Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HJEbEB40vP.exe

Overview

General Information

Sample name:HJEbEB40vP.exe
Analysis ID:1502975
MD5:4f7955fcf2f05ff0e47c6d21bc951c95
SHA1:8826dec44dcba2791ae3508d635ba39212770040
SHA256:9bbb84ccd33a3fca342b03d58b3f2c47410b00872c57e4d9cba8039b21752c57
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Switches to a custom stack to bypass stack traces
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64native
  • HJEbEB40vP.exe (PID: 8768 cmdline: "C:\Users\user\Desktop\HJEbEB40vP.exe" MD5: 4F7955FCF2F05FF0E47C6D21BC951C95)
    • HJEbEB40vP.exe (PID: 5056 cmdline: "C:\Users\user\Desktop\HJEbEB40vP.exe" MD5: 4F7955FCF2F05FF0E47C6D21BC951C95)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.11980091974.0000000004022000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000001.00000002.7643505601.0000000007172000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: HJEbEB40vP.exe PID: 8768JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binAvira URL Cloud: Label: malware
        Source: HJEbEB40vP.exeReversingLabs: Detection: 48%
        Source: HJEbEB40vP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: HJEbEB40vP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmp
        Source: Binary string: mshtml.pdbUGP source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmp
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,1_2_00405A4F
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406620 FindFirstFileA,FindClose,1_2_00406620
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004027CF FindFirstFileA,1_2_004027CF
        Source: Joe Sandbox ViewIP Address: 185.222.58.113 185.222.58.113
        Source: global trafficTCP traffic: 192.168.11.20:49722 -> 185.222.58.113:80
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.113
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwD
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin(WLt
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin0VTu/
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin3c9t
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin8W
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin8~
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binGcMt
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binKcqt
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binPW
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binR
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binccit
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binhW
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binr
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binv
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binvmbusRFCOMM
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin~
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.26
        Source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
        Source: HJEbEB40vP.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: HJEbEB40vP.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
        Source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000626000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
        Source: HJEbEB40vP.exeString found in binary or memory: http://www.skinstudio.netG
        Source: HJEbEB40vP.exe, 00000003.00000001.6985713640.00000000005F2000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
        Source: HJEbEB40vP.exe, 00000003.00000001.6985713640.00000000005F2000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
        Source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,1_2_0040550F
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,1_2_004033D8
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004072D11_2_004072D1
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406AFA1_2_00406AFA
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_6FD81B281_2_6FD81B28
        Source: HJEbEB40vP.exe, 00000001.00000000.6876565430.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs HJEbEB40vP.exe
        Source: HJEbEB40vP.exe, 00000003.00000000.6984058947.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs HJEbEB40vP.exe
        Source: HJEbEB40vP.exeBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs HJEbEB40vP.exe
        Source: HJEbEB40vP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal76.troj.evad.winEXE@3/17@0/1
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,1_2_004033D8
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004047BF GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,1_2_004047BF
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00402198 LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,1_2_00402198
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nsu6458.tmpJump to behavior
        Source: HJEbEB40vP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: HJEbEB40vP.exeReversingLabs: Detection: 48%
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile read: C:\Users\user\Desktop\HJEbEB40vP.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
        Source: HJEbEB40vP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: mshtml.pdb source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmp
        Source: Binary string: mshtml.pdbUGP source: HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmp

        Data Obfuscation

        barindex
        Source: Yara matchFile source: Process Memory Space: HJEbEB40vP.exe PID: 8768, type: MEMORYSTR
        Source: Yara matchFile source: 00000003.00000002.11980091974.0000000004022000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.7643505601.0000000007172000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_6FD81B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6FD81B28
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\UserInfo.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\nsExec.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\BgImage.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Monotonien152.AllJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Inversor.SpoJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Charting.skrJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\chokoladeforretning.marJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\doubling.regJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\hmoriderne.nerJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\lvens.flbJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\materialiter.sigJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\preinvest.priJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\ridningen.txtJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI/Special instruction interceptor: Address: 76A573E
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI/Special instruction interceptor: Address: 455573E
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\UserInfo.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\nsExec.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\BgImage.dllJump to dropped file
        Source: C:\Users\user\Desktop\HJEbEB40vP.exe TID: 7904Thread sleep count: 32 > 30Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exe TID: 7904Thread sleep time: -320000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,1_2_00405A4F
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00406620 FindFirstFileA,FindClose,1_2_00406620
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004027CF FindFirstFileA,1_2_004027CF
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWY
        Source: HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EE4000.00000004.00000020.00020000.00000000.sdmp, HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI call chain: ExitProcess graph end nodegraph_1-4661
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeAPI call chain: ExitProcess graph end nodegraph_1-4516
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_00401A43 LdrInitializeThunk,ExpandEnvironmentStringsA,lstrcmpA,1_2_00401A43
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_6FD81B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6FD81B28
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeProcess created: C:\Users\user\Desktop\HJEbEB40vP.exe "C:\Users\user\Desktop\HJEbEB40vP.exe"Jump to behavior
        Source: C:\Users\user\Desktop\HJEbEB40vP.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,LdrInitializeThunk,wsprintfA,GetFileAttributesA,DeleteFileA,LdrInitializeThunk,SetCurrentDirectoryA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,1_2_004033D8
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        1
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        DLL Side-Loading
        11
        Process Injection
        1
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Clipboard Data
        Junk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
        DLL Side-Loading
        11
        Process Injection
        NTDS13
        System Information Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        HJEbEB40vP.exe48%ReversingLabsWin32.Trojan.GuLoader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\BgImage.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\UserInfo.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\nsExec.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://185.222.58.113/SrkUwD0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin(WLt0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin8W0%Avira URL Cloudsafe
        http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
        http://www.skinstudio.netG0%Avira URL Cloudsafe
        http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
        http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin~0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binR0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin0VTu/0%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binGcMt0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binvmbusRFCOMM0%Avira URL Cloudsafe
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binPW0%Avira URL Cloudsafe
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binccit0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin8~0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binhW0%Avira URL Cloudsafe
        http://185.260%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binKcqt0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin100%Avira URL Cloudmalware
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin3c9t0%Avira URL Cloudsafe
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binv0%Avira URL Cloudsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin8WHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin~HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorHJEbEB40vP.exefalse
        • Avira URL Cloud: safe
        unknown
        http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTDHJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000626000.00000020.00000001.01000000.00000009.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin(WLtHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.gopher.ftp://ftp.HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binRHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.skinstudio.netGHJEbEB40vP.exefalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binGcMtHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin0VTu/HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdHJEbEB40vP.exe, 00000003.00000001.6985713640.00000000005F2000.00000020.00000001.01000000.00000009.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorHJEbEB40vP.exefalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binPWHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binvmbusRFCOMMHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214HJEbEB40vP.exe, 00000003.00000001.6985713640.0000000000649000.00000020.00000001.01000000.00000009.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin8~HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binccitHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdHJEbEB40vP.exe, 00000003.00000001.6985713640.00000000005F2000.00000020.00000001.01000000.00000009.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.26HJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binhWHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004E88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binKcqtHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binrHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.bin3c9tHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.222.58.113/SrkUwDSgspxlFfEyjFIJCX107.binvHJEbEB40vP.exe, 00000003.00000002.11990012824.0000000004EC9000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.222.58.113
          unknownNetherlands
          51447ROOTLAYERNETNLfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1502975
          Start date and time:2024-09-02 16:20:27 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 14m 27s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:HJEbEB40vP.exe
          Detection:MAL
          Classification:mal76.troj.evad.winEXE@3/17@0/1
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 90%
          • Number of executed functions: 52
          • Number of non-executed functions: 29
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): update.googleapis.com, ctldl.windowsupdate.com, c.pki.goog
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: HJEbEB40vP.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.222.58.11320240704-455.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/zpWamTYVR111.bin
          1ppvR5VRT6.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/qUSTn118.bin
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/ubsFsaZf137.bin
          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/bJibCYgZszSl185.bin
          Documents.com.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/QZxiWpS132.bin
          27062024-322copy.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/dzPxpaYSrjQF221.bin
          Jailkeeper.bat.exeGet hashmaliciousGuLoaderBrowse
          • 185.222.58.113/aZZfDlS144.bin
          e6FEkdlKCX.exeGet hashmaliciousRedLineBrowse
          • 185.222.58.113:55615/
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ROOTLAYERNETNLPzPxqbK89H.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.239
          tfF3UBTdr8.exeGet hashmaliciousRedLineBrowse
          • 185.222.57.91
          4Si6dGqcuy.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.102
          lmec.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.171
          CLgi.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.169
          8XYOB9Lo1C.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
          • 45.137.22.179
          5B8E6Z6ZdN.exeGet hashmaliciousRedLineBrowse
          • 185.222.57.81
          XAUnTZQny8.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
          • 45.137.22.253
          Xf0VkRcuwx.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.164
          SI6EttPCYd.exeGet hashmaliciousRedLineBrowse
          • 45.137.22.108
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dllUdspecialiser45.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Botulismus56.exeGet hashmaliciousFormBook, GuLoaderBrowse
              Hebdomcad.exeGet hashmaliciousGuLoaderBrowse
                Udspecialiser45.exeGet hashmaliciousGuLoaderBrowse
                  Hebdomcad.exeGet hashmaliciousGuLoaderBrowse
                    Botulismus56.exeGet hashmaliciousGuLoaderBrowse
                      004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                        DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                          Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                            C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\BgImage.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                              DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                                Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                                  004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                    004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                      DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                                        Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                                          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                            P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):49
                                              Entropy (8bit):4.75216571132969
                                              Encrypted:false
                                              SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                              MD5:797DA95245047A54F125FBF3B19FA295
                                              SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                              SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                              SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):7680
                                              Entropy (8bit):5.188410641489526
                                              Encrypted:false
                                              SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                              MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                              SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                              SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                              SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                              • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                              • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                              • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                              • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                              • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                              • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                              • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                              • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):12288
                                              Entropy (8bit):5.744994954995265
                                              Encrypted:false
                                              SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                              MD5:12B140583E3273EE1F65016BECEA58C4
                                              SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                              SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                              SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: Udspecialiser45.exe, Detection: malicious, Browse
                                              • Filename: Botulismus56.exe, Detection: malicious, Browse
                                              • Filename: Hebdomcad.exe, Detection: malicious, Browse
                                              • Filename: Udspecialiser45.exe, Detection: malicious, Browse
                                              • Filename: Hebdomcad.exe, Detection: malicious, Browse
                                              • Filename: Botulismus56.exe, Detection: malicious, Browse
                                              • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                              • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                              • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):4096
                                              Entropy (8bit):3.327532764383977
                                              Encrypted:false
                                              SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                              MD5:90228DD140188EC0CA02F7F52E4C9A30
                                              SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                              SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                              SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):6656
                                              Entropy (8bit):5.178709395875687
                                              Encrypted:false
                                              SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                              MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                              SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                              SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                              SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):25
                                              Entropy (8bit):4.163856189774724
                                              Encrypted:false
                                              SSDEEP:3:+gMn:8
                                              MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                              SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                              SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                              SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                              Malicious:false
                                              Preview:[Caps]..Setting=Enabled..
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3011
                                              Entropy (8bit):4.875614577841428
                                              Encrypted:false
                                              SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                              MD5:6103DF2AF52F53D95AF61664D1866FFE
                                              SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                              SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                              SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                              Malicious:false
                                              Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3794
                                              Entropy (8bit):4.876163305802233
                                              Encrypted:false
                                              SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                              MD5:0629DF955F60990975A3C8EF199B57E9
                                              SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                              SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                              SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                              Malicious:false
                                              Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):12324
                                              Entropy (8bit):4.506527734456382
                                              Encrypted:false
                                              SSDEEP:192:vBBtswqg7AJ6AcdUzvlL1qRY5AtG+ftEmmbx92x00:vBBtmg7a63Ujbqynambv0
                                              MD5:6A70EE29DFE37723C644213A5B41E3FC
                                              SHA1:AF966E8B806882BF8BB7841E74646AC728A53E75
                                              SHA-256:F76544A52CCA074E85EB691D9FB7A9BE4E2376F29D027A880329AA6186176894
                                              SHA-512:172F6D55D086DC05F0CA9FAB61F594C5D3834060295FE0FC9ADEFCE04772C5F6C459E9DBB86CD2FC38363F4CB5A48F67BB5BD5B9EB71F05FCC2848B9CBA0D1F8
                                              Malicious:false
                                              Preview:.......................................H.OO...................hh.---.@@......`.................k...e.9.r...n...e...l..>3...2...:..6:...C...r...e...a...t...e...F...i...l...e...A...(...m..g ...r..y4... ...,... ...i... ...0...x...8...0..U0...0...0...0...0...0.3.,..' ...i... ..#0.uu,... ...p... ...0...,.r. ...i.." ...4...,..8 .'.i... ...0...x...8...0...,... ...i... ...0. .)...i.......r.zz8...q...k...e.^^r...n...e...l..t3...2.YY:...:...S...e...t...F...i...l...e...P...o...i...n...t...e...r...(...i... .".r...8...,... ...i... ...2...3.ff0..T1...2... ...,... ...i... ...0.*.,..vi... ...0...)...i..R....r...4...q...k.z.e.\\r...n...e...l..J3...2..;:...:...V...i..<r...t..5u...a...l...A...l...l...o.IIc...(...i... ...0...,...i... .k.5...8.."2...3...6...9...2.h.8..`,... ...i.G. ...0...x...3...0...0...0...,..d ...i... ...0...x...4...0...)...p.H.....r...2...q.@.k...e...r...n...e...l..*3.zz2...:...:...R...e...a...d..GF...i...l...e...(...i... ...r...8.DD,..( ..8i... ...r...2...,... ...i... ...5..&8...2...3
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):247013
