Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
02Eh1ah35H.exe

Overview

General Information

Sample name:02Eh1ah35H.exe
renamed because original name is a hash value
Original sample name:8c4c1550cb63a4c8abebb1ef8a7601953c6c1f0d02f1080f1fb7adc306b99c31.exe
Analysis ID:1588655
MD5:8b28f25bafe08a5b838ee152a75d14ae
SHA1:ed2b19ce4a23e1bb09f76658f9b257baaa4d7f59
SHA256:8c4c1550cb63a4c8abebb1ef8a7601953c6c1f0d02f1080f1fb7adc306b99c31
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 02Eh1ah35H.exe (PID: 7356 cmdline: "C:\Users\user\Desktop\02Eh1ah35H.exe" MD5: 8B28F25BAFE08A5B838EE152A75D14AE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3820795220.0000000004635000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 02Eh1ah35H.exeVirustotal: Detection: 69%Perma Link
    Source: 02Eh1ah35H.exeReversingLabs: Detection: 50%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: 02Eh1ah35H.exeJoe Sandbox ML: detected
    Source: 02Eh1ah35H.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 02Eh1ah35H.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
    Source: global trafficTCP traffic: 192.168.2.9:55044 -> 162.159.36.2:53
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
    Source: 02Eh1ah35H.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_00405595 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405595
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_04BED440 NtAllocateVirtualMemory,0_2_04BED440
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_6D4A1B5F0_2_6D4A1B5F
    Source: 02Eh1ah35H.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@1/5@1/0
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_00404835 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404835
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_004021A2 CoCreateInstance,0_2_004021A2
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspiresJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Local\Temp\nsuBC6A.tmpJump to behavior
    Source: 02Eh1ah35H.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 02Eh1ah35H.exeVirustotal: Detection: 69%
    Source: 02Eh1ah35H.exeReversingLabs: Detection: 50%
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile read: C:\Users\user\Desktop\02Eh1ah35H.exeJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: 02Eh1ah35H.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.3820795220.0000000004635000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_6D4A1B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6D4A1B5F
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_046358D6 push ds; retf 0_2_046358DA
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_046388D6 push ds; retf 0_2_046388DA
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspiresJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires\Heteroscian.GenJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires\Sulfoforbindelserne.chlJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires\CauserJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires\Causer\Umpiress240.bivJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires\Causer\potmaker.stiJump to behavior
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeRDTSC instruction interceptor: First address: 4BB19D3 second address: 4BB19D3 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF9784E9E28h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 test ah, ah 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeAPI call chain: ExitProcess graph end nodegraph_0-4433
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeAPI call chain: ExitProcess graph end nodegraph_0-4585
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_6D4A1B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6D4A1B5F
    Source: C:\Users\user\Desktop\02Eh1ah35H.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    02Eh1ah35H.exe69%VirustotalBrowse
    02Eh1ah35H.exe50%ReversingLabsWin32.Trojan.Guloader
    02Eh1ah35H.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dll1%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      high
      15.164.165.52.in-addr.arpa
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_ErrorError02Eh1ah35H.exefalse
          high
          No contacted IP infos
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1588655
          Start date and time:2025-01-11 03:43:31 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 16s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:02Eh1ah35H.exe
          renamed because original name is a hash value
          Original Sample Name:8c4c1550cb63a4c8abebb1ef8a7601953c6c1f0d02f1080f1fb7adc306b99c31.exe
          Detection:MAL
          Classification:mal68.troj.evad.winEXE@1/5@1/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 39
          • Number of non-executed functions: 35
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200, 52.165.164.15, 52.149.20.212
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          No simulations
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          s-part-0017.t-0009.t-msedge.netAJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
          • 13.107.246.45
          suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          1297823757234143258.jsGet hashmaliciousStrela DownloaderBrowse
          • 13.107.246.45
          4N4nldx1wW.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          1487427797195518826.jsGet hashmaliciousStrela DownloaderBrowse
          • 13.107.246.45
          5by4QM3v89.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
          • 13.107.246.45
          23754232101540928500.jsGet hashmaliciousStrela DownloaderBrowse
          • 13.107.246.45
          rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
          • 13.107.246.45
          CGk5FtIq0N.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dllDocument_084462.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Document_084462.scr.exeGet hashmaliciousGuLoaderBrowse
