Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EB2UOXRNsE.exe

Overview

General Information

Sample name:EB2UOXRNsE.exe
renamed because original name is a hash value
Original sample name:03f4b8000f6c3fbe937607f08477b92d.exe
Analysis ID:1581381
MD5:03f4b8000f6c3fbe937607f08477b92d
SHA1:03c24fda0aadcc63006106b94fc56201eec88c5d
SHA256:f531d40ce5491c7aad0dbb198638431276b4574aba7585ca982e3b84b046b091
Tags:exeuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
PE file has a writeable .text section
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • EB2UOXRNsE.exe (PID: 6308 cmdline: "C:\Users\user\Desktop\EB2UOXRNsE.exe" MD5: 03F4B8000F6C3FBE937607F08477B92D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EB2UOXRNsE.exeVirustotal: Detection: 43%Perma Link
Source: EB2UOXRNsE.exeReversingLabs: Detection: 52%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.8% probability
Source: EB2UOXRNsE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeWindow detected: &Next >CancelDiezel Amps Bundle WiN Diezel Amps Bundle WiNLicense AgreementPlease review the license terms before installing Diezel Amps Bundle WiN.Press Page Down to see the rest of the agreement.Welcome this is an important message and license agreement so please read all below carefully. Diezel Amps Bundle WiN is financed by advertisement. By clicking Accept you will continue with the installation of Diezel Amps Bundle WiN and the offers listed below.Get an unparalleled gaming and browsing experience on mobile and desktop with OperaGX. Set limits on CPU RAM and Network usage use Discord & Twitch from the sidebar and connect mobile and desktop browsers with the file-sharing Flow feature. By clicking "Accept" I agree to the EULA <https://legal.opera.com/eula/computers/> Privacy Policy <https://legal.opera.com/privacy/> and consent to install.clicking "I Agree" you agree to the EULA <http://goo.gl/fxTiKZ> and consent to install DotDo.ads in your browser without hassle. No more annoying advertiement and pop up ads!A proxy service to protect your privacy. Accept the EULA <https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabe> by pressing "Agree". Y-Cleaner is fast and easy way to clean and keep your PC optimized.By clicking "Accept" I agree to the EULA <https://y-cleaner.com/eula.php > and consent to install.your PC run like its brand new! Install Windows Manager the best utility for windows! Accept the EULA <https://advancedmanager.io/eula> and Privacy Policy <https://advancedmanager.io/privacy-policy> by pressing "Agree". If you accept the terms of the agreement click I Agree to continue. You must accept the agreement to install Diezel Amps Bundle WiN.
Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,0_2_00405E61
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_0040548B
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /star.php?a=3942&cc=DE&t=1735087457 HTTP/1.1User-Agent: InnoDownloadPlugin/1.5Host: aftermathbirthday.icuConnection: Keep-AliveCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: aftermathbirthday.icu
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/dol.php?paw=144028&spot=5&a=2666&on=440&o=1674&cr=
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/dol.php?paw=345378&spot=4&a=2666&on=443&o=1677&cr=
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/dol.php?paw=638764&spot=3&a=2666&on=487&o=1706&cr=
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/dol.php?paw=749502&spot=6&a=2666&on=244&o=331&cr=
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/dol.php?paw=770445&spot=1&a=2666&on=420&o=1662&cr=
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/dol.php?paw=941484&spot=2&a=2666&on=310&o=365&cr=
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1662&a=2666&dn=420&sp
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1674&a=2666&dn=440&sp
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1677&a=2666&dn=443&sp
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1706&a=2666&dn=487&sp
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=331&a=2666&dn=244&spo
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=365&a=2666&dn=310&spo
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1662&a=2666&dn=420&s
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1674&a=2666&dn=440&s
Source: nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1677&a=2666&dn=443&s
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1706&a=2666&dn=487&s
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=331&a=2666&dn=244&sp
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=365&a=2666&dn=310&sp
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1662&a=2666&dn=4
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1674&a=2666&dn=4
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1677&a=2666&dn=4
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1706&a=2666&dn=4
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=331&a=2666&dn=24
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=365&a=2666&dn=31
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1662&a=2666&dn=420&spot=
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1674&a=2666&dn=440&spot=
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1677&a=2666&dn=443&spot=
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1706&a=2666&dn=487&spot=
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=331&a=2666&dn=244&spot=6
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=365&a=2666&dn=310&spot=2
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: idman641build3.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://goo.gl/fxTiKZ
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://log.egglamp.xyz/track_polosEU.php?tim=1735087457&rcc=DE&c=2666&p=0.27
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: http://log.egglamp.xyz/track_polosEU.php?tim=1735087457&rcc=DE&c=2666&p=0.27Inno
Source: EB2UOXRNsE.exe, 00000000.00000002.3405248489.0000000005530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
Source: EB2UOXRNsE.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: EB2UOXRNsE.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: nse3103.tmp.0.dr, idman641build3.exe.0.drString found in binary or memory: http://www.internetdownloadmanager.com6
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://advancedmanager.io/eula
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://advancedmanager.io/privacy-policy
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.000000000065C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.000000000065C000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000003.2448649629.00000000006B9000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000002.3404038334.0000000000697000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000003.2448754777.0000000000696000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000002.3404082616.00000000006BA000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.00000000005EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457:
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457InnoDownloadPlugin/1.5/USERAGENT/sil
Source: EB2UOXRNsE.exe, 00000000.00000003.2448649629.00000000006B9000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000002.3404082616.00000000006BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457JKq
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.00000000005EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457V
Source: EB2UOXRNsE.exe, 00000000.00000002.3404038334.0000000000697000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000003.2448754777.0000000000696000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457Y
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.00000000005EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457b
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.000000000063A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457ll
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://legal.opera.com/eula/computers/
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://legal.opera.com/privacy/
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabe
Source: EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drString found in binary or memory: https://y-cleaner.com/eula.php
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00405042 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405042

System Summary

barindex
Source: idman641build3.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040323C
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_004048530_2_00404853
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_004061310_2_00406131
Source: EB2UOXRNsE.exe, 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameinetc.dllF vs EB2UOXRNsE.exe
Source: EB2UOXRNsE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/5@1/1
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00404356 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404356
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\star[1].phpJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeFile created: C:\Users\user\AppData\Local\Temp\nsu30C4.tmpJump to behavior
Source: EB2UOXRNsE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EB2UOXRNsE.exeVirustotal: Detection: 43%
Source: EB2UOXRNsE.exeReversingLabs: Detection: 52%
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeFile read: C:\Users\user\Desktop\EB2UOXRNsE.exeJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeWindow detected: &Next >CancelDiezel Amps Bundle WiN Diezel Amps Bundle WiNLicense AgreementPlease review the license terms before installing Diezel Amps Bundle WiN.Press Page Down to see the rest of the agreement.Welcome this is an important message and license agreement so please read all below carefully. Diezel Amps Bundle WiN is financed by advertisement. By clicking Accept you will continue with the installation of Diezel Amps Bundle WiN and the offers listed below.Get an unparalleled gaming and browsing experience on mobile and desktop with OperaGX. Set limits on CPU RAM and Network usage use Discord & Twitch from the sidebar and connect mobile and desktop browsers with the file-sharing Flow feature. By clicking "Accept" I agree to the EULA <https://legal.opera.com/eula/computers/> Privacy Policy <https://legal.opera.com/privacy/> and consent to install.clicking "I Agree" you agree to the EULA <http://goo.gl/fxTiKZ> and consent to install DotDo.ads in your browser without hassle. No more annoying advertiement and pop up ads!A proxy service to protect your privacy. Accept the EULA <https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabe> by pressing "Agree". Y-Cleaner is fast and easy way to clean and keep your PC optimized.By clicking "Accept" I agree to the EULA <https://y-cleaner.com/eula.php > and consent to install.your PC run like its brand new! Install Windows Manager the best utility for windows! Accept the EULA <https://advancedmanager.io/eula> and Privacy Policy <https://advancedmanager.io/privacy-policy> by pressing "Agree". If you accept the terms of the agreement click I Agree to continue. You must accept the agreement to install Diezel Amps Bundle WiN.
Source: EB2UOXRNsE.exeStatic file information: File size 11391011 > 1048576
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E88
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeFile created: C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeFile created: C:\idman641build3.exeJump to dropped file
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\inetc.dllJump to dropped file
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeDropped PE file which has not been started: C:\idman641build3.exeJump to dropped file
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,0_2_00405E61
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_0040548B
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: EB2UOXRNsE.exe, 00000000.00000003.2448754777.00000000006A9000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000002.3404038334.00000000006A9000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000002.3403791987.000000000065C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: EB2UOXRNsE.exeBinary or memory string: iHGFS
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeAPI call chain: ExitProcess graph end nodegraph_0-3395
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeAPI call chain: ExitProcess graph end nodegraph_0-3397
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E88
Source: C:\Users\user\Desktop\EB2UOXRNsE.exeCode function: 0_2_00405B88 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B88
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EB2UOXRNsE.exe43%VirustotalBrowse
EB2UOXRNsE.exe53%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\inetc.dll5%ReversingLabs
C:\idman641build3.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1677&a=2666&dn=40%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457InnoDownloadPlugin/1.5/USERAGENT/sil0%Avira URL Cloudsafe
https://y-cleaner.com/eula.php0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1674&a=2666&dn=40%Avira URL Cloudsafe
http://www.internetdownloadmanager.com60%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=331&a=2666&dn=244&spot=60%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1677&a=2666&dn=443&s0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1677&a=2666&dn=443&sp0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=365&a=2666&dn=310&spot=20%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1674&a=2666&dn=440&spot=0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=365&a=2666&dn=310&sp0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=331&a=2666&dn=244&spo0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1706&a=2666&dn=487&s0%Avira URL Cloudsafe
http://aftermathbirthday.icu/dol.php?paw=749502&spot=6&a=2666&on=244&o=331&cr=0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=331&a=2666&dn=240%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457ll0%Avira URL Cloudsafe
http://log.egglamp.xyz/track_polosEU.php?tim=1735087457&rcc=DE&c=2666&p=0.27Inno0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1662&a=2666&dn=420&spot=0%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457JKq0%Avira URL Cloudsafe
https://legal.opera.com/eula/computers/0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1674&a=2666&dn=440&sp0%Avira URL Cloudsafe
http://aftermathbirthday.icu/dol.php?paw=770445&spot=1&a=2666&on=420&o=1662&cr=0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1662&a=2666&dn=40%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1706&a=2666&dn=487&sp0%Avira URL Cloudsafe
https://advancedmanager.io/eula0%Avira URL Cloudsafe
https://advancedmanager.io/privacy-policy0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=365&a=2666&dn=310&spo0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1662&a=2666&dn=420&s0%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457Y0%Avira URL Cloudsafe
http://aftermathbirthday.icu/dol.php?paw=144028&spot=5&a=2666&on=440&o=1674&cr=0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1674&a=2666&dn=440&s0%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457V0%Avira URL Cloudsafe
http://log.egglamp.xyz/track_polosEU.php?tim=1735087457&rcc=DE&c=2666&p=0.270%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457b0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1706&a=2666&dn=487&spot=0%Avira URL Cloudsafe
http://aftermathbirthday.icu/dol.php?paw=638764&spot=3&a=2666&on=487&o=1706&cr=0%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=17350874570%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=365&a=2666&dn=310%Avira URL Cloudsafe
https://aftermathbirthday.icu/0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1677&a=2666&dn=443&spot=0%Avira URL Cloudsafe
http://aftermathbirthday.icu/dol.php?paw=941484&spot=2&a=2666&on=310&o=365&cr=0%Avira URL Cloudsafe
https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457:0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1706&a=2666&dn=40%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1662&a=2666&dn=420&sp0%Avira URL Cloudsafe
http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=331&a=2666&dn=244&sp0%Avira URL Cloudsafe
https://legal.opera.com/privacy/0%Avira URL Cloudsafe
http://aftermathbirthday.icu/dol.php?paw=345378&spot=4&a=2666&on=443&o=1677&cr=0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
aftermathbirthday.icu
104.21.112.1
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1674&a=2666&dn=4EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.internetdownloadmanager.com6nse3103.tmp.0.dr, idman641build3.exe.0.drfalse
    • Avira URL Cloud: safe
    unknown
    https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457InnoDownloadPlugin/1.5/USERAGENT/silEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1677&a=2666&dn=4EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1674&a=2666&dn=440&spot=EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1677&a=2666&dn=443&spEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    https://y-cleaner.com/eula.phpEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1677&a=2666&dn=443&snse3103.tmp.0.drfalse
    • Avira URL Cloud: safe
    unknown
    https://www.termsfeed.com/live/4bb495ca-d123-4f4d-a727-e9c4d0f3fabeEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
      high
      http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=331&a=2666&dn=244&spot=6EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=365&a=2666&dn=310&spot=2EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://goo.gl/fxTiKZEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        high
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=365&a=2666&dn=310&spEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1706&a=2666&dn=487&sEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=331&a=2666&dn=244&spoEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=331&a=2666&dn=24EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1662&a=2666&dn=420&spot=EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457llEB2UOXRNsE.exe, 00000000.00000002.3403791987.000000000063A000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://log.egglamp.xyz/track_polosEU.php?tim=1735087457&rcc=DE&c=2666&p=0.27InnoEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457JKqEB2UOXRNsE.exe, 00000000.00000003.2448649629.00000000006B9000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000002.3404082616.00000000006BA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/dol.php?paw=749502&spot=6&a=2666&on=244&o=331&cr=nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://legal.opera.com/eula/computers/EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1662&a=2666&dn=4EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/dol.php?paw=770445&spot=1&a=2666&on=420&o=1662&cr=nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1706&a=2666&dn=487&spEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://advancedmanager.io/eulaEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1674&a=2666&dn=440&spEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=365&a=2666&dn=310&spoEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://microsoft.coEB2UOXRNsE.exe, 00000000.00000002.3405248489.0000000005530000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://aftermathbirthday.icu/dol.php?paw=144028&spot=5&a=2666&on=440&o=1674&cr=nse3103.tmp.0.drfalse
          • Avira URL Cloud: safe
          unknown
          http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1662&a=2666&dn=420&snse3103.tmp.0.drfalse
          • Avira URL Cloud: safe
          unknown
          https://advancedmanager.io/privacy-policyEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
          • Avira URL Cloud: safe
          unknown
          https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457YEB2UOXRNsE.exe, 00000000.00000002.3404038334.0000000000697000.00000004.00000020.00020000.00000000.sdmp, EB2UOXRNsE.exe, 00000000.00000003.2448754777.0000000000696000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=1674&a=2666&dn=440&sEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
          • Avira URL Cloud: safe
          unknown
          https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457VEB2UOXRNsE.exe, 00000000.00000002.3403791987.00000000005EB000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorEB2UOXRNsE.exefalse
            high
            https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457bEB2UOXRNsE.exe, 00000000.00000002.3403791987.00000000005EB000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://log.egglamp.xyz/track_polosEU.php?tim=1735087457&rcc=DE&c=2666&p=0.27EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1706&a=2666&dn=487&spot=EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://aftermathbirthday.icu/dol.php?paw=638764&spot=3&a=2666&on=487&o=1706&cr=nse3103.tmp.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=365&a=2666&dn=31EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorEB2UOXRNsE.exefalse
              high
              https://aftermathbirthday.icu/EB2UOXRNsE.exe, 00000000.00000002.3403791987.000000000065C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_exists&ko=no&o=1677&a=2666&dn=443&spot=EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://aftermathbirthday.icu/dol.php?paw=941484&spot=2&a=2666&on=310&o=365&cr=nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution_fail&ko=no&o=1706&a=2666&dn=4EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              https://aftermathbirthday.icu/star.php?a=3942&cc=DE&t=1735087457:EB2UOXRNsE.exe, 00000000.00000002.3403791987.00000000005EB000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=no&o=1662&a=2666&dn=420&spEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://aftermathbirthday.icu/lod.php?fz=&d=nsis&msg=&r=offer_execution&ko=yes&o=331&a=2666&dn=244&spEB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              https://legal.opera.com/privacy/EB2UOXRNsE.exe, 00000000.00000002.3403791987.0000000000623000.00000004.00000020.00020000.00000000.sdmp, nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://aftermathbirthday.icu/dol.php?paw=345378&spot=4&a=2666&on=443&o=1677&cr=nse3103.tmp.0.drfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.21.112.1
              aftermathbirthday.icuUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1581381
              Start date and time:2024-12-27 14:41:13 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 48s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:EB2UOXRNsE.exe
              renamed because original name is a hash value
              Original Sample Name:03f4b8000f6c3fbe937607f08477b92d.exe
              Detection:MAL
              Classification:mal56.winEXE@1/5@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 37
              • Number of non-executed functions: 26
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
              • Excluded IPs from analysis (whitelisted): 2.16.158.171, 2.16.158.184, 2.16.158.186, 2.16.158.192, 2.16.158.32, 2.16.158.27, 2.16.158.26, 2.16.158.35, 2.16.158.176, 40.126.53.19, 20.223.35.26, 13.107.246.63, 52.149.20.212, 20.31.169.57, 150.171.27.10
              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, www-www.bing.com.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, login.live.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.21.112.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
              • beammp.com/phpmyadmin/
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSFXdg37pY22.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.66.86
              gshv2.exeGet hashmaliciousUnknownBrowse
              • 162.159.129.233
              OiMp3TH.exeGet hashmaliciousLummaCBrowse
              • 172.67.216.236
              https://dnsextension.pro/invoice/d2d0bf8701b34bc296ca83b956c10720Get hashmaliciousUnknownBrowse
              • 104.21.31.138
              k0ukcEH.exeGet hashmaliciousLummaCBrowse
              • 172.67.157.254
              appFile.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.94.92
              FloydMounts.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.25.41
              5uVReRlvME.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Remcos, StealcBrowse
              • 172.67.165.185
              0A7XTINw3R.exeGet hashmaliciousUnknownBrowse
              • 104.26.8.44
              RDb082EApV.exeGet hashmaliciousLummaCBrowse
              • 104.21.11.101
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19gshv2.exeGet hashmaliciousUnknownBrowse
              • 104.21.112.1
              DOTA2#U89c6#U8ddd#U63d2#U4ef6.exeGet hashmaliciousUnknownBrowse
              • 104.21.112.1
              n5Szx8qsFB.lnkGet hashmaliciousUnknownBrowse
              • 104.21.112.1
              InExYnlM0N.lnkGet hashmaliciousUnknownBrowse
              • 104.21.112.1
              K9esyY0r4G.lnkGet hashmaliciousUnknownBrowse
              • 104.21.112.1
              vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
              • 104.21.112.1
              aD7D9fkpII.exeGet hashmaliciousVidarBrowse
              • 104.21.112.1
              installer.batGet hashmaliciousVidarBrowse
              • 104.21.112.1
              skript.batGet hashmaliciousVidarBrowse
              • 104.21.112.1
              din.exeGet hashmaliciousVidarBrowse
              • 104.21.112.1
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\inetc.dllwinrar-x64-620b2.exeGet hashmaliciousUnknownBrowse
                quTbWcnSay.exeGet hashmaliciousUnknownBrowse
                  A897F2A98B77B6BFB6DBC62BF37A872DFA90C06387607.exeGet hashmaliciousUnknownBrowse
                    0D79B46F4C9E6F78C0655E3B2A6DD2A0F7B47DB44513D.exeGet hashmaliciousUnknownBrowse
                      BB4D7CD815700D90E229D1D6FA672B46842B66FFEDE69.exeGet hashmaliciousUnknownBrowse
                        61487917009BBCC5F0DAC7840265060F070ADC22139FB.exeGet hashmaliciousUnknownBrowse
                          1787A87F208CD0898943BD70E7E76A2C8B1B39679B20A.exeGet hashmaliciousUnknownBrowse
                            A6A4706B8EFFF748CD8FDB24D6421683BAF448C9881F3.exeGet hashmaliciousUnknownBrowse
                              81B7FB00321A57D0632B50993D514D34E586E86564C13.exeGet hashmaliciousUnknownBrowse
                                F2156D1783E3AC6CE1A003A5543AB525A648D87061ED9.exeGet hashmaliciousUnknownBrowse
                                  C:\idman641build3.exewinrar-x64-620b2.exeGet hashmaliciousUnknownBrowse
                                    Process:C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):2
                                    Entropy (8bit):1.0
                                    Encrypted:false
                                    SSDEEP:3:+:+
                                    MD5:7FA3B767C460B54A2BE4D49030B349C7
                                    SHA1:FD1286353570C5703799BA76999323B7C7447B06
                                    SHA-256:9390298F3FB0C5B160498935D79CB139AEF28E1C47358B4BBBA61862B9C26E59
                                    SHA-512:22494AF556A0782623729D0B5A9878F80AA6C21A6F51D346771842D613F51073C3B02FAB211BAFF42FB1998F38B77250DC7A1C71DD98B4B00CAE9620A6102AD7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:no
                                    Process:C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):23040
                                    Entropy (8bit):5.540206398655926
                                    Encrypted:false
                                    SSDEEP:384:PWc7V9H6MVsnCPFN4DC5/kdhdj/ouVj19L0d10Ac9khYLMkIX0+GbyeEaI2sJ:PWqTH/V7tHSWutp
                                    MD5:CAB75D596ADF6BAC4BA6A8374DD71DE9
                                    SHA1:FB90D4F13331D0C9275FA815937A4FF22EAD6FA3
                                    SHA-256:89E24E4124B607F3F98E4DF508C4DDD2701D8F7FCF1DC6E2ABA11D56C97C0C5A
                                    SHA-512:510786599289C8793526969CFE0A96E049436D40809C1C351642B2C67D5FB2394CB20887010727A5DA35C52A20C5557AD940967053B1B59AD91CA1307208C391
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 5%
                                    Joe Sandbox View:
                                    • Filename: winrar-x64-620b2.exe, Detection: malicious, Browse
                                    • Filename: quTbWcnSay.exe, Detection: malicious, Browse
                                    • Filename: A897F2A98B77B6BFB6DBC62BF37A872DFA90C06387607.exe, Detection: malicious, Browse
                                    • Filename: 0D79B46F4C9E6F78C0655E3B2A6DD2A0F7B47DB44513D.exe, Detection: malicious, Browse
                                    • Filename: BB4D7CD815700D90E229D1D6FA672B46842B66FFEDE69.exe, Detection: malicious, Browse
                                    • Filename: 61487917009BBCC5F0DAC7840265060F070ADC22139FB.exe, Detection: malicious, Browse
                                    • Filename: 1787A87F208CD0898943BD70E7E76A2C8B1B39679B20A.exe, Detection: malicious, Browse
                                    • Filename: A6A4706B8EFFF748CD8FDB24D6421683BAF448C9881F3.exe, Detection: malicious, Browse
                                    • Filename: 81B7FB00321A57D0632B50993D514D34E586E86564C13.exe, Detection: malicious, Browse
                                    • Filename: F2156D1783E3AC6CE1A003A5543AB525A648D87061ED9.exe, Detection: malicious, Browse
                                    Reputation:moderate, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........yP..*P..*P..*.:.*Y..*P..*...*.["*R..*.[#*Q..*.[.*Q..*]..*Q..*.[.*Q..*RichP..*........PE..L...?..V...........!.........^......!0.......@............................................@..........................D..l....D..d...............................X....................................................@..P............................text...!,.......................... ..`.rdata.......@.......2..............@..@.data...<<...P.......@..............@....rsrc................H..............@..@.reloc..X............R..............@..B................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):2
                                    Entropy (8bit):1.0
                                    Encrypted:false
                                    SSDEEP:3:+:+
                                    MD5:7FA3B767C460B54A2BE4D49030B349C7
                                    SHA1:FD1286353570C5703799BA76999323B7C7447B06
                                    SHA-256:9390298F3FB0C5B160498935D79CB139AEF28E1C47358B4BBBA61862B9C26E59
                                    SHA-512:22494AF556A0782623729D0B5A9878F80AA6C21A6F51D346771842D613F51073C3B02FAB211BAFF42FB1998F38B77250DC7A1C71DD98B4B00CAE9620A6102AD7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:no
                                    Process:C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):11365564
                                    Entropy (8bit):7.996927203658775
                                    Encrypted:true
                                    SSDEEP:196608:4Yq5pjxAwA/THcNwTAlAWzN+PpC6UQJlU/rnsfx+KNZeYez8aQHD2peix:4TtxAwAb8NwT1I+Z7inI+sZh/HKpR
                                    MD5:081B6659F179AF64F3851E89D3C298ED
                                    SHA1:18E562F1F38BCBA0A0796E47CE799C8C07FDAFC5
                                    SHA-256:C434CA527D7895D1BF291AF6C789CB04F4D3FC8D5DBCCE400A57262C05FAF5E2
                                    SHA-512:A23C90E8272122B4F402BECA94558D44EBC20FE67561666E3F96A08BCBDF41241FC6127B7A7D7E22E851E0306F30B115CF8D68B9814CA650218E31CDBB35790A
                                    Malicious:false
                                    Reputation:low
                                    Preview:.\......,........................;.......Z.......[..........................................................................1...................................................................................................................................................................................f.......................J.......................L...............j.......................J...................................................................................................................4........+..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):11318936
                                    Entropy (8bit):7.9978182614168265
                                    Encrypted:true
                                    SSDEEP:196608:UYq5pjxAwA/THcNwTAlAWzN+PpC6UQJlU/rnsfx+KNZeYez8aQHD2peix:UTtxAwAb8NwT1I+Z7inI+sZh/HKpR
                                    MD5:D82CD880F4AB8A8E574C1CC049C99304
                                    SHA1:390579E601945CBBD122DC1AEFBA1B94E1EFEE2C
                                    SHA-256:E3F599DDFDDD248D8C94DD88297B69166860C722B9A2B1E6FDC40C34FF367AB0
                                    SHA-512:18C2481255B237C3C73D8B0105BA32A41659FCF3C85F5174EA8F6808DDE11FE057591513F4A3ADD2667F6D461ECD9A66C14E5BAA2FDEF87C6CFEC817606D4B66
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 5%
                                    Joe Sandbox View:
                                    • Filename: winrar-x64-620b2.exe, Detection: malicious, Browse
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@,R.!B..!B..!B..>Q..!B..=L..!B..>H..!B..>F..!B..!C..!B...I..!B...H..!B.L'D..!B.Rich.!B.........PE..L....o;c.................<...h.......B.......P....@..................................,.......................................D..x....p..xG...............)..............................................................d............................text....;.......<.................. ....data........P.......@..............@....rsrc...xG...p...H...\..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Entropy (8bit):7.999801570159996
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 92.16%
                                    • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:EB2UOXRNsE.exe
                                    File size:11'391'011 bytes
                                    MD5:03f4b8000f6c3fbe937607f08477b92d
                                    SHA1:03c24fda0aadcc63006106b94fc56201eec88c5d
                                    SHA256:f531d40ce5491c7aad0dbb198638431276b4574aba7585ca982e3b84b046b091
                                    SHA512:e7ee774b3a7d3559f40dc7af76f8cfa02b5a01a9ae07a6d2070cab89b4c16f0fd79bda835484975701121063fd59afd695b65c1f7a05a2404ddf5c31091fb2a6
                                    SSDEEP:196608:U54G+SK8KEpQFh+K+kZShzllHSJlt5v+8zKInHAHmmRzuUaPPX2rR9sCorI:fG+SaaQ2Kbczlo51zKQHIRIzP+rR9aI
                                    TLSH:7BB6333129FFDB64E78496B1091D4A9FF0A0E73E02C8DBB35A1734B29A64351BD39C58
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\.........