                                              Entropy (8bit):7.52878297101555
                                              Encrypted:false
                                              SSDEEP:3072:356Nef7kQPwRCWb321NX0ALxD8SS5K4gyY7VCEr93uB3ide2dkF20oW8aQHQJK:36KjwRC1NXdZS8vyYQszddde20qaQHf
                                              MD5:C6BD02E86A07F3CFBA4F7A11A050B922
                                              SHA1:15BA4301164AD4FBD27D84F1A50ED71FE411EC31
                                              SHA-256:9EBB31BB1928D6784DB09E0C0F044D309C208ADC9856B92D40C955F43D2379A4
                                              SHA-512:5CA39C401CC0CFFF8093867BE3F2F2516E8E92E08245EE278D17C19524593B7635E037004CA5698858C28E1618DCA2648A5F8D0B31ABE23D8943B52108EDA9B6
                                              Malicious:false
                                              Preview:......~.......\\\\\..$.........................................................111.&&&&..................p............O..._............ll...>....N.\.jjj.O......x......##..L..........mmm....................v...........>..............................=.......................................b...................ss.........J..Z..........VVVVVV........GG.............C.&&...a....K..........o..((......... .........................................]....V..rrrrr........i.....ee............ZZZ.W...................@@@@@@@...........z................##..........UU......#.....NN..........l.^...TT...[.......--....}...|.....iii....5..............................zzz.......+++.....................Z..##.......c...........rr. ................&&.........[.........99......vv........4.....P...............m.v....XX..............................zz....1......................l.......*...nn..O....;......(..SS.G..HH....G....................QQ..............]....Y...........zzz.....)..R...................==.((((
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3861
                                              Entropy (8bit):4.8950653795254695
                                              Encrypted:false
                                              SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                              MD5:2B5A33F2637CE6016495BE603413514E
                                              SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                              SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                              SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                              Malicious:false
                                              Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3435
                                              Entropy (8bit):4.910328234136937
                                              Encrypted:false
                                              SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                              MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                              SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                              SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                              SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                              Malicious:false
                                              Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1618
                                              Entropy (8bit):4.660461986408
                                              Encrypted:false
                                              SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                              MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                              SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                              SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                              SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                              Malicious:false
                                              Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2322
                                              Entropy (8bit):4.685927571910316
                                              Encrypted:false
                                              SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                              MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                              SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                              SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                              SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                              Malicious:false
                                              Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2438
                                              Entropy (8bit):4.834166284053989
                                              Encrypted:false
                                              SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                              MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                              SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                              SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                              SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                              Malicious:false
                                              Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3194
                                              Entropy (8bit):4.87998401204962
                                              Encrypted:false
                                              SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                              MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                              SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                              SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                              SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                              Malicious:false
                                              Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                              Process:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):434
                                              Entropy (8bit):4.287029634434794
                                              Encrypted:false
                                              SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                              MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                              SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                              SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                              SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                              Malicious:false
                                              Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Entropy (8bit):7.435255044103252
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:HJEbEB40vP.exe
                                              File size:504'318 bytes
                                              MD5:4f7955fcf2f05ff0e47c6d21bc951c95
                                              SHA1:8826dec44dcba2791ae3508d635ba39212770040
                                              SHA256:9bbb84ccd33a3fca342b03d58b3f2c47410b00872c57e4d9cba8039b21752c57
                                              SHA512:a11ac10434ea13da397f16122429f7a553685d6d365f6b9e5813c8e514ae413f35e3aee9c61bd70503665d8c39297e3c68a58af4df75b2e28e61974871aef438
                                              SSDEEP:12288:c19+dlfwYKZWegJFLyYjKm/g21SQSfkL4nsiP:PdloYK7g3+IMz7sL4ns
                                              TLSH:7BB4DF13FB27C8DBDA7D13F1A8A2D73B1EE411195871D4DCE7E5AE877000A262B09369
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                              Icon Hash:eb9b9b2bbb9be371
                                              Entrypoint:0x4033d8
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:671f2a1f8aee14d336bab98fea93d734
                                              Instruction
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 00000224h
                                              push esi
                                              push edi
                                              xor edi, edi
                                              push 00008001h
                                              mov dword ptr [ebp-14h], edi
                                              mov dword ptr [ebp-0Ch], 0040A188h
                                              mov dword ptr [ebp-08h], edi
                                              mov byte ptr [ebp-04h], 00000020h
                                              call dword ptr [0040809Ch]
                                              mov esi, dword ptr [004080A0h]
                                              lea eax, dword ptr [ebp-000000C4h]
                                              push eax
                                              mov dword ptr [ebp-000000B0h], edi
                                              mov dword ptr [ebp-30h], edi
                                              mov dword ptr [ebp-2Ch], edi
                                              mov dword ptr [ebp-000000C4h], 0000009Ch
                                              call esi
                                              test eax, eax
                                              jne 00007F2044A99AE1h
                                              lea eax, dword ptr [ebp-000000C4h]
                                              mov dword ptr [ebp-000000C4h], 00000094h
                                              push eax
                                              call esi
                                              cmp dword ptr [ebp-000000B4h], 02h
                                              jne 00007F2044A99ACCh
                                              movsx cx, byte ptr [ebp-000000A3h]
                                              mov al, byte ptr [ebp-000000B0h]
                                              sub ecx, 30h
                                              sub al, 53h
                                              mov byte ptr [ebp-2Ah], 00000004h
                                              neg al
                                              sbb eax, eax
                                              not eax
                                              and eax, ecx
                                              mov word ptr [ebp-30h], ax
                                              cmp dword ptr [ebp-000000B4h], 02h
                                              jnc 00007F2044A99AC4h
                                              and byte ptr [ebp-2Ah], 00000000h
                                              cmp byte ptr [ebp-000000AFh], 00000041h
                                              jl 00007F2044A99AB3h
                                              movsx ax, byte ptr [ebp-000000AFh]
                                              sub eax, 40h
                                              mov word ptr [ebp-30h], ax
                                              jmp 00007F2044A99AA6h
                                              mov word ptr [ebp-30h], di
                                              cmp dword ptr [ebp-000000C0h], 0Ah
                                              jnc 00007F2044A99AAAh
                                              and word ptr [ebp+00000000h], 0000h
                                              Programming Language:
                                              • [EXP] VC++ 6.0 SP5 build 8804
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                              RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                              RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                              RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                              RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                              RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                              RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                              RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                              RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                              RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                              RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                              RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                              RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                              RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                              RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                              RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                              DLLImport
                                              ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                              SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                              ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                              COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                              USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                              GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                              KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 2, 2024 16:22:56.427249908 CEST4972280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:22:57.432728052 CEST4972280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:22:59.447864056 CEST4972280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:10.446830988 CEST4972480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:11.460903883 CEST4972480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:13.460474968 CEST4972480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:24.474966049 CEST4972880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:25.489201069 CEST4972880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:27.504282951 CEST4972880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:38.504216909 CEST4972980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:39.517257929 CEST4972980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:41.532385111 CEST4972980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:52.530982971 CEST4973080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:53.545548916 CEST4973080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:23:55.560522079 CEST4973080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:06.559555054 CEST4973180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:07.573545933 CEST4973180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:09.588706970 CEST4973180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:20.588408947 CEST4973280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:21.601722956 CEST4973280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:23.616955996 CEST4973280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:34.615700960 CEST4973380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:35.630089045 CEST4973380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:37.645059109 CEST4973380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:48.643732071 CEST4973480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:49.658027887 CEST4973480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:24:51.673274994 CEST4973480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:02.672975063 CEST4973580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:03.686289072 CEST4973580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:05.701419115 CEST4973580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:16.700009108 CEST4973680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:17.714476109 CEST4973680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:19.729628086 CEST4973680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:30.728292942 CEST4973780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:31.742584944 CEST4973780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:33.757747889 CEST4973780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:44.757378101 CEST4973880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:45.770705938 CEST4973880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:47.785892010 CEST4973880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:58.784818888 CEST4973980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:25:59.798892021 CEST4973980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:01.814110994 CEST4973980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:12.812608957 CEST4974080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:13.827153921 CEST4974080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:15.842231989 CEST4974080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:26.841922998 CEST4974180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:27.855153084 CEST4974180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:29.870362997 CEST4974180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:40.868905067 CEST4974280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:41.883305073 CEST4974280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:43.898577929 CEST4974280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:54.897120953 CEST4974380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:55.911443949 CEST4974380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:26:57.926692009 CEST4974380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:08.926337957 CEST4974480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:09.939657927 CEST4974480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:11.954763889 CEST4974480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:22.953599930 CEST4974580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:23.967758894 CEST4974580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:25.982918978 CEST4974580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:36.981570005 CEST4974680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:37.995862007 CEST4974680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:40.011050940 CEST4974680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:51.010660887 CEST4974780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:52.024003983 CEST4974780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:27:54.039263964 CEST4974780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:05.037811995 CEST4974880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:06.052246094 CEST4974880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:08.067375898 CEST4974880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:19.066386938 CEST4974980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:20.080358028 CEST4974980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:22.095520020 CEST4974980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:33.095285892 CEST4975080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:34.108653069 CEST4975080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:36.123650074 CEST4975080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:47.122245073 CEST4975180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:48.136683941 CEST4975180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:28:50.151807070 CEST4975180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:01.150717974 CEST4975280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:02.164917946 CEST4975280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:04.180150986 CEST4975280192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:15.180025101 CEST4975380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:16.192970991 CEST4975380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:18.208309889 CEST4975380192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:29.207133055 CEST4975480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:30.221276999 CEST4975480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:32.236391068 CEST4975480192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:43.238210917 CEST4975580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:44.249391079 CEST4975580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:46.264616013 CEST4975580192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:57.264380932 CEST4975680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:29:58.277590990 CEST4975680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:00.292695999 CEST4975680192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:11.291795015 CEST4975780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:12.305772066 CEST4975780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:14.320848942 CEST4975780192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:25.319585085 CEST4975880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:26.333915949 CEST4975880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:28.349225998 CEST4975880192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:39.349069118 CEST4975980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:40.362193108 CEST4975980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:42.377353907 CEST4975980192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:53.376071930 CEST4976080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:54.374788046 CEST4976080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:30:56.389919043 CEST4976080192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:31:07.404232979 CEST4976180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:31:08.418795109 CEST4976180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:31:10.433913946 CEST4976180192.168.11.20185.222.58.113
                                              Sep 2, 2024 16:31:14.448532104 CEST4976180192.168.11.20185.222.58.113

                                              Click to jump to process

                                              Click to jump to process

                                              Click to jump to process

                                              Target ID:1
                                              Start time:10:22:37
                                              Start date:02/09/2024
                                              Path:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\HJEbEB40vP.exe"
                                              Imagebase:0x400000
                                              File size:504'318 bytes
                                              MD5 hash:4F7955FCF2F05FF0E47C6D21BC951C95
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.7643505601.0000000007172000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:3
                                              Start time:10:22:48
                                              Start date:02/09/2024
                                              Path:C:\Users\user\Desktop\HJEbEB40vP.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\HJEbEB40vP.exe"
                                              Imagebase:0x400000
                                              File size:504'318 bytes
                                              MD5 hash:4F7955FCF2F05FF0E47C6D21BC951C95
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.11980091974.0000000004022000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:22.1%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:16.7%
                                                Total number of Nodes:1545
                                                Total number of Limit Nodes:41