              PO.exeGet hashmaliciousGuLoaderBrowse
                PO.exeGet hashmaliciousGuLoaderBrowse
                  yuc1Jwlkh5.exeGet hashmaliciousGuLoaderBrowse
                    yuc1Jwlkh5.exeGet hashmaliciousGuLoaderBrowse
                      IMAGE000Pdf.exeGet hashmaliciousGuLoaderBrowse
                        stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          IMAGE000Pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            orders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                              Process:C:\Users\user\Desktop\02Eh1ah35H.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):12288
                              Entropy (8bit):5.737556724687435
                              Encrypted:false
                              SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                              MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                              SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                              SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                              SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 1%, Browse
                              Joe Sandbox View:
                              • Filename: Document_084462.scr.exe, Detection: malicious, Browse
                              • Filename: Document_084462.scr.exe, Detection: malicious, Browse
                              • Filename: PO.exe, Detection: malicious, Browse
                              • Filename: PO.exe, Detection: malicious, Browse
                              • Filename: yuc1Jwlkh5.exe, Detection: malicious, Browse
                              • Filename: yuc1Jwlkh5.exe, Detection: malicious, Browse
                              • Filename: IMAGE000Pdf.exe, Detection: malicious, Browse
                              • Filename: stormskridtets.exe, Detection: malicious, Browse
                              • Filename: IMAGE000Pdf.exe, Detection: malicious, Browse
                              • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\02Eh1ah35H.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):222131
                              Entropy (8bit):1.2548431305039245
                              Encrypted:false
                              SSDEEP:768:I2mmH3AhfHp+POGgRSRFZHl2bxYLbBjJ4tFGZjDyYqIx3x9+6yiKk+vlK5u5DF+G:UoNwkuoHtyiKJlQVD
                              MD5:C018B5D87F38B0DBA90AFE75F72B6798
                              SHA1:9B43AE84826B712BB8152D70D2D7B929DB5CE3E2
                              SHA-256:323B7D5F0C7A4F9FA87D8F6DD9A18E81F4284C31DA4FDD5FFE7022501445FD1C
                              SHA-512:D4D6A99EBA1F594BA4052F4C83C93946749EE7524D5765CFD67C0CD34BBA3F1ABBDEA259EBE155A3767898AAE806E29E42BE6539C4A2DC067730EC6D9655ECD5
                              Malicious:false
                              Reputation:low
                              Preview:.....................................%..................................................................................................................L....B..............................I...........]...........i.........A............\............................................................................................................................................................................................&..............s............................................................................(........].........................................................................,..............]...............F..............G....+..............................................F..............9...........,........i.............................................................................................h...k........................Y......k..........................................................U..........R..................................C...........e..................
                              Process:C:\Users\user\Desktop\02Eh1ah35H.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):477418
                              Entropy (8bit):1.2516735777117096
                              Encrypted:false
                              SSDEEP:1536:BugSY71rrh1lxz0ZSyCjm0eydI6Vl73+ByRgN:F7Zrh4SvQy3SBGgN
                              MD5:B86B0A4CFA46775BAEEE023CCECA54E1
                              SHA1:16BABC347EBFC80762D73A12FF39E5ADE55EC7DB
                              SHA-256:7B1E45A0398C8428C6CF476DAE264102A842FACC20930B57688960046FF087F6
                              SHA-512:42787A7037E7D117D82AF3580306C7C10854B279CEC0B38956217B4E04222B34EAC50763B0DB850454DC0AA43B5238297D39FC8E5A681C805966E0BCCD4E7C0D
                              Malicious:false
                              Reputation:low
                              Preview:.................................E..............................................................................................................................F......................................./..............#...........n...t..>..........]...............".................|................................4...........s...z......................................................................................U......................................................................J...............................................................j......................-......."...._..............;.............X........................3.H....................................P........#...............L.....................................,......................................R........&..............................................................................................................`<.....f......E..al.....................S..........................................V..............