                                    Icon Hash:0771ccf8d84d2907
                                    Entrypoint:0x40323c
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x4B1AE3C6 [Sat Dec 5 22:50:46 2009 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:099c0646ea7282d232219f8807883be0
                                    Instruction
                                    sub esp, 00000180h
                                    push ebx
                                    push ebp
                                    push esi
                                    xor ebx, ebx
                                    push edi
                                    mov dword ptr [esp+18h], ebx
                                    mov dword ptr [esp+10h], 00409130h
                                    xor esi, esi
                                    mov byte ptr [esp+14h], 00000020h
                                    call dword ptr [00407030h]
                                    push 00008001h
                                    call dword ptr [004070B4h]
                                    push ebx
                                    call dword ptr [0040727Ch]
                                    push 00000008h
                                    mov dword ptr [00423F58h], eax
                                    call 00007F30D4B7E11Eh
                                    mov dword ptr [00423EA4h], eax
                                    push ebx
                                    lea eax, dword ptr [esp+34h]
                                    push 00000160h
                                    push eax
                                    push ebx
                                    push 0041F458h
                                    call dword ptr [00407158h]
                                    push 004091B8h
                                    push 004236A0h
                                    call 00007F30D4B7DDD1h
                                    call dword ptr [004070B0h]
                                    mov edi, 00429000h
                                    push eax
                                    push edi
                                    call 00007F30D4B7DDBFh
                                    push ebx
                                    call dword ptr [0040710Ch]
                                    cmp byte ptr [00429000h], 00000022h
                                    mov dword ptr [00423EA0h], eax
                                    mov eax, edi
                                    jne 00007F30D4B7B51Ch
                                    mov byte ptr [esp+14h], 00000022h
                                    mov eax, 00429001h
                                    push dword ptr [esp+14h]
                                    push eax
                                    call 00007F30D4B7D8B2h
                                    push eax
                                    call dword ptr [0040721Ch]
                                    mov dword ptr [esp+1Ch], eax
                                    jmp 00007F30D4B7B575h
                                    cmp cl, 00000020h
                                    jne 00007F30D4B7B518h
                                    inc eax
                                    cmp byte ptr [eax], 00000020h
                                    je 00007F30D4B7B50Ch
                                    cmp byte ptr [eax], 00000022h
                                    mov byte ptr [eax+eax+00h], 00000000h
                                    Programming Language:
                                    • [EXP] VC++ 6.0 SP5 build 8804
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x3fe0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x5a5a0x5c000bc2ffd32265a08d72b795b18265828dFalse0.6604534646739131data6.417698236857409IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x70000x11900x1200f179218a059068529bdb4637ef5fa28eFalse0.4453125data5.181627099249737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x90000x1af980x400975304d6dd6c4a4f076b15511e2bbbc0False0.55859375data4.70902740305165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .ndata0x240000x140000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x380000x3fe00x40006c8afe19b579117fedd2131322762f5cFalse0.63214111328125data5.949666716811652IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x382e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                                    RT_ICON0x393880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                                    RT_ICON0x3a2300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                                    RT_ICON0x3aad80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                                    RT_ICON0x3b0400x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                                    RT_ICON0x3b4a80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                                    RT_ICON0x3b7900x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                                    RT_DIALOG0x3b8b80xb4dataEnglishUnited States0.6111111111111112
                                    RT_DIALOG0x3b9700x202dataEnglishUnited States0.4085603112840467
                                    RT_DIALOG0x3bb780xf8dataEnglishUnited States0.6290322580645161
                                    RT_DIALOG0x3bc700xeedataEnglishUnited States0.6260504201680672
                                    RT_GROUP_ICON0x3bd600x68dataEnglishUnited States0.6634615384615384
                                    RT_MANIFEST0x3bdc80x215XML 1.0 document, ASCII text, with very long lines (533), with no line terminatorsEnglishUnited States0.575984990619137
                                    DLLImport
                                    KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                    USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                    GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                    SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                    ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                    ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                    VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 27, 2024 14:42:18.193768978 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:18.193809032 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:18.193983078 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:18.205490112 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:18.205502987 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.467705965 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.467988968 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.541313887 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.541332006 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.541613102 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.541701078 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.547036886 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.591331959 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.946547985 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.946609020 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.946616888 CET44349718104.21.112.1192.168.2.6
                                    Dec 27, 2024 14:42:19.946670055 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.952297926 CET49718443192.168.2.6104.21.112.1
                                    Dec 27, 2024 14:42:19.952313900 CET44349718104.21.112.1192.168.2.6
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 27, 2024 14:42:17.884443045 CET5313353192.168.2.61.1.1.1
                                    Dec 27, 2024 14:42:18.189078093 CET53531331.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 27, 2024 14:42:17.884443045 CET192.168.2.61.1.1.10xeeb1Standard query (0)aftermathbirthday.icuA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.112.1A (IP address)IN (0x0001)false
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.96.1A (IP address)IN (0x0001)false
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.80.1A (IP address)IN (0x0001)false
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.64.1A (IP address)IN (0x0001)false
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.32.1A (IP address)IN (0x0001)false
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.16.1A (IP address)IN (0x0001)false
                                    Dec 27, 2024 14:42:18.189078093 CET1.1.1.1192.168.2.60xeeb1No error (0)aftermathbirthday.icu104.21.48.1A (IP address)IN (0x0001)false
                                    • aftermathbirthday.icu
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649718104.21.112.14436308C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    TimestampBytes transferredDirectionData
                                    2024-12-27 13:42:19 UTC166OUTGET /star.php?a=3942&cc=DE&t=1735087457 HTTP/1.1
                                    User-Agent: InnoDownloadPlugin/1.5
                                    Host: aftermathbirthday.icu
                                    Connection: Keep-Alive
                                    Cache-Control: no-cache
                                    2024-12-27 13:42:19 UTC802INHTTP/1.1 200 OK
                                    Date: Fri, 27 Dec 2024 13:42:19 GMT
                                    Content-Type: text/plain
                                    Content-Length: 2
                                    Connection: close
                                    X-Powered-By: PHP/5.5.38
                                    cf-cache-status: DYNAMIC
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dNY%2BT0dFeuFXkZOs0EQv%2F0Ln6G4z%2B0OtVjgvamPiPD8s8uuu1ZHt30bS5DgzBybB3P8jySqDuAQu%2ByQFz26fe2oO%2B9ublvwlVcqbrJyHwIUEr8Uhu35Q85XutpnAMqNO9Gxm1eM0jco%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8f89bbb55f5b43b3-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1585&min_rtt=1585&rtt_var=595&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2853&recv_bytes=780&delivery_rate=1839949&cwnd=198&unsent_bytes=0&cid=122f39699a83eda8&ts=489&x=0"
                                    2024-12-27 13:42:19 UTC2INData Raw: 6e 6f
                                    Data Ascii: no


                                    Click to jump to process

                                    Click to jump to process

                                    Target ID:0
                                    Start time:08:42:10
                                    Start date:27/12/2024
                                    Path:C:\Users\user\Desktop\EB2UOXRNsE.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\EB2UOXRNsE.exe"
                                    Imagebase:0x400000
                                    File size:11'391'011 bytes
                                    MD5 hash:03F4B8000F6C3FBE937607F08477B92D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:20.9%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:22.7%
                                      Total number of Nodes:1258
                                      Total number of Limit Nodes:37
                                      execution_graph 3692 401cc1 GetDlgItem GetClientRect 3693 4029f6 18 API calls 3692->3693 3694 401cf1 LoadImageA SendMessageA 3693->3694 3695 40288b 3694->3695 3696 401d0f DeleteObject 3694->3696 3696->3695 3697 401dc1 3698 4029f6 18 API calls 3697->3698 3699 401dc7 3698->3699 3700 4029f6 18 API calls 3699->3700 3701 401dd0 3700->3701 3702 4029f6 18 API calls 3701->3702 3703 401dd9 3702->3703 3704 4029f6 18 API calls 3703->3704 3705 401de2 3704->3705 3706 401423 25 API calls 3705->3706 3707 401de9 ShellExecuteA 3706->3707 3708 401e16 3707->3708 3069 405042 3070 405063 GetDlgItem GetDlgItem GetDlgItem 3069->3070 3071 4051ee 3069->3071 3115 403f4d SendMessageA 3070->3115 3073 4051f7 GetDlgItem CreateThread CloseHandle 3071->3073 3074 40521f 3071->3074 3073->3074 3121 404fd6 OleInitialize 3073->3121 3076 40524a 3074->3076 3077 405236 ShowWindow ShowWindow 3074->3077 3078 40526c 3074->3078 3075 4050d4 3080 4050db GetClientRect GetSystemMetrics SendMessageA SendMessageA 3075->3080 3079 4052a8 3076->3079 3082 405281 ShowWindow 3076->3082 3083 40525b 3076->3083 3117 403f4d SendMessageA 3077->3117 3084 403f7f 8 API calls 3078->3084 3079->3078 3089 4052b3 SendMessageA 3079->3089 3087 40514a 3080->3087 3088 40512e SendMessageA SendMessageA 3080->3088 3085 4052a1 3082->3085 3086 405293 3082->3086 3118 403ef1 3083->3118 3096 40527a 3084->3096 3092 403ef1 SendMessageA 3085->3092 3091 404f04 25 API calls 3086->3091 3093 40515d 3087->3093 3094 40514f SendMessageA 3087->3094 3088->3087 3095 4052cc CreatePopupMenu 3089->3095 3089->3096 3091->3085 3092->3079 3098 403f18 19 API calls 3093->3098 3094->3093 3097 405b88 18 API calls 3095->3097 3099 4052dc AppendMenuA 3097->3099 3100 40516d 3098->3100 3101 405302 3099->3101 3102 4052ef GetWindowRect 3099->3102 3103 405176 ShowWindow 3100->3103 3104 4051aa GetDlgItem SendMessageA 3100->3104 3106 40530b TrackPopupMenu 3101->3106 3102->3106 3107 405199 3103->3107 3108 40518c ShowWindow 3103->3108 3104->3096 3105 4051d1 SendMessageA SendMessageA 3104->3105 3105->3096 3106->3096 3109 405329 3106->3109 3116 403f4d SendMessageA 3107->3116 3108->3107 3110 405345 SendMessageA 3109->3110 3110->3110 3112 405362 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3110->3112 3113 405384 SendMessageA 3112->3113 3113->3113 3114 4053a5 GlobalUnlock SetClipboardData CloseClipboard 3113->3114 3114->3096 3115->3075 3116->3104 3117->3076 3119 403ef8 3118->3119 3120 403efe SendMessageA 3118->3120 3119->3120 3120->3078 3128 403f64 3121->3128 3123 405020 3124 403f64 SendMessageA 3123->3124 3125 405032 OleUninitialize 3124->3125 3127 404ff9 3127->3123 3131 401389 3127->3131 3129 403f7c 3128->3129 3130 403f6d SendMessageA 3128->3130 3129->3127 3130->3129 3133 401390 3131->3133 3132 4013fe 3132->3127 3133->3132 3134 4013cb MulDiv SendMessageA 3133->3134 3134->3133 3273 403a45 3274 403b98 3273->3274 3275 403a5d 3273->3275 3277 403be9 3274->3277 3278 403ba9 GetDlgItem GetDlgItem 3274->3278 3275->3274 3276 403a69 3275->3276 3280 403a74 SetWindowPos 3276->3280 3281 403a87 3276->3281 3279 403c43 3277->3279 3287 401389 2 API calls 3277->3287 3282 403f18 19 API calls 3278->3282 3283 403f64 SendMessageA 3279->3283 3334 403b93 3279->3334 3280->3281 3284 403aa4 3281->3284 3285 403a8c ShowWindow 3281->3285 3286 403bd3 SetClassLongA 3282->3286 3332 403c55 3283->3332 3288 403ac6 3284->3288 3289 403aac DestroyWindow 3284->3289 3285->3284 3290 40140b 2 API calls 3286->3290 3291 403c1b 3287->3291 3292 403acb SetWindowLongA 3288->3292 3293 403adc 3288->3293 3342 403ea1 3289->3342 3290->3277 3291->3279 3296 403c1f SendMessageA 3291->3296 3292->3334 3294 403b85 3293->3294 3295 403ae8 GetDlgItem 3293->3295 3300 403f7f 8 API calls 3294->3300 3299 403afb SendMessageA IsWindowEnabled 3295->3299 3302 403b18 3295->3302 3296->3334 3297 40140b 2 API calls 3297->3332 3298 403ea3 DestroyWindow EndDialog 3298->3342 3299->3302 3299->3334 3300->3334 3301 403ed2 ShowWindow 3301->3334 3304 403b25 3302->3304 3305 403b6c SendMessageA 3302->3305 3306 403b38 3302->3306 3315 403b1d 3302->3315 3303 405b88 18 API calls 3303->3332 3304->3305 3304->3315 3305->3294 3309 403b40 3306->3309 3310 403b55 3306->3310 3307 403ef1 SendMessageA 3308 403b53 3307->3308 3308->3294 3346 40140b 3309->3346 3312 40140b 2 API calls 3310->3312 3311 403f18 19 API calls 3311->3332 3314 403b5c 3312->3314 3314->3294 3314->3315 3315->3307 3316 403f18 19 API calls 3317 403cd0 GetDlgItem 3316->3317 3318 403ce5 3317->3318 3319 403ced ShowWindow KiUserCallbackDispatcher 3317->3319 3318->3319 3343 403f3a KiUserCallbackDispatcher 3319->3343 3321 403d17 KiUserCallbackDispatcher 3324 403d2b 3321->3324 3322 403d30 GetSystemMenu EnableMenuItem SendMessageA 3323 403d60 SendMessageA 3322->3323 3322->3324 3323->3324 3324->3322 3344 403f4d SendMessageA 3324->3344 3345 405b66 lstrcpynA 3324->3345 3327 403d8e lstrlenA 3328 405b88 18 API calls 3327->3328 3329 403d9f SetWindowTextA 3328->3329 3330 401389 2 API calls 3329->3330 3330->3332 3331 403de3 DestroyWindow 3333 403dfd CreateDialogParamA 3331->3333 3331->3342 3332->3297 3332->3298 3332->3303 3332->3311 3332->3316 3332->3331 3332->3334 3335 403e30 3333->3335 3333->3342 3336 403f18 19 API calls 3335->3336 3337 403e3b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3336->3337 3338 401389 2 API calls 3337->3338 3339 403e81 3338->3339 3339->3334 3340 403e89 ShowWindow 3339->3340 3341 403f64 SendMessageA 3340->3341 3341->3342 3342->3301 3342->3334 3343->3321 3344->3324 3345->3327 3347 401389 2 API calls 3346->3347 3348 401420 3347->3348 3348->3315 3709 401645 3710 4029f6 18 API calls 3709->3710 3711 40164c 3710->3711 3712 4029f6 18 API calls 3711->3712 3713 401655 3712->3713 3714 4029f6 18 API calls 3713->3714 3715 40165e MoveFileA 3714->3715 3716 401671 3715->3716 3717 40166a 3715->3717 3718 405e61 2 API calls 3716->3718 3721 402169 3716->3721 3719 401423 25 API calls 3717->3719 3720 401680 3718->3720 3719->3721 3720->3721 3722 4058b4 38 API calls 3720->3722 3722->3717 3723 401ec5 3724 4029f6 18 API calls 3723->3724 3725 401ecc GetFileVersionInfoSizeA 3724->3725 3726 401eef GlobalAlloc 3725->3726 3727 401f45 3725->3727 3726->3727 3728 401f03 GetFileVersionInfoA 3726->3728 3728->3727 3729 401f14 VerQueryValueA 3728->3729 3729->3727 3730 401f2d 3729->3730 3734 405ac4 wsprintfA 3730->3734 3732 401f39 3735 405ac4 wsprintfA 3732->3735 3734->3732 3735->3727 3739 4025cc 3740 4025d3 3739->3740 3741 402838 3739->3741 3742 4029d9 18 API calls 3740->3742 3743 4025de 3742->3743 3744 4025e5 SetFilePointer 3743->3744 3744->3741 3745 4025f5 3744->3745 3747 405ac4 wsprintfA 3745->3747 3747->3741 3021 401f51 3022 401f63 3021->3022 3032 402012 3021->3032 3039 4029f6 3022->3039 3025 401423 25 API calls 3030 402169 3025->3030 3026 4029f6 18 API calls 3027 401f73 3026->3027 3028 401f88 LoadLibraryExA 3027->3028 3029 401f7b GetModuleHandleA 3027->3029 3031 401f98 GetProcAddress 3028->3031 3028->3032 3029->3028 3029->3031 3033 401fe5 3031->3033 3034 401fa8 3031->3034 3032->3025 3048 404f04 3033->3048 3037 401fb8 3034->3037 3045 401423 3034->3045 3037->3030 3038 402006 FreeLibrary 3037->3038 3038->3030 3040 402a02 3039->3040 3041 405b88 18 API calls 3040->3041 3042 402a23 3041->3042 3043 401f6a 3042->3043 3044 405dc8 5 API calls 3042->3044 3043->3026 3044->3043 3046 404f04 25 API calls 3045->3046 3047 401431 3046->3047 3047->3037 3049 404fc2 3048->3049 3050 404f1f 3048->3050 3049->3037 3051 404f3c lstrlenA 3050->3051 3052 405b88 18 API calls 3050->3052 3053 404f65 3051->3053 3054 404f4a lstrlenA 3051->3054 3052->3051 3056 404f78 3053->3056 3057 404f6b SetWindowTextA 3053->3057 3054->3049 3055 404f5c lstrcatA 3054->3055 3055->3053 3056->3049 3058 404f7e SendMessageA SendMessageA SendMessageA 3056->3058 3057->3056 3058->3049 3755 404853 GetDlgItem GetDlgItem 3756 4048a7 7 API calls 3755->3756 3763 404ac4 3755->3763 3757 404940 SendMessageA 3756->3757 3758 40494d DeleteObject 3756->3758 3757->3758 3759 404958 3758->3759 3761 40498f 3759->3761 3762 405b88 18 API calls 3759->3762 3760 404bae 3765 404c5d 3760->3765 3770 404ab7 3760->3770 3771 404c07 SendMessageA 3760->3771 3764 403f18 19 API calls 3761->3764 3766 404971 SendMessageA SendMessageA 3762->3766 3763->3760 3790 404b38 3763->3790 3808 4047d3 SendMessageA 3763->3808 3769 4049a3 3764->3769 3767 404c72 3765->3767 3768 404c66 SendMessageA 3765->3768 3766->3759 3779 404c84 ImageList_Destroy 3767->3779 3780 404c8b 3767->3780 3784 404c9b 3767->3784 3768->3767 3775 403f18 19 API calls 3769->3775 3772 403f7f 8 API calls 3770->3772 3771->3770 3777 404c1c SendMessageA 3771->3777 3778 404e4d 3772->3778 3773 404ba0 SendMessageA 3773->3760 3787 4049b1 3775->3787 3776 404e01 3776->3770 3785 404e13 ShowWindow GetDlgItem ShowWindow 3776->3785 3781 404c2f 3777->3781 3779->3780 3782 404c94 GlobalFree 3780->3782 3780->3784 3793 404c40 SendMessageA 3781->3793 3782->3784 3783 404a85 GetWindowLongA SetWindowLongA 3786 404a9e 3783->3786 3784->3776 3792 40140b 2 API calls 3784->3792 3799 404ccd 3784->3799 3785->3770 3788 404aa4 ShowWindow 3786->3788 3789 404abc 3786->3789 3787->3783 3791 404a00 SendMessageA 3787->3791 3794 404a7f 3787->3794 3797 404a3c SendMessageA 3787->3797 3798 404a4d SendMessageA 3787->3798 3806 403f4d SendMessageA 3788->3806 3807 403f4d SendMessageA 3789->3807 3790->3760 3790->3773 3791->3787 3792->3799 3793->3765 3794->3783 3794->3786 3797->3787 3798->3787 3801 404d11 3799->3801 3802 404cfb SendMessageA 3799->3802 3800 404dd7 InvalidateRect 3800->3776 3803 404ded 3800->3803 3801->3800 3805 404d85 SendMessageA SendMessageA 3801->3805 3802->3801 3813 4046f1 3803->3813 3805->3801 3806->3770 3807->3763 3809 404832 SendMessageA 3808->3809 3810 4047f6 GetMessagePos ScreenToClient SendMessageA 3808->3810 3811 40482a 3809->3811 3810->3811 3812 40482f 3810->3812 3811->3790 3812->3809 3814 40470b 3813->3814 3815 405b88 18 API calls 3814->3815 3816 404740 3815->3816 3817 405b88 18 API calls 3816->3817 3818 40474b 3817->3818 3819 405b88 18 API calls 3818->3819 3820 40477c lstrlenA wsprintfA SetDlgItemTextA 3819->3820 3820->3776 3821 404e54 3822 404e62 3821->3822 3823 404e79 3821->3823 3824 404e68 3822->3824 3839 404ee2 3822->3839 3825 404e87 IsWindowVisible 3823->3825 3831 404e9e 3823->3831 3826 403f64 SendMessageA 3824->3826 3828 404e94 3825->3828 3825->3839 3829 404e72 3826->3829 3827 404ee8 CallWindowProcA 3827->3829 3830 4047d3 5 API calls 3828->3830 3830->3831 3831->3827 