                                                execution_graph 5017 6fd81058 5019 6fd81074 5017->5019 5018 6fd810dc 5019->5018 5021 6fd81091 5019->5021 5030 6fd8154b 5019->5030 5022 6fd8154b GlobalFree 5021->5022 5023 6fd810a1 5022->5023 5024 6fd810a8 GlobalSize 5023->5024 5025 6fd810b1 5023->5025 5024->5025 5026 6fd810b5 GlobalAlloc 5025->5026 5027 6fd810c6 5025->5027 5028 6fd81572 3 API calls 5026->5028 5029 6fd810d1 GlobalFree 5027->5029 5028->5027 5029->5018 5031 6fd81551 5030->5031 5032 6fd81557 5031->5032 5033 6fd81563 GlobalFree 5031->5033 5032->5021 5033->5021 3895 4015c2 3899 402c5e 3895->3899 3898 4015db 3900 402c6a 3899->3900 3905 406320 3900->3905 3903 4015c9 SetFileAttributesA 3903->3898 3920 40632d 3905->3920 3906 40656e 3907 402c8b 3906->3907 3944 40628d lstrcpynA 3906->3944 3907->3903 3922 406587 3907->3922 3909 406545 lstrlenA 3909->3920 3912 406320 15 API calls 3912->3909 3914 40644c GetSystemDirectoryA 3914->3920 3915 406462 GetWindowsDirectoryA 3915->3920 3916 406587 5 API calls 3916->3920 3917 406320 15 API calls 3917->3920 3918 4064ee lstrcatA 3918->3920 3920->3906 3920->3909 3920->3912 3920->3914 3920->3915 3920->3916 3920->3917 3920->3918 3921 4064c5 SHGetPathFromIDListA CoTaskMemFree 3920->3921 3931 406174 3920->3931 3936 4066b5 GetModuleHandleA 3920->3936 3942 4061eb wsprintfA 3920->3942 3943 40628d lstrcpynA 3920->3943 3921->3920 3929 406593 3922->3929 3923 4065fb 3924 4065ff CharPrevA 3923->3924 3927 40661a 3923->3927 3924->3923 3925 4065f0 CharNextA 3925->3923 3925->3929 3927->3903 3928 4065de CharNextA 3928->3929 3929->3923 3929->3925 3929->3928 3930 4065eb CharNextA 3929->3930 3952 405c4a 3929->3952 3930->3925 3945 406113 3931->3945 3934 4061a8 RegQueryValueExA RegCloseKey 3935 4061d7 3934->3935 3935->3920 3937 4066d1 3936->3937 3938 4066db GetProcAddress 3936->3938 3949 406647 GetSystemDirectoryA 3937->3949 3940 4066ea 3938->3940 3940->3920 3941 4066d7 3941->3938 3941->3940 3942->3920 3943->3920 3944->3907 3946 406122 3945->3946 3947 40612b RegOpenKeyExA 3946->3947 3948 406126 3946->3948 3947->3948 3948->3934 3948->3935 3950 406669 wsprintfA LoadLibraryExA 3949->3950 3950->3941 3953 405c50 3952->3953 3954 405c63 3953->3954 3955 405c56 CharNextA 3953->3955 3954->3929 3955->3953 3956 401a43 3957 402c5e 21 API calls 3956->3957 3958 401a4c ExpandEnvironmentStringsA 3957->3958 3959 401a60 3958->3959 3961 401a73 3958->3961 3960 401a65 lstrcmpA 3959->3960 3959->3961 3960->3961 3962 402543 3973 402c9e 3962->3973 3965 402c5e 21 API calls 3966 402556 3965->3966 3967 402560 RegQueryValueExA 3966->3967 3969 4027ed 3966->3969 3968 402586 RegCloseKey 3967->3968 3970 402580 3967->3970 3968->3969 3970->3968 3978 4061eb wsprintfA 3970->3978 3974 402c5e 21 API calls 3973->3974 3975 402cb5 3974->3975 3976 406113 RegOpenKeyExA 3975->3976 3977 40254d 3976->3977 3977->3965 3978->3968 5039 401744 5040 402c5e 21 API calls 5039->5040 5041 40174b SearchPathA 5040->5041 5042 401766 5041->5042 5043 401d44 5044 402c3c 21 API calls 5043->5044 5045 401d4b 5044->5045 5046 402c3c 21 API calls 5045->5046 5047 401d57 GetDlgItem 5046->5047 5048 40264d 5047->5048 5049 402ac5 SendMessageA 5050 402aea 5049->5050 5051 402adf InvalidateRect 5049->5051 5051->5050 5052 405345 5053 405355 5052->5053 5054 405369 5052->5054 5055 4053b2 5053->5055 5056 40535b 5053->5056 5057 405371 IsWindowVisible 5054->5057 5063 405388 5054->5063 5058 4053b7 CallWindowProcA 5055->5058 5059 404379 SendMessageA 5056->5059 5057->5055 5060 40537e 5057->5060 5061 405365 5058->5061 5059->5061 5065 404c80 SendMessageA 5060->5065 5063->5058 5070 404d00 5063->5070 5066 404ca3 GetMessagePos ScreenToClient SendMessageA 5065->5066 5067 404cdf SendMessageA 5065->5067 5068 404cdc 5066->5068 5069 404cd7 5066->5069 5067->5069 5068->5067 5069->5063 5079 40628d lstrcpynA 5070->5079 5072 404d13 5080 4061eb wsprintfA 5072->5080 5074 404d1d 5075 40140b 2 API calls 5074->5075 5076 404d26 5075->5076 5081 40628d lstrcpynA 5076->5081 5078 404d2d 5078->5055 5079->5072 5080->5074 5081->5078 3979 4023c9 3980 4023d1 3979->3980 3981 4023d7 3979->3981 3982 402c5e 21 API calls 3980->3982 3983 4023e7 3981->3983 3985 402c5e 21 API calls 3981->3985 3982->3981 3984 4023f5 3983->3984 3986 402c5e 21 API calls 3983->3986 3987 402c5e 21 API calls 3984->3987 3985->3983 3986->3984 3988 4023fe WritePrivateProfileStringA 3987->3988 3989 4020ca 3990 40218a 3989->3990 3991 4020dc 3989->3991 3993 401423 28 API calls 3990->3993 3992 402c5e 21 API calls 3991->3992 3994 4020e3 3992->3994 3999 40230f 3993->3999 3995 402c5e 21 API calls 3994->3995 3996 4020ec 3995->3996 3997 402101 LoadLibraryExA 3996->3997 3998 4020f4 GetModuleHandleA 3996->3998 3997->3990 4000 402111 GetProcAddress 3997->4000 3998->3997 3998->4000 4001 402120 4000->4001 4002 40215d 4000->4002 4003 402128 4001->4003 4004 40213f 4001->4004 4055 4053d1 4002->4055 4052 401423 4003->4052 4010 6fd8176b 4004->4010 4007 402130 4007->3999 4008 40217e FreeLibrary 4007->4008 4008->3999 4011 6fd8179b 4010->4011 4066 6fd81b28 4011->4066 4013 6fd817a2 4014 6fd818c4 4013->4014 4015 6fd817ba 4013->4015 4016 6fd817b3 4013->4016 4014->4007 4100 6fd82381 4015->4100 4116 6fd8233f 4016->4116 4021 6fd8181e 4027 6fd8186c 4021->4027 4028 6fd81824 4021->4028 4022 6fd81800 4129 6fd82568 4022->4129 4023 6fd817e9 4037 6fd817df 4023->4037 4126 6fd82d53 4023->4126 4024 6fd817d0 4026 6fd817d6 4024->4026 4030 6fd817e1 4024->4030 4026->4037 4110 6fd82ac8 4026->4110 4034 6fd82568 11 API calls 4027->4034 4148 6fd815fb 4028->4148 4029 6fd81806 4140 6fd815e9 4029->4140 4120 6fd82742 4030->4120 4035 6fd8185d 4034->4035 4043 6fd818b3 4035->4043 4154 6fd8252e 4035->4154 4037->4021 4037->4022 4041 6fd817e7 4041->4037 4042 6fd82568 11 API calls 4042->4035 4043->4014 4047 6fd818bd GlobalFree 4043->4047 4047->4014 4049 6fd8189f 4049->4043 4158 6fd81572 wsprintfA 4049->4158 4050 6fd81898 FreeLibrary 4050->4049 4053 4053d1 28 API calls 4052->4053 4054 401431 4053->4054 4054->4007 4056 40548f 4055->4056 4057 4053ec 4055->4057 4056->4007 4058 405409 lstrlenA 4057->4058 4059 406320 21 API calls 4057->4059 4060 405432 4058->4060 4061 405417 lstrlenA 4058->4061 4059->4058 4063 405445 4060->4063 4064 405438 SetWindowTextA 4060->4064 4061->4056 4062 405429 lstrcatA 4061->4062 4062->4060 4063->4056 4065 40544b SendMessageA SendMessageA SendMessageA 4063->4065 4064->4063 4065->4056 4161 6fd812a5 GlobalAlloc 4066->4161 4068 6fd81b4f 4162 6fd812a5 GlobalAlloc 4068->4162 4070 6fd81d90 GlobalFree GlobalFree GlobalFree 4071 6fd81dad 4070->4071 4084 6fd81df7 4070->4084 4073 6fd82181 4071->4073 4081 6fd81dc2 4071->4081 4071->4084 4072 6fd81c4d GlobalAlloc 4094 6fd81b5a 4072->4094 4074 6fd821a3 GetModuleHandleA 4073->4074 4073->4084 4077 6fd821c9 4074->4077 4078 6fd821b4 LoadLibraryA 4074->4078 4075 6fd81c98 lstrcpyA 4080 6fd81ca2 lstrcpyA 4075->4080 4076 6fd81cb6 GlobalFree 4076->4094 4169 6fd81652 GetProcAddress 4077->4169 4078->4077 4078->4084 4080->4094 4081->4084 4165 6fd812b4 4081->4165 4082 6fd8221a 4082->4084 4086 6fd82227 lstrlenA 4082->4086 4083 6fd82047 4168 6fd812a5 GlobalAlloc 4083->4168 4084->4013 4170 6fd81652 GetProcAddress 4086->4170 4088 6fd81f89 GlobalFree 4088->4094 4089 6fd820c3 4089->4084 4097 6fd8211c lstrcpyA 4089->4097 4090 6fd821db 4090->4082 4098 6fd82204 GetProcAddress 4090->4098 4092 6fd81cf4 4092->4094 4163 6fd815c4 GlobalSize GlobalAlloc 4092->4163 4093 6fd82240 4093->4084 4094->4070 4094->4072 4094->4075 4094->4076 4094->4080 4094->4083 4094->4084 4094->4088 4094->4089 4094->4092 4095 6fd812b4 2 API calls 4094->4095 4095->4094 4097->4084 4098->4082 4099 6fd8204f 4099->4013 4101 6fd8239a 4100->4101 4103 6fd824d6 GlobalFree 4101->4103 4105 6fd82448 GlobalAlloc MultiByteToWideChar 4101->4105 4106 6fd812b4 GlobalAlloc lstrcpynA 4101->4106 4108 6fd82495 4101->4108 4172 6fd8133d 4101->4172 4103->4101 4104 6fd817c0 4103->4104 4104->4023 4104->4024 4104->4037 4107 6fd82474 GlobalAlloc CLSIDFromString GlobalFree 4105->4107 4105->4108 4106->4101 4107->4103 4108->4103 4176 6fd826d6 4108->4176 4112 6fd82ada 4110->4112 4111 6fd82b7f EnumWindows 4115 6fd82b9d 4111->4115 4112->4111 4114 6fd82c69 4114->4037 4179 6fd82a74 4115->4179 4117 6fd82354 4116->4117 4118 6fd8235f GlobalAlloc 4117->4118 4119 6fd817b9 4117->4119 4118->4117 4119->4015 4125 6fd82772 4120->4125 4121 6fd8280d GlobalAlloc 4124 6fd82830 4121->4124 4122 6fd82820 4123 6fd82826 GlobalSize 4122->4123 4122->4124 4123->4124 4124->4041 4125->4121 4125->4122 4127 6fd82d5e 4126->4127 4128 6fd82d9e GlobalFree 4127->4128 4183 6fd812a5 GlobalAlloc 4129->4183 4131 6fd82628 WideCharToMultiByte 4136 6fd82574 4131->4136 4132 6fd825f3 lstrcpynA 4132->4136 4133 6fd82604 StringFromGUID2 WideCharToMultiByte 4133->4136 4134 6fd82649 wsprintfA 4134->4136 4135 6fd8266d GlobalFree 4135->4136 4136->4131 4136->4132 4136->4133 4136->4134 4136->4135 4137 6fd826a7 GlobalFree 4136->4137 4138 6fd812f6 2 API calls 4136->4138 4184 6fd81361 4136->4184 4137->4029 4138->4136 4188 6fd812a5 GlobalAlloc 4140->4188 4142 6fd815ee 4143 6fd815fb 2 API calls 4142->4143 4144 6fd815f8 4143->4144 4145 6fd812f6 4144->4145 4146 6fd81338 GlobalFree 4145->4146 4147 6fd812ff GlobalAlloc lstrcpynA 4145->4147 4146->4035 4147->4146 4149 6fd81634 lstrcpyA 4148->4149 4150 6fd81607 wsprintfA 4148->4150 4153 6fd8164d 4149->4153 4150->4153 4153->4042 4155 6fd8253c 4154->4155 4156 6fd8187f 4154->4156 4155->4156 4157 6fd82555 GlobalFree 4155->4157 4156->4049 4156->4050 4157->4155 4159 6fd812f6 2 API calls 4158->4159 4160 6fd81593 4159->4160 4160->4043 4161->4068 4162->4094 4164 6fd815e2 4163->4164 4164->4092 4171 6fd812a5 GlobalAlloc 4165->4171 4167 6fd812c3 lstrcpynA 4167->4084 4168->4099 4169->4090 4170->4093 4171->4167 4173 6fd81344 4172->4173 4174 6fd812b4 2 API calls 4173->4174 4175 6fd8135f 4174->4175 4175->4101 4177 6fd8273a 4176->4177 4178 6fd826e4 VirtualAlloc 4176->4178 4177->4108 4178->4177 4180 6fd82a7f 4179->4180 4181 6fd82a8f 4180->4181 4182 6fd82a84 GetLastError 4180->4182 4181->4114 4182->4181 4183->4136 4185 6fd81389 4184->4185 4186 6fd8136a 4184->4186 4185->4136 4186->4185 4187 6fd81370 lstrcpyA 4186->4187 4187->4185 4188->4142 5082 402e4a 5083 402e59 SetTimer 5082->5083 5085 402e72 5082->5085 5083->5085 5084 402ec7 5085->5084 5086 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5085->5086 5086->5084 4196 40244e 4197 402480 4196->4197 4198 402455 4196->4198 4200 402c5e 21 API calls 4197->4200 4199 402c9e 21 API calls 4198->4199 4201 40245c 4199->4201 4202 402487 4200->4202 4203 402466 4201->4203 4206 402494 4201->4206 4208 402d1c 4202->4208 4205 402c5e 21 API calls 4203->4205 4207 40246d RegDeleteValueA RegCloseKey 4205->4207 4207->4206 4209 402d28 4208->4209 4210 402d2f 4208->4210 4209->4206 4210->4209 4212 402d60 4210->4212 4213 406113 RegOpenKeyExA 4212->4213 4214 402d8e 4213->4214 4215 402e43 4214->4215 4216 402d98 4214->4216 4215->4209 4217 402d9e RegEnumValueA 4216->4217 4222 402dc1 4216->4222 4218 402e28 RegCloseKey 4217->4218 4217->4222 4218->4215 4219 402dfd RegEnumKeyA 4220 402e06 RegCloseKey 4219->4220 4219->4222 4221 4066b5 5 API calls 4220->4221 4223 402e16 4221->4223 4222->4218 4222->4219 4222->4220 4224 402d60 6 API calls 4222->4224 4225 402e38 4223->4225 4226 402e1a RegDeleteKeyA 4223->4226 4224->4222 4225->4215 4226->4215 5090 4027cf 5091 402c5e 21 API calls 5090->5091 5092 4027d6 FindFirstFileA 5091->5092 5093 4027f9 5092->5093 5094 4027e9 5092->5094 5098 4061eb wsprintfA 5093->5098 5096 402800 5099 40628d lstrcpynA 5096->5099 5098->5096 5099->5094 5100 6fd816c8 5101 6fd816f7 5100->5101 5102 6fd81b28 18 API calls 5101->5102 5103 6fd816fe 5102->5103 5104 6fd81711 5103->5104 5105 6fd81705 5103->5105 5107 6fd81738 5104->5107 5108 6fd8171b 5104->5108 5106 6fd812f6 2 API calls 5105->5106 5109 6fd8170f 5106->5109 5111 6fd8173e 5107->5111 5112 6fd81762 5107->5112 5110 6fd81572 3 API calls 5108->5110 5114 6fd81720 5110->5114 5115 6fd815e9 3 API calls 5111->5115 5113 6fd81572 3 API calls 5112->5113 5113->5109 5117 6fd815e9 3 API calls 5114->5117 5116 6fd81743 5115->5116 5118 6fd812f6 2 API calls 5116->5118 5119 6fd81726 5117->5119 5120 6fd81749 GlobalFree 5118->5120 5121 6fd812f6 2 API calls 5119->5121 5120->5109 5122 6fd8175d GlobalFree 5120->5122 5123 6fd8172c GlobalFree 5121->5123 5122->5109 5123->5109 5124 401c53 5125 402c3c 21 API calls 5124->5125 5126 401c5a 5125->5126 5127 402c3c 21 API calls 5126->5127 5128 401c67 5127->5128 5129 401c7c 5128->5129 5131 402c5e 21 API calls 5128->5131 5130 401c8c 5129->5130 5132 402c5e 21 API calls 5129->5132 5133 401ce3 5130->5133 5134 401c97 5130->5134 5131->5129 5132->5130 5136 402c5e 21 API calls 5133->5136 5135 402c3c 21 API calls 5134->5135 5137 401c9c 5135->5137 5138 401ce8 5136->5138 5139 402c3c 21 API calls 5137->5139 5140 402c5e 21 API calls 5138->5140 5141 401ca8 5139->5141 5142 401cf1 FindWindowExA 5140->5142 5143 401cd3 SendMessageA 5141->5143 5144 401cb5 SendMessageTimeoutA 5141->5144 5145 401d0f 5142->5145 5143->5145 5144->5145 5146 402653 5147 402658 5146->5147 5148 40266c 5146->5148 5149 402c3c 21 API calls 5147->5149 5150 402c5e 21 API calls 5148->5150 5152 402661 5149->5152 5151 402673 lstrlenA 5150->5151 5151->5152 5153 402695 5152->5153 5154 405ec7 WriteFile 5152->5154 5154->5153 5155 403a54 5156 403a5f 5155->5156 5157 403a66 GlobalAlloc 5156->5157 5158 403a63 5156->5158 5157->5158 4369 4014d6 4374 402c3c 4369->4374 4371 4014dc Sleep 4373 402aea 4371->4373 4375 406320 21 API calls 4374->4375 4376 402c51 4375->4376 4376->4371 4377 401957 4378 401959 4377->4378 4379 402c5e 21 API calls 4378->4379 4380 40195e 4379->4380 4383 405a4f 4380->4383 4423 405d0d 4383->4423 4386 405a77 DeleteFileA 4391 401967 4386->4391 4387 405a8e 4389 405bc6 4387->4389 4437 40628d lstrcpynA 4387->4437 4389->4391 4396 406620 2 API calls 4389->4396 4390 405ab4 4392 405ac7 4390->4392 4393 405aba lstrcatA 4390->4393 4438 405c66 lstrlenA 4392->4438 4394 405acd 4393->4394 4397 405adb lstrcatA 4394->4397 4399 405ae6 lstrlenA FindFirstFileA 4394->4399 4398 405be0 4396->4398 4397->4399 4398->4391 4400 405be4 4398->4400 4401 405bbc 4399->4401 4421 405b0a 4399->4421 4451 405c1f lstrlenA CharPrevA 4400->4451 4401->4389 4403 405c4a CharNextA 4403->4421 4405 405a07 5 API calls 4406 405bf6 4405->4406 4407 405c10 4406->4407 4408 405bfa 4406->4408 4410 4053d1 28 API calls 4407->4410 4408->4391 4412 4053d1 28 API calls 4408->4412 4410->4391 4411 405b9b FindNextFileA 4413 405bb3 FindClose 4411->4413 4411->4421 4414 405c07 4412->4414 4413->4401 4415 406066 40 API calls 4414->4415 4418 405c0e 4415->4418 4417 405a4f 64 API calls 4417->4421 4418->4391 4419 4053d1 28 API calls 4419->4411 4420 4053d1 28 API calls 4420->4421 4421->4403 4421->4411 4421->4417 4421->4419 4421->4420 4422 406066 40 API calls 4421->4422 4442 40628d lstrcpynA 4421->4442 4443 405a07 4421->4443 4422->4421 4454 40628d lstrcpynA 4423->4454 4425 405d1e 4455 405cb8 CharNextA CharNextA 4425->4455 4428 405a6f 4428->4386 4428->4387 4429 406587 5 API calls 4432 405d34 4429->4432 4430 405d5f lstrlenA 4431 405d6a 4430->4431 4430->4432 4434 405c1f 3 API calls 4431->4434 4432->4428 4432->4430 4433 406620 2 API calls 4432->4433 4436 405c66 2 API calls 4432->4436 4433->4432 4435 405d6f GetFileAttributesA 4434->4435 4435->4428 4436->4430 4437->4390 4439 405c73 4438->4439 4440 405c84 4439->4440 4441 405c78 CharPrevA 4439->4441 4440->4394 4441->4439 4441->4440 4442->4421 4461 405dfb GetFileAttributesA 4443->4461 4446 405a34 4446->4421 4447 405a22 RemoveDirectoryA 4449 405a30 4447->4449 4448 405a2a DeleteFileA 4448->4449 4449->4446 4450 405a40 SetFileAttributesA 4449->4450 4450->4446 4452 405bea 4451->4452 4453 405c39 lstrcatA 4451->4453 4452->4405 4453->4452 4454->4425 4456 405ce3 4455->4456 4457 405cd3 4455->4457 4459 405c4a CharNextA 4456->4459 4460 405d03 4456->4460 4457->4456 4458 405cde CharNextA 4457->4458 4458->4460 4459->4456 4460->4428 4460->4429 4462 405a13 4461->4462 4463 405e0d SetFileAttributesA 4461->4463 4462->4446 4462->4447 4462->4448 4463->4462 4464 4033d8 SetErrorMode GetVersionExA 4465 40342a GetVersionExA 4464->4465 4467 403469 4464->4467 4466 403446 4465->4466 4465->4467 4466->4467 4468 4034ed 4467->4468 4469 4066b5 5 API calls 4467->4469 4470 406647 3 API calls 4468->4470 4469->4468 4471 403503 lstrlenA 4470->4471 4471->4468 4472 403513 4471->4472 4473 4066b5 5 API calls 4472->4473 4474 40351a 4473->4474 4475 4066b5 5 API calls 4474->4475 4476 403521 4475->4476 4477 4066b5 5 API calls 4476->4477 4478 40352d #17 OleInitialize SHGetFileInfoA 4477->4478 4553 40628d lstrcpynA 4478->4553 4481 40357b GetCommandLineA 4554 40628d lstrcpynA 4481->4554 4483 40358d 4484 405c4a CharNextA 4483->4484 4485 4035b4 CharNextA 4484->4485 4490 4035c3 4485->4490 4486 403689 4487 40369d GetTempPathA 4486->4487 4555 4033a7 4487->4555 4489 4036b5 4491 4036b9 GetWindowsDirectoryA lstrcatA 4489->4491 4492 40370f DeleteFileA 4489->4492 4490->4486 4493 405c4a CharNextA 4490->4493 4497 40368b 4490->4497 4494 4033a7 12 API calls 4491->4494 4565 402f31 GetTickCount GetModuleFileNameA 4492->4565 4493->4490 4496 4036d5 4494->4496 4496->4492 4500 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4496->4500 4649 40628d lstrcpynA 4497->4649 4498 403722 4503 405c4a CharNextA 4498->4503 4536 4037a7 4498->4536 4545 4037b7 4498->4545 4502 4033a7 12 API calls 4500->4502 4505 403707 4502->4505 4519 40373c 4503->4519 4505->4492 4505->4545 4507 4037d1 4659 4059a3 4507->4659 4508 403928 4509 403930 GetCurrentProcess OpenProcessToken 4508->4509 4516 4039a6 ExitProcess 4508->4516 4511 403976 4509->4511 4512 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4509->4512 4518 4066b5 5 API calls 4511->4518 4512->4511 4513 403781 4520 405d0d 18 API calls 4513->4520 4514 4037e6 4663 40590e 4514->4663 4522 40397d 4518->4522 4519->4513 4519->4514 4523 40378d 4520->4523 4525 403992 ExitWindowsEx 4522->4525 4527 40399f 4522->4527 4523->4545 4650 40628d lstrcpynA 4523->4650 4525->4516 4525->4527 4677 40140b 4527->4677 4529 403803 4532 40381b 4529->4532 4667 40628d lstrcpynA 4529->4667 4531 40379c 4651 40628d lstrcpynA 4531->4651 4535 403839 wsprintfA 4532->4535 4550 403867 4532->4550 4537 406320 21 API calls 4535->4537 4593 403a96 4536->4593 4537->4532 4540 403877 GetFileAttributesA 4543 403883 DeleteFileA 4540->4543 4540->4550 4541 4038af SetCurrentDirectoryA 4542 406066 40 API calls 4541->4542 4544 4038be CopyFileA 4542->4544 4543->4550 4544->4545 4544->4550 4652 4039bc 4545->4652 4546 405a4f 71 API calls 4546->4550 4547 406066 40 API calls 4547->4550 4548 406320 21 API calls 4548->4550 4550->4532 4550->4535 4550->4540 4550->4541 4550->4545 4550->4546 4550->4547 4550->4548 4551 403918 CloseHandle 4550->4551 4552 406620 2 API calls 4550->4552 4668 405897 CreateDirectoryA 4550->4668 4671 4058f1 CreateDirectoryA 4550->4671 4674 405926 CreateProcessA 4550->4674 4551->4545 4552->4550 4553->4481 4554->4483 4556 406587 5 API calls 4555->4556 4558 4033b3 4556->4558 4557 4033bd 4557->4489 4558->4557 4559 405c1f 3 API calls 4558->4559 4560 4033c5 4559->4560 4561 4058f1 2 API calls 4560->4561 4562 4033cb 4561->4562 4680 405e4f 4562->4680 4684 405e20 GetFileAttributesA CreateFileA 4565->4684 4567 402f71 4585 402f81 4567->4585 4685 40628d lstrcpynA 4567->4685 4569 402f97 4570 405c66 2 API calls 4569->4570 4571 402f9d 4570->4571 4686 40628d lstrcpynA 4571->4686 4573 402fa8 GetFileSize 4574 4030a2 4573->4574 4592 402fbf 4573->4592 4687 402ecd 4574->4687 4576 4030ab 4578 4030db GlobalAlloc 4576->4578 4576->4585 4722 403390 SetFilePointer 4576->4722 4698 403390 SetFilePointer 4578->4698 4580 40310e 4582 402ecd 6 API calls 4580->4582 4582->4585 4583 4030c4 4586 40337a ReadFile 4583->4586 4584 4030f6 4699 403168 4584->4699 4585->4498 4588 4030cf 4586->4588 4588->4578 4588->4585 4589 402ecd 6 API calls 4589->4592 4590 403102 4590->4585 4590->4590 4591 40313f SetFilePointer 4590->4591 4591->4585 4592->4574 4592->4580 4592->4585 4592->4589 4719 40337a 4592->4719 4594 4066b5 5 API calls 4593->4594 4595 403aaa 4594->4595 4596 403ab0 4595->4596 4597 403ac2 4595->4597 4736 4061eb wsprintfA 4596->4736 4598 406174 3 API calls 4597->4598 4599 403aed 4598->4599 4601 403b0b lstrcatA 4599->4601 4603 406174 3 API calls 4599->4603 4602 403ac0 4601->4602 4728 403d5b 4602->4728 4603->4601 4606 405d0d 18 API calls 4608 403b3d 4606->4608 4607 403bc6 4609 405d0d 18 API calls 4607->4609 4608->4607 4610 406174 3 API calls 4608->4610 4611 403bcc 4609->4611 4612 403b69 4610->4612 4613 403bdc LoadImageA 4611->4613 4614 406320 21 API calls 4611->4614 4612->4607 4617 403b85 lstrlenA 4612->4617 4620 405c4a CharNextA 4612->4620 4615 403c82 4613->4615 4616 403c03 RegisterClassA 4613->4616 4614->4613 4619 40140b 2 API calls 4615->4619 4618 403c39 SystemParametersInfoA CreateWindowExA 4616->4618 4648 403c8c 4616->4648 4621 403b93 lstrcmpiA 4617->4621 4622 403bb9 4617->4622 4618->4615 4623 403c88 4619->4623 4625 403b83 4620->4625 4621->4622 4626 403ba3 GetFileAttributesA 4621->4626 4624 405c1f 3 API calls 4622->4624 4627 403d5b 22 API calls 4623->4627 4623->4648 4628 403bbf 4624->4628 4625->4617 4629 403baf 4626->4629 4630 403c99 4627->4630 4737 40628d lstrcpynA 4628->4737 4629->4622 4632 405c66 2 API calls 4629->4632 4633 403ca5 ShowWindow 4630->4633 4634 403d28 4630->4634 4632->4622 4635 406647 3 API calls 4633->4635 4636 4054a3 5 API calls 4634->4636 4638 403cbd 4635->4638 4637 403d2e 4636->4637 4639 403d32 4637->4639 4640 403d4a 4637->4640 4641 403ccb GetClassInfoA 4638->4641 4643 406647 3 API calls 4638->4643 4646 40140b 2 API calls 4639->4646 4639->4648 4642 40140b 2 API calls 4640->4642 4644 403cf5 DialogBoxParamA 4641->4644 4645 403cdf GetClassInfoA RegisterClassA 4641->4645 4642->4648 4643->4641 4647 40140b 2 API calls 4644->4647 4645->4644 4646->4648 4647->4648 4648->4545 4649->4487 4650->4531 4651->4536 4653 4039d4 4652->4653 4654 4039c6 CloseHandle 4652->4654 4742 403a01 4653->4742 4654->4653 4657 405a4f 71 API calls 4658 4037bf OleUninitialize 4657->4658 4658->4507 4658->4508 4660 4059b8 4659->4660 4661 4037de ExitProcess 4660->4661 4662 4059cc MessageBoxIndirectA 4660->4662 4662->4661 4664 4066b5 5 API calls 4663->4664 4665 4037eb lstrlenA 4664->4665 4666 40628d lstrcpynA 4665->4666 4666->4529 4667->4532 4669 4058e3 4668->4669 4670 4058e7 GetLastError 4668->4670 4669->4550 4670->4669 4672 405901 4671->4672 4673 405905 GetLastError 4671->4673 4672->4550 4673->4672 4675 405965 4674->4675 4676 405959 CloseHandle 4674->4676 4675->4550 4676->4675 4678 401389 2 API calls 4677->4678 4679 401420 4678->4679 4679->4516 4681 405e5a GetTickCount GetTempFileNameA 4680->4681 4682 405e87 4681->4682 4683 4033d6 4681->4683 4682->4681 4682->4683 4683->4489 4684->4567 4685->4569 4686->4573 4688 402ed6 4687->4688 4689 402eee 4687->4689 4690 402ee6 4688->4690 4691 402edf DestroyWindow 4688->4691 4692 402ef6 4689->4692 4693 402efe GetTickCount 4689->4693 4690->4576 4691->4690 4723 4066f1 4692->4723 4695 402f0c CreateDialogParamA ShowWindow 4693->4695 4696 402f2f 4693->4696 4695->4696 4696->4576 4698->4584 4700 40317e 4699->4700 4701 4031ac 4700->4701 4727 403390 SetFilePointer 4700->4727 4703 40337a ReadFile 4701->4703 4704 4031b7 4703->4704 4705 403313 4704->4705 4706 4031c9 GetTickCount 4704->4706 4708 4032fd 4704->4708 4707 403355 4705->4707 4712 403317 4705->4712 4706->4708 4715 403218 4706->4715 4709 40337a ReadFile 4707->4709 4708->4590 4709->4708 4710 40337a ReadFile 4710->4715 4711 40337a ReadFile 4711->4712 4712->4708 4712->4711 4713 405ec7 WriteFile 4712->4713 4713->4712 4714 40326e GetTickCount 4714->4715 4715->4708 4715->4710 4715->4714 4716 403293 MulDiv wsprintfA 4715->4716 4718 405ec7 WriteFile 4715->4718 4717 4053d1 28 API calls 4716->4717 4717->4715 4718->4715 4720 405e98 ReadFile 4719->4720 4721 40338d 4720->4721 4721->4592 4722->4583 4724 40670e PeekMessageA 4723->4724 4725 406704 DispatchMessageA 4724->4725 4726 402efc 4724->4726 4725->4724 4726->4576 4727->4701 4729 403d6f 4728->4729 4738 4061eb wsprintfA 4729->4738 4731 403de0 4739 403e14 4731->4739 4733 403b1b 4733->4606 4734 403de5 4734->4733 4735 406320 21 API calls 4734->4735 4735->4734 4736->4602 4737->4607 4738->4731 4740 406320 21 API calls 4739->4740 4741 403e22 SetWindowTextA 4740->4741 4741->4734 4743 403a0f 4742->4743 4744 4039d9 4743->4744 4745 403a14 FreeLibrary GlobalFree 4743->4745 4744->4657 4745->4744 4745->4745 4746 402758 4747 40275f 4746->4747 4749 402a6c 4746->4749 4748 402c3c 21 API calls 4747->4748 4750 402766 4748->4750 4751 402775 SetFilePointer 4750->4751 4751->4749 4752 402785 4751->4752 4754 4061eb wsprintfA 4752->4754 4754->4749 5159 401e5a GetDC 5160 402c3c 21 API calls 5159->5160 5161 401e6c GetDeviceCaps MulDiv ReleaseDC 5160->5161 5162 402c3c 21 API calls 5161->5162 5163 401e9d 5162->5163 5164 406320 21 API calls 5163->5164 5165 401eda CreateFontIndirectA 5164->5165 5166 40264d 5165->5166 5167 6fd818c7 5168 6fd818ea 5167->5168 5169 6fd8191a GlobalFree 5168->5169 5170 6fd8192c 5168->5170 5169->5170 5171 6fd812f6 2 API calls 5170->5171 5172 6fd81aae GlobalFree GlobalFree 5171->5172 4780 4015e0 4781 402c5e 21 API calls 4780->4781 4782 4015e7 4781->4782 4783 405cb8 4 API calls 4782->4783 4788 4015ef 4783->4788 4784 401649 4786 401677 4784->4786 4787 40164e 4784->4787 4785 405c4a CharNextA 4785->4788 4791 401423 28 API calls 4786->4791 4789 401423 28 API calls 4787->4789 4788->4784 4788->4785 4793 4058f1 2 API calls 4788->4793 4794 40590e 5 API calls 4788->4794 4797 401631 GetFileAttributesA 4788->4797 4798 405897 2 API calls 4788->4798 4790 401655 4789->4790 4799 40628d lstrcpynA 4790->4799 4796 40166f 4791->4796 4793->4788 4794->4788 4795 401660 SetCurrentDirectoryA 4795->4796 4797->4788 4798->4788 4799->4795 5173 4016e0 5174 402c5e 21 API calls 5173->5174 5175 4016e6 GetFullPathNameA 5174->5175 5176 4016fd 5175->5176 5182 40171e 5175->5182 5179 406620 2 API calls 5176->5179 5176->5182 5177 401732 GetShortPathNameA 5178 402aea 5177->5178 5180 40170e 5179->5180 5180->5182 5183 40628d lstrcpynA 5180->5183 5182->5177 5182->5178 5183->5182 5184 404463 lstrcpynA lstrlenA 4846 405969 ShellExecuteExA 4850 401eea 4851 402c3c 21 API calls 4850->4851 4852 401ef0 4851->4852 4853 402c3c 21 API calls 4852->4853 4854 401efc 4853->4854 4855 401f13 EnableWindow 4854->4855 4856 401f08 ShowWindow 