                              Process:C:\Users\user\Desktop\02Eh1ah35H.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):273298
                              Entropy (8bit):7.755785174749238
                              Encrypted:false
                              SSDEEP:6144:qz5senqHDSrcDmVvWHleK1735QPec3p/v1m/inzYS5O:qVF8WcDSvWH8K9pQmcvyGYX
                              MD5:EF147A600EB913E453C8376095C627C5
                              SHA1:C610761555E74460763F6737740644C683A92B54
                              SHA-256:B22893A26EE265E7F901FB92E115CB5C8A483A56800CB7D85F435AD4A042B61E
                              SHA-512:3F96C9D5D2B7427E79EFC829325C9911C861BA49FAAEF525B8826C6829FF1485FFDBD64A83BF98193B3D97E1E854416322A6AF6C4F98CE79677EFD1006179C40
                              Malicious:false
                              Reputation:low
                              Preview:...............!.yy........33.....E............;;;;........................55....tt.2."...............#....................a.%%%.www.t.4..V...........;;......xxxx......l...................................b.p.........33................................W...G.............dd..................XXX...............D......EE..2........................v.............................-......*.....[.|||.............E.................<<<...(((....,,......?...o....:..??...........uuu......~................#.GG..................M.....####.^.........6..m.....................v.4..xxx..........cc.........w...&&...........B....ii...q.........v....J.FFFF....$....................Z.555.b.vvvv....T...........777..U..........................]]]..........66.]]..TTT...``.rr..........pp...............////.........DDDD...[[[.>....................CCC..l...,,,...........$....bbb............................UU..............|........n...........I......@@@........l...((......Z.FF.B...x........^............................]
                              Process:C:\Users\user\Desktop\02Eh1ah35H.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):116773
                              Entropy (8bit):1.2617404262864118
                              Encrypted:false
                              SSDEEP:768:4yTqkjNz46YyMqMTGZGi7vk59sktCQ3am6ZRN8rOFlS70dhEr:0avCLJ
                              MD5:753C4F9B2F84095556E2C65E2569D814
                              SHA1:3F878C44B311B8C34B2A6E09F49324D42FAD1437
                              SHA-256:E6DCE06287ACEBCFB23DA58EAC6AAA36E253BADB493125F47E801B99C4E48B25
                              SHA-512:8C19F357F4A59D5CB493F418C82B0D06ECED25EC9D05E9B1CFF943A6A79232DC6B2EBC3552B0BFBA76018A7FCEFE8A0410ADEE739151640F149884A4FC3DF651
                              Malicious:false
                              Reputation:low
                              Preview:..................................................V...................Y..Y................................................................................................................M.......................................................................................*.......................`...............................................A................D....D....................................................."................................................l.............\.....%....:......*.......................................................................................c.....M........?......................5........G...................................................U.........................................................................5.8...s................[.....m.....{...........................)$..................................................lm.....................................................}................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):7.958584060074148
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:02Eh1ah35H.exe