3840 405b66 lstrcpynA 3831->3840 3833 404ecd 3841 405ac4 wsprintfA 3833->3841 3835 404ed4 3836 40140b 2 API calls 3835->3836 3837 404edb 3836->3837 3842 405b66 lstrcpynA 3837->3842 3839->3827 3840->3833 3841->3835 3842->3839 3843 404356 3844 404394 3843->3844 3845 404387 3843->3845 3847 40439d GetDlgItem 3844->3847 3853 404400 3844->3853 3904 40540b GetDlgItemTextA 3845->3904 3849 4043b1 3847->3849 3848 40438e 3851 405dc8 5 API calls 3848->3851 3852 4043c5 SetWindowTextA 3849->3852 3856 4056ed 4 API calls 3849->3856 3850 4044e4 3901 404670 3850->3901 3906 40540b GetDlgItemTextA 3850->3906 3851->3844 3857 403f18 19 API calls 3852->3857 3853->3850 3858 405b88 18 API calls 3853->3858 3853->3901 3855 403f7f 8 API calls 3863 404684 3855->3863 3864 4043bb 3856->3864 3860 4043e3 3857->3860 3861 404476 SHBrowseForFolderA 3858->3861 3859 404510 3862 40573a 18 API calls 3859->3862 3865 403f18 19 API calls 3860->3865 3861->3850 3866 40448e CoTaskMemFree 3861->3866 3867 404516 3862->3867 3864->3852 3870 405659 3 API calls 3864->3870 3868 4043f1 3865->3868 3869 405659 3 API calls 3866->3869 3907 405b66 lstrcpynA 3867->3907 3905 403f4d SendMessageA 3868->3905 3872 40449b 3869->3872 3870->3852 3875 4044d2 SetDlgItemTextA 3872->3875 3879 405b88 18 API calls 3872->3879 3874 4043f9 3877 405e88 3 API calls 3874->3877 3875->3850 3876 40452d 3878 405e88 3 API calls 3876->3878 3877->3853 3886 404535 3878->3886 3880 4044ba lstrcmpiA 3879->3880 3880->3875 3883 4044cb lstrcatA 3880->3883 3881 40456f 3908 405b66 lstrcpynA 3881->3908 3883->3875 3884 404578 3885 4056ed 4 API calls 3884->3885 3887 40457e GetDiskFreeSpaceA 3885->3887 3886->3881 3890 4056a0 2 API calls 3886->3890 3891 4045c2 3886->3891 3889 4045a0 MulDiv 3887->3889 3887->3891 3889->3891 3890->3886 3892 4046f1 21 API calls 3891->3892 3902 40461f 3891->3902 3893 404611 3892->3893 3896 404621 SetDlgItemTextA 3893->3896 3897 404616 3893->3897 3894 40140b 2 API calls 3898 404642 3894->3898 3896->3902 3900 4046f1 21 API calls 3897->3900 3909 403f3a KiUserCallbackDispatcher 3898->3909 3899 40465e 3899->3901 3903 4042eb SendMessageA 3899->3903 3900->3902 3901->3855 3902->3894 3902->3898 3903->3901 3904->3848 3905->3874 3906->3859 3907->3876 3908->3884 3909->3899 3910 4014d6 3911 4029d9 18 API calls 3910->3911 3912 4014dc Sleep 3911->3912 3914 40288b 3912->3914 3920 4018d8 3921 40190f 3920->3921 3922 4029f6 18 API calls 3921->3922 3923 401914 3922->3923 3924 40548b 68 API calls 3923->3924 3925 40191d 3924->3925 3926 4018db 3927 4029f6 18 API calls 3926->3927 3928 4018e2 3927->3928 3929 405427 MessageBoxIndirectA 3928->3929 3930 4018eb 3929->3930 2929 404060 2930 404076 2929->2930 2938 404183 2929->2938 2958 403f18 2930->2958 2931 4041f2 2932 4042c6 2931->2932 2933 4041fc GetDlgItem 2931->2933 2967 403f7f 2932->2967 2936 404212 2933->2936 2937 404284 2933->2937 2935 4040cc 2940 403f18 19 API calls 2935->2940 2936->2937 2944 404238 6 API calls 2936->2944 2937->2932 2945 404296 2937->2945 2938->2931 2938->2932 2941 4041c7 GetDlgItem SendMessageA 2938->2941 2943 4040d9 CheckDlgButton 2940->2943 2963 403f3a KiUserCallbackDispatcher 2941->2963 2942 4042c1 2961 403f3a KiUserCallbackDispatcher 2943->2961 2944->2937 2948 40429c SendMessageA 2945->2948 2949 4042ad 2945->2949 2948->2949 2949->2942 2953 4042b3 SendMessageA 2949->2953 2950 4041ed 2964 4042eb 2950->2964 2952 4040f7 GetDlgItem 2962 403f4d SendMessageA 2952->2962 2953->2942 2955 40410d SendMessageA 2956 404134 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 2955->2956 2957 40412b GetSysColor 2955->2957 2956->2942 2957->2956 2981 405b88 2958->2981 2961->2952 2962->2955 2963->2950 2965 4042f9 2964->2965 2966 4042fe SendMessageA 2964->2966 2965->2966 2966->2931 2968 403f97 GetWindowLongA 2967->2968 2969 404020 2967->2969 2968->2969 2970 403fa8 2968->2970 2969->2942 2971 403fb7 GetSysColor 2970->2971 2972 403fba 2970->2972 2971->2972 2973 403fc0 SetTextColor 2972->2973 2974 403fca SetBkMode 2972->2974 2973->2974 2975 403fe2 GetSysColor 2974->2975 2976 403fe8 2974->2976 2975->2976 2977 403ff9 2976->2977 2978 403fef SetBkColor 2976->2978 2977->2969 2979 404013 CreateBrushIndirect 2977->2979 2980 40400c DeleteObject 2977->2980 2978->2977 2979->2969 2980->2979 2992 405b95 2981->2992 2982 405daf 2983 403f23 SetDlgItemTextA 2982->2983 3016 405b66 lstrcpynA 2982->3016 2983->2935 2985 405c2d GetVersion 2994 405c3a 2985->2994 2986 405d86 lstrlenA 2986->2992 2987 405b88 10 API calls 2987->2986 2990 405ca5 GetSystemDirectoryA 2990->2994 2992->2982 2992->2985 2992->2986 2992->2987 3005 405dc8 2992->3005 3014 405ac4 wsprintfA 2992->3014 3015 405b66 lstrcpynA 2992->3015 2993 405cb8 GetWindowsDirectoryA 2993->2994 2994->2990 2994->2992 2994->2993 2996 405b88 10 API calls 2994->2996 2997 405d2f lstrcatA 2994->2997 2998 405cec SHGetSpecialFolderLocation 2994->2998 3000 405a4d RegOpenKeyExA 2994->3000 2996->2994 2997->2992 2998->2994 2999 405d04 SHGetPathFromIDListA CoTaskMemFree 2998->2999 2999->2994 3001 405a80 RegQueryValueExA 3000->3001 3002 405abe 3000->3002 3003 405aa1 RegCloseKey 3001->3003 3002->2994 3003->3002 3006 405dd4 3005->3006 3008 405e31 CharNextA 3006->3008 3009 405e3c 3006->3009 3012 405e1f CharNextA 3006->3012 3013 405e2c CharNextA 3006->3013 3017 405684 3006->3017 3007 405e40 CharPrevA 3007->3009 3008->3006 3008->3009 3009->3007 3011 405e5b 3009->3011 3011->2992 3012->3006 3013->3008 3014->2992 3015->2992 3016->2983 3018 40568a 3017->3018 3019 40569d 3018->3019 3020 405690 CharNextA 3018->3020 3019->3006 3020->3018 3931 401ae5 3932 4029f6 18 API calls 3931->3932 3933 401aec 3932->3933 3934 4029d9 18 API calls 3933->3934 3935 401af5 wsprintfA 3934->3935 3936 40288b 3935->3936 3937 402866 SendMessageA 3938 402880 InvalidateRect 3937->3938 3939 40288b 3937->3939 3938->3939 3947 4019e6 3948 4029f6 18 API calls 3947->3948 3949 4019ef ExpandEnvironmentStringsA 3948->3949 3950 401a03 3949->3950 3952 401a16 3949->3952 3951 401a08 lstrcmpA 3950->3951 3950->3952 3951->3952 3953 402267 3954 4029f6 18 API calls 3953->3954 3955 402275 3954->3955 3956 4029f6 18 API calls 3955->3956 3957 40227e 3956->3957 3958 4029f6 18 API calls 3957->3958 3959 402288 GetPrivateProfileStringA 3958->3959 3967 401c6d 3968 4029d9 18 API calls 3967->3968 3969 401c73 IsWindow 3968->3969 3970 4019d6 3969->3970 3971 40366d 3972 403678 3971->3972 3973 40367c 3972->3973 3974 40367f GlobalAlloc 3972->3974 3974->3973 3982 4014f0 SetForegroundWindow 3983 40288b 3982->3983 3984 402172 3985 4029f6 18 API calls 3984->3985 3986 402178 3985->3986 3987 4029f6 18 API calls 3986->3987 3988 402181 3987->3988 3989 4029f6 18 API calls 3988->3989 3990 40218a 3989->3990 3991 405e61 2 API calls 3990->3991 3992 402193 3991->3992 3993 4021a4 lstrlenA lstrlenA 3992->3993 3997 402197 3992->3997 3995 404f04 25 API calls 3993->3995 3994 404f04 25 API calls 3998 40219f 3994->3998 3996 4021e0 SHFileOperationA 3995->3996 3996->3997 3996->3998 3997->3994 3997->3998 3999 4021f4 4000 4021fb 3999->4000 4003 40220e 3999->4003 4001 405b88 18 API calls 4000->4001 4002 402208 4001->4002 4004 405427 MessageBoxIndirectA 4002->4004 4004->4003 4005 4016fa 4006 4029f6 18 API calls 4005->4006 4007 401701 SearchPathA 4006->4007 4008 40171c 4007->4008 4009 4025fb 4010 402602 4009->4010 4011 40288b 4009->4011 4012 402608 FindClose 4010->4012 4012->4011 4013 40267c 4014 4029f6 18 API calls 4013->4014 4016 40268a 4014->4016 4015 4026a0 4018 40581e 2 API calls 4015->4018 4016->4015 4017 4029f6 18 API calls 4016->4017 4017->4015 4019 4026a6 4018->4019 4039 40583d GetFileAttributesA CreateFileA 4019->4039 4021 4026b3 4022 40275c 4021->4022 4023 4026bf GlobalAlloc 4021->4023 4026 402764 DeleteFileA 4022->4026 4027 402777 4022->4027 4024 402753 CloseHandle 4023->4024 4025 4026d8 4023->4025 4024->4022 4040 4031f1 SetFilePointer 4025->4040 4026->4027 4029 4026de 4030 4031bf ReadFile 4029->4030 4031 4026e7 GlobalAlloc 4030->4031 4032 4026f7 4031->4032 4033 40272b WriteFile GlobalFree 4031->4033 4035 402f18 48 API calls 4032->4035 4034 402f18 48 API calls 4033->4034 4036 402750 4034->4036 4038 402704 4035->4038 4036->4024 4037 402722 GlobalFree 4037->4033 4038->4037 4039->4021 4040->4029 4041 40277d 4042 4029d9 18 API calls 4041->4042 4043 402783 4042->4043 4044 4027a7 4043->4044 4045 4027be 4043->4045 4054 40265c 4043->4054 4048 4027bb 4044->4048 4051 4027ac 4044->4051 4046 4027d4 4045->4046 4047 4027c8 4045->4047 4050 405b88 18 API calls 4046->4050 4049 4029d9 18 API calls 4047->4049 4056 405ac4 wsprintfA 4048->4056 4049->4054 4050->4054 4055 405b66 lstrcpynA 4051->4055 4055->4054 4056->4054 4064 4014fe 4065 401506 4064->4065 4067 401519 4064->4067 4066 4029d9 18 API calls 4065->4066 4066->4067 4068 401000 4069 401037 BeginPaint GetClientRect 4068->4069 4070 40100c DefWindowProcA 4068->4070 4071 4010f3 4069->4071 4073 401179 4070->4073 4074 401073 CreateBrushIndirect FillRect DeleteObject 4071->4074 4075 4010fc 4071->4075 4074->4071 4076 401102 CreateFontIndirectA 4075->4076 4077 401167 EndPaint 4075->4077 4076->4077 4078 401112 6 API calls 4076->4078 4077->4073 4078->4077 4079 402303 4080 402309 4079->4080 4081 4029f6 18 API calls 4080->4081 4082 40231b 4081->4082 4083 4029f6 18 API calls 4082->4083 4084 402325 RegCreateKeyExA 4083->4084 4085 40288b 4084->4085 4086 40234f 4084->4086 4087 402367 4086->4087 4088 4029f6 18 API calls 4086->4088 4089 402373 4087->4089 4091 4029d9 18 API calls 4087->4091 4090 402360 lstrlenA 4088->4090 4092 40238e RegSetValueExA 4089->4092 4094 402f18 48 API calls 4089->4094 4090->4087 4091->4089 4093 4023a4 RegCloseKey 4092->4093 4093->4085 4094->4092 4096 402803 4097 4029d9 18 API calls 4096->4097 4098 402809 4097->4098 4099 40283a 4098->4099 4101 402817 4098->4101 4102 40265c 4098->4102 4100 405b88 18 API calls 4099->4100 4099->4102 4100->4102 4101->4102 4104 405ac4 wsprintfA 4101->4104 4104->4102 3349 402506 3358 4029d9 3349->3358 3351 402586 3352 402544 ReadFile 3352->3351 3353 402510 3352->3353 3353->3351 3353->3352 3354 402588 3353->3354 3355 402598 3353->3355 3361 405ac4 wsprintfA 3354->3361 3355->3351 3357 4025ae SetFilePointer 3355->3357 3357->3351 3359 405b88 18 API calls 3358->3359 3360 4029ed 3359->3360 3360->3353 3361->3351 4105 401b06 4106 401b13 4105->4106 4107 401b57 4105->4107 4108 4021fb 4106->4108 4115 401b2a 4106->4115 4109 401b80 GlobalAlloc 4107->4109 4110 401b5b 4107->4110 4112 405b88 18 API calls 4108->4112 4111 405b88 18 API calls 4109->4111 4113 401b9b 4110->4113 4126 405b66 lstrcpynA 4110->4126 4111->4113 4114 402208 4112->4114 4119 405427 MessageBoxIndirectA 4114->4119 4124 405b66 lstrcpynA 4115->4124 4118 401b6d GlobalFree 4118->4113 4119->4113 4120 401b39 4125 405b66 lstrcpynA 4120->4125 4122 401b48 4127 405b66 lstrcpynA 4122->4127 4124->4120 4125->4122 4126->4118 4127->4113 4128 401c8a 4129 4029d9 18 API calls 4128->4129 4130 401c91 4129->4130 4131 4029d9 18 API calls 4130->4131 4132 401c99 GetDlgItem 4131->4132 4133 4024b8 4132->4133 4134 40468b 4135 4046b7 4134->4135 4136 40469b 4134->4136 4137 4046ea 4135->4137 4138 4046bd SHGetPathFromIDListA 4135->4138 4145 40540b GetDlgItemTextA 4136->4145 4140 4046cd 4138->4140 4144 4046d4 SendMessageA 4138->4144 4142 40140b 2 API calls 4140->4142 4141 4046a8 SendMessageA 4141->4135 4142->4144 4144->4137 4145->4141 4146 40430f 4147 404345 4146->4147 4148 40431f 4146->4148 4150 403f7f 8 API calls 4147->4150 4149 403f18 19 API calls 4148->4149 4151 40432c SetDlgItemTextA 4149->4151 4152 404351 4150->4152 4151->4147 4153 401490 4154 404f04 25 API calls 4153->4154 4155 401497 4154->4155 4156 402615 4157 402618 4156->4157 4158 402630 4156->4158 4159 402625 FindNextFileA 4157->4159 4159->4158 4160 40266f 4159->4160 4162 405b66 lstrcpynA 4160->4162 4162->4158 4170 401595 4171 4029f6 18 API calls 4170->4171 4172 40159c SetFileAttributesA 4171->4172 4173 4015ae 4172->4173 4174 401d95 4175 4029d9 18 API calls 4174->4175 4176 401d9b 4175->4176 4177 4029d9 18 API calls 4176->4177 4178 401da4 4177->4178 4179 401db6 EnableWindow 4178->4179 4180 401dab ShowWindow 4178->4180 4181 40288b 4179->4181 4180->4181 4182 401e95 4183 4029f6 18 API calls 4182->4183 4184 401e9c 4183->4184 4185 405e61 2 API calls 4184->4185 4186 401ea2 4185->4186 4187 401eb4 4186->4187 4189 405ac4 wsprintfA 4186->4189 4189->4187 4190 401696 4191 4029f6 18 API calls 4190->4191 4192 40169c GetFullPathNameA 4191->4192 4193 4016b3 4192->4193 4199 4016d4 4192->4199 4196 405e61 2 API calls 4193->4196 4193->4199 4194 4016e8 GetShortPathNameA 4195 40288b 4194->4195 4197 4016c4 4196->4197 4197->4199 4200 405b66 lstrcpynA 4197->4200 4199->4194 4199->4195 4200->4199 4201 401d1b GetDC GetDeviceCaps 4202 4029d9 18 API calls 4201->4202 4203 401d37 MulDiv 4202->4203 4204 4029d9 18 API calls 4203->4204 4205 401d4c 4204->4205 4206 405b88 18 API calls 4205->4206 4207 401d85 CreateFontIndirectA 4206->4207 4208 4024b8 4207->4208 4209 401e1b 4210 4029f6 18 API calls 4209->4210 4211 401e21 4210->4211 4212 404f04 25 API calls 4211->4212 4213 401e2b 4212->4213 4214 4053c6 2 API calls 4213->4214 4217 401e31 4214->4217 4215 401e87 CloseHandle 4219 40265c 4215->4219 4216 401e50 WaitForSingleObject 4216->4217 4218 401e5e GetExitCodeProcess 4216->4218 4217->4215 4217->4216 4217->4219 4222 405ec1 2 API calls 4217->4222 4220 401e70 4218->4220 4221 401e79 4218->4221 4224 405ac4 wsprintfA 4220->4224 4221->4215 4222->4216 4224->4221 4225 40249c 4226 4029f6 18 API calls 4225->4226 4227 4024a3 4226->4227 4230 40583d GetFileAttributesA CreateFileA 4227->4230 4229 4024af 4230->4229 4231 402020 4232 4029f6 18 API calls 4231->4232 4233 402027 4232->4233 4234 4029f6 18 API calls 4233->4234 4235 402031 4234->4235 4236 4029f6 18 API calls 4235->4236 4237 40203a 4236->4237 4238 4029f6 18 API calls 4237->4238 4239 402044 4238->4239 4240 4029f6 18 API calls 4239->4240 4242 40204e 4240->4242 4241 402062 CoCreateInstance 4244 402081 4241->4244 4245 402137 4241->4245 4242->4241 4243 4029f6 18 API calls 4242->4243 4243->4241 4244->4245 4248 402116 MultiByteToWideChar 4244->4248 4246 401423 25 API calls 4245->4246 4247 402169 4245->4247 4246->4247 4248->4245 3059 401721 3060 4029f6 18 API calls 3059->3060 3061 401728 3060->3061 3065 40586c 3061->3065 3063 40172f 3064 40586c 2 API calls 3063->3064 3064->3063 3066 405877 GetTickCount GetTempFileNameA 3065->3066 3067 4058a7 3066->3067 3068 4058a3 3066->3068 3067->3063 3068->3066 3068->3067 4249 401922 4250 4029f6 18 API calls 4249->4250 4251 401929 lstrlenA 4250->4251 4252 4024b8 4251->4252 4253 402223 4254 40222b 4253->4254 4257 402231 4253->4257 4255 4029f6 18 API calls 4254->4255 4255->4257 4256 402241 4259 4029f6 18 API calls 4256->4259 4261 40224f 4256->4261 4257->4256 4258 4029f6 18 API calls 4257->4258 4258->4256 4259->4261 4260 4029f6 18 API calls 4262 402258 WritePrivateProfileStringA 4260->4262 4261->4260 4270 401ca5 4271 4029d9 18 API calls 4270->4271 4272 401cb5 SetWindowLongA 4271->4272 4273 40288b 4272->4273 4274 401a26 4275 4029d9 18 API calls 4274->4275 4276 401a2c 4275->4276 4277 4029d9 18 API calls 4276->4277 4278 4019d6 4277->4278 4279 402427 4289 402b00 4279->4289 4281 402431 4282 4029d9 18 API calls 4281->4282 4283 40243a 4282->4283 4284 402451 RegEnumKeyA 4283->4284 4285 40245d RegEnumValueA 4283->4285 4286 40265c 4283->4286 4287 402476 RegCloseKey 4284->4287 4285->4286 4285->4287 4287->4286 4290 4029f6 18 API calls 4289->4290 4291 402b19 4290->4291 4292 402b27 RegOpenKeyExA 4291->4292 4292->4281 4293 4022a7 4294 4022d7 4293->4294 4295 4022ac 4293->4295 4297 4029f6 18 API calls 4294->4297 4296 402b00 19 API calls 4295->4296 4298 4022b3 4296->4298 4299 4022de 4297->4299 4300 4029f6 18 API calls 4298->4300 4303 4022f4 4298->4303 4304 402a36 RegOpenKeyExA 4299->4304 4301 4022c4 RegDeleteValueA RegCloseKey 4300->4301 4301->4303 4308 402a61 4304->4308 4312 402aad 4304->4312 4305 402a87 RegEnumKeyA 4306 402a99 RegCloseKey 4305->4306 4305->4308 4307 405e88 3 API calls 4306->4307 4310 402aa9 4307->4310 4308->4305 4308->4306 4309 402abe RegCloseKey 4308->4309 4311 402a36 3 API calls 4308->4311 4309->4312 4310->4312 4313 402ad9 RegDeleteKeyA 4310->4313 4311->4308 4312->4303 4313->4312 4314 40402c lstrcpynA lstrlenA 3670 401bad 3671 4029d9 18 API calls 3670->3671 3672 401bb4 3671->3672 3673 4029d9 18 API calls 3672->3673 3674 401bbe 3673->3674 3675 401bce 3674->3675 3676 4029f6 18 API calls 3674->3676 3677 401bde 3675->3677 3678 4029f6 18 API calls 3675->3678 3676->3675 3679 401be9 3677->3679 3680 401c2d 3677->3680 3678->3677 3682 4029d9 18 API calls 3679->3682 3681 4029f6 18 API calls 3680->3681 3683 401c32 3681->3683 3684 401bee 3682->3684 3685 4029f6 18 API calls 3683->3685 3686 4029d9 18 API calls 3684->3686 3687 401c3b FindWindowExA 3685->3687 3688 401bf7 3686->3688 3691 401c59 3687->3691 3689 401c1d SendMessageA 3688->3689 3690 401bff SendMessageTimeoutA 3688->3690 3689->3691 3690->3691 4315 4023af 4316 402b00 19 API calls 4315->4316 4317 4023b9 4316->4317 4318 4029f6 18 API calls 4317->4318 4319 4023c2 4318->4319 4320 4023cc RegQueryValueExA 4319->4320 4323 40265c 4319->4323 4321 4023f2 RegCloseKey 4320->4321 4322 4023ec 4320->4322 4321->4323 4322->4321 4326 405ac4 wsprintfA 4322->4326 4326->4321 4327 406131 4328 405fb5 4327->4328 4329 406920 4328->4329 4330 406036 GlobalFree 4328->4330 4331 40603f GlobalAlloc 4328->4331 4332 4060b6 GlobalAlloc 4328->4332 4333 4060ad GlobalFree 4328->4333 4330->4331 4331->4328 4331->4329 4332->4328 4332->4329 4333->4332 3135 4015b3 3136 4029f6 18 API calls 3135->3136 3137 4015ba 3136->3137 3153 4056ed CharNextA CharNextA 3137->3153 3139 40160a 3140 40162d 3139->3140 3141 40160f 3139->3141 3147 401423 25 API calls 3140->3147 3143 401423 25 API calls 3141->3143 3142 405684 CharNextA 3144 4015d0 CreateDirectoryA 3142->3144 3146 401616 3143->3146 3145 4015e5 GetLastError 3144->3145 3149 4015c2 3144->3149 3148 4015f2 GetFileAttributesA 3145->3148 3145->3149 3159 405b66 lstrcpynA 3146->3159 3152 402169 3147->3152 3148->3149 3149->3139 3149->3142 3151 401621 SetCurrentDirectoryA 3151->3152 3154 405707 3153->3154 3158 405713 3153->3158 3155 40570e CharNextA 3154->3155 3154->3158 3156 405730 3155->3156 3156->3149 3157 405684 CharNextA 3157->3158 3158->3156 3158->3157 3159->3151 3160 401734 3161 4029f6 18 API calls 3160->3161 3162 40173b 3161->3162 3163 401761 3162->3163 3164 401759 3162->3164 3215 405b66 lstrcpynA 3163->3215 3214 405b66 lstrcpynA 3164->3214 3167 40175f 3171 405dc8 5 API calls 3167->3171 3168 40176c 3216 405659 lstrlenA CharPrevA 3168->3216 3177 40177e 3171->3177 3175 401795 CompareFileTime 3175->3177 3176 401859 3178 404f04 25 API calls 3176->3178 3177->3175 3177->3176 3180 405b66 lstrcpynA 3177->3180 3187 405b88 18 API calls 3177->3187 3196 401830 3177->3196 3198 40583d GetFileAttributesA CreateFileA 3177->3198 3219 405e61 FindFirstFileA 3177->3219 3222 40581e GetFileAttributesA 3177->3222 3225 405427 3177->3225 3181 401863 3178->3181 3179 404f04 25 API calls 3186 401845 3179->3186 3180->3177 3199 402f18 3181->3199 3184 40188a SetFileTime 3185 40189c CloseHandle 3184->3185 3185->3186 3188 4018ad 3185->3188 3187->3177 3189 4018b2 3188->3189 3190 4018c5 3188->3190 3191 405b88 18 API calls 3189->3191 3192 405b88 18 API calls 3190->3192 3193 4018ba lstrcatA 3191->3193 3194 4018cd 3192->3194 3193->3194 3197 405427 MessageBoxIndirectA 3194->3197 3196->3179 3196->3186 3197->3186 3198->3177 3200 402f45 3199->3200 3201 402f29 SetFilePointer 3199->3201 3229 403043 GetTickCount 3200->3229 3201->3200 3204 402f56 ReadFile 3205 402f76 3204->3205 3209 401876 3204->3209 3206 403043 43 API calls 3205->3206 3205->3209 3207 402f8d 3206->3207 3208 403008 ReadFile 3207->3208 3207->3209 3213 402f9d 3207->3213 3208->3209 3209->3184 3209->3185 3211 402fb8 ReadFile 3211->3209 3211->3213 3212 402fd1 WriteFile 3212->3209 3212->3213 3213->3209 3213->3211 3213->3212 3214->3167 3215->3168 3217 405673 lstrcatA 3216->3217 3218 401772 lstrcatA 3216->3218 3217->3218 3218->3167 3220 405e82 3219->3220 3221 405e77 FindClose 3219->3221 3220->3177 3221->3220 3223 40583a 3222->3223 3224 40582d SetFileAttributesA 3222->3224 3223->3177 3224->3223 3228 40543c 3225->3228 3226 405488 3226->3177 3227 405450 MessageBoxIndirectA 3227->3226 3228->3226 3228->3227 3230 403072 3229->3230 3231 4031ad 3229->3231 3242 4031f1 SetFilePointer 3230->3242 3232 402bd3 33 API calls 3231->3232 3238 402f4e 3232->3238 3234 40307d SetFilePointer 3240 4030a2 3234->3240 3238->3204 3238->3209 3239 403137 WriteFile 3239->3238 3239->3240 3240->3238 3240->3239 3241 40318e SetFilePointer 3240->3241 3243 4031bf ReadFile 3240->3243 3245 402bd3 3240->3245 3259 405f82 3240->3259 3241->3231 3242->3234 3244 4031e0 3243->3244 3244->3240 3246 402be1 3245->3246 3247 402bf9 3245->3247 3250 402bea DestroyWindow 3246->3250 3258 402bf1 3246->3258 3248 402c01 3247->3248 3249 402c09 GetTickCount 3247->3249 3269 405ec1 3248->3269 3252 402c17 3249->3252 3249->3258 3250->3258 3253 402c4c CreateDialogParamA ShowWindow 3252->3253 3254 402c1f 3252->3254 3253->3258 3254->3258 3266 402bb7 3254->3266 3256 402c2d wsprintfA 3257 404f04 25 API calls 3256->3257 3257->3258 3258->3240 3260 405fa7 3259->3260 3261 405faf 3259->3261 3260->3240 3261->3260 3262 406036 GlobalFree 3261->3262 3263 40603f GlobalAlloc 3261->3263 3264 4060b6 GlobalAlloc 3261->3264 3265 4060ad GlobalFree 3261->3265 3262->3263 3263->3260 3263->3261 3264->3260 3264->3261 3265->3264 3267 402bc6 3266->3267 3268 402bc8 MulDiv 3266->3268 3267->3268 3268->3256 3270 405ede PeekMessageA 3269->3270 3271 405ed4 DispatchMessageA 3270->3271 3272 405eee 3270->3272 3271->3270 3272->3258 4334 401634 4335 4029f6 18 API calls 4334->4335 4336 40163a 4335->4336 4337 405e61 2 API calls 4336->4337 4338 401640 4337->4338 4339 401934 4340 4029d9 