4854->4856 4857 402aea 4855->4857 4856->4857 4858 40176b 4859 402c5e 21 API calls 4858->4859 4860 401772 4859->4860 4861 405e4f 2 API calls 4860->4861 4862 401779 4861->4862 4863 405e4f 2 API calls 4862->4863 4863->4862 5185 6fd82c73 5186 6fd82c8b 5185->5186 5187 6fd815c4 2 API calls 5186->5187 5188 6fd82ca6 5187->5188 5189 40196c 5190 402c5e 21 API calls 5189->5190 5191 401973 lstrlenA 5190->5191 5192 40264d 5191->5192 5193 401ff0 5194 402c5e 21 API calls 5193->5194 5195 401ff7 5194->5195 5196 406620 2 API calls 5195->5196 5197 401ffd 5196->5197 5199 40200f 5197->5199 5200 4061eb wsprintfA 5197->5200 5200->5199 5201 6fd822ea 5202 6fd82354 5201->5202 5203 6fd8235f GlobalAlloc 5202->5203 5204 6fd8237e 5202->5204 5203->5202 5205 4014f4 SetForegroundWindow 5206 402aea 5205->5206 5207 6fd810e0 5208 6fd81110 5207->5208 5209 6fd8129a GlobalFree 5208->5209 5210 6fd811cd GlobalAlloc 5208->5210 5211 6fd81295 5208->5211 5212 6fd81286 GlobalFree 5208->5212 5213 6fd8133d 2 API calls 5208->5213 5214 6fd812f6 2 API calls 5208->5214 5215 6fd81165 GlobalAlloc 5208->5215 5216 6fd81361 lstrcpyA 5208->5216 5210->5208 5211->5209 5212->5208 5213->5208 5214->5208 5215->5208 5216->5208 5217 404778 5218 404788 5217->5218 5219 4047ae 5217->5219 5220 40432d 22 API calls 5218->5220 5221 404394 8 API calls 5219->5221 5222 404795 SetDlgItemTextA 5220->5222 5223 4047ba 5221->5223 5222->5219 5224 6fd81661 5225 6fd8154b GlobalFree 5224->5225 5227 6fd81679 5225->5227 5226 6fd816bf GlobalFree 5227->5226 5228 6fd81694 5227->5228 5229 6fd816ab VirtualFree 5227->5229 5228->5226 5229->5226 4975 40177e 4976 402c5e 21 API calls 4975->4976 4977 401785 4976->4977 4978 4017a3 4977->4978 4979 4017ab 4977->4979 5015 40628d lstrcpynA 4978->5015 5016 40628d lstrcpynA 4979->5016 4982 4017a9 4986 406587 5 API calls 4982->4986 4983 4017b6 4984 405c1f 3 API calls 4983->4984 4985 4017bc lstrcatA 4984->4985 4985->4982 5007 4017c8 4986->5007 4987 406620 2 API calls 4987->5007 4988 401809 4989 405dfb 2 API calls 4988->4989 4989->5007 4991 4017df CompareFileTime 4991->5007 4992 4018a3 4993 4053d1 28 API calls 4992->4993 4995 4018ad 4993->4995 4994 40187a 4996 4053d1 28 API calls 4994->4996 5003 40188f 4994->5003 4997 403168 35 API calls 4995->4997 4996->5003 4999 4018c0 4997->4999 4998 40628d lstrcpynA 4998->5007 5000 4018d4 SetFileTime 4999->5000 5002 4018e6 CloseHandle 4999->5002 5000->5002 5001 406320 21 API calls 5001->5007 5002->5003 5004 4018f7 5002->5004 5005 4018fc 5004->5005 5006 40190f 5004->5006 5008 406320 21 API calls 5005->5008 5009 406320 21 API calls 5006->5009 5007->4987 5007->4988 5007->4991 5007->4992 5007->4994 5007->4998 5007->5001 5010 4059a3 MessageBoxIndirectA 5007->5010 5014 405e20 GetFileAttributesA CreateFileA 5007->5014 5011 401904 lstrcatA 5008->5011 5012 401917 5009->5012 5010->5007 5011->5012 5012->5003 5013 4059a3 MessageBoxIndirectA 5012->5013 5013->5003 5014->5007 5015->4982 5016->4983 5230 40167e 5231 402c5e 21 API calls 5230->5231 5232 401684 5231->5232 5233 406620 2 API calls 5232->5233 5234 40168a 5233->5234 5235 40197e 5236 402c3c 21 API calls 5235->5236 5237 401985 5236->5237 5238 402c3c 21 API calls 5237->5238 5239 401992 5238->5239 5240 402c5e 21 API calls 5239->5240 5241 4019a9 lstrlenA 5240->5241 5243 4019b9 5241->5243 5242 4019f9 5243->5242 5247 40628d lstrcpynA 5243->5247 5245 4019e9 5245->5242 5246 4019ee lstrlenA 5245->5246 5246->5242 5247->5245 5248 401000 5249 401037 BeginPaint GetClientRect 5248->5249 5251 40100c DefWindowProcA 5248->5251 5252 4010f3 5249->5252 5253 401179 5251->5253 5254 401073 CreateBrushIndirect FillRect DeleteObject 5252->5254 5255 4010fc 5252->5255 5254->5252 5256 401102 CreateFontIndirectA 5255->5256 5257 401167 EndPaint 5255->5257 5256->5257 5258 401112 6 API calls 5256->5258 5257->5253 5258->5257 5259 401502 5260 401507 5259->5260 5261 40152d 5259->5261 5262 402c3c 21 API calls 5260->5262 5262->5261 5263 401a83 5264 402c3c 21 API calls 5263->5264 5265 401a8c 5264->5265 5266 402c3c 21 API calls 5265->5266 5267 401a33 5266->5267 5268 401588 5269 402a67 5268->5269 5272 4061eb wsprintfA 5269->5272 5271 402a6c 5272->5271 5273 401b88 5274 402c5e 21 API calls 5273->5274 5275 401b8f 5274->5275 5276 402c3c 21 API calls 5275->5276 5277 401b98 wsprintfA 5276->5277 5278 402aea 5277->5278 5279 401d8a 5280 401d90 5279->5280 5281 401d9d GetDlgItem 5279->5281 5282 402c3c 21 API calls 5280->5282 5283 401d97 5281->5283 5282->5283 5284 401dde GetClientRect LoadImageA SendMessageA 5283->5284 5286 402c5e 21 API calls 5283->5286 5287 401e3f 5284->5287 5289 401e4b 5284->5289 5286->5284 5288 401e44 DeleteObject 5287->5288 5287->5289 5288->5289 5290 40278b 5291 402791 5290->5291 5292 402799 FindClose 5291->5292 5293 402aea 5291->5293 5292->5293 4189 40240d 4190 402c5e 21 API calls 4189->4190 4191 40241e 4190->4191 4192 402c5e 21 API calls 4191->4192 4193 402427 4192->4193 4194 402c5e 21 API calls 4193->4194 4195 402431 GetPrivateProfileStringA 4194->4195 4227 40550f 4228 405531 GetDlgItem GetDlgItem GetDlgItem 4227->4228 4229 4056ba 4227->4229 4273 404362 SendMessageA 4228->4273 4231 4056c2 GetDlgItem CreateThread CloseHandle 4229->4231 4232 4056ea 4229->4232 4231->4232 4296 4054a3 OleInitialize 4231->4296 4234 405718 4232->4234 4235 405700 ShowWindow ShowWindow 4232->4235 4236 405739 4232->4236 4233 4055a1 4243 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4233->4243 4237 405720 4234->4237 4238 405773 4234->4238 4278 404362 SendMessageA 4235->4278 4282 404394 4236->4282 4240 405728 4237->4240 4241 40574c ShowWindow 4237->4241 4238->4236 4244 405780 SendMessageA 4238->4244 4279 404306 4240->4279 4247 40576c 4241->4247 4248 40575e 4241->4248 4249 405616 4243->4249 4250 4055fa SendMessageA SendMessageA 4243->4250 4246 405745 4244->4246 4251 405799 CreatePopupMenu 4244->4251 4255 404306 SendMessageA 4247->4255 4254 4053d1 28 API calls 4248->4254 4252 405629 4249->4252 4253 40561b SendMessageA 4249->4253 4250->4249 4256 406320 21 API calls 4251->4256 4274 40432d 4252->4274 4253->4252 4254->4247 4255->4238 4258 4057a9 AppendMenuA 4256->4258 4260 4057c7 GetWindowRect 4258->4260 4261 4057da TrackPopupMenu 4258->4261 4259 405639 4262 405642 ShowWindow 4259->4262 4263 405676 GetDlgItem SendMessageA 4259->4263 4260->4261 4261->4246 4264 4057f6 4261->4264 4265 405665 4262->4265 4266 405658 ShowWindow 4262->4266 4263->4246 4267 40569d SendMessageA SendMessageA 4263->4267 4268 405815 SendMessageA 4264->4268 4277 404362 SendMessageA 4265->4277 4266->4265 4267->4246 4268->4268 4269 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4268->4269 4271 405854 SendMessageA 4269->4271 4271->4271 4272 405876 GlobalUnlock SetClipboardData CloseClipboard 4271->4272 4272->4246 4273->4233 4275 406320 21 API calls 4274->4275 4276 404338 SetDlgItemTextA 4275->4276 4276->4259 4277->4263 4278->4234 4280 404313 SendMessageA 4279->4280 4281 40430d 4279->4281 4280->4236 4281->4280 4283 4043ac GetWindowLongA 4282->4283 4284 404457 4282->4284 4283->4284 4285 4043c1 4283->4285 4284->4246 4285->4284 4286 4043f1 4285->4286 4287 4043ee GetSysColor 4285->4287 4288 404401 SetBkMode 4286->4288 4289 4043f7 SetTextColor 4286->4289 4287->4286 4290 404419 GetSysColor 4288->4290 4291 40441f 4288->4291 4289->4288 4290->4291 4292 404430 4291->4292 4293 404426 SetBkColor 4291->4293 4292->4284 4294 404443 DeleteObject 4292->4294 4295 40444a CreateBrushIndirect 4292->4295 4293->4292 4294->4295 4295->4284 4303 404379 4296->4303 4298 4054c6 4302 4054ed 4298->4302 4306 401389 4298->4306 4299 404379 SendMessageA 4300 4054ff OleUninitialize 4299->4300 4302->4299 4304 404391 4303->4304 4305 404382 SendMessageA 4303->4305 4304->4298 4305->4304 4308 401390 4306->4308 4307 4013fe 4307->4298 4308->4307 4309 4013cb MulDiv SendMessageA 4308->4309 4309->4308 4310 40168f 4311 402c5e 21 API calls 4310->4311 4312 401696 4311->4312 4313 402c5e 21 API calls 4312->4313 4314 40169f 4313->4314 4315 402c5e 21 API calls 4314->4315 4316 4016a8 MoveFileA 4315->4316 4317 4016b4 4316->4317 4318 4016bb 4316->4318 4319 401423 28 API calls 4317->4319 4322 40230f 4318->4322 4324 406620 FindFirstFileA 4318->4324 4319->4322 4325 4016ca 4324->4325 4326 406636 FindClose 4324->4326 4325->4322 4327 406066 MoveFileExA 4325->4327 4326->4325 4328 406087 4327->4328 4329 40607a 4327->4329 4328->4317 4331 405ef6 4329->4331 4332 405f42 GetShortPathNameA 4331->4332 4333 405f1c 4331->4333 4335 406061 4332->4335 4336 405f57 4332->4336 4358 405e20 GetFileAttributesA CreateFileA 4333->4358 4335->4328 4336->4335 4338 405f5f wsprintfA 4336->4338 4337 405f26 CloseHandle GetShortPathNameA 4337->4335 4339 405f3a 4337->4339 4340 406320 21 API calls 4338->4340 4339->4332 4339->4335 4341 405f87 4340->4341 4359 405e20 GetFileAttributesA CreateFileA 4341->4359 4343 405f94 4343->4335 4344 405fa3 GetFileSize GlobalAlloc 4343->4344 4345 405fc5 4344->4345 4346 40605a CloseHandle 4344->4346 4360 405e98 ReadFile 4345->4360 4346->4335 4351 405fe4 lstrcpyA 4353 406006 4351->4353 4352 405ff8 4354 405d85 4 API calls 4352->4354 4355 40603d SetFilePointer 4353->4355 4354->4353 4367 405ec7 WriteFile 4355->4367 4358->4337 4359->4343 4361 405eb6 4360->4361 4361->4346 4362 405d85 lstrlenA 4361->4362 4363 405dc6 lstrlenA 4362->4363 4364 405dce 4363->4364 4365 405d9f lstrcmpiA 4363->4365 4364->4351 4364->4352 4365->4364 4366 405dbd CharNextA 4365->4366 4366->4363 4368 405ee5 GlobalFree 4367->4368 4368->4346 5294 401490 5295 4053d1 28 API calls 5294->5295 5296 401497 5295->5296 5297 404b10 5298 404b20 5297->5298 5299 404b3c 5297->5299 5308 405987 GetDlgItemTextA 5298->5308 5300 404b42 SHGetPathFromIDListA 5299->5300 5301 404b6f 5299->5301 5303 404b59 SendMessageA 5300->5303 5304 404b52 5300->5304 5303->5301 5306 40140b 2 API calls 5304->5306 5305 404b2d SendMessageA 5305->5299 5306->5303 5308->5305 5309 401a12 5310 402c5e 21 API calls 5309->5310 5311 401a19 5310->5311 5312 402c5e 21 API calls 5311->5312 5313 401a22 5312->5313 5314 401a29 lstrcmpiA 5313->5314 5315 401a3b lstrcmpA 5313->5315 5316 401a2f 5314->5316 5315->5316 5317 401594 5318 4015a4 ShowWindow 5317->5318 5319 4015ab 5317->5319 5318->5319 5320 4015b9 ShowWindow 5319->5320 5321 402aea 5319->5321 5320->5321 4755 402318 4756 402c5e 21 API calls 4755->4756 4757 40231e 4756->4757 4758 402c5e 21 API calls 4757->4758 4759 402327 4758->4759 4760 402c5e 21 API calls 4759->4760 4761 402330 4760->4761 4762 406620 2 API calls 4761->4762 4763 402339 4762->4763 4764 40234a lstrlenA lstrlenA 4763->4764 4768 40233d 4763->4768 4766 4053d1 28 API calls 4764->4766 4765 4053d1 28 API calls 4769 402345 4765->4769 4767 402386 SHFileOperationA 4766->4767 4767->4768 4767->4769 4768->4765 4768->4769 5322 404498 5323 4044ae 5322->5323 5328 4045ba 5322->5328 5326 40432d 22 API calls 5323->5326 5324 404629 5325 4046f3 5324->5325 5327 404633 GetDlgItem 5324->5327 5334 404394 8 API calls 5325->5334 5329 404504 5326->5329 5330 4046b1 5327->5330 5331 404649 5327->5331 5328->5324 5328->5325 5332 4045fe GetDlgItem SendMessageA 5328->5332 5333 40432d 22 API calls 5329->5333 5330->5325 5335 4046c3 5330->5335 5331->5330 5338 40466f SendMessageA LoadCursorA SetCursor 5331->5338 5355 40434f KiUserCallbackDispatcher 5332->5355 5337 404511 CheckDlgButton 5333->5337 5345 4046ee 5334->5345 5339 4046c9 SendMessageA 5335->5339 5340 4046da 5335->5340 5353 40434f KiUserCallbackDispatcher 5337->5353 5359 40473c 5338->5359 5339->5340 5344 4046e0 SendMessageA 5340->5344 5340->5345 5341 404624 5356 404718 5341->5356 5344->5345 5347 40452f GetDlgItem 5354 404362 SendMessageA 5347->5354 5350 404545 SendMessageA 5351 404563 GetSysColor 5350->5351 5352 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5350->5352 5351->5352 5352->5345 5353->5347 5354->5350 5355->5341 5357 404726 5356->5357 5358 40472b SendMessageA 5356->5358 5357->5358 5358->5324 5362 405969 ShellExecuteExA 5359->5362 5361 4046a2 LoadCursorA SetCursor 5361->5330 5362->5361 5363 6fd81000 5366 6fd8101b 5363->5366 5367 6fd8154b GlobalFree 5366->5367 5368 6fd81020 5367->5368 5369 6fd81024 5368->5369 5370 6fd81027 GlobalAlloc 5368->5370 5371 6fd81572 3 API calls 5369->5371 5370->5369 5372 6fd81019 5371->5372 5373 402198 5374 402c5e 21 API calls 5373->5374 5375 40219f 5374->5375 5376 402c5e 21 API calls 5375->5376 5377 4021a9 5376->5377 5378 402c5e 21 API calls 5377->5378 5379 4021b3 5378->5379 5380 402c5e 21 API calls 5379->5380 5381 4021c0 5380->5381 5382 402c5e 21 API calls 5381->5382 5383 4021ca 5382->5383 5384 40220c CoCreateInstance 5383->5384 5385 402c5e 21 API calls 5383->5385 5386 4022d9 5384->5386 5388 40222b 5384->5388 5385->5384 5387 401423 28 API calls 5386->5387 5389 40230f 5386->5389 5387->5389 5388->5386 5390 4022b9 MultiByteToWideChar 5388->5390 5390->5386 4770 40269a 4771 402c3c 21 API calls 4770->4771 4773 4026a4 4771->4773 4772 405e98 ReadFile 4772->4773 4773->4772 4774 402714 4773->4774 4775 402724 4773->4775 4778 402712 4773->4778 4779 4061eb wsprintfA 4774->4779 4777 40273a SetFilePointer 4775->4777 4775->4778 4777->4778 4779->4778 5391 40239a 5392 4023a1 5391->5392 5395 4023b4 5391->5395 5393 406320 21 API calls 5392->5393 5394 4023ae 5393->5394 5394->5395 5396 4059a3 MessageBoxIndirectA 5394->5396 5396->5395 5397 402a1b 5398 402a22 5397->5398 5399 402a6e 5397->5399 5402 402c3c 21 API calls 5398->5402 5407 402a6c 5398->5407 5400 4066b5 5 API calls 5399->5400 5401 402a75 5400->5401 5403 402c5e 21 API calls 5401->5403 5404 402a30 5402->5404 5405 402a7e 5403->5405 5406 402c3c 21 API calls 5404->5406 5405->5407 5415 4062e0 5405->5415 5409 402a3f 5406->5409 5414 4061eb wsprintfA 5409->5414 5410 402a8c 5410->5407 5419 4062ca 5410->5419 5414->5407 5416 4062eb 5415->5416 5417 40630e IIDFromString 5416->5417 5418 406307 5416->5418 5417->5410 5418->5410 5422 4062af WideCharToMultiByte 5419->5422 5421 402aad CoTaskMemFree 5421->5407 5422->5421 5423 40149d 5424 4023b4 5423->5424 5425 4014ab PostQuitMessage 5423->5425 5425->5424 5426 401f1e 5427 402c5e 21 API calls 5426->5427 5428 401f24 5427->5428 5429 402c5e 21 API calls 5428->5429 5430 401f2d 5429->5430 5431 402c5e 21 API calls 5430->5431 5432 401f36 5431->5432 5433 402c5e 21 API calls 5432->5433 5434 401f3f 5433->5434 5435 401423 28 API calls 5434->5435 5436 401f46 5435->5436 5443 405969 ShellExecuteExA 5436->5443 5438 401f81 5439 40672a 5 API calls 5438->5439 5440 4027ed 5438->5440 5441 401f9b CloseHandle 5439->5441 5441->5440 5443->5438 4800 401fa0 4801 402c5e 21 API calls 4800->4801 4802 401fa6 4801->4802 4803 4053d1 28 API calls 4802->4803 4804 401fb0 4803->4804 4805 405926 2 API calls 4804->4805 4806 401fb6 4805->4806 4807 401fd7 CloseHandle 4806->4807 4811 4027ed 4806->4811 4815 40672a WaitForSingleObject 4806->4815 4807->4811 4810 401fcb 4812 401fd0 4810->4812 4813 401fd9 4810->4813 4820 4061eb wsprintfA 4812->4820 4813->4807 4816 406744 4815->4816 4817 406756 GetExitCodeProcess 4816->4817 4818 4066f1 2 API calls 4816->4818 4817->4810 4819 40674b WaitForSingleObject 4818->4819 4819->4816 4820->4807 5444 402020 5445 402c5e 21 API calls 5444->5445 5446 402027 5445->5446 5447 4066b5 5 API calls 5446->5447 5448 402036 5447->5448 5449 4020be 5448->5449 5450 40204e GlobalAlloc 5448->5450 5450->5449 5451 402062 5450->5451 5452 4066b5 5 API calls 5451->5452 5453 402069 5452->5453 5454 4066b5 5 API calls 5453->5454 5455 402073 5454->5455 5455->5449 5459 4061eb wsprintfA 5455->5459 5457 4020ae 5460 4061eb wsprintfA 5457->5460 5459->5457 5460->5449 5461 401922 5462 401959 5461->5462 5463 402c5e 21 API calls 5462->5463 5464 40195e 5463->5464 5465 405a4f 71 API calls 5464->5465 5466 401967 5465->5466 4821 4024a3 4822 402c5e 21 API calls 4821->4822 4823 4024b5 4822->4823 4824 402c5e 21 API calls 4823->4824 4825 4024bf 4824->4825 4838 402cee 4825->4838 4828 402aea 4829 4024f4 4831 402500 4829->4831 4833 402c3c 21 API calls 4829->4833 4830 402c5e 21 API calls 4832 4024ed lstrlenA 4830->4832 4834 402522 RegSetValueExA 4831->4834 4835 403168 35 API calls 4831->4835 4832->4829 4833->4831 4836 402538 RegCloseKey 4834->4836 4835->4834 4836->4828 4839 402d09 4838->4839 4842 406141 4839->4842 4843 406150 4842->4843 4844 4024cf 4843->4844 4845 40615b RegCreateKeyExA 4843->4845 4844->4828 4844->4829 4844->4830 4845->4844 5467 401d23 5468 402c3c 21 API calls 5467->5468 5469 401d29 IsWindow 5468->5469 5470 401a33 5469->5470 5471 401925 5472 402c5e 21 API calls 5471->5472 5473 40192c 5472->5473 5474 4059a3 MessageBoxIndirectA 5473->5474 5475 401935 5474->5475 5476 6fd8103d 5477 6fd8101b 5 API calls 5476->5477 5478 6fd81056 5477->5478 5479 4027a5 5480 4027ab 5479->5480 5481 4027af FindNextFileA 5480->5481 5483 4027c1 5480->5483 5482 402800 5481->5482 5481->5483 5485 40628d lstrcpynA 5482->5485 5485->5483 4847 6fd829b1 4848 6fd82a01 4847->4848 4849 6fd829c1 VirtualProtect 4847->4849 4849->4848 4864 401bac 4865 401bb9 4864->4865 4866 401bfd 4864->4866 4869 401c41 4865->4869 4874 401bd0 4865->4874 4867 401c01 4866->4867 4868 401c26 GlobalAlloc 4866->4868 4877 4023b4 4867->4877 4885 40628d lstrcpynA 4867->4885 4871 406320 21 API calls 4868->4871 4870 406320 21 API calls 4869->4870 4869->4877 4873 4023ae 4870->4873 4871->4869 4873->4877 4878 4059a3 MessageBoxIndirectA 4873->4878 4883 40628d lstrcpynA 4874->4883 4875 401c13 GlobalFree 4875->4877 4878->4877 4879 401bdf 4884 40628d lstrcpynA 4879->4884 4881 401bee 4886 40628d lstrcpynA 4881->4886 4883->4879 4884->4881 4885->4875 4886->4877 5486 4029af 5487 402c3c 21 API calls 5486->5487 5488 4029b5 5487->5488 5489 4027ed 5488->5489 5490 406320 21 API calls 5488->5490 5490->5489 5491 402631 5492 402c5e 21 API calls 5491->5492 5493 402638 5492->5493 5496 405e20 GetFileAttributesA CreateFileA 5493->5496 5495 402644 5496->5495 5497 404d32 GetDlgItem GetDlgItem 5498 404d88 7 API calls 5497->5498 5509 404faf 5497->5509 5499 404e30 DeleteObject 5498->5499 5500 404e24 SendMessageA 5498->5500 5501 404e3b 5499->5501 5500->5499 5502 404e72 5501->5502 5503 406320 21 API calls 5501->5503 5504 40432d 22 API calls 5502->5504 5508 404e54 SendMessageA SendMessageA 5503->5508 5510 404e86 5504->5510 5505 40513d 5506 405147 SendMessageA 5505->5506 5507 40514f 5505->5507 5506->5507 5518 405161 ImageList_Destroy 5507->5518 5519 405168 5507->5519 5529 405178 5507->5529 5508->5501 5511 405091 5509->5511 5514 404c80 5 API calls 5509->5514 5534 40501e 5509->5534 5515 40432d 22 API calls 5510->5515 5511->5505 5516 4050ea SendMessageA 5511->5516 5540 404fa2 5511->5540 5512 405083 SendMessageA 5512->5511 5513 404394 8 API calls 5517 40533e 5513->5517 5514->5534 5535 404e97 5515->5535 5521 4050ff SendMessageA 5516->5521 5516->5540 5518->5519 5522 405171 GlobalFree 5519->5522 5519->5529 5520 4052f2 5525 405304 ShowWindow GetDlgItem ShowWindow 5520->5525 5520->5540 5524 405112 5521->5524 5522->5529 5523 404f71 GetWindowLongA SetWindowLongA 5526 404f8a 5523->5526 5530 405123 SendMessageA 5524->5530 5525->5540 5527 404fa7 5526->5527 5528 404f8f ShowWindow 5526->5528 5550 404362 SendMessageA 5527->5550 5549 404362 SendMessageA 5528->5549 5529->5520 5539 404d00 4 API calls 5529->5539 5544 4051b3 5529->5544 5530->5505 5531 404f6c 5531->5523 5531->5526 5534->5511 5534->5512 5535->5523 5535->5531 5536 404ee9 SendMessageA 5535->5536 5537 404f27 SendMessageA 5535->5537 5538 404f3b SendMessageA 5535->5538 5536->5535 5537->5535 5538->5535 5539->5544 5540->5513 5541 4052bd 5542 4052c8 InvalidateRect 5541->5542 5545 4052d4 5541->5545 5542->5545 5543 4051e1 SendMessageA 5547 4051f7 5543->5547 5544->5543 5544->5547 5545->5520 5551 404c3b 5545->5551 5546 40526b SendMessageA SendMessageA 5546->5547 5547->5541 5547->5546 5549->5540 5550->5509 5554 404b76 5551->5554 5553 404c50 5553->5520 5555 404b8c 5554->5555 5556 406320 21 API calls 5555->5556 5557 404bf0 5556->5557 5558 406320 21 API calls 5557->5558 5559 404bfb 5558->5559 5560 406320 21 API calls 5559->5560 5561 404c11 lstrlenA wsprintfA SetDlgItemTextA 5560->5561 5561->5553 4887 403e33 4888 403e4b 4887->4888 4889 403fac 4887->4889 4888->4889 4890 403e57 4888->4890 4891 403ffd 4889->4891 4892 403fbd GetDlgItem GetDlgItem 4889->4892 4894 403e62 SetWindowPos 4890->4894 4895 403e75 4890->4895 4893 404057 4891->4893 4904 401389 2 API calls 4891->4904 4896 40432d 22 API calls 4892->4896 4898 404379 SendMessageA 4893->4898 4915 403fa7 4893->4915 4894->4895 4899 403ec0 4895->4899 4900 403e7e ShowWindow 4895->4900 4897 403fe7 SetClassLongA 4896->4897 4901 40140b 2 API calls 4897->4901 4918 404069 4898->4918 4902 403ec8 DestroyWindow 4899->4902 4903 403edf 4899->4903 4905 403f99 4900->4905 4906 403e9e GetWindowLongA 4900->4906 4901->4891 4959 4042b6 4902->4959 4907 403ee4 SetWindowLongA 4903->4907 4908 403ef5 4903->4908 4909 40402f 4904->4909 4910 404394 8 API calls 4905->4910 4906->4905 4911 403eb7 ShowWindow 4906->4911 4907->4915 4908->4905 4913 403f01 GetDlgItem 4908->4913 4909->4893 4914 404033 SendMessageA 4909->4914 4910->4915 4911->4899 4912 4042b8 DestroyWindow EndDialog 4912->4959 4919 403f12 SendMessageA IsWindowEnabled 4913->4919 4922 403f2f 4913->4922 4914->4915 4916 40140b 2 API calls 4916->4918 4917 4042e7 ShowWindow 4917->4915 4918->4912 4918->4915 4918->4916 4920 406320 21 API calls 4918->4920 4925 40432d 22 API calls 4918->4925 4934 40432d 22 API calls 4918->4934 4950 4041f8 DestroyWindow 4918->4950 4919->4915 4919->4922 4920->4918 4921 403f34 4924 404306 SendMessageA 4921->4924 4922->4921 4923 403f3c 4922->4923 4926 403f83 SendMessageA 4922->4926 4927 403f4f 4922->4927 4923->4921 4923->4926 4928 403f6a 4924->4928 4925->4918 4926->4905 4929 403f57 4927->4929 4930 403f6c 4927->4930 4928->4905 4932 40140b 2 API calls 4929->4932 4931 40140b 2 API calls 4930->4931 4933 403f73 4931->4933 4932->4921 4933->4905 4933->4921 4935 4040e4 GetDlgItem 4934->4935 4936 404101 ShowWindow KiUserCallbackDispatcher 4935->4936 4937 4040f9 4935->4937 4960 40434f KiUserCallbackDispatcher 4936->4960 4937->4936 4939 40412b EnableWindow 4944 40413f 4939->4944 4940 404144 GetSystemMenu EnableMenuItem SendMessageA 4941 404174 SendMessageA 4940->4941 4940->4944 4941->4944 4943 403e14 22 API calls 4943->4944 4944->4940 4944->4943 4961 404362 SendMessageA 4944->4961 4962 40628d lstrcpynA 4944->4962 4946 4041a3 lstrlenA 4947 406320 21 API calls 4946->4947 4948 4041b4 SetWindowTextA 4947->4948 4949 401389 2 API calls 4948->4949 4949->4918 4951 404212 CreateDialogParamA 4950->4951 4950->4959 4952 404245 4951->4952 4951->4959 4953 40432d 22 API calls 4952->4953 4954 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4953->4954 4955 401389 2 API calls 4954->4955 4956 404296 4955->4956 4956->4915 4957 40429e ShowWindow 4956->4957 4958 404379 SendMessageA 4957->4958 4958->4959 4959->4915 4959->4917 4960->4939 4961->4944 4962->4946 4963 4025b5 4964 402c9e 21 API calls 4963->4964 4965 4025bf 4964->4965 4966 402c3c 21 API calls 4965->4966 4967 4025c8 4966->4967 4968 4025d6 4967->4968 4972 4027ed 4967->4972 4969 4025e3 RegEnumKeyA 4968->4969 4970 4025ef RegEnumValueA 4968->4970 4971 40260b RegCloseKey 4969->4971 4970->4971 4973 402604 4970->4973 4971->4972 4973->4971 5562 4014b7 5563 4014bd 5562->5563 5564 401389 2 API calls 5563->5564 5565 4014c5 5564->5565 5566 40283b 5588 405e20 GetFileAttributesA CreateFileA 5566->5588 5568 402842 5569 4028fe 5568->5569 5570 4028e6 5568->5570 5571 40285d GlobalAlloc 5568->5571 5572 402905 DeleteFileA 5569->5572 5573 402918 5569->5573 5575 403168 35 API calls 5570->5575 5571->5570 5574 402876 5571->5574 5572->5573 5589 403390 SetFilePointer 5574->5589 5577 4028f3 CloseHandle 5575->5577 5577->5569 5578 40287c 5579 40337a ReadFile 5578->5579 5580 402885 GlobalAlloc 5579->5580 5581 402895 5580->5581 5582 4028cf 5580->5582 5583 403168 35 API calls 5581->5583 5584 405ec7 WriteFile 5582->5584 5587 4028a2 5583->5587 5585 4028db GlobalFree 5584->5585 5585->5570 5586 4028c6 GlobalFree 5586->5582 5587->5586 5588->5568 5589->5578 5590 4047bf 5591 4047eb 5590->5591 5592 4047fc 5590->5592 5651 405987 GetDlgItemTextA 5591->5651 5594 404808 GetDlgItem 5592->5594 5597 404867 5592->5597 5596 40481c 5594->5596 5595 4047f6 5599 406587 5 API calls 5595->5599 5600 404830 SetWindowTextA 5596->5600 5603 405cb8 4 API calls 5596->5603 5598 40494b 5597->5598 5605 406320 21 API calls 5597->5605 5649 404af5 5597->5649 5598->5649 5653 405987 GetDlgItemTextA 5598->5653 5599->5592 5604 40432d 22 API calls 5600->5604 5602 404394 8 API calls 5610 404b09 5602->5610 5611 404826 5603->5611 5607 40484c 5604->5607 5608 4048db SHBrowseForFolderA 5605->5608 5606 40497b 5609 405d0d 18 API calls 5606->5609 5612 40432d 22 API calls 5607->5612 5608->5598 5613 4048f3 CoTaskMemFree 5608->5613 5614 404981 5609->5614 5611->5600 5617 405c1f 3 API calls 5611->5617 5615 40485a 5612->5615 5616 405c1f 3 API calls 5613->5616 5654 40628d lstrcpynA 5614->5654 5652 404362 SendMessageA 5615->5652 5624 404900 5616->5624 5617->5600 5620 404860 5623 4066b5 5 API calls 5620->5623 5621 404937 SetDlgItemTextA 5621->5598 5622 404998 5625 4066b5 5 API calls 5622->5625 5623->5597 5624->5621 5626 406320 21 API calls 5624->5626 5633 40499f 5625->5633 5627 40491f lstrcmpiA 5626->5627 5627->5621 5630 404930 lstrcatA 5627->5630 5628 4049db 5655 40628d lstrcpynA 5628->5655 5630->5621 5631 4049e2 5632 405cb8 4 API calls 5631->5632 5634 4049e8 GetDiskFreeSpaceA 5632->5634 5633->5628 5637 405c66 2 API calls 5633->5637 5639 404a33 5633->5639 5636 404a0c MulDiv 5634->5636 5634->5639 5636->5639 5637->5633 5638 404aa4 5641 404ac7 5638->5641 5643 40140b 2 API calls 5638->5643 5639->5638 5640 404c3b 24 API calls 5639->5640 5642 404a91 5640->5642 5656 40434f KiUserCallbackDispatcher 5641->5656 5645 404aa6 SetDlgItemTextA 5642->5645 5646 404a96 5642->5646 5643->5641 5645->5638 5648 404b76 24 API calls 5646->5648 5647 404ae3 5647->5649 5650 404718 SendMessageA 5647->5650 5648->5638 5649->5602 5650->5649 5651->5595 5652->5620 5653->5606 5654->5622 5655->5631 5656->5647