                              File size:441'369 bytes
                              MD5:8b28f25bafe08a5b838ee152a75d14ae
                              SHA1:ed2b19ce4a23e1bb09f76658f9b257baaa4d7f59
                              SHA256:8c4c1550cb63a4c8abebb1ef8a7601953c6c1f0d02f1080f1fb7adc306b99c31
                              SHA512:297bb7e67bcdfb588c521909dc10d012f5b2c8a05f2ffb8c66a74c4101cdfd6d0182879aaad71cf8e4c73bcd59245140f9463046049c0424d474a3016e8c6f76
                              SSDEEP:12288:B3UTPUWt3mXGKr3UnWyPOHBieD7e5QuZN9sUS0zT:B3UTMWt3mXGOUWy5Z0US0z
                              TLSH:2B9422A1A7A0523BC1E71672286627334EDFAC63383943570F247F993DB61438B576A3
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                              Icon Hash:3d2e0f95332b3399
                              Entrypoint:0x4034a2
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                              Instruction
                              sub esp, 000002D4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+14h], ebx
                              mov dword ptr [esp+10h], 0040A2E0h
                              mov dword ptr [esp+1Ch], ebx
                              call dword ptr [004080CCh]
                              call dword ptr [004080D0h]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [007A8A6Ch], eax
                              je 00007FF978B25253h
                              push ebx
                              call 00007FF978B28541h
                              cmp eax, ebx
                              je 00007FF978B25249h
                              push 00000C00h
                              call eax
                              mov esi, 004082B0h
                              push esi
                              call 00007FF978B284BBh
                              push esi
                              call dword ptr [00408154h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], 00000000h
                              jne 00007FF978B2522Ch
                              push 0000000Bh
                              call 00007FF978B28514h
                              push 00000009h
                              call 00007FF978B2850Dh
                              push 00000007h
                              mov dword ptr [007A8A64h], eax
                              call 00007FF978B28501h
                              cmp eax, ebx
                              je 00007FF978B25251h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007FF978B25249h
                              or byte ptr [007A8A6Fh], 00000040h
                              push ebp
                              call dword ptr [00408038h]
                              push ebx
                              call dword ptr [00408298h]
                              mov dword ptr [007A8B38h], eax
                              push ebx
                              lea eax, dword ptr [esp+34h]
                              push 000002B4h
                              push eax
                              push ebx
                              push 0079FF08h
                              call dword ptr [0040818Ch]
                              push 0040A2C8h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c70000xb48.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x3a90000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x3c70000xb480xc0013d9a87cc14830e1f01c641a62386bbeFalse0.4215494791666667data4.357284806500026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x3c71c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                              RT_DIALOG0x3c74a80x100dataEnglishUnited States0.5234375
                              RT_DIALOG0x3c75a80x11cdataEnglishUnited States0.6056338028169014
                              RT_DIALOG0x3c76c80xc4dataEnglishUnited States0.5918367346938775