18 API calls 4339->4340 4341 40193b 4340->4341 4342 4029d9 18 API calls 4341->4342 4343 401945 4342->4343 4344 4029f6 18 API calls 4343->4344 4345 40194e 4344->4345 4346 401961 lstrlenA 4345->4346 4347 40199c 4345->4347 4348 40196b 4346->4348 4348->4347 4352 405b66 lstrcpynA 4348->4352 4350 401985 4350->4347 4351 401992 lstrlenA 4350->4351 4351->4347 4352->4350 4353 4019b5 4354 4029f6 18 API calls 4353->4354 4355 4019bc 4354->4355 4356 4029f6 18 API calls 4355->4356 4357 4019c5 4356->4357 4358 4019cc lstrcmpiA 4357->4358 4359 4019de lstrcmpA 4357->4359 4360 4019d2 4358->4360 4359->4360 4361 4014b7 4362 4014bd 4361->4362 4363 401389 2 API calls 4362->4363 4364 4014c5 4363->4364 4372 402b3b 4373 402b63 4372->4373 4374 402b4a SetTimer 4372->4374 4375 402bb1 4373->4375 4376 402bb7 MulDiv 4373->4376 4374->4373 4377 402b71 wsprintfA SetWindowTextA SetDlgItemTextA 4376->4377 4377->4375 3362 40323c #17 SetErrorMode OleInitialize 3432 405e88 GetModuleHandleA 3362->3432 3366 4032aa GetCommandLineA 3437 405b66 lstrcpynA 3366->3437 3368 4032bc GetModuleHandleA 3369 4032d3 3368->3369 3370 405684 CharNextA 3369->3370 3371 4032e7 CharNextA 3370->3371 3375 4032f4 3371->3375 3372 40335d 3373 403370 GetTempPathA 3372->3373 3438 403208 3373->3438 3375->3372 3379 405684 CharNextA 3375->3379 3383 40335f 3375->3383 3376 403386 3377 4033aa DeleteFileA 3376->3377 3378 40338a GetWindowsDirectoryA lstrcatA 3376->3378 3446 402c72 GetTickCount GetModuleFileNameA 3377->3446 3380 403208 11 API calls 3378->3380 3379->3375 3382 4033a6 3380->3382 3382->3377 3385 403424 3382->3385 3530 405b66 lstrcpynA 3383->3530 3384 4033bb 3384->3385 3387 403414 3384->3387 3390 405684 CharNextA 3384->3390 3547 4035bd 3385->3547 3476 4036af 3387->3476 3392 4033d2 3390->3392 3400 403453 lstrcatA lstrcmpiA 3392->3400 3401 4033ef 3392->3401 3393 403522 3395 4035a5 ExitProcess 3393->3395 3398 405e88 3 API calls 3393->3398 3394 40343d 3396 405427 MessageBoxIndirectA 3394->3396 3397 40344b ExitProcess 3396->3397 3402 403531 3398->3402 3400->3385 3404 40346f CreateDirectoryA SetCurrentDirectoryA 3400->3404 3531 40573a 3401->3531 3405 405e88 3 API calls 3402->3405 3407 403491 3404->3407 3408 403486 3404->3408 3409 40353a 3405->3409 3557 405b66 lstrcpynA 3407->3557 3556 405b66 lstrcpynA 3408->3556 3412 405e88 3 API calls 3409->3412 3414 403543 3412->3414 3415 403591 ExitWindowsEx 3414->3415 3420 403551 GetCurrentProcess 3414->3420 3415->3395 3419 40359e 3415->3419 3416 403409 3546 405b66 lstrcpynA 3416->3546 3418 405b88 18 API calls 3421 4034c1 DeleteFileA 3418->3421 3422 40140b 2 API calls 3419->3422 3424 403561 3420->3424 3423 4034ce CopyFileA 3421->3423 3429 40349f 3421->3429 3422->3395 3423->3429 3424->3415 3425 403516 3426 4058b4 38 API calls 3425->3426 3426->3385 3428 405b88 18 API calls 3428->3429 3429->3418 3429->3425 3429->3428 3431 403502 CloseHandle 3429->3431 3558 4058b4 3429->3558 3584 4053c6 CreateProcessA 3429->3584 3431->3429 3433 405ea4 LoadLibraryA 3432->3433 3434 405eaf GetProcAddress 3432->3434 3433->3434 3435 40327f SHGetFileInfoA 3433->3435 3434->3435 3436 405b66 lstrcpynA 3435->3436 3436->3366 3437->3368 3439 405dc8 5 API calls 3438->3439 3440 403214 3439->3440 3441 40321e 3440->3441 3442 405659 3 API calls 3440->3442 3441->3376 3443 403226 CreateDirectoryA 3442->3443 3444 40586c 2 API calls 3443->3444 3445 40323a 3444->3445 3445->3376 3587 40583d GetFileAttributesA CreateFileA 3446->3587 3448 402cb5 3475 402cc2 3448->3475 3588 405b66 lstrcpynA 3448->3588 3450 402cd8 3589 4056a0 lstrlenA 3450->3589 3454 402ce9 GetFileSize 3455 402dea 3454->3455 3465 402d00 3454->3465 3456 402bd3 33 API calls 3455->3456 3458 402df1 3456->3458 3457 4031bf ReadFile 3457->3465 3459 402e2d GlobalAlloc 3458->3459 3458->3475 3594 4031f1 SetFilePointer 3458->3594 3462 402e44 3459->3462 3460 402e85 3463 402bd3 33 API calls 3460->3463 3468 40586c 2 API calls 3462->3468 3463->3475 3464 402e0e 3466 4031bf ReadFile 3464->3466 3465->3455 3465->3457 3465->3460 3467 402bd3 33 API calls 3465->3467 3465->3475 3469 402e19 3466->3469 3467->3465 3470 402e55 CreateFileA 3468->3470 3469->3459 3469->3475 3471 402e8f 3470->3471 3470->3475 3595 4031f1 SetFilePointer 3471->3595 3473 402e9d 3474 402f18 48 API calls 3473->3474 3474->3475 3475->3384 3477 405e88 3 API calls 3476->3477 3478 4036c3 3477->3478 3479 4036c9 3478->3479 3480 4036db 3478->3480 3605 405ac4 wsprintfA 3479->3605 3481 405a4d 3 API calls 3480->3481 3482 4036fc 3481->3482 3484 40371a lstrcatA 3482->3484 3486 405a4d 3 API calls 3482->3486 3485 4036d9 3484->3485 3596 403978 3485->3596 3486->3484 3489 40573a 18 API calls 3490 40374c 3489->3490 3491 4037d5 3490->3491 3493 405a4d 3 API calls 3490->3493 3492 40573a 18 API calls 3491->3492 3494 4037db 3492->3494 3495 403778 3493->3495 3496 4037eb LoadImageA 3494->3496 3497 405b88 18 API calls 3494->3497 3495->3491 3500 403794 lstrlenA 3495->3500 3503 405684 CharNextA 3495->3503 3498 403816 RegisterClassA 3496->3498 3499 40389f 3496->3499 3497->3496 3501 403852 SystemParametersInfoA CreateWindowExA 3498->3501 3529 4038a9 3498->3529 3502 40140b 2 API calls 3499->3502 3504 4037a2 lstrcmpiA 3500->3504 3505 4037c8 3500->3505 3501->3499 3506 4038a5 3502->3506 3507 403792 3503->3507 3504->3505 3508 4037b2 GetFileAttributesA 3504->3508 3509 405659 3 API calls 3505->3509 3511 403978 19 API calls 3506->3511 3506->3529 3507->3500 3510 4037be 3508->3510 3512 4037ce 3509->3512 3510->3505 3513 4056a0 2 API calls 3510->3513 3514 4038b6 3511->3514 3606 405b66 lstrcpynA 3512->3606 3513->3505 3516 4038c2 ShowWindow LoadLibraryA 3514->3516 3517 403945 3514->3517 3518 4038e1 LoadLibraryA 3516->3518 3519 4038e8 GetClassInfoA 3516->3519 3520 404fd6 5 API calls 3517->3520 3518->3519 3521 403912 DialogBoxParamA 3519->3521 3522 4038fc GetClassInfoA RegisterClassA 3519->3522 3523 40394b 3520->3523 3524 40140b 2 API calls 3521->3524 3522->3521 3525 403967 3523->3525 3526 40394f 3523->3526 3524->3529 3527 40140b 2 API calls 3525->3527 3528 40140b 2 API calls 3526->3528 3526->3529 3527->3529 3528->3529 3529->3385 3530->3373 3608 405b66 lstrcpynA 3531->3608 3533 40574b 3534 4056ed 4 API calls 3533->3534 3535 405751 3534->3535 3536 4033fa 3535->3536 3537 405dc8 5 API calls 3535->3537 3536->3385 3545 405b66 lstrcpynA 3536->3545 3543 405761 3537->3543 3538 40578c lstrlenA 3539 405797 3538->3539 3538->3543 3540 405659 3 API calls 3539->3540 3542 40579c GetFileAttributesA 3540->3542 3541 405e61 2 API calls 3541->3543 3542->3536 3543->3536 3543->3538 3543->3541 3544 4056a0 2 API calls 3543->3544 3544->3538 3545->3416 3546->3387 3548 4035d8 3547->3548 3549 4035ce CloseHandle 3547->3549 3550 4035e2 CloseHandle 3548->3550 3551 4035ec 3548->3551 3549->3548 3550->3551 3609 40361a 3551->3609 3556->3407 3557->3429 3559 405e88 3 API calls 3558->3559 3561 4058bf 3559->3561 3560 40591c GetShortPathNameA 3563 405931 3560->3563 3564 405a11 3560->3564 3561->3560 3561->3564 3656 40583d GetFileAttributesA CreateFileA 3561->3656 3563->3564 3566 405939 wsprintfA 3563->3566 3564->3429 3565 405900 CloseHandle GetShortPathNameA 3565->3564 3567 405914 3565->3567 3568 405b88 18 API calls 3566->3568 3567->3560 3567->3564 3569 405961 3568->3569 3657 40583d GetFileAttributesA CreateFileA 3569->3657 3571 40596e 3571->3564 3572 40597d GetFileSize GlobalAlloc 3571->3572 3573 405a0a CloseHandle 3572->3573 3574 40599b ReadFile 3572->3574 3573->3564 3574->3573 3575 4059af 3574->3575 3575->3573 3658 4057b2 lstrlenA 3575->3658 3578 4059c4 3663 405b66 lstrcpynA 3578->3663 3579 405a1e 3581 4057b2 4 API calls 3579->3581 3582 4059d2 3581->3582 3583 4059e5 SetFilePointer WriteFile GlobalFree 3582->3583 3583->3573 3585 405401 3584->3585 3586 4053f5 CloseHandle 3584->3586 3585->3429 3586->3585 3587->3448 3588->3450 3590 4056ad 3589->3590 3591 4056b2 CharPrevA 3590->3591 3592 402cde 3590->3592 3591->3590 3591->3592 3593 405b66 lstrcpynA 3592->3593 3593->3454 3594->3464 3595->3473 3597 40398c 3596->3597 3607 405ac4 wsprintfA 3597->3607 3599 4039fd 3600 405b88 18 API calls 3599->3600 3601 403a09 SetWindowTextA 3600->3601 3602 40372a 3601->3602 3603 403a25 3601->3603 3602->3489 3603->3602 3604 405b88 18 API calls 3603->3604 3604->3603 3605->3485 3606->3491 3607->3599 3608->3533 3610 403628 3609->3610 3611 4035f1 3610->3611 3612 40362d FreeLibrary GlobalFree 3610->3612 3613 40548b 3611->3613 3612->3611 3612->3612 3614 40573a 18 API calls 3613->3614 3615 40549f 3614->3615 3616 4054a8 DeleteFileA 3615->3616 3617 4054bf 3615->3617 3618 40342d OleUninitialize 3616->3618 3619 4055fe 3617->3619 3654 405b66 lstrcpynA 3617->3654 3618->3393 3618->3394 3619->3618 3626 405e61 2 API calls 3619->3626 3621 4054e9 3622 4054fa 3621->3622 3623 4054ed lstrcatA 3621->3623 3625 4056a0 2 API calls 3622->3625 3624 405500 3623->3624 3627 40550e lstrcatA 3624->3627 3629 405519 lstrlenA FindFirstFileA 3624->3629 3625->3624 3628 405619 3626->3628 3627->3629 3628->3618 3631 405659 3 API calls 3628->3631 3630 4055f4 3629->3630 3651 40553d 3629->3651 3630->3619 3633 405623 3631->3633 3632 405684 CharNextA 3632->3651 3634 40581e 2 API calls 3633->3634 3635 405629 RemoveDirectoryA 3634->3635 3636 405634 3635->3636 3637 40564b 3635->3637 3636->3618 3639 40563a 3636->3639 3640 404f04 25 API calls 3637->3640 3642 404f04 25 API calls 3639->3642 3640->3618 3641 4055d3 FindNextFileA 3643 4055eb FindClose 3641->3643 3641->3651 3644 405642 3642->3644 3643->3630 3645 4058b4 38 API calls 3644->3645 3648 405649 3645->3648 3646 40581e 2 API calls 3649 4055a0 DeleteFileA 3646->3649 3647 40548b 59 API calls 3647->3651 3648->3618 3649->3651 3650 404f04 25 API calls 3650->3641 3651->3632 3651->3641 3651->3646 3651->3647 3651->3650 3652 404f04 25 API calls 3651->3652 3653 4058b4 38 API calls 3651->3653 3655 405b66 lstrcpynA 3651->3655 3652->3651 3653->3651 3654->3621 3655->3651 3656->3565 3657->3571 3659 4057e8 lstrlenA 3658->3659 3660 4057f2 3659->3660 3661 4057c6 lstrcmpiA 3659->3661 3660->3578 3660->3579 3661->3660 3662 4057df CharNextA 3661->3662 3662->3659 3663->3582 4379 40263e 4380 4029f6 18 API calls 4379->4380 4381 402645 FindFirstFileA 4380->4381 4382 402668 4381->4382 4386 402658 4381->4386 4383 40266f 4382->4383 4387 405ac4 wsprintfA 4382->4387 4388 405b66 lstrcpynA 4383->4388 4387->4383 4388->4386 4389 4024be 4390 4024c3 4389->4390 4391 4024d4 4389->4391 4393 4029d9 18 API calls 4390->4393 4392 4029f6 18 API calls 4391->4392 4394 4024db lstrlenA 4392->4394 4395 4024ca 4393->4395 4394->4395 4396 4024fa WriteFile 4395->4396 4397 40265c 4395->4397 4396->4397

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 40323c-4032d1 #17 SetErrorMode OleInitialize call 405e88 SHGetFileInfoA call 405b66 GetCommandLineA call 405b66 GetModuleHandleA 7 4032d3-4032d8 0->7 8 4032dd-4032f2 call 405684 CharNextA 0->8 7->8 11 403357-40335b 8->11 12 4032f4-4032f7 11->12 13 40335d 11->13 14 4032f9-4032fd 12->14 15 4032ff-403307 12->15 16 403370-403388 GetTempPathA call 403208 13->16 14->14 14->15 18 403309-40330a 15->18 19 40330f-403312 15->19 25 4033aa-4033c1 DeleteFileA call 402c72 16->25 26 40338a-4033a8 GetWindowsDirectoryA lstrcatA call 403208 16->26 18->19 20 403314-403318 19->20 21 403347-403354 call 405684 19->21 23 403328-40332e 20->23 24 40331a-403323 20->24 21->11 38 403356 21->38 30 403330-403339 23->30 31 40333e-403345 23->31 24->23 28 403325 24->28 39 403428-403437 call 4035bd OleUninitialize 25->39 40 4033c3-4033c9 25->40 26->25 26->39 28->23 30->31 35 40333b 30->35 31->21 36 40335f-40336b call 405b66 31->36 35->31 36->16 38->11 50 403522-403528 39->50 51 40343d-40344d call 405427 ExitProcess 39->51 42 403418-40341f call 4036af 40->42 43 4033cb-4033d4 call 405684 40->43 48 403424 42->48 54 4033df-4033e1 43->54 48->39 52 4035a5-4035ad 50->52 53 40352a-403547 call 405e88 * 3 50->53 58 4035b3-4035b7 ExitProcess 52->58 59 4035af 52->59 80 403591-40359c ExitWindowsEx 53->80 81 403549-40354b 53->81 60 4033e3-4033ed 54->60 61 4033d6-4033dc 54->61 59->58 62 403453-40346d lstrcatA lstrcmpiA 60->62 63 4033ef-4033fc call 40573a 60->63 61->60 65 4033de 61->65 62->39 67 40346f-403484 CreateDirectoryA SetCurrentDirectoryA 62->67 63->39 73 4033fe-403414 call 405b66 * 2 63->73 65->54 70 403491-4034ab call 405b66 67->70 71 403486-40348c call 405b66 67->71 83 4034b0-4034cc call 405b88 DeleteFileA 70->83 71->70 73->42 80->52 87 40359e-4035a0 call 40140b 80->87 81->80 84 40354d-40354f 81->84 92 40350d-403514 83->92 93 4034ce-4034de CopyFileA 83->93 84->80 88 403551-403563 GetCurrentProcess 84->88 87->52 88->80 97 403565-403587 88->97 92->83 95 403516-40351d call 4058b4 92->95 93->92 96 4034e0-403500 call 4058b4 call 405b88 call 4053c6 93->96 95->39 96->92 107 403502-403509 CloseHandle 96->107 97->80 107->92
                                      APIs
                                      • #17.COMCTL32 ref: 0040325B
                                      • SetErrorMode.KERNEL32(00008001), ref: 00403266
                                      • OleInitialize.OLE32(00000000), ref: 0040326D
                                        • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                        • Part of subcall function 00405E88: LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                        • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                      • SHGetFileInfoA.SHELL32(0041F458,00000000,?,00000160,00000000,00000008), ref: 00403295
                                        • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00000400,004032AA,Diezel Amps Bundle WiN,NSIS Error), ref: 00405B73
                                      • GetCommandLineA.KERNEL32(Diezel Amps Bundle WiN,NSIS Error), ref: 004032AA
                                      • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\EB2UOXRNsE.exe",00000000), ref: 004032BD
                                      • CharNextA.USER32(00000000,"C:\Users\user\Desktop\EB2UOXRNsE.exe",00000020), ref: 004032E8
                                      • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 0040337B
                                      • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403390
                                      • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040339C
                                      • DeleteFileA.KERNEL32(1033), ref: 004033AF
                                      • OleUninitialize.OLE32(00000000), ref: 0040342D
                                      • ExitProcess.KERNEL32 ref: 0040344D
                                      • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\EB2UOXRNsE.exe",00000000,00000000), ref: 00403459
                                      • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 00403465
                                      • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403471
                                      • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403478
                                      • DeleteFileA.KERNEL32(0041F058,0041F058,?,00424000,?), ref: 004034C2
                                      • CopyFileA.KERNEL32(C:\Users\user\Desktop\EB2UOXRNsE.exe,0041F058,00000001), ref: 004034D6
                                      • CloseHandle.KERNEL32(00000000,0041F058,0041F058,?,0041F058,00000000), ref: 00403503
                                      • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403558
                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403594
                                      • ExitProcess.KERNEL32 ref: 004035B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: File$DirectoryExitHandleProcess$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                      • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\EB2UOXRNsE.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\EB2UOXRNsE.exe$Diezel Amps Bundle WiN$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$3b
                                      • API String ID: 2278157092-1470720252
                                      • Opcode ID: b237e16242222b526cfbc7eec5e85b12329012a3d6ce1955aa8a6be5a5dec380
                                      • Instruction ID: d9df3101e86bd055252ea398e1a167ecdf9755d8b7b18b8fa076e16bcd865dbe
                                      • Opcode Fuzzy Hash: b237e16242222b526cfbc7eec5e85b12329012a3d6ce1955aa8a6be5a5dec380
                                      • Instruction Fuzzy Hash: E191D231A087417EE7216F609D49B2B7EACEB01306F44457BF941B61E2C77CAE058B6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 108 405042-40505d 109 405063-40512c GetDlgItem * 3 call 403f4d call 4047a6 GetClientRect GetSystemMetrics SendMessageA * 2 108->109 110 4051ee-4051f5 108->110 130 40514a-40514d 109->130 131 40512e-405148 SendMessageA * 2 109->131 112 4051f7-405219 GetDlgItem CreateThread CloseHandle 110->112 113 40521f-40522c 110->113 112->113 115 40524a-405251 113->115 116 40522e-405234 113->116 120 405253-405259 115->120 121 4052a8-4052ac 115->121 118 405236-405245 ShowWindow * 2 call 403f4d 116->118 119 40526c-405275 call 403f7f 116->119 118->115 134 40527a-40527e 119->134 125 405281-405291 ShowWindow 120->125 126 40525b-405267 call 403ef1 120->126 121->119 123 4052ae-4052b1 121->123 123->119 132 4052b3-4052c6 SendMessageA 123->132 128 4052a1-4052a3 call 403ef1 125->128 129 405293-40529c call 404f04 125->129 126->119 128->121 129->128 137 40515d-405174 call 403f18 130->137 138 40514f-40515b SendMessageA 130->138 131->130 139 4052cc-4052ed CreatePopupMenu call 405b88 AppendMenuA 132->139 140 4053bf-4053c1 132->140 147 405176-40518a ShowWindow 137->147 148 4051aa-4051cb GetDlgItem SendMessageA 137->148 138->137 145 405302-405308 139->145 146 4052ef-405300 GetWindowRect 139->146 140->134 150 40530b-405323 TrackPopupMenu 145->150 146->150 151 405199 147->151 152 40518c-405197 ShowWindow 147->152 148->140 149 4051d1-4051e9 SendMessageA * 2 148->149 149->140 150->140 153 405329-405340 150->153 154 40519f-4051a5 call 403f4d 151->154 152->154 155 405345-405360 SendMessageA 153->155 154->148 155->155 157 405362-405382 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 155->157 158 405384-4053a3 SendMessageA 157->158 158->158 159 4053a5-4053b9 GlobalUnlock SetClipboardData CloseClipboard 158->159 159->140
                                      APIs
                                      • GetDlgItem.USER32(?,00000403), ref: 004050A1
                                      • GetDlgItem.USER32(?,000003EE), ref: 004050B0
                                      • GetClientRect.USER32(?,?), ref: 004050ED
                                      • GetSystemMetrics.USER32(00000015), ref: 004050F5
                                      • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00405116
                                      • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405127
                                      • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 0040513A
                                      • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00405148
                                      • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040515B
                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040517D
                                      • ShowWindow.USER32(?,00000008), ref: 00405191
                                      • GetDlgItem.USER32(?,000003EC), ref: 004051B2
                                      • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004051C2
                                      • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004051DB
                                      • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 004051E7
                                      • GetDlgItem.USER32(?,000003F8), ref: 004050BF
                                        • Part of subcall function 00403F4D: SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                                      • GetDlgItem.USER32(?,000003EC), ref: 00405204
                                      • CreateThread.KERNEL32(00000000,00000000,Function_00004FD6,00000000), ref: 00405212
                                      • CloseHandle.KERNEL32(00000000), ref: 00405219
                                      • ShowWindow.USER32(00000000), ref: 0040523D
                                      • ShowWindow.USER32(0003040C,00000008), ref: 00405242
                                      • ShowWindow.USER32(00000008), ref: 00405289
                                      • SendMessageA.USER32(0003040C,00001004,00000000,00000000), ref: 004052BB
                                      • CreatePopupMenu.USER32 ref: 004052CC
                                      • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004052E1
                                      • GetWindowRect.USER32(0003040C,?), ref: 004052F4
                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405318
                                      • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405353
                                      • OpenClipboard.USER32(00000000), ref: 00405363
                                      • EmptyClipboard.USER32 ref: 00405369
                                      • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405372
                                      • GlobalLock.KERNEL32(00000000), ref: 0040537C
                                      • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405390
                                      • GlobalUnlock.KERNEL32(00000000), ref: 004053A8
                                      • SetClipboardData.USER32(00000001,00000000), ref: 004053B3