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 7 403490 5->7 8 40347f-40348e 5->8 9 4034a5-4034e5 6->9 10 40349d 6->10 7->6 8->6 11 4034e7-4034ef call 4066b5 9->11 12 4034f8 9->12 10->9 11->12 17 4034f1 11->17 14 4034fd-403511 call 406647 lstrlenA 12->14 19 403513-40352f call 4066b5 * 3 14->19 17->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 31 403539 27->31 31->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 42 4035c8-4035cc 39->42 43 4035ce-4035d5 39->43 41 40369d-4036b7 GetTempPathA call 4033a7 40->41 52 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 41->52 53 40370f-403727 DeleteFileA call 402f31 41->53 42->42 42->43 45 4035d7-4035d8 43->45 46 4035dc-4035df 43->46 45->46 47 403670-40367c call 405c4a 46->47 48 4035e5-4035e9 46->48 47->38 67 40367e 47->67 50 403601-40362e 48->50 51 4035eb-4035f1 48->51 57 403640-40366e 50->57 58 403630-403636 50->58 55 4035f3-4035f5 51->55 56 4035f7 51->56 52->53 69 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 52->69 70 4037ba-4037cb call 4039bc OleUninitialize 53->70 71 40372d-403733 53->71 55->50 55->56 56->50 57->47 65 40368b-403698 call 40628d 57->65 62 403638-40363a 58->62 63 40363c 58->63 62->57 62->63 63->57 65->41 67->38 69->53 69->70 82 4037d1-4037e0 call 4059a3 ExitProcess 70->82 83 403928-40392e 70->83 74 403735-403740 call 405c4a 71->74 75 4037ab-4037b2 call 403a96 71->75 86 403742-40376b 74->86 87 403776-40377f 74->87 80 4037b7 75->80 80->70 84 403930-403945 GetCurrentProcess OpenProcessToken 83->84 85 4039a6-4039ae 83->85 89 403976-403984 call 4066b5 84->89 90 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 84->90 95 4039b0 85->95 96 4039b3-4039b6 ExitProcess 85->96 91 40376d-40376f 86->91 92 403781-40378f call 405d0d 87->92 93 4037e6-40380a call 40590e lstrlenA call 40628d 87->93 104 403992-40399d ExitWindowsEx 89->104 105 403986-403990 89->105 90->89 91->87 98 403771-403774 91->98 92->70 106 403791-4037a7 call 40628d * 2 92->106 114 40381b-403830 93->114 115 40380c-403816 call 40628d 93->115 95->96 98->87 98->91 104->85 108 40399f-4039a1 call 40140b 104->108 105->104 105->108 106->75 108->85 118 403835 114->118 115->114 119 403839-403865 wsprintfA call 406320 118->119 123 403867-40386c call 405897 119->123 124 40386e call 4058f1 119->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 132 4038a0-4038a8 129->132 133 403883-40388c DeleteFileA 129->133 130->70 137 4038d4-4038f5 call 406066 call 406320 call 405926 130->137 132->118 136 4038aa 132->136 133->132 135 40388e-40389e call 405a4f 133->135 135->119 135->132 136->70 146 4038f7-4038ff 137->146 147 403918-403923 CloseHandle 137->147 146->70 148 403905-40390d call 406620 146->148 147->70 148->119 151 403913 148->151 151->70
                                                APIs
                                                • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                                • GetVersionExA.KERNEL32(?), ref: 00403424
                                                • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                                • #17.COMCTL32(?,?,0000000A,?), ref: 00403541
                                                • OleInitialize.OLE32(00000000), ref: 00403548
                                                • SHGetFileInfoA.SHELL32(00429448,00000000,?,?,00000000,?,?,0000000A,?), ref: 00403566
                                                • GetCommandLineA.KERNEL32(forholdsordren Setup,NSIS Error,?,?,0000000A,?), ref: 0040357B
                                                • CharNextA.USER32(00000000,"C:\Users\user\Desktop\HJEbEB40vP.exe",00000020,"C:\Users\user\Desktop\HJEbEB40vP.exe",00000000,?,?,0000000A,?), ref: 004035B5
                                                • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,?,0000000A,?), ref: 004036AE
                                                • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?), ref: 004036BF
                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036CB
                                                • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036DF
                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036E7
                                                • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036F8
                                                • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?), ref: 00403700
                                                • DeleteFileA.KERNELBASE(1033,?,?,0000000A,?), ref: 00403714
                                                • OleUninitialize.OLE32(?,?,?,0000000A,?), ref: 004037BF
                                                • ExitProcess.KERNEL32 ref: 004037E0
                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",00000000,?,?,?,0000000A,?), ref: 004037EF
                                                • wsprintfA.USER32 ref: 00403846
                                                • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 00403878
                                                • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                                • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 004038B0
                                                • CopyFileA.KERNEL32(C:\Users\user\Desktop\HJEbEB40vP.exe,00431400,?), ref: 004038C6
                                                • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                                • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?), ref: 00403936
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                                • ExitProcess.KERNEL32 ref: 004039B6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                                • String ID: "$"C:\Users\user\Desktop\HJEbEB40vP.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\Desktop$C:\Users\user\Desktop\HJEbEB40vP.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$forholdsordren Setup$~nsu%X.tmp
                                                • API String ID: 2956269667-282118277
                                                • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                                • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                                • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                                • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 177 405616-405619 153->177 178 4055fa-405614 SendMessageA * 2 153->178 156 4056c2-4056e4 GetDlgItem CreateThread CloseHandle 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 163 405720-405726 159->163 164 405773-405776 159->164 161 405700-405713 ShowWindow * 2 call 404362 160->161 162 405739-405740 call 404394 160->162 161->159 174 405745-405749 162->174 167 405728-405734 call 404306 163->167 168 40574c-40575c ShowWindow 163->168 164->162 171 405778-40577e 164->171 167->162 175 40576c-40576e call 404306 168->175 176 40575e-405767 call 4053d1 168->176 171->162 172 405780-405793 SendMessageA 171->172 179 405890-405892 172->179 180 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 172->180 175->164 176->175 181 405629-405640 call 40432d 177->181 182 40561b-405627 SendMessageA 177->182 178->177 179->174 189 4057c7-4057d7 GetWindowRect 180->189 190 4057da-4057f0 TrackPopupMenu 180->190 191 405642-405656 ShowWindow 181->191 192 405676-405697 GetDlgItem SendMessageA 181->192 182->181 189->190 190->179 193 4057f6-405810 190->193 194 405665 191->194 195 405658-405663 ShowWindow 191->195 192->179 196 40569d-4056b5 SendMessageA * 2 192->196 197 405815-405830 SendMessageA 193->197 198 40566b-405671 call 404362 194->198 195->198 196->179 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->179
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                                • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                                • GetClientRect.USER32(?,?), ref: 004055BA
                                                • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                                • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                                • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                                • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                                • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                                • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                                • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                                • ShowWindow.USER32(?,?), ref: 0040565D
                                                • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                                • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                                • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                                • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                                • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                                  • Part of subcall function 00404362: SendMessageA.USER32(?,?,?,00404192), ref: 00404370
                                                • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                                • CreateThread.KERNEL32(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                                • CloseHandle.KERNELBASE(00000000), ref: 004056E4
                                                • ShowWindow.USER32(00000000), ref: 00405707
                                                • ShowWindow.USER32(?,?), ref: 0040570E
                                                • ShowWindow.USER32(?), ref: 00405754
                                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                                • CreatePopupMenu.USER32 ref: 00405799
                                                • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004057AE
                                                • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                                • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004057E7
                                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                                • OpenClipboard.USER32(00000000), ref: 00405833
                                                • EmptyClipboard.USER32 ref: 00405839
                                                • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                                • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                                • SetClipboardData.USER32(?,00000000), ref: 00405884
                                                • CloseClipboard.USER32 ref: 0040588A
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID:
                                                • API String ID: 590372296-0
                                                • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                                • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                                • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                                • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                                APIs
                                                  • Part of subcall function 6FD812A5: GlobalAlloc.KERNEL32(?,6FD812C3,?,6FD8135F,-6FD8504B,6FD811C0,-000000A0), ref: 6FD812AD
                                                • GlobalAlloc.KERNELBASE(?,000014A4), ref: 6FD81C54
                                                • lstrcpyA.KERNEL32(00000008,?), ref: 6FD81C9C
                                                • lstrcpyA.KERNEL32(00000408,?), ref: 6FD81CA6
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD81CB9
                                                • GlobalFree.KERNEL32(?), ref: 6FD81D99
                                                • GlobalFree.KERNEL32(?), ref: 6FD81D9E
                                                • GlobalFree.KERNEL32(?), ref: 6FD81DA3
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD81F8A
                                                • lstrcpyA.KERNEL32(?,?), ref: 6FD82128
                                                • GetModuleHandleA.KERNEL32(00000008), ref: 6FD821A4
                                                • LoadLibraryA.KERNEL32(00000008), ref: 6FD821B5
                                                • GetProcAddress.KERNEL32(?,?), ref: 6FD8220E
                                                • lstrlenA.KERNEL32(00000408), ref: 6FD82228
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                • String ID:
                                                • API String ID: 245916457-0
                                                • Opcode ID: 28e0323a5bc96aa577aa99b4d1d3552b3d74ba3e7555feabd425f07c8f675413
                                                • Instruction ID: ae185d0527ab539a36ee797e185aff1813210390b93da02f6b882564266cd93c
                                                • Opcode Fuzzy Hash: 28e0323a5bc96aa577aa99b4d1d3552b3d74ba3e7555feabd425f07c8f675413
                                                • Instruction Fuzzy Hash: 3E228D7594470ADEDB908FB8C9807EEBBF4BF06319F20862AD1B6A7280D7747549CB50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 737 405a4f-405a75 call 405d0d 740 405a77-405a89 DeleteFileA 737->740 741 405a8e-405a95 737->741 742 405c18-405c1c 740->742 743 405a97-405a99 741->743 744 405aa8-405ab8 call 40628d 741->744 745 405bc6-405bcb 743->745 746 405a9f-405aa2 743->746 752 405ac7-405ac8 call 405c66 744->752 753 405aba-405ac5 lstrcatA 744->753 745->742 748 405bcd-405bd0 745->748 746->744 746->745 750 405bd2-405bd8 748->750 751 405bda-405be2 call 406620 748->751 750->742 751->742 761 405be4-405bf8 call 405c1f call 405a07 751->761 754 405acd-405ad0 752->754 753->754 757 405ad2-405ad9 754->757 758 405adb-405ae1 lstrcatA 754->758 757->758 760 405ae6-405b04 lstrlenA FindFirstFileA 757->760 758->760 762 405b0a-405b21 call 405c4a 760->762 763 405bbc-405bc0 760->763 773 405c10-405c13 call 4053d1 761->773 774 405bfa-405bfd 761->774 771 405b23-405b27 762->771 772 405b2c-405b2f 762->772 763->745 765 405bc2 763->765 765->745 771->772 775 405b29 771->775 776 405b31-405b36 772->776 777 405b42-405b50 call 40628d 772->777 773->742 774->750 779 405bff-405c0e call 4053d1 call 406066 774->779 775->772 781 405b38-405b3a 776->781 782 405b9b-405bad FindNextFileA 776->782 787 405b52-405b5a 777->787 788 405b67-405b72 call 405a07 777->788 779->742 781->777 786 405b3c-405b40 781->786 782->762 785 405bb3-405bb6 FindClose 782->785 785->763 786->777 786->782 787->782 790 405b5c-405b65 call 405a4f 787->790 797 405b93-405b96 call 4053d1 788->797 798 405b74-405b77 788->798 790->782 797->782 800 405b79-405b89 call 4053d1 call 406066 798->800 801 405b8b-405b91 798->801 800->782 801->782
                                                APIs
                                                • DeleteFileA.KERNELBASE(?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405A78
                                                • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AC0
                                                • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AE1
                                                • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AE7
                                                • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405AF8
                                                • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                                • FindClose.KERNEL32(00000000), ref: 00405BB6
                                                Strings
                                                • "C:\Users\user\Desktop\HJEbEB40vP.exe", xrefs: 00405A58
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                                • \*.*, xrefs: 00405ABA
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                • API String ID: 2035342205-3462972797
                                                • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                                • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                                • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                                • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                                APIs
                                                • FindFirstFileA.KERNELBASE(75A03410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                                • FindClose.KERNEL32(00000000), ref: 00406637
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\nsi6D71.tmp, xrefs: 00406620
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp
                                                • API String ID: 2295610775-4242058899
                                                • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                                • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                                • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                                • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC
                                                APIs
                                                • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A56
                                                • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A69
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: EnvironmentExpandStringslstrcmp
                                                • String ID:
                                                • API String ID: 1938659011-0
                                                • Opcode ID: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                                • Instruction ID: 106b93b956adcb394031d7b68410eec4a4f19a4829598155c7958b8f8b1c482a
                                                • Opcode Fuzzy Hash: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                                • Instruction Fuzzy Hash: E8F08231B01201EBCB20CF659E48AAF7EE8DF51354B10403BE145F6190D6788643DF5C

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 206 403e57-403e60 204->206 207 40400a-40401f 205->207 208 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->208 211 403e62-403e6f SetWindowPos 206->211 212 403e75-403e7c 206->212 209 404021-404024 207->209 210 40405f-404064 call 404379 207->210 208->207 215 404026-404031 call 401389 209->215 216 404057-404059 209->216 225 404069-404084 210->225 211->212 218 403ec0-403ec6 212->218 219 403e7e-403e98 ShowWindow 212->219 215->216 241 404033-404052 SendMessageA 215->241 216->210 224 4042fa 216->224 221 403ec8-403eda DestroyWindow 218->221 222 403edf-403ee2 218->222 226 403f99-403fa7 call 404394 219->226 227 403e9e-403eb1 GetWindowLongA 219->227 229 4042d7-4042dd 221->229 231 403ee4-403ef0 SetWindowLongA 222->231 232 403ef5-403efb 222->232 230 4042fc-404303 224->230 235 404086-404088 call 40140b 225->235 236 40408d-404093 225->236 226->230 227->226 237 403eb7-403eba ShowWindow 227->237 229->224 244 4042df-4042e5 229->244 231->230 232->226 240 403f01-403f10 GetDlgItem 232->240 235->236 238 4042b8-4042d1 DestroyWindow EndDialog 236->238 239 404099-4040a4 236->239 237->218 238->229 239->238 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 239->246 247 403f12-403f29 SendMessageA IsWindowEnabled 240->247 248 403f2f-403f32 240->248 241->230 244->224 245 4042e7-4042f0 ShowWindow 244->245 245->224 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->224 247->248 250 403f34-403f35 248->250 251 403f37-403f3a 248->251 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->226 258 403f83-403f93 SendMessageA 254->258 260 403f4f-403f55 254->260 255->258 259 403f44-403f46 255->259 258->226 259->253 263 403f57-403f5d call 40140b 260->263 264 403f6c-403f75 call 40140b 260->264 271 403f63 263->271 264->226 273 403f77-403f81 264->273 271->253 273->271 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->225 295 4041cd-4041cf 284->295 295->225 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->229 300 404212-40423f CreateDialogParamA 297->300 298->224 299 4041e7-4041ed 298->299 299->225 301 4041f3 299->301 300->229 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->224 302->224 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->229
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                                • ShowWindow.USER32(?), ref: 00403E8F
                                                • GetWindowLongA.USER32(?,?), ref: 00403EA1
                                                • ShowWindow.USER32(?,?), ref: 00403EBA
                                                • DestroyWindow.USER32 ref: 00403ECE
                                                • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                                • GetDlgItem.USER32(?,?), ref: 00403F06
                                                • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                                • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                                • GetDlgItem.USER32(?,?), ref: 00403FCC
                                                • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                                • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                                • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00404041
                                                • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                                • ShowWindow.USER32(00000000,?), ref: 00404108
                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                                • EnableWindow.USER32(?,?), ref: 00404135
                                                • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040414B
                                                • EnableMenuItem.USER32(00000000), ref: 00404152
                                                • SendMessageA.USER32(?,?,00000000,?), ref: 0040416A
                                                • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                                • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                                • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                                • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                • String ID:
                                                • API String ID: 121052019-0
                                                • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                                • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                                • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                                • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 323 403b16-403b3f call 403d5b call 405d0d 313->323 319 403af5-403b06 call 406174 314->319 320 403b0b-403b11 lstrcatA 314->320 319->320 320->323 328 403b45-403b4a 323->328 329 403bc6-403bce call 405d0d 323->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 337 403b72-403b74 330->337 335->336 339 403c82-403c8a call 40140b 336->339 340 403c03-403c33 RegisterClassA 336->340 341 403b85-403b91 lstrlenA 337->341 342 403b76-403b83 call 405c4a 337->342 354 403c94-403c9f call 403d5b 339->354 355 403c8c-403c8f 339->355 343 403d51 340->343 344 403c39-403c7d SystemParametersInfoA CreateWindowExA 340->344 348 403b93-403ba1 lstrcmpiA 341->348 349 403bb9-403bc1 call 405c1f call 40628d 341->349 342->341 347 403d53-403d5a 343->347 344->339 348->349 353 403ba3-403bad GetFileAttributesA 348->353 349->329 358 403bb3-403bb4 call 405c66 353->358 359 403baf-403bb1 353->359 363 403ca5-403cbf ShowWindow call 406647 354->363 364 403d28-403d29 call 4054a3 354->364 355->347 358->349 359->349 359->358 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->355 373 403d3e-403d45 call 40140b 369->373 370->343 371->372 376 403cf5-403d18 DialogBoxParamA call 40140b 372->376 377 403cdf-403cef GetClassInfoA RegisterClassA 372->377 373->355 381 403d1d-403d26 call 4039e6 376->381 377->376 381->347
                                                APIs
                                                  • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                                  • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,75A03410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\HJEbEB40vP.exe",0000000A,?), ref: 00403B11