                              RT_DIALOG0x3c77900x60dataEnglishUnited States0.7291666666666666
                              RT_GROUP_ICON0x3c77f00x14dataEnglishUnited States1.2
                              RT_MANIFEST0x3c78080x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                              DLLImport
                              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 03:44:55.036902905 CET5504453192.168.2.9162.159.36.2
                              Jan 11, 2025 03:44:55.041737080 CET5355044162.159.36.2192.168.2.9
                              Jan 11, 2025 03:44:55.041845083 CET5504453192.168.2.9162.159.36.2
                              Jan 11, 2025 03:44:55.046786070 CET5355044162.159.36.2192.168.2.9
                              Jan 11, 2025 03:44:55.523017883 CET5504453192.168.2.9162.159.36.2
                              Jan 11, 2025 03:44:55.528074026 CET5355044162.159.36.2192.168.2.9
                              Jan 11, 2025 03:44:55.528112888 CET5504453192.168.2.9162.159.36.2
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 03:44:55.036207914 CET5353873162.159.36.2192.168.2.9
                              Jan 11, 2025 03:44:55.546228886 CET5338353192.168.2.91.1.1.1
                              Jan 11, 2025 03:44:55.553231001 CET53533831.1.1.1192.168.2.9
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 11, 2025 03:44:55.546228886 CET192.168.2.91.1.1.10x1296Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 11, 2025 03:44:19.744431973 CET1.1.1.1192.168.2.90x4067No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                              Jan 11, 2025 03:44:19.744431973 CET1.1.1.1192.168.2.90x4067No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                              Jan 11, 2025 03:44:55.553231001 CET1.1.1.1192.168.2.90x1296Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:21:44:24
                              Start date:10/01/2025
                              Path:C:\Users\user\Desktop\02Eh1ah35H.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\02Eh1ah35H.exe"
                              Imagebase:0x400000
                              File size:441'369 bytes
                              MD5 hash:8B28F25BAFE08A5B838EE152A75D14AE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3820795220.0000000004635000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:17.6%
                                Dynamic/Decrypted Code Coverage:0.4%
                                Signature Coverage:15.9%
                                Total number of Nodes:1584
                                Total number of Limit Nodes:32
                                execution_graph 4137 401941 4138 401943 4137->4138 4143 402d3e 4138->4143 4144 402d4a 4143->4144 4188 40642b 4144->4188 4147 401948 4149 405b00 4147->4149 4230 405dcb 4149->4230 4152 405b28 DeleteFileW 4154 401951 4152->4154 4153 405b3f 4155 405c6a 4153->4155 4244 4063ee lstrcpynW 4153->4244 4155->4154 4273 40674c FindFirstFileW 4155->4273 4157 405b65 4158 405b78 4157->4158 4159 405b6b lstrcatW 4157->4159 4245 405d0f lstrlenW 4158->4245 4160 405b7e 4159->4160 4164 405b8e lstrcatW 4160->4164 4166 405b99 lstrlenW FindFirstFileW 4160->4166 4164->4166 4165 405c88 4276 405cc3 lstrlenW CharPrevW 4165->4276 4169 405c5f 4166->4169 4186 405bbb 4166->4186 4169->4155 4170 405c42 FindNextFileW 4174 405c58 FindClose 4170->4174 4170->4186 4171 405ab8 5 API calls 4173 405c9a 4171->4173 4175 405cb4 4173->4175 4176 405c9e 4173->4176 4174->4169 4178 405456 24 API calls 4175->4178 4176->4154 4179 405456 24 API calls 4176->4179 4178->4154 4181 405cab 4179->4181 4180 405b00 60 API calls 4180->4186 4183 4061b4 36 API calls 4181->4183 4182 405456 24 API calls 4182->4170 4185 405cb2 4183->4185 4185->4154 4186->4170 4186->4180 4186->4182 4249 4063ee lstrcpynW 4186->4249 4250 405ab8 4186->4250 4258 405456 4186->4258 4269 4061b4 MoveFileExW 