                                      • CloseClipboard.USER32 ref: 004053B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                      • String ID: L5b${$3b
                                      • API String ID: 590372296-825258754
                                      • Opcode ID: 5aa5e299d21103ac010b4f938d0fd54a6532c41be376ce1bb5dd201a3ba19c05
                                      • Instruction ID: b28aa7ce0402c6385ba5b6cd868a6258f1d07b471923b7bae974b2a68da01879
                                      • Opcode Fuzzy Hash: 5aa5e299d21103ac010b4f938d0fd54a6532c41be376ce1bb5dd201a3ba19c05
                                      • Instruction Fuzzy Hash: 34A14870904208FFDB219F60DD89AAE7F79FB08355F00417AFA05BA2A0C7795A41DF69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 445 40548b-4054a6 call 40573a 448 4054a8-4054ba DeleteFileA 445->448 449 4054bf-4054c9 445->449 450 405653-405656 448->450 451 4054cb-4054cd 449->451 452 4054dd-4054eb call 405b66 449->452 453 4054d3-4054d7 451->453 454 4055fe-405604 451->454 458 4054fa-4054fb call 4056a0 452->458 459 4054ed-4054f8 lstrcatA 452->459 453->452 453->454 454->450 456 405606-405609 454->456 460 405613-40561b call 405e61 456->460 461 40560b-405611 456->461 462 405500-405503 458->462 459->462 460->450 469 40561d-405632 call 405659 call 40581e RemoveDirectoryA 460->469 461->450 465 405505-40550c 462->465 466 40550e-405514 lstrcatA 462->466 465->466 468 405519-405537 lstrlenA FindFirstFileA 465->468 466->468 470 4055f4-4055f8 468->470 471 40553d-405554 call 405684 468->471 481 405634-405638 469->481 482 40564b-40564e call 404f04 469->482 470->454 473 4055fa 470->473 479 405556-40555a 471->479 480 40555f-405562 471->480 473->454 479->480 483 40555c 479->483 484 405564-405569 480->484 485 405575-405583 call 405b66 480->485 481->461 487 40563a-405649 call 404f04 call 4058b4 481->487 482->450 483->480 489 4055d3-4055e5 FindNextFileA 484->489 490 40556b-40556d 484->490 495 405585-40558d 485->495 496 40559a-4055a9 call 40581e DeleteFileA 485->496 487->450 489->471 493 4055eb-4055ee FindClose 489->493 490->485 494 40556f-405573 490->494 493->470 494->485 494->489 495->489 498 40558f-405598 call 40548b 495->498 505 4055cb-4055ce call 404f04 496->505 506 4055ab-4055af 496->506 498->489 505->489 508 4055b1-4055c1 call 404f04 call 4058b4 506->508 509 4055c3-4055c9 506->509 508->489 509->489
                                      APIs
                                      • DeleteFileA.KERNEL32(?,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 004054A9
                                      • lstrcatA.KERNEL32(004214A8,\*.*,004214A8,?,00000000,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 004054F3
                                      • lstrcatA.KERNEL32(?,00409010,?,004214A8,?,00000000,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 00405514
                                      • lstrlenA.KERNEL32(?,?,00409010,?,004214A8,?,00000000,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 0040551A
                                      • FindFirstFileA.KERNEL32(004214A8,?,?,?,00409010,?,004214A8,?,00000000,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 0040552B
                                      • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 004055DD
                                      • FindClose.KERNEL32(?), ref: 004055EE
                                      Strings
                                      • \*.*, xrefs: 004054ED
                                      • "C:\Users\user\Desktop\EB2UOXRNsE.exe", xrefs: 00405495
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 0040548B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                      • String ID: "C:\Users\user\Desktop\EB2UOXRNsE.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                      • API String ID: 2035342205-780943878
                                      • Opcode ID: 6c8ee5a3fe02bedcc3e1648cc4c34db6c3543f7bd00f265664a9289eb0c65dd6
                                      • Instruction ID: bc429f5d1e1b14784ce7e3564347ec6ed469848bfd5577fff983359c073685a4
                                      • Opcode Fuzzy Hash: 6c8ee5a3fe02bedcc3e1648cc4c34db6c3543f7bd00f265664a9289eb0c65dd6
                                      • Instruction Fuzzy Hash: 0351F331904A447ADB216B218C45BBF3B79CF42728F54847BF905711E2CB3C5A82DE6E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                                      • Instruction ID: 7fe690cacb8e5da35aefc448adc87e2f65dc6f56ff44dc44b78e187fa59068bd
                                      • Opcode Fuzzy Hash: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                                      • Instruction Fuzzy Hash: 70F16871D00229CBDF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF44
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                      • LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: AddressHandleLibraryLoadModuleProc
                                      • String ID:
                                      • API String ID: 310444273-0
                                      • Opcode ID: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                                      • Instruction ID: 91087f9554edebef2dfdad95906e97f440013226b38390424b9c6ad62026e406
                                      • Opcode Fuzzy Hash: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                                      • Instruction Fuzzy Hash: 0FE08C32A08511BBD3115B30ED0896B77A8EA89B41304083EF959F6290D734EC119BFA
                                      APIs
                                      • FindFirstFileA.KERNEL32(?,004224F0,004218A8,0040577D,004218A8,004218A8,00000000,004218A8,004218A8,?,?,76232EE0,0040549F,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 00405E6C
                                      • FindClose.KERNEL32(00000000), ref: 00405E78
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: a0d9290738f1f02d4b3743de2211279f78b4a64d0718c2c828088997ee3199ab
                                      • Instruction ID: f2fe444ddfa45285d6a9eb51d657c4c39712a0d2250b7f8498e11f87d01b5aa3
                                      • Opcode Fuzzy Hash: a0d9290738f1f02d4b3743de2211279f78b4a64d0718c2c828088997ee3199ab
                                      • Instruction Fuzzy Hash: 26D012359495206FC7001738AD0C85B7A58EF553347508B32F969F62E0C7B4AD51DAED

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 160 403a45-403a57 161 403b98-403ba7 160->161 162 403a5d-403a63 160->162 164 403bf6-403c0b 161->164 165 403ba9-403bf1 GetDlgItem * 2 call 403f18 SetClassLongA call 40140b 161->165 162->161 163 403a69-403a72 162->163 168 403a74-403a81 SetWindowPos 163->168 169 403a87-403a8a 163->169 166 403c4b-403c50 call 403f64 164->166 167 403c0d-403c10 164->167 165->164 179 403c55-403c70 166->179 171 403c12-403c1d call 401389 167->171 172 403c43-403c45 167->172 168->169 174 403aa4-403aaa 169->174 175 403a8c-403a9e ShowWindow 169->175 171->172 193 403c1f-403c3e SendMessageA 171->193 172->166 178 403ee5 172->178 180 403ac6-403ac9 174->180 181 403aac-403ac1 DestroyWindow 174->181 175->174 186 403ee7-403eee 178->186 184 403c72-403c74 call 40140b 179->184 185 403c79-403c7f 179->185 189 403acb-403ad7 SetWindowLongA 180->189 190 403adc-403ae2 180->190 187 403ec2-403ec8 181->187 184->185 196 403ea3-403ebc DestroyWindow EndDialog 185->196 197 403c85-403c90 185->197 187->178 194 403eca-403ed0 187->194 189->186 191 403b85-403b93 call 403f7f 190->191 192 403ae8-403af9 GetDlgItem 190->192 191->186 198 403b18-403b1b 192->198 199 403afb-403b12 SendMessageA IsWindowEnabled 192->199 193->186 194->178 201 403ed2-403edb ShowWindow 194->201 196->187 197->196 202 403c96-403ce3 call 405b88 call 403f18 * 3 GetDlgItem 197->202 203 403b20-403b23 198->203 204 403b1d-403b1e 198->204 199->178 199->198 201->178 230 403ce5-403cea 202->230 231 403ced-403d29 ShowWindow KiUserCallbackDispatcher call 403f3a KiUserCallbackDispatcher 202->231 208 403b31-403b36 203->208 209 403b25-403b2b 203->209 207 403b4e-403b53 call 403ef1 204->207 207->191 212 403b6c-403b7f SendMessageA 208->212 214 403b38-403b3e 208->214 209->212 213 403b2d-403b2f 209->213 212->191 213->207 218 403b40-403b46 call 40140b 214->218 219 403b55-403b5e call 40140b 214->219 228 403b4c 218->228 219->191 227 403b60-403b6a 219->227 227->228 228->207 230->231 234 403d2b-403d2c 231->234 235 403d2e 231->235 236 403d30-403d5e GetSystemMenu EnableMenuItem SendMessageA 234->236 235->236 237 403d60-403d71 SendMessageA 236->237 238 403d73 236->238 239 403d79-403db2 call 403f4d call 405b66 lstrlenA call 405b88 SetWindowTextA call 401389 237->239 238->239 239->179 248 403db8-403dba 239->248 248->179 249 403dc0-403dc4 248->249 250 403de3-403df7 DestroyWindow 249->250 251 403dc6-403dcc 249->251 250->187 253 403dfd-403e2a CreateDialogParamA 250->253 251->178 252 403dd2-403dd8 251->252 252->179 254 403dde 252->254 253->187 255 403e30-403e87 call 403f18 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 253->255 254->178 255->178 260 403e89-403e9c ShowWindow call 403f64 255->260 262 403ea1 260->262 262->187
                                      APIs
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A81
                                      • ShowWindow.USER32(?), ref: 00403A9E
                                      • DestroyWindow.USER32 ref: 00403AB2
                                      • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403ACE
                                      • GetDlgItem.USER32(?,?), ref: 00403AEF
                                      • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403B03
                                      • IsWindowEnabled.USER32(00000000), ref: 00403B0A
                                      • GetDlgItem.USER32(?,00000001), ref: 00403BB8
                                      • GetDlgItem.USER32(?,00000002), ref: 00403BC2
                                      • SetClassLongA.USER32(?,000000F2,?), ref: 00403BDC
                                      • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403C2D
                                      • GetDlgItem.USER32(?,00000003), ref: 00403CD3
                                      • ShowWindow.USER32(00000000,?), ref: 00403CF4
                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D06
                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D21
                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D37
                                      • EnableMenuItem.USER32(00000000), ref: 00403D3E
                                      • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D56
                                      • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D69
                                      • lstrlenA.KERNEL32(004204A0,?,004204A0,Diezel Amps Bundle WiN), ref: 00403D92
                                      • SetWindowTextA.USER32(?,004204A0), ref: 00403DA1
                                      • ShowWindow.USER32(?,0000000A), ref: 00403ED5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Window$Item$MessageSend$Show$CallbackDispatcherLongMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
                                      • String ID: Diezel Amps Bundle WiN$L5b
                                      • API String ID: 1252290697-2961543041
                                      • Opcode ID: 14e7e0a8131732f9e150b36a7fce0cb21c204cb0cec2561e24870ec1d01c69b9
                                      • Instruction ID: 1b558320748e03173a152966608fa9e4bba3452d5179f8dde3fdb5243a6fbb8a
                                      • Opcode Fuzzy Hash: 14e7e0a8131732f9e150b36a7fce0cb21c204cb0cec2561e24870ec1d01c69b9
                                      • Instruction Fuzzy Hash: 21C18071A04204BBDB216F21ED45E2B3E7DEB4970AF40053EF541B12E1C739AA42DB6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 263 4036af-4036c7 call 405e88 266 4036c9-4036d9 call 405ac4 263->266 267 4036db-403702 call 405a4d 263->267 276 403725-40374e call 403978 call 40573a 266->276 272 403704-403715 call 405a4d 267->272 273 40371a-403720 lstrcatA 267->273 272->273 273->276 281 403754-403759 276->281 282 4037d5-4037dd call 40573a 276->282 281->282 284 40375b-40377f call 405a4d 281->284 288 4037eb-403810 LoadImageA 282->288 289 4037df-4037e6 call 405b88 282->289 284->282 290 403781-403783 284->290 292 403816-40384c RegisterClassA 288->292 293 40389f-4038a7 call 40140b 288->293 289->288 294 403794-4037a0 lstrlenA 290->294 295 403785-403792 call 405684 290->295 296 403852-40389a SystemParametersInfoA CreateWindowExA 292->296 297 40396e 292->297 306 4038b1-4038bc call 403978 293->306 307 4038a9-4038ac 293->307 301 4037a2-4037b0 lstrcmpiA 294->301 302 4037c8-4037d0 call 405659 call 405b66 294->302 295->294 296->293 299 403970-403977 297->299 301->302 305 4037b2-4037bc GetFileAttributesA 301->305 302->282 309 4037c2-4037c3 call 4056a0 305->309 310 4037be-4037c0 305->310 316 4038c2-4038df ShowWindow LoadLibraryA 306->316 317 403945-403946 call 404fd6 306->317 307->299 309->302 310->302 310->309 318 4038e1-4038e6 LoadLibraryA 316->318 319 4038e8-4038fa GetClassInfoA 316->319 323 40394b-40394d 317->323 318->319 321 403912-403935 DialogBoxParamA call 40140b 319->321 322 4038fc-40390c GetClassInfoA RegisterClassA 319->322 328 40393a-403943 call 4035ff 321->328 322->321 325 403967-403969 call 40140b 323->325 326 40394f-403955 323->326 325->297 326->307 329 40395b-403962 call 40140b 326->329 328->299 329->307
                                      APIs
                                        • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                        • Part of subcall function 00405E88: LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                        • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                      • lstrcatA.KERNEL32(1033,004204A0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004204A0,00000000,00000006,"C:\Users\user\Desktop\EB2UOXRNsE.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403720
                                      • lstrlenA.KERNEL32(00422E40,?,?,?,00422E40,00000000,00429400,1033,004204A0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004204A0,00000000,00000006,"C:\Users\user\Desktop\EB2UOXRNsE.exe"), ref: 00403795
                                      • lstrcmpiA.KERNEL32(?,.exe), ref: 004037A8
                                      • GetFileAttributesA.KERNEL32(00422E40), ref: 004037B3
                                      • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004037FC
                                        • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                                      • RegisterClassA.USER32 ref: 00403843
                                      • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 0040385B
                                      • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403894
                                      • ShowWindow.USER32(00000005,00000000), ref: 004038CA
                                      • LoadLibraryA.KERNEL32(RichEd20), ref: 004038DB
                                      • LoadLibraryA.KERNEL32(RichEd32), ref: 004038E6
                                      • GetClassInfoA.USER32(00000000,RichEdit20A,00423640), ref: 004038F6
                                      • GetClassInfoA.USER32(00000000,RichEdit,00423640), ref: 00403903
                                      • RegisterClassA.USER32(00423640), ref: 0040390C
                                      • DialogBoxParamA.USER32(?,00000000,00403A45,00000000), ref: 0040392B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                      • String ID: "C:\Users\user\Desktop\EB2UOXRNsE.exe"$.DEFAULT\Control Panel\International$.exe$1033$@.B$@6B$A.B$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$3b
                                      • API String ID: 914957316-1008334487
                                      • Opcode ID: 6186cd0dc7f5b8c4dd386d80bd90aa2821d034a13263318605b4bd1c267fc880
                                      • Instruction ID: 5edcd83abe1923a5ef33726047749e404321c8c293ca1ea02831498dc8d0bb6f
                                      • Opcode Fuzzy Hash: 6186cd0dc7f5b8c4dd386d80bd90aa2821d034a13263318605b4bd1c267fc880
                                      • Instruction Fuzzy Hash: A961A3B16442007FD720AF659D45E2B3AADEB4475AF40457FF940B22E1D77CAD01CA2E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 334 404060-404070 335 404183-404196 334->335 336 404076-40407e 334->336 337 4041f2-4041f6 335->337 338 404198-4041a1 335->338 339 404080-40408f 336->339 340 404091-404129 call 403f18 * 2 CheckDlgButton call 403f3a GetDlgItem call 403f4d SendMessageA 336->340 341 4042c6-4042cd 337->341 342 4041fc-404210 GetDlgItem 337->342 343 4042d5 338->343 344 4041a7-4041af 338->344 339->340 372 404134-40417e SendMessageA * 2 lstrlenA SendMessageA * 2 340->372 373 40412b-40412e GetSysColor 340->373 341->343 351 4042cf 341->351 348 404212-404219 342->348 349 404284-40428b 342->349 346 4042d8-4042df call 403f7f 343->346 344->343 350 4041b5-4041c1 344->350 357 4042e4-4042e8 346->357 348->349 354 40421b-404236 348->354 349->346 355 40428d-404294 349->355 350->343 356 4041c7-4041ed GetDlgItem SendMessageA call 403f3a call 4042eb 350->356 351->343 354->349 359 404238-404281 SendMessageA LoadCursorA SetCursor ShellExecuteA LoadCursorA SetCursor 354->359 355->346 360 404296-40429a 355->360 356->337 359->349 363 40429c-4042ab SendMessageA 360->363 364 4042ad-4042b1 360->364 363->364 368 4042c1-4042c4 364->368 369 4042b3-4042bf SendMessageA 364->369 368->357 369->368 372->357 373->372
                                      APIs
                                      • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004040EB
                                      • GetDlgItem.USER32(00000000,000003E8), ref: 004040FF
                                      • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040411D
                                      • GetSysColor.USER32(?), ref: 0040412E
                                      • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040413D
                                      • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040414C
                                      • lstrlenA.KERNEL32(?), ref: 00404156
                                      • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404164
                                      • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404173
                                      • GetDlgItem.USER32(?,0000040A), ref: 004041D6
                                      • SendMessageA.USER32(00000000), ref: 004041D9
                                      • GetDlgItem.USER32(?,000003E8), ref: 00404204
                                      • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404244
                                      • LoadCursorA.USER32(00000000,00007F02), ref: 00404253
                                      • SetCursor.USER32(00000000), ref: 0040425C
                                      • ShellExecuteA.SHELL32(0000070B,open,@.B,00000000,00000000,00000001), ref: 0040426F
                                      • LoadCursorA.USER32(00000000,00007F00), ref: 0040427C
                                      • SetCursor.USER32(00000000), ref: 0040427F
                                      • SendMessageA.USER32(00000111,00000001,00000000), ref: 004042AB
                                      • SendMessageA.USER32(00000010,00000000,00000000), ref: 004042BF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                      • String ID: @.B$L5b$N$open$3b
                                      • API String ID: 3615053054-2534267217
                                      • Opcode ID: e8b988e3949f0b6d91b1b58256fef292242953983a672fd1ea6cb44b2e1e2ed0
                                      • Instruction ID: 7761d7a6ce13443680711406d70bf9c6d022160e69bfd2fffc9b265f6460a43d
                                      • Opcode Fuzzy Hash: e8b988e3949f0b6d91b1b58256fef292242953983a672fd1ea6cb44b2e1e2ed0
                                      • Instruction Fuzzy Hash: 4661B2B1A40209BFEB109F60DC45F6A3B69FB44755F10817AFB04BA2D1C7B8A951CF98

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 374 402c72-402cc0 GetTickCount GetModuleFileNameA call 40583d 377 402cc2-402cc7 374->377 378 402ccc-402cfa call 405b66 call 4056a0 call 405b66 GetFileSize 374->378 379 402f11-402f15 377->379 386 402d00-402d17 378->386 387 402dea-402df8 call 402bd3 378->387 388 402d19 386->388 389 402d1b-402d21 call 4031bf 386->389 393 402ec9-402ece 387->393 394 402dfe-402e01 387->394 388->389 395 402d26-402d28 389->395 393->379 396 402e03-402e14 call 4031f1 call 4031bf 394->396 397 402e2d-402e79 GlobalAlloc call 405f62 call 40586c CreateFileA 394->397 398 402e85-402e8d call 402bd3 395->398 399 402d2e-402d34 395->399 417 402e19-402e1b 396->417 424 402e7b-402e80 397->424 425 402e8f-402ebf call 4031f1 call 402f18 397->425 398->393 402 402db4-402db8 399->402 403 402d36-402d4e call 4057fe 399->403 406 402dc1-402dc7 402->406 407 402dba-402dc0 call 402bd3 402->407 403->406 421 402d50-402d57 403->421 413 402dc9-402dd7 call 405ef4 406->413 414 402dda-402de4 406->414 407->406 413->414 414->386 414->387 417->393 422 402e21-402e27 417->422 421->406 426 402d59-402d60 421->426 422->393 422->397 424->379 434 402ec4-402ec7 425->434 426->406 428 402d62-402d69 426->428 428->406 430 402d6b-402d72 428->430 430->406 432 402d74-402d94 430->432 432->393 433 402d9a-402d9e 432->433 435 402da0-402da4 433->435 436 402da6-402dae 433->436 434->393 437 402ed0-402ee1 434->437 435->387 435->436 436->406 438 402db0-402db2 436->438 439 402ee3 437->439 440 402ee9-402eee 437->440 438->406 439->440 441 402eef-402ef5 440->441 441->441 442 402ef7-402f0f call 4057fe 441->442 442->379