                                                • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,75A03410), ref: 00403B86
                                                • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                                • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\HJEbEB40vP.exe",0000000A,?), ref: 00403BA4
                                                • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                                  • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                                • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403C42
                                                • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                                • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\HJEbEB40vP.exe",0000000A,?), ref: 00403CAD
                                                • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                                • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                                • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                                • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                • API String ID: 1975747703-1497474246
                                                • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                                • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                                • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                                • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 389 403161-403165 387->389 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 410 40310e-403116 call 402ecd 402->410 411 402fee-402ff5 402->411 406 4030b9-4030d1 call 403390 call 40337a 403->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 403->407 404->389 406->404 430 4030d3-4030d9 406->430 407->404 435 403118-403129 407->435 410->404 415 403071-403075 411->415 416 402ff7-40300b call 405ddb 411->416 420 403077-40307e call 402ecd 415->420 421 40307f-403085 415->421 416->421 433 40300d-403014 416->433 420->421 426 403094-40309c 421->426 427 403087-403091 call 40676c 421->427 426->399 434 4030a2 426->434 427->426 430->404 430->407 433->421 439 403016-40301d 433->439 434->396 436 403131-403136 435->436 437 40312b 435->437 440 403137-40313d 436->440 437->436 439->421 441 40301f-403026 439->441 440->440 443 40313f-40315a SetFilePointer call 405ddb 440->443 441->421 442 403028-40302f 441->442 442->421 444 403031-403051 442->444 447 40315f 443->447 444->404 446 403057-40305b 444->446 448 403063-40306b 446->448 449 40305d-403061 446->449 447->389 448->421 450 40306d-40306f 448->450 449->434 449->448 450->421
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402F42
                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\HJEbEB40vP.exe,00000400,?,?,00403722,?,?,?,0000000A,?), ref: 00402F5E
                                                  • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                  • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HJEbEB40vP.exe,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?), ref: 00402FAA
                                                • GlobalAlloc.KERNELBASE(?,?,?,?,00403722,?,?,?,0000000A,?), ref: 004030E0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\HJEbEB40vP.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                • API String ID: 2803837635-2692072056
                                                • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                                • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 672 406320-40632b 673 40632d-40633c 672->673 674 40633e-406353 672->674 673->674 675 406564-406568 674->675 676 406359-406364 674->676 678 406376-406380 675->678 679 40656e-406578 675->679 676->675 677 40636a-406371 676->677 677->675 678->679 682 406386-40638d 678->682 680 406583-406584 679->680 681 40657a-40657e call 40628d 679->681 681->680 684 406393-4063c9 682->684 685 406557 682->685 686 406501-406504 684->686 687 4063cf-4063d9 684->687 688 406561-406563 685->688 689 406559-40655f 685->689 692 406534-406537 686->692 693 406506-406509 686->693 690 4063f6 687->690 691 4063db-4063e4 687->691 688->675 689->675 699 4063fd-406405 690->699 691->690 698 4063e6-4063e9 691->698 696 406545-406555 lstrlenA 692->696 697 406539-406540 call 406320 692->697 694 406519-406525 call 40628d 693->694 695 40650b-406517 call 4061eb 693->695 709 40652a-406530 694->709 695->709 696->675 697->696 698->690 703 4063eb-4063ee 698->703 704 406407 699->704 705 40640e-406410 699->705 703->690 710 4063f0-4063f4 703->710 704->705 706 406412-40642d call 406174 705->706 707 406447-40644a 705->707 715 406432-406435 706->715 713 40644c-406458 GetSystemDirectoryA 707->713 714 40645d-406460 707->714 709->696 712 406532 709->712 710->699 716 4064f9-4064ff call 406587 712->716 717 4064e3-4064e6 713->717 718 406471-406474 714->718 719 406462-40646e GetWindowsDirectoryA 714->719 720 4064e8-4064ec 715->720 721 40643b-406442 call 406320 715->721 716->696 717->716 717->720 718->717 723 406476-406494 718->723 719->718 720->716 725 4064ee-4064f4 lstrcatA 720->725 721->717 727 406496-406499 723->727 728 4064ab-4064c3 call 4066b5 723->728 725->716 727->728 731 40649b-40649f 727->731 735 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 728->735 736 4064da-4064e1 728->736 733 4064a7-4064a9 731->733 733->717 733->728 735->717 735->736 736->717 736->723
                                                APIs
                                                • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                                • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00000000), ref: 00406468
                                                • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000), ref: 004064C7
                                                • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000), ref: 004064D0
                                                • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000), ref: 004064F4
                                                • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00000000,00424440,75A023A0), ref: 00406546
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                • String ID: T@$Call$Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 4024019347-548753373
                                                • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                                • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                                • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                                • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 806 40177e-4017a1 call 402c5e call 405c8c 811 4017a3-4017a9 call 40628d 806->811 812 4017ab-4017bd call 40628d call 405c1f lstrcatA 806->812 817 4017c2-4017c8 call 406587 811->817 812->817 822 4017cd-4017d1 817->822 823 4017d3-4017dd call 406620 822->823 824 401804-401807 822->824 831 4017ef-401801 823->831 832 4017df-4017ed CompareFileTime 823->832 826 401809-40180a call 405dfb 824->826 827 40180f-40182b call 405e20 824->827 826->827 834 4018a3-4018cc call 4053d1 call 403168 827->834 835 40182d-401830 827->835 831->824 832->831 848 4018d4-4018e0 SetFileTime 834->848 849 4018ce-4018d2 834->849 837 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 835->837 838 401885-40188f call 4053d1 835->838 837->822 871 40187a-40187b 837->871 850 401898-40189e 838->850 853 4018e6-4018f1 CloseHandle 848->853 849->848 849->853 851 402af3 850->851 855 402af5-402af9 851->855 856 4018f7-4018fa 853->856 857 402aea-402aed 853->857 859 4018fc-40190d call 406320 lstrcatA 856->859 860 40190f-401912 call 406320 856->860 857->851 866 401917-4023af 859->866 860->866 869 4023b4-4023b9 866->869 870 4023af call 4059a3 866->870 869->855 870->869 871->850 872 40187d-40187e 871->872 872->838
                                                APIs
                                                • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,00000000,00000000,00000031), ref: 004017BD
                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,00000000,00000000,00000031), ref: 004017E7
                                                  • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,forholdsordren Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                                  • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                  • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                  • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0), ref: 0040542D
                                                  • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll), ref: 0040543F
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp$C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                                • API String ID: 1941528284-3036024615
                                                • Opcode ID: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                                • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                                • Opcode Fuzzy Hash: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                                • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 873 4053d1-4053e6 874 40549c-4054a0 873->874 875 4053ec-4053fe 873->875 876 405400-405404 call 406320 875->876 877 405409-405415 lstrlenA 875->877 876->877 879 405432-405436 877->879 880 405417-405427 lstrlenA 877->880 882 405445-405449 879->882 883 405438-40543f SetWindowTextA 879->883 880->874 881 405429-40542d lstrcatA 880->881 881->879 884 40544b-40548d SendMessageA * 3 882->884 885 40548f-405491 882->885 883->882 884->885 885->874 886 405493-405496 885->886 886->874
                                                APIs
                                                • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0), ref: 0040542D
                                                • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll), ref: 0040543F
                                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll
                                                • API String ID: 2531174081-3192834817
                                                • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                                • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                                • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                                • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 887 403168-40317c 888 403185-40318e 887->888 889 40317e 887->889 890 403190 888->890 891 403197-40319c 888->891 889->888 890->891 892 4031ac-4031b9 call 40337a 891->892 893 40319e-4031a7 call 403390 891->893 897 403368 892->897 898 4031bf-4031c3 892->898 893->892 899 40336a-40336b 897->899 900 403313-403315 898->900 901 4031c9-403212 GetTickCount 898->901 904 403373-403377 899->904 902 403355-403358 900->902 903 403317-40331a 900->903 905 403370 901->905 906 403218-403220 901->906 907 40335a 902->907 908 40335d-403366 call 40337a 902->908 903->905 909 40331c 903->909 905->904 910 403222 906->910 911 403225-403233 call 40337a 906->911 907->908 908->897 919 40336d 908->919 913 40331f-403325 909->913 910->911 911->897 921 403239-403242 911->921 916 403327 913->916 917 403329-403337 call 40337a 913->917 916->917 917->897 925 403339-403345 call 405ec7 917->925 919->905 922 403248-403268 call 4067da 921->922 929 40330b-40330d 922->929 930 40326e-403281 GetTickCount 922->930 931 403347-403351 925->931 932 40330f-403311 925->932 929->899 933 403283-40328b 930->933 934 4032c6-4032c8 930->934 931->913 935 403353 931->935 932->899 936 403293-4032be MulDiv wsprintfA call 4053d1 933->936 937 40328d-403291 933->937 938 4032ca-4032ce 934->938 939 4032ff-403303 934->939 935->905 945 4032c3 936->945 937->934 937->936 942 4032d0-4032d7 call 405ec7 938->942 943 4032e5-4032f0 938->943 939->906 940 403309 939->940 940->905 948 4032dc-4032de 942->948 944 4032f3-4032f7 943->944 944->922 947 4032fd 944->947 945->934 947->905 948->932 949 4032e0-4032e3 948->949 949->944
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CountTick$wsprintf
                                                • String ID: ... %d%%$@DB
                                                • API String ID: 551687249-1316549817
                                                • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                                • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                                • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                                • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 950 406647-406667 GetSystemDirectoryA 951 406669 950->951 952 40666b-40666d 950->952 951->952 953 40667d-40667f 952->953 954 40666f-406677 952->954 956 406680-4066b2 wsprintfA LoadLibraryExA 953->956 954->953 955 406679-40667b 954->955 955->956
                                                APIs
                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                • wsprintfA.USER32 ref: 00406697
                                                • LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                • String ID: %s%s.dll$UXTHEME$\
                                                • API String ID: 2200240437-4240819195
                                                • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                                • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 957 402d60-402d89 call 406113 959 402d8e-402d92 957->959 960 402e43-402e47 959->960 961 402d98-402d9c 959->961 962 402dc1-402dd4 961->962 963 402d9e-402dbf RegEnumValueA 961->963 965 402dfd-402e04 RegEnumKeyA 962->965 963->962 964 402e28-402e36 RegCloseKey 963->964 964->960 966 402dd6-402dd8 965->966 967 402e06-402e18 RegCloseKey call 4066b5 965->967 966->964 969 402dda-402dee call 402d60 966->969 973 402e38-402e3e 967->973 974 402e1a-402e26 RegDeleteKeyA 967->974 969->967 975 402df0-402dfc 969->975 973->960 974->960 975->965
                                                APIs
                                                • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                                • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                                • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CloseEnum$DeleteValue
                                                • String ID:
                                                • API String ID: 1354259210-0
                                                • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                                • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 976 6fd8176b-6fd817a7 call 6fd81b28 980 6fd817ad-6fd817b1 976->980 981 6fd818c4-6fd818c6 976->981 982 6fd817ba-6fd817c7 call 6fd82381 980->982 983 6fd817b3-6fd817b9 call 6fd8233f 980->983 988 6fd817c9-6fd817ce 982->988 989 6fd817f7-6fd817fe 982->989 983->982 992 6fd817e9-6fd817ec 988->992 993 6fd817d0-6fd817d1 988->993 990 6fd8181e-6fd81822 989->990 991 6fd81800-6fd8181c call 6fd82568 call 6fd815e9 call 6fd812f6 GlobalFree 989->991 997 6fd8186c-6fd81872 call 6fd82568 990->997 998 6fd81824-6fd8186a call 6fd815fb call 6fd82568 990->998 1013 6fd81873-6fd81877 991->1013 992->989 999 6fd817ee-6fd817ef call 6fd82d53 992->999 995 6fd817d9-6fd817da call 6fd82ac8 993->995 996 6fd817d3-6fd817d4 993->996 1009 6fd817df 995->1009 1001 6fd817e1-6fd817e7 call 6fd82742 996->1001 1002 6fd817d6-6fd817d7 996->1002 997->1013 998->1013 1012 6fd817f4 999->1012 1017 6fd817f6 1001->1017 1002->989 1002->995 1009->1012 1012->1017 1018 6fd81879-6fd81887 call 6fd8252e 1013->1018 1019 6fd818b4-6fd818bb 1013->1019 1017->989 1026 6fd81889-6fd8188c 1018->1026 1027 6fd8189f-6fd818a6 1018->1027 1019->981 1024 6fd818bd-6fd818be GlobalFree 1019->1024 1024->981 1026->1027 1028 6fd8188e-6fd81896 1026->1028 1027->1019 1029 6fd818a8-6fd818b3 call 6fd81572 1027->1029 1028->1027 1030 6fd81898-6fd81899 FreeLibrary 1028->1030 1029->1019 1030->1027
                                                APIs
                                                  • Part of subcall function 6FD81B28: GlobalFree.KERNEL32(?), ref: 6FD81D99
                                                  • Part of subcall function 6FD81B28: GlobalFree.KERNEL32(?), ref: 6FD81D9E
                                                  • Part of subcall function 6FD81B28: GlobalFree.KERNEL32(?), ref: 6FD81DA3
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD81816
                                                • FreeLibrary.KERNEL32(?), ref: 6FD81899
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD818BE
                                                  • Part of subcall function 6FD8233F: GlobalAlloc.KERNEL32(?,?), ref: 6FD82370
                                                  • Part of subcall function 6FD82742: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,6FD817E7,00000000), ref: 6FD82812
                                                  • Part of subcall function 6FD815FB: wsprintfA.USER32 ref: 6FD81629
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc$Librarywsprintf
                                                • String ID:
                                                • API String ID: 3962662361-3916222277
                                                • Opcode ID: a5c97615608383c05da966d08cbe724edf1c66de5674445b98578c8eff82a931
                                                • Instruction ID: b05c70057b668c40058758bea8c7bff26507933f13d6b1b2fd38e8fb33680a2e
                                                • Opcode Fuzzy Hash: a5c97615608383c05da966d08cbe724edf1c66de5674445b98578c8eff82a931
                                                • Instruction Fuzzy Hash: 16418EB1400305EADB819F749C85BDA3BACBF02329F04856AE9769E1D6DB74B14DC7B0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1033 4024a3-4024ca call 402c5e * 2 call 402cee 1039 4024cf-4024d4 1033->1039 1040 402aea-402af9 1039->1040 1041 4024da-4024e4 1039->1041 1043 4024f4-4024f7 1041->1043 1044 4024e6-4024f3 call 402c5e lstrlenA 1041->1044 1047 4024f9-40250d call 402c3c 1043->1047 1048 40250e-402511 1043->1048 1044->1043 1047->1048 1051 402522-402536 RegSetValueExA 1048->1051 1052 402513-40251d call 403168 1048->1052 1054 402538 1051->1054 1055 40253b-402618 RegCloseKey 1051->1055 1052->1051 1054->1055 1055->1040
                                                APIs
                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000023,00000011,00000002), ref: 004024EE
                                                • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,00000011,00000002), ref: 0040252E
                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,00000011,00000002), ref: 00402612
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CloseValuelstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp
                                                • API String ID: 2655323295-4242058899
                                                • Opcode ID: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                                • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                                • Opcode Fuzzy Hash: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                                • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1058 405e4f-405e59 1059 405e5a-405e85 GetTickCount GetTempFileNameA 1058->1059 1060 405e94-405e96 1059->1060 1061 405e87-405e89 1059->1061 1062 405e8e-405e91 1060->1062 1061->1059 1063 405e8b 1061->1063 1063->1062
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405E63
                                                • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?), ref: 00405E7D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                • API String ID: 1716503409-944333549
                                                • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                                • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                                APIs
                                                • GetModuleHandleA.KERNELBASE(00000000,?,?), ref: 004020F5
                                                  • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                  • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                  • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0), ref: 0040542D
                                                  • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll), ref: 0040543F
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                • LoadLibraryExA.KERNELBASE(00000000,?,?,?,?), ref: 00402105
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                                • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040217F
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 2987980305-0
                                                • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                                • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                                • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                                • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                                APIs
                                                  • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405CC6
                                                  • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                                  • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                                • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,?,00000000,?), ref: 00401632
                                                  • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                                • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,00000000,00000000,?), ref: 00401661
                                                Strings
                                                • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes, xrefs: 00401656
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes
                                                • API String ID: 1892508949-1320684958
                                                • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                                • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                                • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                                • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                                APIs
                                                • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                                • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll), ref: 004061C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue
                                                • String ID: Call
                                                • API String ID: 3356406503-1824292864
                                                • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                                • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                                APIs
                                                • GlobalFree.KERNEL32(00854A38), ref: 00401C1B
                                                • GlobalAlloc.KERNEL32(?,00000404), ref: 00401C2D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree
                                                • String ID: Call
                                                • API String ID: 3394109436-1824292864
                                                • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                                • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                                • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                                • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                                APIs
                                                  • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(75A03410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                                  • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                                • lstrlenA.KERNEL32 ref: 00402358
                                                • lstrlenA.KERNEL32(00000000), ref: 00402362
                                                • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileFindlstrlen$CloseFirstOperation
                                                • String ID:
                                                • API String ID: 1486964399-0
                                                • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                                • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                                • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                                • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                                APIs
                                                • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                                • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,00000011,00000002), ref: 00402612
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Enum$CloseValue
                                                • String ID:
                                                • API String ID: 397863658-0
                                                • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                                • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                                • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                                • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                                APIs
                                                • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,00000011,00000002), ref: 00402612
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue
                                                • String ID:
                                                • API String ID: 3356406503-0
                                                • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                                • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                                • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                                • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                                APIs
                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                                • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                                • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                                • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                                APIs
                                                • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CloseDeleteValue
                                                • String ID:
                                                • API String ID: 2831762973-0
                                                • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                                • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                                • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                                • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                                APIs
                                                • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                                • GetLastError.KERNEL32 ref: 004058E7
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CreateDirectoryErrorLast
                                                • String ID:
                                                • API String ID: 1375471231-0
                                                • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                                • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                                • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                                • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                                APIs
                                                • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                                • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Window$EnableShow
                                                • String ID:
                                                • API String ID: 1136574915-0
                                                • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                                • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                                • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                                • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                                APIs
                                                • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                                • CloseHandle.KERNEL32(?), ref: 0040595C
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID:
                                                • API String ID: 3712363035-0
                                                • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                                • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                                • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                                • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                                APIs
                                                • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                  • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                  • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                                  • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                • String ID:
                                                • API String ID: 2547128583-0
                                                • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                                • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                                • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                                • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                                APIs
                                                • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: File$AttributesCreate
                                                • String ID:
                                                • API String ID: 415043291-0
                                                • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                                • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                                • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                                • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                                APIs
                                                • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004058F7
                                                • GetLastError.KERNEL32(?,?,0000000A,?), ref: 00405905
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CreateDirectoryErrorLast
                                                • String ID:
                                                • API String ID: 1375471231-0
                                                • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                                • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                                APIs
                                                • EnumWindows.USER32(00000000), ref: 6FD82B87
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: EnumWindows
                                                • String ID:
                                                • API String ID: 1129996299-0
                                                • Opcode ID: 8e2b641649fb8890e2d2e9a64054ddbd625efc6fa26a740256d66434d84cbbf6
                                                • Instruction ID: 806fde7f7932420e33d4020bf9c63bced7dc3f59441dea87c857cd5196cd411b
                                                • Opcode Fuzzy Hash: 8e2b641649fb8890e2d2e9a64054ddbd625efc6fa26a740256d66434d84cbbf6
                                                • Instruction Fuzzy Hash: 9B419072510704DFEB60DF68D981B5E37B8EF0673EF244826E426CA250C738B551ABA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: wsprintf
                                                • String ID:
                                                • API String ID: 2111968516-0
                                                • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                                • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                                • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                                • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                                APIs
                                                • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileMove
                                                • String ID:
                                                • API String ID: 3562171763-0
                                                • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                                • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                                • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                                • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                                APIs
                                                • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                                  • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FilePointerwsprintf
                                                • String ID:
                                                • API String ID: 327478801-0
                                                • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                                • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                                • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                                • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                                APIs
                                                • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: PrivateProfileStringWrite
                                                • String ID:
                                                • API String ID: 390214022-0
                                                • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                                • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                                • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                                • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                                APIs
                                                • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                                • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                                APIs
                                                • WriteFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,?,00000000), ref: 00405EDB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileWrite
                                                • String ID:
                                                • API String ID: 3934441357-0
                                                • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                                • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                                • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                                • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                                APIs
                                                • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,?,00000000,00000000,00000000), ref: 00405EAC
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                                • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                                • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                                • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                                APIs
                                                • VirtualProtect.KERNELBASE(6FD8504C,?,?,6FD8503C), ref: 6FD829CF
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: da1b269b586ed87e67437d7d881766cd0f4e55477b20ee60bdefeba5af0fc1c6
                                                • Instruction ID: a1f72425a0de6be99706075d847c52a00fc9b7a151f141c92fe3df644443a5b5
                                                • Opcode Fuzzy Hash: da1b269b586ed87e67437d7d881766cd0f4e55477b20ee60bdefeba5af0fc1c6
                                                • Instruction Fuzzy Hash: BCF0ACB0524B40DEEBA0CF2CC444B0A3FE0BB17779B18452AE17AD6341E3347064BB92
                                                APIs
                                                • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: PrivateProfileString
                                                • String ID:
                                                • API String ID: 1096422788-0
                                                • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                                • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                                • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                                • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                                APIs
                                                • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Open
                                                • String ID:
                                                • API String ID: 71445658-0
                                                • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                                • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                                APIs
                                                • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015CD
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                                • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                                • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                                • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                                APIs
                                                • SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 0040438B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                                • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                                • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                                • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                                APIs
                                                • SendMessageA.USER32(?,?,?,00404192), ref: 00404370
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                                • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                                • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                                • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                                APIs
                                                • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID:
                                                • API String ID: 587946157-0
                                                • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                                • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                                • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                                • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                                APIs
                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                                • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                                • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                                • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                                APIs
                                                • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CallbackDispatcherUser
                                                • String ID:
                                                • API String ID: 2492992576-0
                                                • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                                • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                                • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                                • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                                APIs
                                                  • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                  • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                  • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,00000000,00424440,75A023A0), ref: 0040542D
                                                  • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp\System.dll), ref: 0040543F
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                  • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                                  • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                                  • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,?), ref: 0040673B
                                                  • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                                  • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                • String ID:
                                                • API String ID: 2972824698-0
                                                • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                                • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                                • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                                • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                                APIs
                                                • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                                • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                                • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                                • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                                • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                                • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                                • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                                • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                                • lstrcatA.KERNEL32(?,Call), ref: 00404932
                                                • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                                  • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                                  • Part of subcall function 00406587: CharNextA.USER32(?,*?|<>/":,00000000,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                                  • Part of subcall function 00406587: CharNextA.USER32(?,?,?,00000000,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                                  • Part of subcall function 00406587: CharNextA.USER32(?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                                  • Part of subcall function 00406587: CharPrevA.USER32(?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                                • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,?,00429458,?,?,000003FB,?), ref: 00404A02
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                                  • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                  • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                                  • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                                • API String ID: 2624150263-243749230
                                                • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                                • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                                • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                                • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                                APIs
                                                • CoCreateInstance.OLE32(0040851C,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040221D
                                                • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 004022CF
                                                Strings
                                                • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes, xrefs: 0040225D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: ByteCharCreateInstanceMultiWide
                                                • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes
                                                • API String ID: 123533781-1320684958
                                                • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                                • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                                • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                                • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileFindFirst
                                                • String ID:
                                                • API String ID: 1974802433-0
                                                • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                                • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                                • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                                • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                                • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                                • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                                • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                                • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                                • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                                • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                                • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                                • GlobalAlloc.KERNEL32(?,?), ref: 00404DA5
                                                • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                                • SetWindowLongA.USER32(?,?,00405345), ref: 00404DD6
                                                • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404DE8
                                                • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                                • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                                • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                                • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404E2E
                                                • DeleteObject.GDI32(00000110), ref: 00404E33
                                                • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                                • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                                • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                                  • Part of subcall function 00404362: SendMessageA.USER32(?,?,?,00404192), ref: 00404370
                                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                                • GetWindowLongA.USER32(?,?), ref: 00404F76
                                                • SetWindowLongA.USER32(?,?,00000000), ref: 00404F84
                                                • ShowWindow.USER32(?,00000005), ref: 00404F94
                                                • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                                • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                                • SendMessageA.USER32(?,?,00000000,00000000), ref: 00405109