4186->4269 4196 406438 4188->4196 4189 406683 4190 402d6b 4189->4190 4221 4063ee lstrcpynW 4189->4221 4190->4147 4205 40669d 4190->4205 4192 406651 lstrlenW 4192->4196 4195 40642b 10 API calls 4195->4192 4196->4189 4196->4192 4196->4195 4198 406566 GetSystemDirectoryW 4196->4198 4199 406579 GetWindowsDirectoryW 4196->4199 4200 40669d 5 API calls 4196->4200 4201 40642b 10 API calls 4196->4201 4202 4065f4 lstrcatW 4196->4202 4203 4065ad SHGetSpecialFolderLocation 4196->4203 4214 4062bc 4196->4214 4219 406335 wsprintfW 4196->4219 4220 4063ee lstrcpynW 4196->4220 4198->4196 4199->4196 4200->4196 4201->4196 4202->4196 4203->4196 4204 4065c5 SHGetPathFromIDListW CoTaskMemFree 4203->4204 4204->4196 4212 4066aa 4205->4212 4206 406720 4207 406725 CharPrevW 4206->4207 4210 406746 4206->4210 4207->4206 4208 406713 CharNextW 4208->4206 4208->4212 4210->4147 4211 4066ff CharNextW 4211->4212 4212->4206 4212->4208 4212->4211 4213 40670e CharNextW 4212->4213 4226 405cf0 4212->4226 4213->4208 4222 40625b 4214->4222 4217 4062f0 RegQueryValueExW RegCloseKey 4218 406320 4217->4218 4218->4196 4219->4196 4220->4196 4221->4190 4223 40626a 4222->4223 4224 406273 RegOpenKeyExW 4223->4224 4225 40626e 4223->4225 4224->4225 4225->4217 4225->4218 4227 405cf6 4226->4227 4228 405d0c 4227->4228 4229 405cfd CharNextW 4227->4229 4228->4212 4229->4227 4279 4063ee lstrcpynW 4230->4279 4232 405ddc 4280 405d6e CharNextW CharNextW 4232->4280 4235 405b20 4235->4152 4235->4153 4236 40669d 5 API calls 4242 405df2 4236->4242 4237 405e23 lstrlenW 4238 405e2e 4237->4238 4237->4242 4240 405cc3 3 API calls 4238->4240 4239 40674c 2 API calls 4239->4242 4241 405e33 GetFileAttributesW 4240->4241 4241->4235 4242->4235 4242->4237 4242->4239 4243 405d0f 2 API calls 4242->4243 4243->4237 4244->4157 4246 405d1d 4245->4246 4247 405d23 CharPrevW 4246->4247 4248 405d2f 4246->4248 4247->4246 4247->4248 4248->4160 4249->4186 4286 405ebf GetFileAttributesW 4250->4286 4253 405ae5 4253->4186 4254 405ad3 RemoveDirectoryW 4256 405ae1 4254->4256 4255 405adb DeleteFileW 4255->4256 4256->4253 4257 405af1 SetFileAttributesW 4256->4257 4257->4253 4259 405471 4258->4259 4267 405513 4258->4267 4260 40548d lstrlenW 4259->4260 4261 40642b 17 API calls 4259->4261 4262 4054b6 4260->4262 4263 40549b lstrlenW 4260->4263 4261->4260 4265 4054c9 4262->4265 4266 4054bc SetWindowTextW 4262->4266 4264 4054ad lstrcatW 4263->4264 4263->4267 4264->4262 4265->4267 4268 4054cf SendMessageW SendMessageW SendMessageW 4265->4268 4266->4265 4267->4186 4268->4267 4270 4061d5 4269->4270 4271 4061c8 4269->4271 4270->4186 4289 40603a 4271->4289 4274 406762 FindClose 4273->4274 4275 405c84 4273->4275 4274->4275 4275->4154 4275->4165 4277 405c8e 4276->4277 4278 405cdf lstrcatW 4276->4278 4277->4171 4278->4277 4279->4232 4281 405d8b 4280->4281 4282 405d9d 4280->4282 4281->4282 4283 405d98 CharNextW 4281->4283 4284 405cf0 CharNextW 4282->4284 4285 405dc1 4282->4285 4283->4285 4284->4282 4285->4235 4285->4236 4287 405ed1 SetFileAttributesW 4286->4287 4288 405ac4 4286->4288 4287->4288 4288->4253 4288->4254 4288->4255 4290 406090 GetShortPathNameW 4289->4290 4291 40606a 4289->4291 4293 4060a5 4290->4293 4294 4061af 4290->4294 4316 405ee4 GetFileAttributesW CreateFileW 4291->4316 4293->4294 4296 4060ad wsprintfA 4293->4296 4294->4270 4295 406074 CloseHandle GetShortPathNameW 4295->4294 4297 406088 4295->4297 4298 40642b 17 API calls 4296->4298 4297->4290 4297->4294 4299 4060d5 4298->4299 4317 405ee4 GetFileAttributesW CreateFileW 4299->4317 4301 4060e2 4301->4294 4302 4060f1 GetFileSize GlobalAlloc 4301->4302 4303 406113 4302->4303 4304 4061a8 CloseHandle 4302->4304 4318 405f67 ReadFile 4303->4318 4304->4294 4309 406132 lstrcpyA 4312 406154 4309->4312 4310 406146 4311 405e49 4 API calls 4310->4311 4311->4312 4313 40618b SetFilePointer 4312->4313 4325 405f96 WriteFile 4313->4325 4316->4295 4317->4301 4319 405f85 