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00402C86
                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\EB2UOXRNsE.exe,00000400), ref: 00402CA2
                                        • Part of subcall function 0040583D: GetFileAttributesA.KERNEL32(00000003,00402CB5,C:\Users\user\Desktop\EB2UOXRNsE.exe,80000000,00000003), ref: 00405841
                                        • Part of subcall function 0040583D: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                                      • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\EB2UOXRNsE.exe,C:\Users\user\Desktop\EB2UOXRNsE.exe,80000000,00000003), ref: 00402CEB
                                      • GlobalAlloc.KERNEL32(00000040,00409130), ref: 00402E32
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                      • String ID: "C:\Users\user\Desktop\EB2UOXRNsE.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\EB2UOXRNsE.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft$3b
                                      • API String ID: 2803837635-3670827252
                                      • Opcode ID: 0cdd48fbc5a4d5c8723b79192c8575744a8c62d839b7521bcc62a74243bb106d
                                      • Instruction ID: 0b72a330c31c6d4d52753dad6a5c3012229d4666e6dae103a7747cbc92612fb8
                                      • Opcode Fuzzy Hash: 0cdd48fbc5a4d5c8723b79192c8575744a8c62d839b7521bcc62a74243bb106d
                                      • Instruction Fuzzy Hash: B761E231A40215ABDB20DF64DE49B9E7BB4EB04315F20407BF904B62D2D7BC9E458B9C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 514 401734-401757 call 4029f6 call 4056c6 519 401761-401773 call 405b66 call 405659 lstrcatA 514->519 520 401759-40175f call 405b66 514->520 525 401778-40177e call 405dc8 519->525 520->525 530 401783-401787 525->530 531 401789-401793 call 405e61 530->531 532 4017ba-4017bd 530->532 540 4017a5-4017b7 531->540 541 401795-4017a3 CompareFileTime 531->541 533 4017c5-4017e1 call 40583d 532->533 534 4017bf-4017c0 call 40581e 532->534 542 4017e3-4017e6 533->542 543 401859-401882 call 404f04 call 402f18 533->543 534->533 540->532 541->540 544 4017e8-40182a call 405b66 * 2 call 405b88 call 405b66 call 405427 542->544 545 40183b-401845 call 404f04 542->545 557 401884-401888 543->557 558 40188a-401896 SetFileTime 543->558 544->530 577 401830-401831 544->577 555 40184e-401854 545->555 560 402894 555->560 557->558 559 40189c-4018a7 CloseHandle 557->559 558->559 562 40288b-40288e 559->562 563 4018ad-4018b0 559->563 564 402896-40289a 560->564 562->560 566 4018b2-4018c3 call 405b88 lstrcatA 563->566 567 4018c5-4018c8 call 405b88 563->567 573 4018cd-402213 call 405427 566->573 567->573 573->564 581 40265c-402663 573->581 577->555 579 401833-401834 577->579 579->545 581->562
                                      APIs
                                      • lstrcatA.KERNEL32(00000000,00000000,get,00429800,00000000,00000000,00000031), ref: 00401773
                                      • CompareFileTime.KERNEL32(-00000014,?,get,get,00000000,00000000,get,00429800,00000000,00000000,00000031), ref: 0040179D
                                        • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00000400,004032AA,Diezel Amps Bundle WiN,NSIS Error), ref: 00405B73
                                        • Part of subcall function 00404F04: lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                        • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                        • Part of subcall function 00404F04: lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                        • Part of subcall function 00404F04: SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\s$get
                                      • API String ID: 1941528284-1391312149
                                      • Opcode ID: 7e13bad854fddeb55fa2929aff0ffc3a5c93114e1649d47e1deeff05be23e6f2
                                      • Instruction ID: ca24b6133afb507e547736dc5ab02d451b7f1a2d30e0a517c5ad6537af4b780a
                                      • Opcode Fuzzy Hash: 7e13bad854fddeb55fa2929aff0ffc3a5c93114e1649d47e1deeff05be23e6f2
                                      • Instruction Fuzzy Hash: 8441C131900515BBCB10BFB5DD46EAF3A79EF01369B24433BF511B11E1D63C9A418AAD

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 582 402f18-402f27 583 402f45-402f50 call 403043 582->583 584 402f29-402f3f SetFilePointer 582->584 587 402f56-402f70 ReadFile 583->587 588 40303c-403040 583->588 584->583 589 402f76-402f79 587->589 590 403039 587->590 589->590 592 402f7f-402f92 call 403043 589->592 591 40303b 590->591 591->588 592->588 595 402f98-402f9b 592->595 596 403008-40300e 595->596 597 402f9d-402fa0 595->597 600 403010 596->600 601 403013-403026 ReadFile 596->601 598 403034-403037 597->598 599 402fa6 597->599 598->588 603 402fab-402fb3 599->603 600->601 601->590 602 403028-403031 601->602 602->598 604 402fb5 603->604 605 402fb8-402fca ReadFile 603->605 604->605 605->590 606 402fcc-402fcf 605->606 606->590 607 402fd1-402fe6 WriteFile 606->607 608 403004-403006 607->608 609 402fe8-402feb 607->609 608->591 609->608 610 402fed-403000 609->610 610->603 611 403002 610->611 611->598
                                      APIs
                                      • SetFilePointer.KERNEL32(00409130,00000000,00000000,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130,0000B5E4), ref: 00402F3F
                                      • ReadFile.KERNEL32(00409130,00000004,0000B5E4,00000000,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130), ref: 00402F6C
                                      • ReadFile.KERNEL32(00413040,00004000,0000B5E4,00000000,00409130,?,00402EC4,000000FF,00000000,00000000,00409130,0000B5E4), ref: 00402FC6
                                      • WriteFile.KERNEL32(00000000,00413040,0000B5E4,000000FF,00000000,?,00402EC4,000000FF,00000000,00000000,00409130,0000B5E4), ref: 00402FDE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: File$Read$PointerWrite
                                      • String ID: @0A
                                      • API String ID: 2113905535-1363546919
                                      • Opcode ID: 3fc20a6f8204afd4db5be5275d6ec1a2b538eb21de19a3adc5be7867336c551b
                                      • Instruction ID: f0f891dec1baa82fcb152a6e3a42d02399587e043c2e4755ce28507b82245ee9
                                      • Opcode Fuzzy Hash: 3fc20a6f8204afd4db5be5275d6ec1a2b538eb21de19a3adc5be7867336c551b
                                      • Instruction Fuzzy Hash: 3F315731501249EBDB21CF55DD40A9E7FBCEB843A5F20407AFA05A6190D3789F81DBA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 612 403043-40306c GetTickCount 613 403072-40309d call 4031f1 SetFilePointer 612->613 614 4031ad-4031b5 call 402bd3 612->614 620 4030a2-4030b4 613->620 619 4031b7-4031bc 614->619 621 4030b6 620->621 622 4030b8-4030c6 call 4031bf 620->622 621->622 625 4030cc-4030d8 622->625 626 40319f-4031a2 622->626 627 4030de-4030e4 625->627 626->619 628 4030e6-4030ec 627->628 629 40310f-40312b call 405f82 627->629 628->629 631 4030ee-403109 call 402bd3 628->631 635 4031a8 629->635 636 40312d-403135 629->636 634 40310e 631->634 634->629 637 4031aa-4031ab 635->637 638 403137-40314d WriteFile 636->638 639 403169-40316f 636->639 637->619 640 4031a4-4031a6 638->640 641 40314f-403153 638->641 639->635 642 403171-403173 639->642 640->637 641->640 643 403155-403161 641->643 642->635 644 403175-403188 642->644 643->627 645 403167 643->645 644->620 646 40318e-40319d SetFilePointer 644->646 645->644 646->614
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00403058
                                        • Part of subcall function 004031F1: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402E9D,0000B5E4), ref: 004031FF
                                      • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000), ref: 0040308B
                                      • WriteFile.KERNEL32(0040B040,0040F3B0,00000000,00000000,00413040,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403145
                                      • SetFilePointer.KERNEL32(00AD6CBC,00000000,00000000,00413040,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403197
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: File$Pointer$CountTickWrite
                                      • String ID: @0A$3b
                                      • API String ID: 2146148272-3067313148
                                      • Opcode ID: c3ab3b2a6ebb8e6cedc02463b91186366695901546e3771a82caeddcf6bda455
                                      • Instruction ID: c862c83604f3b109b9ae356e59bf9e99270c6d64ee518f880403d0392c1b0dc8
                                      • Opcode Fuzzy Hash: c3ab3b2a6ebb8e6cedc02463b91186366695901546e3771a82caeddcf6bda455
                                      • Instruction Fuzzy Hash: 4B41ABB25042029FD710CF29EE4096A7FBDF748356705423BE501BA2E1CB3C6E099B9E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 647 404f04-404f19 648 404fcf-404fd3 647->648 649 404f1f-404f31 647->649 650 404f33-404f37 call 405b88 649->650 651 404f3c-404f48 lstrlenA 649->651 650->651 653 404f65-404f69 651->653 654 404f4a-404f5a lstrlenA 651->654 656 404f78-404f7c 653->656 657 404f6b-404f72 SetWindowTextA 653->657 654->648 655 404f5c-404f60 lstrcatA 654->655 655->653 658 404fc2-404fc4 656->658 659 404f7e-404fc0 SendMessageA * 3 656->659 657->656 658->648 660 404fc6-404fc9 658->660 659->658 660->648
                                      APIs
                                      • lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                      • lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                      • lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                      • SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                      • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                      • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                      • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                      • String ID:
                                      • API String ID: 2531174081-0
                                      • Opcode ID: 3060ff48176a0075549dcba78de7f639edbccfa172efc44d831dc49f1ba50047
                                      • Instruction ID: 33d69ec58002f5e3cec48cf4aa7ac502a1da6879986bf9ca4026f821734cd723
                                      • Opcode Fuzzy Hash: 3060ff48176a0075549dcba78de7f639edbccfa172efc44d831dc49f1ba50047
                                      • Instruction Fuzzy Hash: C4219D71A00108BBDF119FA5CD849DEBFB9EB49354F14807AFA04B6290C3389E45CBA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 661 402bd3-402bdf 662 402be1-402be8 661->662 663 402bf9-402bff 661->663 666 402bf1-402bf7 662->666 667 402bea-402beb DestroyWindow 662->667 664 402c01-402c07 call 405ec1 663->664 665 402c09-402c15 GetTickCount 663->665 670 402c6f-402c71 664->670 669 402c17-402c1d 665->669 665->670 666->670 667->666 672 402c4c-402c69 CreateDialogParamA ShowWindow 669->672 673 402c1f-402c26 669->673 672->670 673->670 674 402c28-402c45 call 402bb7 wsprintfA call 404f04 673->674 678 402c4a 674->678 678->670
                                      APIs
                                      • DestroyWindow.USER32(00000000,00000000), ref: 00402BEB
                                      • GetTickCount.KERNEL32 ref: 00402C09
                                      • wsprintfA.USER32 ref: 00402C37
                                        • Part of subcall function 00404F04: lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                        • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                        • Part of subcall function 00404F04: lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                        • Part of subcall function 00404F04: SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                      • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C5B
                                      • ShowWindow.USER32(00000000,00000005), ref: 00402C69
                                        • Part of subcall function 00402BB7: MulDiv.KERNEL32(00000000,00000064,00004370), ref: 00402BCC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                      • String ID: ... %d%%
                                      • API String ID: 722711167-2449383134
                                      • Opcode ID: f8ace1eb95c0e61b2c61dafef86db0eeb17deac8452a01d8f5baf0090805ef89
                                      • Instruction ID: c44cf6bb529b7c61e0c77009ed50883557557090b8ffabf6f859222ef57aaf40
                                      • Opcode Fuzzy Hash: f8ace1eb95c0e61b2c61dafef86db0eeb17deac8452a01d8f5baf0090805ef89
                                      • Instruction Fuzzy Hash: C6016170949210EBD7215F61EE4DA9F7B78AB04701B14403BF502B11E5C6BC9A01CBAE

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 679 401f51-401f5d 680 401f63-401f79 call 4029f6 * 2 679->680 681 402019-40201b 679->681 691 401f88-401f96 LoadLibraryExA 680->691 692 401f7b-401f86 GetModuleHandleA 680->692 683 402164-402169 call 401423 681->683 689 40288b-40289a 683->689 694 401f98-401fa6 GetProcAddress 691->694 695 402012-402014 691->695 692->691 692->694 696 401fe5-401fea call 404f04 694->696 697 401fa8-401fae 694->697 695->683 701 401fef-401ff2 696->701 699 401fb0-401fbc call 401423 697->699 700 401fc7-401fdb 697->700 699->701 709 401fbe-401fc5 699->709 703 401fe0-401fe3 700->703 701->689 704 401ff8-402000 call 40364f 701->704 703->701 704->689 710 402006-40200d FreeLibrary 704->710 709->701 710->689
                                      APIs
                                      • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
                                        • Part of subcall function 00404F04: lstrlenA.KERNEL32(0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                                        • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0041FC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                                        • Part of subcall function 00404F04: lstrcatA.KERNEL32(0041FC78,00402C4A,00402C4A,0041FC78,00000000,00000000,00000000), ref: 00404F60
                                        • Part of subcall function 00404F04: SetWindowTextA.USER32(0041FC78,0041FC78), ref: 00404F72
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                                        • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                                      • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                                      • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                      • String ID: ?B
                                      • API String ID: 2987980305-117478770
                                      • Opcode ID: 8a5e19ada2a0501c23d939e05fc9a3d0d7d0ee5640c0e41b76e5c8575941fe9f
                                      • Instruction ID: 83c29b7dad20212888764ed045f323035a642c1bbb84e8da84d377f5f563bf0e
                                      • Opcode Fuzzy Hash: 8a5e19ada2a0501c23d939e05fc9a3d0d7d0ee5640c0e41b76e5c8575941fe9f
                                      • Instruction Fuzzy Hash: D621EE72D04216EBCF207FA4DE49A6E75B06B44399F204237F511B52E0D77C4D41965E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 711 40586c-405876 712 405877-4058a1 GetTickCount GetTempFileNameA 711->712 713 4058b0-4058b2 712->713 714 4058a3-4058a5 712->714 716 4058aa-4058ad 713->716 714->712 715 4058a7 714->715 715->716
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 0040587F
                                      • GetTempFileNameA.KERNEL32(?,0061736E,00000000,?), ref: 00405899
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CountFileNameTempTick
                                      • String ID: "C:\Users\user\Desktop\EB2UOXRNsE.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                      • API String ID: 1716503409-2647686291
                                      • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                      • Instruction ID: 7bdb262dbebad2fb51735791196b4a750b565e3ebaa120aaaad2cbe3184e43fd
                                      • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                      • Instruction Fuzzy Hash: B1F0A73734820876E7105E55DC04B9B7F9DDF91760F14C027FE44DA1C0D6B49954C7A5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 717 401bad-401bc5 call 4029d9 * 2 722 401bd1-401bd5 717->722 723 401bc7-401bce call 4029f6 717->723 725 401be1-401be7 722->725 726 401bd7-401bde call 4029f6 722->726 723->722 729 401be9-401bfd call 4029d9 * 2 725->729 730 401c2d-401c53 call 4029f6 * 2 FindWindowExA 725->730 726->725 740 401c1d-401c2b SendMessageA 729->740 741 401bff-401c1b SendMessageTimeoutA 729->741 742 401c59 730->742 740->742 743 401c5c-401c5f 741->743 742->743 744 401c65 743->744 745 40288b-40289a 743->745 744->745
                                      APIs
                                      • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                                      • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$Timeout
                                      • String ID: !
                                      • API String ID: 1777923405-2657877971
                                      • Opcode ID: 4c88f05d798f5705ce1e1e18451d2fcf653d7f56610e9d44bad61831beeb824c
                                      • Instruction ID: 67abd366a37910a3fb0c7fe19d632a25016d3899897cc5a5bd850e91adcb6683
                                      • Opcode Fuzzy Hash: 4c88f05d798f5705ce1e1e18451d2fcf653d7f56610e9d44bad61831beeb824c
                                      • Instruction Fuzzy Hash: B721C4B1A44209BFEF01AFB4CE4AAAE7B75EF44344F14053EF602B60D1D6B84980E718
                                      APIs
                                        • Part of subcall function 004056ED: CharNextA.USER32(0040549F,?,004218A8,00000000,00405751,004218A8,004218A8,?,?,76232EE0,0040549F,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",76232EE0), ref: 004056FB
                                        • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 00405700
                                        • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 0040570F
                                      • CreateDirectoryA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                      • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                      • GetFileAttributesA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                      • SetCurrentDirectoryA.KERNEL32(00000000,00429800,00000000,00000000,000000F0), ref: 00401622
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                      • String ID:
                                      • API String ID: 3751793516-0
                                      • Opcode ID: 79158bb1b9e0f9446a8291b1140989ad94052719e68ebd3d846b01836d69eb3e
                                      • Instruction ID: c38907cd9fbddcdb820990ab727de55d75fa8bca08f123d111df4852c942a759
                                      • Opcode Fuzzy Hash: 79158bb1b9e0f9446a8291b1140989ad94052719e68ebd3d846b01836d69eb3e
                                      • Instruction Fuzzy Hash: 7E010431D08141AFDB216F751D4497F27B0AA56369728073FF891B22E2C63C0942962E
                                      APIs
                                        • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E20
                                        • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                                        • Part of subcall function 00405DC8: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E32
                                        • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E42
                                      • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00403229
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Char$Next$CreateDirectoryPrev
                                      • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 4115351271-3512041753
                                      • Opcode ID: abd89e45c2a658b1316b3d4f01b0b3756ccb9227471bfd75c63f163c6189ffd7
                                      • Instruction ID: 28437e5e833f6c5712a3d87292ca06883de7807d6adf700678bf42288e0e849f
                                      • Opcode Fuzzy Hash: abd89e45c2a658b1316b3d4f01b0b3756ccb9227471bfd75c63f163c6189ffd7
                                      • Instruction Fuzzy Hash: 11D0C922656E3032C651363A3C0AFDF091C8F5271AF55847BF908B40D64B6C5A5259EF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                                      • Instruction ID: 319d18918fa2cc3741333e20ed782d5c303dd2f769888eebbc994f2124d7c2e6
                                      • Opcode Fuzzy Hash: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                                      • Instruction Fuzzy Hash: 29A15171E00229CBDF28CFA8C8547ADBBB1FF44305F15812AD856BB281D7789A96DF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                                      • Instruction ID: 868f2ec1f3ea74d7de1394d818727f69d5aca31e92bf34b5737afca42cfaef71
