                      • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,forholdsordren Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                                      • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405CC6
                                                      • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                                      • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405D60
                                                    • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nscDCA5.tmp
                                                    • API String ID: 3248276644-16269006
                                                    • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                                    • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                                    • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                                    • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                                    APIs
                                                    • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C25
                                                    • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C2E
                                                    • lstrcatA.KERNEL32(?,0040A014,?,?,0000000A,?), ref: 00405C3F
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CharPrevlstrcatlstrlen
                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                    • API String ID: 2659869361-297319885
                                                    • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                                    • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                                    • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                                    • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                                    APIs
                                                    • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,C:\Users\user\AppData\Local\Temp\nscDCA5.tmp,76F93410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,76F93410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405CC6
                                                    • CharNextA.USER32(00000000), ref: 00405CCB
                                                    • CharNextA.USER32(00000000), ref: 00405CDF
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Temp\nscDCA5.tmp, xrefs: 00405CB9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CharNext
                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscDCA5.tmp
                                                    • API String ID: 3213498283-2778696829
                                                    • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                                    • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                                    • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                                    • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                                    APIs
                                                    • DestroyWindow.USER32(00000000,00000000,004030AB,?,?,?,00403722,?,?,?,0000000A,?), ref: 00402EE0
                                                    • GetTickCount.KERNEL32 ref: 00402EFE
                                                    • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                                    • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,?,0000000A,?), ref: 00402F29
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                    • String ID:
                                                    • API String ID: 2102729457-0
                                                    • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                    • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                                    • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                    • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 00405374
                                                    • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                                      • Part of subcall function 00404379: SendMessageA.USER32(000103E2,00000000,00000000,00000000), ref: 0040438B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Window$CallMessageProcSendVisible
                                                    • String ID:
                                                    • API String ID: 3748168415-3916222277
                                                    • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                    • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                                    • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                    • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                                    APIs
                                                    • FreeLibrary.KERNEL32(?,76F93410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,?,0000000A,?), ref: 00403A1B
                                                    • GlobalFree.KERNEL32(005973B8), ref: 00403A22
                                                    Strings
                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Free$GlobalLibrary
                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                    • API String ID: 1100898210-297319885
                                                    • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                                    • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                                    • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                                    • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                                    APIs
                                                    • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HJEbEB40vP.exe,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A), ref: 00405C6C
                                                    • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HJEbEB40vP.exe,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: CharPrevlstrlen
                                                    • String ID: C:\Users\user\Desktop
                                                    • API String ID: 2709904686-2743851969
                                                    • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                                    • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                                    • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                                    • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                                    APIs
                                                    • GlobalAlloc.KERNEL32(?,?), ref: 71C2116B
                                                    • GlobalAlloc.KERNEL32(?,?), ref: 71C211D8
                                                    • GlobalFree.KERNEL32(?), ref: 71C21286
                                                    • GlobalFree.KERNEL32(00000000), ref: 71C2129B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3795747356.0000000071C21000.00000020.00000001.01000000.00000009.sdmp, Offset: 71C20000, based on PE: true
                                                    • Associated: 00000001.00000002.3795677514.0000000071C20000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795785834.0000000071C24000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000001.00000002.3795863948.0000000071C26000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_71c20000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocFree
                                                    • String ID:
                                                    • API String ID: 3394109436-0
                                                    • Opcode ID: 59bb9fd7b50a538bffd9b4f4b11c1b7aaac6520564b7fa343888343f5c809dde
                                                    • Instruction ID: 7ca5f798328e452ab309e948b7e0b0f7045ae908bbb40cea7757db70ee3b640e
                                                    • Opcode Fuzzy Hash: 59bb9fd7b50a538bffd9b4f4b11c1b7aaac6520564b7fa343888343f5c809dde
                                                    • Instruction Fuzzy Hash: 4C519CB2918286EFD301CFE9CC84F667BB8FB1A242B240069F646CB251D7389904CB91
                                                    APIs
                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                                    • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.3748593807.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.3748538582.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748649585.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000429000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000042B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.0000000000435000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748680436.000000000043F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.3748859216.0000000000443000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                    • String ID:
                                                    • API String ID: 190613189-0
                                                    • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                    • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                                    • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                    • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C