                                                • SendMessageA.USER32(?,00000420,00000000,?), ref: 0040512D
                                                • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                                • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                                • GlobalFree.KERNEL32(?), ref: 00405172
                                                • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                                • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                                • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                                • InvalidateRect.USER32(?,00000000,?), ref: 004052CE
                                                • ShowWindow.USER32(?,00000000), ref: 0040531C
                                                • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                                • ShowWindow.USER32(00000000), ref: 0040532E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: $M$N
                                                • API String ID: 2564846305-813528018
                                                • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                                • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                                • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                                • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                                APIs
                                                • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404523
                                                • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                                • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 00404555
                                                • GetSysColor.USER32(?), ref: 00404566
                                                • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                                • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                                • lstrlenA.KERNEL32(?), ref: 00404587
                                                • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                                • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                                • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                                • SendMessageA.USER32(00000000), ref: 00404610
                                                • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                                • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                                • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                                • SetCursor.USER32(00000000), ref: 00404693
                                                • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                                • SetCursor.USER32(00000000), ref: 004046AC
                                                • SendMessageA.USER32(00000111,?,00000000), ref: 004046D8
                                                • SendMessageA.USER32(?,00000000,00000000), ref: 004046EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                • String ID: Call$N$cD@
                                                • API String ID: 3103080414-3938186718
                                                • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                                • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                                • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                                • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                                APIs
                                                • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextA.USER32(00000000,forholdsordren Setup,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F$forholdsordren Setup
                                                • API String ID: 941294808-4059315213
                                                • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                                • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                                APIs
                                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                                • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                                  • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                  • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                                • wsprintfA.USER32 ref: 00405F6B
                                                • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,?,0042C618,?,?,?,?,?), ref: 00405FA6
                                                • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405FB5
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                                • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                                • GlobalFree.KERNEL32(00000000), ref: 00406054
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                                  • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                  • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                • String ID: %s=%s$[Rename]
                                                • API String ID: 2171350718-1727408572
                                                • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                                • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                                • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                                • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                                APIs
                                                • CharNextA.USER32(?,*?|<>/":,00000000,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                                • CharNextA.USER32(?,?,?,00000000,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                                • CharNextA.USER32(?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                                • CharPrevA.USER32(?,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                                Strings
                                                • "C:\Users\user\Desktop\HJEbEB40vP.exe", xrefs: 00406587
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                                • *?|<>/":, xrefs: 004065CF
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: "C:\Users\user\Desktop\HJEbEB40vP.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 589700163-2763098445
                                                • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                                • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                                APIs
                                                • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                                • GetSysColor.USER32(00000000), ref: 004043EF
                                                • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                                • SetBkMode.GDI32(?,?), ref: 00404407
                                                • GetSysColor.USER32(?), ref: 0040441A
                                                • SetBkColor.GDI32(?,?), ref: 0040442A
                                                • DeleteObject.GDI32(?), ref: 00404444
                                                • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                                • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                                APIs
                                                  • Part of subcall function 6FD812A5: GlobalAlloc.KERNEL32(?,6FD812C3,?,6FD8135F,-6FD8504B,6FD811C0,-000000A0), ref: 6FD812AD
                                                • GlobalFree.KERNEL32(?), ref: 6FD8266E
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD826A8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc
                                                • String ID:
                                                • API String ID: 1780285237-0
                                                • Opcode ID: 964ca0a6e495f72259960843728ba486d825df6cc6cdba921134f7bbba778207
                                                • Instruction ID: 7b477fdf43b607970593da4e57c2fdffb33ffffe4d857876af889c8f0c755cbc
                                                • Opcode Fuzzy Hash: 964ca0a6e495f72259960843728ba486d825df6cc6cdba921134f7bbba778207
                                                • Instruction Fuzzy Hash: 3541DE71108600EFEB418FA8CD85D2F7BBAFB8732AB044669F57197240C731B8189B62
                                                APIs
                                                • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                                • GetMessagePos.USER32 ref: 00404CA3
                                                • ScreenToClient.USER32(?,?), ref: 00404CBD
                                                • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                                • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                                • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                                APIs
                                                • GetDC.USER32(?), ref: 00401E5D
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                                • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                                • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID: Tahoma
                                                • API String ID: 3808545654-3580928618
                                                • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                                • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                                • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                                • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                                APIs
                                                • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E65
                                                • MulDiv.KERNEL32(0007AFFA,?,0007B1FE), ref: 00402E90
                                                • wsprintfA.USER32 ref: 00402EA0
                                                • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                                • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                                Strings
                                                • verifying installer: %d%%, xrefs: 00402E9A
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: verifying installer: %d%%
                                                • API String ID: 1451636040-82062127
                                                • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                                • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                                APIs
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD824D7
                                                  • Part of subcall function 6FD812B4: lstrcpynA.KERNEL32(00000000,?,6FD8135F,-6FD8504B,6FD811C0,-000000A0), ref: 6FD812C4
                                                • GlobalAlloc.KERNEL32(?,?), ref: 6FD82452
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6FD82467
                                                • GlobalAlloc.KERNEL32(?,?), ref: 6FD82478
                                                • CLSIDFromString.OLE32(00000000,00000000), ref: 6FD82486
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD8248D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                • String ID:
                                                • API String ID: 3730416702-0
                                                • Opcode ID: 48d8db155a032310224b3b94300e4a5a1c8fb43ba0cb34713610e23ed2be4f30
                                                • Instruction ID: 5a2d3c2641a54a2dd852873890876b65d6aafa606f3b00c822bec25a516e81a1
                                                • Opcode Fuzzy Hash: 48d8db155a032310224b3b94300e4a5a1c8fb43ba0cb34713610e23ed2be4f30
                                                • Instruction Fuzzy Hash: 8041BEB1504700EFE7509F289840B6A73E8FB4232AF144A5EF5B6DBA80D770B544CB61
                                                APIs
                                                  • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                                  • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                                • GlobalAlloc.KERNEL32(?,?), ref: 0040286E
                                                  • Part of subcall function 00403390: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                                • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040288A
                                                • GlobalFree.KERNEL32(?), ref: 004028C9
                                                • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                                  • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 004031CF
                                                  • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 00403276
                                                  • Part of subcall function 00403168: MulDiv.KERNEL32(7FFFFFFF,?,?), ref: 0040329F
                                                  • Part of subcall function 00403168: wsprintfA.USER32 ref: 004032AF
                                                • CloseHandle.KERNEL32(?,?,?), ref: 004028F8
                                                • DeleteFileA.KERNEL32(?), ref: 0040290B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                                • String ID:
                                                • API String ID: 2082585436-0
                                                • Opcode ID: 4de34a0584c9f07ca01e631d387470c66e36086a4f72a89d30526263dc69d697
                                                • Instruction ID: ef30041e15382934485b3a1dbcd939e881a8f40863dcc9ce189fd72ebc1ad175
                                                • Opcode Fuzzy Hash: 4de34a0584c9f07ca01e631d387470c66e36086a4f72a89d30526263dc69d697
                                                • Instruction Fuzzy Hash: B8213972C00128BBDF216FA5DD8899EBE79BF04364F10823AF554B62E0CB7949419F68
                                                APIs
                                                • GetDlgItem.USER32(?,?), ref: 00401DA3
                                                • GetClientRect.USER32(?,?), ref: 00401DF1
                                                • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                                • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                                • DeleteObject.GDI32(00000000), ref: 00401E45
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                • String ID:
                                                • API String ID: 1849352358-0
                                                • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                                • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                                APIs
                                                • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                                • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                                • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                                APIs
                                                • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                • wsprintfA.USER32 ref: 00404C1C
                                                • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s
                                                • API String ID: 3540041739-3551169577
                                                • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                                • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                                • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                                • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                                APIs
                                                  • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,forholdsordren Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                                  • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405CC6
                                                  • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                                  • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405D60
                                                • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsi6D71.tmp
                                                • API String ID: 3248276644-3343979795
                                                • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                                • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                                • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                                • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                                APIs
                                                • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C25
                                                • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C2E
                                                • lstrcatA.KERNEL32(?,0040A014,?,?,0000000A,?), ref: 00405C3F
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrcatlstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 2659869361-3355392842
                                                • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                                • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                                • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                                • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                                APIs
                                                • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,C:\Users\user\AppData\Local\Temp\nsi6D71.tmp,75A03410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,75A03410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\HJEbEB40vP.exe"), ref: 00405CC6
                                                • CharNextA.USER32(00000000), ref: 00405CCB
                                                • CharNextA.USER32(00000000), ref: 00405CDF
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\nsi6D71.tmp, xrefs: 00405CB9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CharNext
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsi6D71.tmp
                                                • API String ID: 3213498283-4242058899
                                                • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                                • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                                • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                                • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                                APIs
                                                • DestroyWindow.USER32(00000000,00000000,004030AB,?,?,?,00403722,?,?,?,0000000A,?), ref: 00402EE0
                                                • GetTickCount.KERNEL32 ref: 00402EFE
                                                • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                                • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,?,0000000A,?), ref: 00402F29
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                • String ID:
                                                • API String ID: 2102729457-0
                                                • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                                • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00405374
                                                • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                                  • Part of subcall function 00404379: SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 0040438B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                                • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                                APIs
                                                • FreeLibrary.KERNEL32(?,75A03410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,?,0000000A,?), ref: 00403A1B
                                                • GlobalFree.KERNEL32(008543E0), ref: 00403A22
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Free$GlobalLibrary
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 1100898210-3355392842
                                                • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                                • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                                • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                                • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                                APIs
                                                • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HJEbEB40vP.exe,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A), ref: 00405C6C
                                                • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\HJEbEB40vP.exe,C:\Users\user\Desktop\HJEbEB40vP.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrlen
                                                • String ID: C:\Users\user\Desktop
                                                • API String ID: 2709904686-3370423016
                                                • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                                • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                                • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                                • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                                APIs
                                                • GlobalAlloc.KERNEL32(?,?), ref: 6FD8116B
                                                • GlobalAlloc.KERNEL32(?,?), ref: 6FD811D8
                                                • GlobalFree.KERNEL32(?), ref: 6FD81286
                                                • GlobalFree.KERNEL32(00000000), ref: 6FD8129B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7664745035.000000006FD81000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FD80000, based on PE: true
                                                • Associated: 00000001.00000002.7664657780.000000006FD80000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664834838.000000006FD84000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                • Associated: 00000001.00000002.7664921643.000000006FD86000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6fd80000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree
                                                • String ID:
                                                • API String ID: 3394109436-0
                                                • Opcode ID: 629f54c3c17c08cbef59e0392d130bdecc032f9c5ce73930273b3a60d743fc02
                                                • Instruction ID: 1ebea2af96fbdca0a7ed51994bbb78683f9cd39450028a1a0e4cc2a26b32a333
                                                • Opcode Fuzzy Hash: 629f54c3c17c08cbef59e0392d130bdecc032f9c5ce73930273b3a60d743fc02
                                                • Instruction Fuzzy Hash: 64519C755147059FEB91CF68C885BAA7BF8FB0B364B08005AE576DB350D730B828DBA1
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                                • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                                • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.7641484541.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.7641421634.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641546324.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641592808.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000001.00000002.7641922244.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_HJEbEB40vP.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                                • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C