                                      • Opcode Fuzzy Hash: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                                      • Instruction Fuzzy Hash: 6E913171D00229CBEF28CF98C8547ADBBB1FF44305F15812AD856BB281C7789A9ADF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                                      • Instruction ID: e06b97397237a54a8f7c6fae7a0c48c933f493286525731b7b3672fa0d973436
                                      • Opcode Fuzzy Hash: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                                      • Instruction Fuzzy Hash: 678155B1D00229CFDF24CFA8C8447ADBBB1FB44305F25816AD456BB281D7789A96CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                                      • Instruction ID: 3ccfc7c80e99de65fa6db0e0edc8679980b1d0ea62cd2807200041591328ae3c
                                      • Opcode Fuzzy Hash: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                                      • Instruction Fuzzy Hash: D98187B1D00229CBDF24CFA8C8447AEBBB1FB44305F11816AD856BB2C1C7785A96CF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                                      • Instruction ID: 235c9a1f152390887c8e3346b3cf8cf745e7d176c25095dba4735a56a8f4339d
                                      • Opcode Fuzzy Hash: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                                      • Instruction Fuzzy Hash: 80714371D00229CBDF28CFA8C8447ADBBF1FB48305F15806AD846BB281D7395A96DF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                                      • Instruction ID: 067b91939e33353516387f96afd3df60e22fb0a2a23546be1218d687de4ca84d
                                      • Opcode Fuzzy Hash: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                                      • Instruction Fuzzy Hash: 14715371E00229CFEF28CF98C844BADBBB1FB44305F15816AD816BB281C7799996DF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                                      • Instruction ID: fa01dbb36adddbb747bc37ce8d7c8691094d52a97b4972d7f98645f49a39bfe1
                                      • Opcode Fuzzy Hash: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                                      • Instruction Fuzzy Hash: B3715671D00229CBEF28CF98C844BADBBB1FF44305F11816AD856BB281C7795A56DF54
                                      APIs
                                      • ReadFile.KERNEL32(?,?,00000001,?,?,?,00000002), ref: 00402552
                                        • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FileReadwsprintf
                                      • String ID:
                                      • API String ID: 3326442220-0
                                      • Opcode ID: f09489efe15c3b80ce99059f114ac931b0952256192e953ec66e22e0d2490737
                                      • Instruction ID: 6cc84ed2bafa7cfa1e138a8cf3ad7e95c15831b5a897215fce06e49f2d1c7330
                                      • Opcode Fuzzy Hash: f09489efe15c3b80ce99059f114ac931b0952256192e953ec66e22e0d2490737
                                      • Instruction Fuzzy Hash: 6821F870D05259BFCF219F648E595EEBBB49B01304F14817BE881B63D2D1BC8A81C72D
                                      APIs
                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                      • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 7b8e9ba5108b55dad21e1cb19ef7846daac3b048e1c883625bc8c045044f289d
                                      • Instruction ID: b71ad761f0ea07ecc4e6183a90c0cd8288537aab3e92bb5761005deb6e4a9b1f
                                      • Opcode Fuzzy Hash: 7b8e9ba5108b55dad21e1cb19ef7846daac3b048e1c883625bc8c045044f289d
                                      • Instruction Fuzzy Hash: 20014431B24210ABE7291B388D08B2A32ADE714315F10423FF801F32F0D678DC028B4C
                                      APIs
                                      • GetFileAttributesA.KERNEL32(00000003,00402CB5,C:\Users\user\Desktop\EB2UOXRNsE.exe,80000000,00000003), ref: 00405841
                                      • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: File$AttributesCreate
                                      • String ID:
                                      • API String ID: 415043291-0
                                      • Opcode ID: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                                      • Instruction ID: 90a47e22fdd321f70bf06df01bfdefa11f3e73682391c7296034eb3a8fe04f39
                                      • Opcode Fuzzy Hash: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                                      • Instruction Fuzzy Hash: 8CD09E31658301AFEF098F20DD1AF2E7AA2EB84B00F10562CB646940E0D6715815DB16
                                      APIs
                                      • GetFileAttributesA.KERNEL32(?,00405629,?,?,?), ref: 00405822
                                      • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405834
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                      • Instruction ID: 89544605ef234ac14ed66c3b065a2d642d1346908a696065e0ba681aeed38476
                                      • Opcode Fuzzy Hash: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                      • Instruction Fuzzy Hash: F8C04CB1808501ABD7056B24EF0D81F7B66EF50325B108B35F5A9E00F0C7355C66DA1A
                                      APIs
                                      • ReadFile.KERNEL32(00409130,00000000,00000000,00000000,00413040,0040B040,004030C4,00413040,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000), ref: 004031D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                      • Instruction ID: 4c5c04567c480c11bae84e94003d2882b37cb3083c3cc1db03504fe221b835f3
                                      • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                      • Instruction Fuzzy Hash: DAE08631500119BBCF215E619C00A973B5CEB09362F008033FA04E9190D532DB109BA5
                                      APIs
                                      • SetDlgItemTextA.USER32(?,?,00000000), ref: 00403F32
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: ItemText
                                      • String ID:
                                      • API String ID: 3367045223-0
                                      • Opcode ID: 3e813572aabfc24dd457d3397d8ae2cb884b5dfcfb659632984281e934c33c5c
                                      • Instruction ID: 32956ba5a052c000d200729fffd4f2c944d874cb1110b62223aa4bdd109d9e57
                                      • Opcode Fuzzy Hash: 3e813572aabfc24dd457d3397d8ae2cb884b5dfcfb659632984281e934c33c5c
                                      • Instruction Fuzzy Hash: E4C08C31048200BFD241AB04CC42F1FB3A8EFA0327F00C92EB05CE00D2C634D420CE2A
                                      APIs
                                      • SendMessageA.USER32(000203FA,00000000,00000000,00000000), ref: 00403F76
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 74a19277012f6d931596f598d2f6ffa2ec736fc7041dbb57cfa43a045af561dc
                                      • Instruction ID: 4934297729c285da13a483c37f1bad53b44c21571947472378d90217470b6476
                                      • Opcode Fuzzy Hash: 74a19277012f6d931596f598d2f6ffa2ec736fc7041dbb57cfa43a045af561dc
                                      • Instruction Fuzzy Hash: 6CC04C71B442017AEA209F619D45F177B68A754701F5444657204A51D0C674E510D61D
                                      APIs
                                      • SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 5380ca26047a56ac044db27ec5452a3d407db4c462228856e9187df95d64c5b6
                                      • Instruction ID: 0662716cb4741bc9db58cdf5bc89cb1196afa115b106f7c4ea820954fb206898
                                      • Opcode Fuzzy Hash: 5380ca26047a56ac044db27ec5452a3d407db4c462228856e9187df95d64c5b6
                                      • Instruction Fuzzy Hash: 17B09276685201BADA215B10DE09F457E62E764702F018064B204240B0C6B200A5DB09
                                      APIs
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00402E9D,0000B5E4), ref: 004031FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                      • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                                      • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                      • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,00403D17), ref: 00403F44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: 315e157356e8942ef3b8d7e2082c61631171d9164c942d8812de0ab912510814
                                      • Instruction ID: 218003202f2b1835e3bff4e9bf146b8b4f872d9b8cc4e3003fd48478f7f9154f
                                      • Opcode Fuzzy Hash: 315e157356e8942ef3b8d7e2082c61631171d9164c942d8812de0ab912510814
                                      • Instruction Fuzzy Hash: 09A002755051049BCA519B54DE048057A62A754701741C479B24551575C7315461EB6E
                                      APIs
                                      • GetDlgItem.USER32(?,000003F9), ref: 0040486A
                                      • GetDlgItem.USER32(?,00000408), ref: 00404877
                                      • GlobalAlloc.KERNEL32(00000040,00000002), ref: 004048C3
                                      • LoadBitmapA.USER32(0000006E), ref: 004048D6
                                      • SetWindowLongA.USER32(?,000000FC,00404E54), ref: 004048F0
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404904
                                      • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404918
                                      • SendMessageA.USER32(?,00001109,00000002), ref: 0040492D
                                      • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404939
                                      • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 0040494B
                                      • DeleteObject.GDI32(?), ref: 00404950
                                      • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 0040497B
                                      • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404987
                                      • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A1C
                                      • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A47
                                      • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A5B
                                      • GetWindowLongA.USER32(?,000000F0), ref: 00404A8A
                                      • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A98
                                      • ShowWindow.USER32(?,00000005), ref: 00404AA9
                                      • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404BAC
                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404C11
                                      • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404C26
                                      • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404C4A
                                      • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C70
                                      • ImageList_Destroy.COMCTL32(?), ref: 00404C85
                                      • GlobalFree.KERNEL32(?), ref: 00404C95
                                      • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404D05
                                      • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404DAE
                                      • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404DBD
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404DDD
                                      • ShowWindow.USER32(?,00000000), ref: 00404E2B
                                      • GetDlgItem.USER32(?,000003FE), ref: 00404E36
                                      • ShowWindow.USER32(00000000), ref: 00404E3D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                      • String ID: $M$N$3b
                                      • API String ID: 1638840714-75586220
                                      • Opcode ID: dede86c728acf6a11cc3ab5fbc78af527f28fbd96654b5baab0c469e43695f01
                                      • Instruction ID: 91af9d563adbb526dddc39620d8b288a2aea1bcbb5731436b9e02a5cfbe7d22d
                                      • Opcode Fuzzy Hash: dede86c728acf6a11cc3ab5fbc78af527f28fbd96654b5baab0c469e43695f01
                                      • Instruction Fuzzy Hash: AB029FB0E00209AFDB21DF54DD45AAE7BB5FB84315F10817AF610BA2E1C7799A42CF58
                                      APIs
                                      • GetDlgItem.USER32(?,000003FB), ref: 004043A2
                                      • SetWindowTextA.USER32(?,?), ref: 004043CF
                                      • SHBrowseForFolderA.SHELL32(?,0041F870,?), ref: 00404484
                                      • CoTaskMemFree.OLE32(00000000), ref: 0040448F
                                      • lstrcmpiA.KERNEL32(00422E40,004204A0), ref: 004044C1
                                      • lstrcatA.KERNEL32(?,00422E40), ref: 004044CD
                                      • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004044DD
                                        • Part of subcall function 0040540B: GetDlgItemTextA.USER32(?,?,00000400,00404510), ref: 0040541E
                                        • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E20
                                        • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                                        • Part of subcall function 00405DC8: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E32
                                        • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E42
                                      • GetDiskFreeSpaceA.KERNEL32(0041F468,?,?,0000040F,?,0041F468,0041F468,?,00000000,0041F468,?,?,000003FB,?), ref: 00404596
                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004045B1
                                      • SetDlgItemTextA.USER32(00000000,00000400,0041F458), ref: 0040462A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                      • String ID: @.B$A$L5b$3b
                                      • API String ID: 2246997448-2350531843
                                      • Opcode ID: 6525314df4a180c9e7b66623ed26d8b7b6bbf618626a18de822d55977fdbc2f3
                                      • Instruction ID: fa341535892c43c3a67d7fcafb17cb6574160925603278dae289bcadb551eaae
                                      • Opcode Fuzzy Hash: 6525314df4a180c9e7b66623ed26d8b7b6bbf618626a18de822d55977fdbc2f3
                                      • Instruction Fuzzy Hash: 2D9170B1900218BBDB11AFA1CD84AAF7BB8EF45314F10847BF704B6291D77C9A41DB59
                                      APIs
                                      • GetVersion.KERNEL32(00000000,0041FC78,00000000,00404F3C,0041FC78,00000000), ref: 00405C30
                                      • GetSystemDirectoryA.KERNEL32(00422E40,00000400), ref: 00405CAB
                                      • GetWindowsDirectoryA.KERNEL32(00422E40,00000400), ref: 00405CBE
                                      • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405CFA
                                      • SHGetPathFromIDListA.SHELL32(00000000,00422E40), ref: 00405D08
                                      • CoTaskMemFree.OLE32(00000000), ref: 00405D13
                                      • lstrcatA.KERNEL32(00422E40,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D35
                                      • lstrlenA.KERNEL32(00422E40,00000000,0041FC78,00000000,00404F3C,0041FC78,00000000), ref: 00405D87
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                      • String ID: @.B$@.B$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                      • API String ID: 900638850-3135342408
                                      • Opcode ID: 855ce943f005fc76d33ba75c1c33b75b466f9e158227b928842345586457093f
                                      • Instruction ID: 2bb53c71d9fe9ef1e56bc14ab20fd8486271744d1d3ead2cb2ad614034e11287
                                      • Opcode Fuzzy Hash: 855ce943f005fc76d33ba75c1c33b75b466f9e158227b928842345586457093f
                                      • Instruction Fuzzy Hash: D7510131A04A04AAEF205F64DC88B7B3BA4DF55324F14823BE911B62D0D33C59829E4E
                                      APIs
                                      • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
                                      • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409368,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: ByteCharCreateInstanceMultiWide
                                      • String ID:
                                      • API String ID: 123533781-0
                                      • Opcode ID: 20f8b56c3263d051d76756f701b26ac218ff209cd135641c8178b13e20f06e8d
                                      • Instruction ID: 0b92ce9401c32f92a97655b67b17bc3e2e7042a2ba93bb40bff56c30807ccd12
                                      • Opcode Fuzzy Hash: 20f8b56c3263d051d76756f701b26ac218ff209cd135641c8178b13e20f06e8d
                                      • Instruction Fuzzy Hash: 94418E75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
                                      APIs
                                      • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FileFindFirst
                                      • String ID:
                                      • API String ID: 1974802433-0
                                      • Opcode ID: fec3e59c21f88b2afe0d858e3cd58f666a30441cfee8bf2827fa80150cba7d73
                                      • Instruction ID: b3d2387cb92b068db8966d6a1439c3c253679041c8135bb289436d91baf53d0e
                                      • Opcode Fuzzy Hash: fec3e59c21f88b2afe0d858e3cd58f666a30441cfee8bf2827fa80150cba7d73
                                      • Instruction Fuzzy Hash: 42F0A072A04201DBD700EBB49A89AEEB7789B51328F60067BE111F20C1C6B85A459B2E
                                      APIs
                                      • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                      • BeginPaint.USER32(?,?), ref: 00401047
                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                      • DeleteObject.GDI32(?), ref: 004010ED
                                      • CreateFontIndirectA.GDI32(?), ref: 00401105
                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                      • SetTextColor.GDI32(00000000,?), ref: 00401130
                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                      • DrawTextA.USER32(00000000,Diezel Amps Bundle WiN,000000FF,00000010,00000820), ref: 00401156
                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                      • DeleteObject.GDI32(?), ref: 00401165
                                      • EndPaint.USER32(?,?), ref: 0040116E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                      • String ID: Diezel Amps Bundle WiN$F$3b
                                      • API String ID: 941294808-3918602725
                                      • Opcode ID: 1fa3053a276be56ef7da5d68adfba1d9971bfb9fa2beb597bf2db4fb963a824d
                                      • Instruction ID: 81477e3a2fde3fb3f26aa953fc06e347994717d76cab2c79682594c458f31f57
                                      • Opcode Fuzzy Hash: 1fa3053a276be56ef7da5d68adfba1d9971bfb9fa2beb597bf2db4fb963a824d
                                      • Instruction Fuzzy Hash: 8141BC71804249AFCB058FA4CD459BFBFB9FF44314F00802AF551AA1A0C378EA54DFA5
                                      APIs
                                        • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                                        • Part of subcall function 00405E88: LoadLibraryA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405EA5
                                        • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,00405649,?,00000000,000000F1,?), ref: 00405901
                                      • GetShortPathNameA.KERNEL32(?,00422630,00000400), ref: 0040590A
                                      • GetShortPathNameA.KERNEL32(00000000,004220A8,00000400), ref: 00405927
                                      • wsprintfA.USER32 ref: 00405945
                                      • GetFileSize.KERNEL32(00000000,00000000,004220A8,C0000000,00000004,004220A8,?,?,?,00000000,000000F1,?), ref: 00405980
                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 0040598F
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 004059A5
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,00421CA8,00000000,-0000000A,00409350,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004059EB
                                      • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004059FD
                                      • GlobalFree.KERNEL32(00000000), ref: 00405A04
                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 00405A0B
                                        • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                                        • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
                                      • String ID: %s=%s$0&B$[Rename]$3b
                                      • API String ID: 3772915668-3330097244
                                      • Opcode ID: 0c179fa3417d280b53e5d95a4378c92fb06f2b6e7dc6de3d5fc3f6893b1dd3a2
                                      • Instruction ID: 8912a0e40cac8f66f34925055924fb713260e7a12edb00ecfb1cfbef244c1689
                                      • Opcode Fuzzy Hash: 0c179fa3417d280b53e5d95a4378c92fb06f2b6e7dc6de3d5fc3f6893b1dd3a2
                                      • Instruction Fuzzy Hash: D9411332B05B11BBD3216B61AD88F6B3A5CDB84715F140136FE05F22C2E678A801CEBD
                                      APIs
                                      • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E20
                                      • CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                                      • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E32
                                      • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",C:\Users\user\AppData\Local\Temp\,00000000,00403214,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405E42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Char$Next$Prev
                                      • String ID: "C:\Users\user\Desktop\EB2UOXRNsE.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 589700163-2238789825
                                      • Opcode ID: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                                      • Instruction ID: 3b6179abbfe29fc78842bf11aa846075366cc437f950451d76d565b88bc2b460
                                      • Opcode Fuzzy Hash: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                                      • Instruction Fuzzy Hash: A0110861805B9129EB3227284C48BBB7F89CF66754F18447FD8C4722C2C67C5D429FAD
                                      APIs
                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                                      • wsprintfA.USER32 ref: 00402B8A
                                      • SetWindowTextA.USER32(?,?), ref: 00402B9A
                                      • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BAC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Text$ItemTimerWindowwsprintf
                                      • String ID: unpacking data: %d%%$verifying installer: %d%%$3b
                                      • API String ID: 1451636040-89169363
                                      • Opcode ID: a19141f3df1e0a3c8b8c2abcbd515ef60a2dd56e778219f0b9cb34bd20a9fb2d
                                      • Instruction ID: 39266fd7d8b3d51d4259f470751267aa52f8e49dbca779dff7f29341b6a717b4
                                      • Opcode Fuzzy Hash: a19141f3df1e0a3c8b8c2abcbd515ef60a2dd56e778219f0b9cb34bd20a9fb2d
                                      • Instruction Fuzzy Hash: AFF03671900109ABEF255F51DD0ABEE3779FB00305F008036FA05B51D1D7F9AA559F99
                                      APIs
                                      • GetWindowLongA.USER32(?,000000EB), ref: 00403F9C
                                      • GetSysColor.USER32(00000000), ref: 00403FB8
                                      • SetTextColor.GDI32(?,00000000), ref: 00403FC4
                                      • SetBkMode.GDI32(?,?), ref: 00403FD0
                                      • GetSysColor.USER32(?), ref: 00403FE3
                                      • SetBkColor.GDI32(?,?), ref: 00403FF3
                                      • DeleteObject.GDI32(?), ref: 0040400D
                                      • CreateBrushIndirect.GDI32(?), ref: 00404017
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                      • String ID:
                                      • API String ID: 2320649405-0
                                      • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                      • Instruction ID: 4cc26f8bf5fc777f430f8318c3ba194748f169832e683f7fcd21add738ba3f9d
                                      • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                      • Instruction Fuzzy Hash: C221C371904705ABCB209F78DD08B4BBBF8AF40711F048A29F992F26E0C738E904CB55
                                      APIs
                                      • GlobalAlloc.KERNEL32(00000040,0000B600,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                                      • GlobalFree.KERNEL32(?), ref: 00402725
                                      • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                                      • GlobalFree.KERNEL32(00000000), ref: 0040273E
                                      • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                                      • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                      • String ID:
                                      • API String ID: 3294113728-0
                                      • Opcode ID: b8defe13902d58a52973a2e3f60156d7c1400e5746f24ef4cd0721e59596b3c4
                                      • Instruction ID: 719c612f4f238206e278f6e296a81204df483451b361404a9b6a09c3536a307a
                                      • Opcode Fuzzy Hash: b8defe13902d58a52973a2e3f60156d7c1400e5746f24ef4cd0721e59596b3c4
                                      • Instruction Fuzzy Hash: F831AD71C00128BBDF216FA4CD89DAE7E79EF08364F10423AF920772E0C6795D419BA8
                                      APIs
                                      • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004047EE
                                      • GetMessagePos.USER32 ref: 004047F6
                                      • ScreenToClient.USER32(?,?), ref: 00404810
                                      • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404822
                                      • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404848
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Message$Send$ClientScreen
                                      • String ID: f
                                      • API String ID: 41195575-1993550816
                                      • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                      • Instruction ID: 01d6173a61c3c3b4b037133c9a52f1e04ee3049876a8ff08b59bebc5d15cf036
                                      • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                      • Instruction Fuzzy Hash: BA018075D40218BADB00DB94CC41BFEBBBCAB55711F10412ABB00B61C0C3B46501CB95
                                      APIs
                                      • SetWindowTextA.USER32(00000000,Diezel Amps Bundle WiN), ref: 00403A10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: TextWindow
                                      • String ID: 1033$C:\Users\user\AppData\Local\Temp\$Diezel Amps Bundle WiN$3b
                                      • API String ID: 530164218-3365879125
                                      • Opcode ID: defed7287a9455a29b24b67e45bb8aa9d1031aed7a359321573c6b72916d69ed
                                      • Instruction ID: 09623374405f0611f065d620c03919b516a5f167df25bc0d5edc66fe9dc562c0
                                      • Opcode Fuzzy Hash: defed7287a9455a29b24b67e45bb8aa9d1031aed7a359321573c6b72916d69ed
                                      • Instruction Fuzzy Hash: F611C2B1B005109BC730DF15D880A73767DEB84716369413BE94167391C77EAE028E58
                                      APIs
                                      • GetDC.USER32(?), ref: 00401D22
                                      • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                                      • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                                      • CreateFontIndirectA.GDI32(0040AF74), ref: 00401D8A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CapsCreateDeviceFontIndirect
                                      • String ID: MS Shell Dlg
                                      • API String ID: 3272661963-76309092
                                      • Opcode ID: 2c6a9fd6684e48c72e8170f31dde3613139c4976fc228405473ba1f45ca6ba00
                                      • Instruction ID: d83410998d1654a5337f8c322709d39cf2ce3a8a4f0330bc6585c9693e616625
                                      • Opcode Fuzzy Hash: 2c6a9fd6684e48c72e8170f31dde3613139c4976fc228405473ba1f45ca6ba00
                                      • Instruction Fuzzy Hash: E1F044F1A45342AEE7016770AE0ABA93B649725306F100576F541BA1E2C5BC10149B7F
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A57
                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                                      • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                                      • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                                      • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Close$DeleteEnumOpen
                                      • String ID:
                                      • API String ID: 1912718029-0
                                      • Opcode ID: 90165163457562f2d2db0d0e016cf4740f9c141c2854e05e69f214c53397e3bf
                                      • Instruction ID: 3ec7b1818cbfc33efeafaf7017db19c7c479205e5d6f4ff66fb244667a93d6f3
                                      • Opcode Fuzzy Hash: 90165163457562f2d2db0d0e016cf4740f9c141c2854e05e69f214c53397e3bf
                                      • Instruction Fuzzy Hash: 93112971A00009FFDF319F90DE49EAF7B7DEB44385B104436F905A10A0DBB59E51AE69
                                      APIs
                                      • GetDlgItem.USER32(?), ref: 00401CC5
                                      • GetClientRect.USER32(00000000,?), ref: 00401CD2
                                      • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                                      • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                                      • DeleteObject.GDI32(00000000), ref: 00401D10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                      • String ID:
                                      • API String ID: 1849352358-0
                                      • Opcode ID: 70cca8153c69b2e132429069c22b9ddf05dbb7ba62a9a7cfa9b79a9bcebcea9b
                                      • Instruction ID: de7316f9b9f1bcc3f0c1dff9ae5dc63c91f1472c52c052d8cf8a0da7f27950be
                                      • Opcode Fuzzy Hash: 70cca8153c69b2e132429069c22b9ddf05dbb7ba62a9a7cfa9b79a9bcebcea9b
                                      • Instruction Fuzzy Hash: D5F01DB2E04105BFD700EFA4EE89DAFB7BDEB44345B104576F602F2190C6789D018B69
                                      APIs
                                      • lstrlenA.KERNEL32(004204A0,004204A0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404611,000000DF,0000040F,00000400,00000000), ref: 0040477F
                                      • wsprintfA.USER32 ref: 00404787
                                      • SetDlgItemTextA.USER32(?,004204A0), ref: 0040479A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: ItemTextlstrlenwsprintf
                                      • String ID: %u.%u%s%s
                                      • API String ID: 3540041739-3551169577
                                      • Opcode ID: 900e3a4788bbcdb5831f4eb4ea085b1ecc54347093cfae2cf180548b061950ae
                                      • Instruction ID: e1128f73888b2767c9277aed1687fd20c93e739cc52df1aac9c0a45a5a8dde9d
                                      • Opcode Fuzzy Hash: 900e3a4788bbcdb5831f4eb4ea085b1ecc54347093cfae2cf180548b061950ae
                                      • Instruction Fuzzy Hash: 7311E2736001243BDB10666D9C46EEF3699DBC6335F14423BFA25F61D1E938AC5286A8
                                      APIs
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004224A8,Error launching installer), ref: 004053EB
                                      • CloseHandle.KERNEL32(?), ref: 004053F8
                                      Strings
                                      • Error launching installer, xrefs: 004053D9
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 004053C6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CloseCreateHandleProcess
                                      • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
                                      • API String ID: 3712363035-4043152584
                                      • Opcode ID: 3b814a6f076d0ba9038e170a1e0f3647fdefee354992cb10a65e7e77ca0a2381
                                      • Instruction ID: 069b69ca15cd8b990da55ccc95fe3be7356009797bdfa18ab8f6d6c8c96e71ef
                                      • Opcode Fuzzy Hash: 3b814a6f076d0ba9038e170a1e0f3647fdefee354992cb10a65e7e77ca0a2381
                                      • Instruction Fuzzy Hash: A3E0ECB4A00219BFDB00AF64ED49AAB7BBDEB00305F90C522A911E2150D775D8118AB9
                                      APIs
                                      • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403226,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 0040565F
                                      • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403226,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403386), ref: 00405668
                                      • lstrcatA.KERNEL32(?,00409010), ref: 00405679
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405659
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrcatlstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 2659869361-3936084776
                                      • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                      • Instruction ID: d5422d5486d5b384c4dcc02911800b35c31fcf4388d9dde419d5dff5703c7688
                                      • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                      • Instruction Fuzzy Hash: 8BD05272605A202ED2022A258C05E9B7A28CF06311B044866B540B2292C6386D818AEE
                                      APIs
                                      • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402341
                                      • lstrlenA.KERNEL32(0040A370,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402361
                                      • RegSetValueExA.ADVAPI32(?,?,?,?,0040A370,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040239A
                                      • RegCloseKey.ADVAPI32(?,?,?,0040A370,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CloseCreateValuelstrlen
                                      • String ID:
                                      • API String ID: 1356686001-0
                                      • Opcode ID: 271707f578e5353a3fbe2519cc7d62c3cf42ff78cad1b3e4df9531e7eebe3039
                                      • Instruction ID: d7b132d9018d44432a73f3315d2b91b6aa1600c7a927e9fa70905f900517fa5a
                                      • Opcode Fuzzy Hash: 271707f578e5353a3fbe2519cc7d62c3cf42ff78cad1b3e4df9531e7eebe3039
                                      • Instruction Fuzzy Hash: BA1160B1E00209BFEB10AFA0DE49EAF767CFB54398F10413AF905B61D0D7B85D019669
                                      APIs
                                      • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                                      • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                                      • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                                        • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                      • String ID:
                                      • API String ID: 1404258612-0
                                      • Opcode ID: be50ba22476c795dccddfbd46c0b19e6aec7ed87346bdfd2eed6167faf837e67
                                      • Instruction ID: 178fa6cf4330108057832d0c189c0e5a27020503733a18e797ef1cc5e9d7aef6
                                      • Opcode Fuzzy Hash: be50ba22476c795dccddfbd46c0b19e6aec7ed87346bdfd2eed6167faf837e67
                                      • Instruction Fuzzy Hash: 52113A71A00108BEDB01EFA5DD819AEBBB9EB48344B20853AF501F61E1D7389A54DB28
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 00404E8A
                                      • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404EF8
                                        • Part of subcall function 00403F64: SendMessageA.USER32(000203FA,00000000,00000000,00000000), ref: 00403F76
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Window$CallMessageProcSendVisible
                                      • String ID:
                                      • API String ID: 3748168415-3916222277
                                      • Opcode ID: 1a28ca64547386e1a64dd11c64f6ae458e1df03769ff3acb3952d776ac0a4b66
                                      • Instruction ID: 62f3a1a08e098275047049d4f9968a6b4933f6b7f921e7009373277d82a30415
                                      • Opcode Fuzzy Hash: 1a28ca64547386e1a64dd11c64f6ae458e1df03769ff3acb3952d776ac0a4b66
                                      • Instruction Fuzzy Hash: D1116D71900208BBDB21AF52DC4499B3669FB84369F00803BF6047A2E2C37C5A519BAD
                                      APIs
                                      • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
                                      • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\s,00000000,?,?,00000000,00000011), ref: 004024FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: FileWritelstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsa4C1E.tmp\s
                                      • API String ID: 427699356-2675403548
                                      • Opcode ID: 02a15bd42c28bed1fb8554f3d16374f042fc662dbffd218bbabce7ee12e12458
                                      • Instruction ID: 2c1f07a632d72534084a5ac00d75746702f795d1104bf50e8da4b719a2e94720
                                      • Opcode Fuzzy Hash: 02a15bd42c28bed1fb8554f3d16374f042fc662dbffd218bbabce7ee12e12458
                                      • Instruction Fuzzy Hash: BCF08972A44245FFD710EBB19E49EAF7668DB00348F14443BB142F51C2D6FC5982976D
                                      APIs
                                      • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\EB2UOXRNsE.exe",00000000,76232EE0,004035F1,00000000,0040342D,00000000), ref: 00403634
                                      • GlobalFree.KERNEL32(00000000), ref: 0040363B
                                      Strings
                                      • "C:\Users\user\Desktop\EB2UOXRNsE.exe", xrefs: 0040362C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: Free$GlobalLibrary
                                      • String ID: "C:\Users\user\Desktop\EB2UOXRNsE.exe"
                                      • API String ID: 1100898210-1998525660
                                      • Opcode ID: 594683390acbace1feb38ee5af495b240e475f157c4d409b541952378f73dbd9
                                      • Instruction ID: 07f203a12dc211ea1540440f4769086933c1ddaa55d0411da1bb29b7fd771b51
                                      • Opcode Fuzzy Hash: 594683390acbace1feb38ee5af495b240e475f157c4d409b541952378f73dbd9
                                      • Instruction Fuzzy Hash: 8FE08C32804420ABC6216F55EC0579A7768AB48B22F028536E900BB3A083743C464BDC
                                      APIs
                                      • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CDE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\EB2UOXRNsE.exe,C:\Users\user\Desktop\EB2UOXRNsE.exe,80000000,00000003), ref: 004056A6
                                      • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CDE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\EB2UOXRNsE.exe,C:\Users\user\Desktop\EB2UOXRNsE.exe,80000000,00000003), ref: 004056B4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrlen
                                      • String ID: C:\Users\user\Desktop
                                      • API String ID: 2709904686-3125694417
                                      • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                      • Instruction ID: 6658d1b0ab05e5211e75f0b74aef41c49d7b43cb9628f8e009f88ad9fa15a52a
                                      • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                      • Instruction Fuzzy Hash: C5D0A772409DB02EF30352108C04B8F7A98CF17300F0948A2E440E21D0C27C5C818FFD
                                      APIs
                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004057D2
                                      • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 004057E0
                                      • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3403570209.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.3403554534.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403589213.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403626462.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3403691641.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_EB2UOXRNsE.jbxd
                                      Similarity
                                      • API ID: lstrlen$CharNextlstrcmpi
                                      • String ID:
                                      • API String ID: 190613189-0
                                      • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                      • Instruction ID: 042c172281cf084eebf1820456e7eb749b121a10276c912c68532230cfd8689c
                                      • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                      • Instruction Fuzzy Hash: BBF0A736249D51DBC2029B295C44E6FBEA4EF95355F14057EF440F3180D335AC11ABBB