4318->4319 4319->4304 4320 405e49 lstrlenA 4319->4320 4321 405e8a lstrlenA 4320->4321 4322 405e92 4321->4322 4323 405e63 lstrcmpiA 4321->4323 4322->4309 4322->4310 4323->4322 4324 405e81 CharNextA 4323->4324 4324->4321 4326 405fb4 GlobalFree 4325->4326 4326->4304 4327 4015c1 4328 402d3e 17 API calls 4327->4328 4329 4015c8 4328->4329 4330 405d6e 4 API calls 4329->4330 4343 4015d1 4330->4343 4331 401631 4333 401663 4331->4333 4334 401636 4331->4334 4332 405cf0 CharNextW 4332->4343 4337 401423 24 API calls 4333->4337 4354 401423 4334->4354 4344 40165b 4337->4344 4341 40164a SetCurrentDirectoryW 4341->4344 4342 401617 GetFileAttributesW 4342->4343 4343->4331 4343->4332 4343->4342 4346 4059bf 4343->4346 4349 405925 CreateDirectoryW 4343->4349 4358 4059a2 CreateDirectoryW 4343->4358 4361 4067e3 GetModuleHandleA 4346->4361 4350 405972 4349->4350 4351 405976 GetLastError 4349->4351 4350->4343 4351->4350 4352 405985 SetFileSecurityW 4351->4352 4352->4350 4353 40599b GetLastError 4352->4353 4353->4350 4355 405456 24 API calls 4354->4355 4356 401431 4355->4356 4357 4063ee lstrcpynW 4356->4357 4357->4341 4359 4059b2 4358->4359 4360 4059b6 GetLastError 4358->4360 4359->4343 4360->4359 4362 406809 GetProcAddress 4361->4362 4363 4067ff 4361->4363 4365 4059c6 4362->4365 4367 406773 GetSystemDirectoryW 4363->4367 4365->4343 4366 406805 4366->4362 4366->4365 4368 406795 wsprintfW LoadLibraryExW 4367->4368 4368->4366 5144 402a42 5145 402d1c 17 API calls 5144->5145 5146 402a48 5145->5146 5147 402a88 5146->5147 5148 402a6f 5146->5148 5157 402925 5146->5157 5149 402aa2 5147->5149 5150 402a92 5147->5150 5153 402a74 5148->5153 5154 402a85 5148->5154 5152 40642b 17 API calls 5149->5152 5151 402d1c 17 API calls 5150->5151 5151->5157 5152->5157 5158 4063ee lstrcpynW 5153->5158 5159 406335 wsprintfW 5154->5159 5158->5157 5159->5157 5160 401c43 5161 402d1c 17 API calls 5160->5161 5162 401c4a 5161->5162 5163 402d1c 17 API calls 5162->5163 5164 401c57 5163->5164 5165 401c6c 5164->5165 5166 402d3e 17 API calls 5164->5166 5167 401c7c 5165->5167 5168 402d3e 17 API calls 5165->5168 5166->5165 5169 401cd3 5167->5169 5170 401c87 5167->5170 5168->5167 5171 402d3e 17 API calls 5169->5171 5172 402d1c 17 API calls 5170->5172 5173 401cd8 5171->5173 5174 401c8c 5172->5174 5176 402d3e 17 API calls 5173->5176 5175 402d1c 17 API calls 5174->5175 5177 401c98 5175->5177 5178 401ce1 FindWindowExW 5176->5178 5179 401cc3 SendMessageW 5177->5179 5180 401ca5 SendMessageTimeoutW 5177->5180 5181 401d03 5178->5181 5179->5181 5180->5181 5182 6d4a2349 5183 6d4a23b3 5182->5183 5184 6d4a23be GlobalAlloc 5183->5184 5185 6d4a23dd 5183->5185 5184->5183 5186 402b43 5187 4067e3 5 API calls 5186->5187 5188 402b4a 5187->5188 5189 402d3e 17 API calls 5188->5189 5190 402b53 5189->5190 5191 402b57 IIDFromString 5190->5191 5192 402b8e 5190->5192 5191->5192 5193 402b66 5191->5193 5193->5192 5196 4063ee lstrcpynW 5193->5196 5195 402b83 CoTaskMemFree 5195->5192 5196->5195 5197 402947 5198 402d3e 17 API calls 5197->5198 5199 402955 5198->5199 5200 40296b 5199->5200 5201 402d3e 17 API calls 5199->5201 5202 405ebf 2 API calls 5200->5202 5201->5200 5203 402971 5202->5203 5225 405ee4 GetFileAttributesW CreateFileW 5203->5225 5205 40297e 5206 402a21 5205->5206 5207 40298a GlobalAlloc 5205->5207 5210 402a29 DeleteFileW 5206->5210 5211 402a3c 5206->5211 5208 4029a3 5207->5208 5209 402a18 CloseHandle 5207->5209 5226 40345a SetFilePointer 5208->5226 5209->5206 5210->5211 5213 4029a9 5214 403444 ReadFile 5213->5214 5215 4029b2 GlobalAlloc 5214->5215 5216 4029c2 5215->5216 5217 4029f6 5215->5217 5218 40324c 31 API calls 5216->5218 5219 405f96 WriteFile 5217->5219 5224 4029cf 5218->5224 5220 402a02 GlobalFree 5219->5220 5221 40324c 31 API calls 5220->5221 5222 402a15 5221->5222 5222->5209 5223 4029ed GlobalFree 5223->5217 5224->5223 5225->5205 5226->5213 4675 4be9f36 4676 4bed43b 4675->4676 4678 4be9f51 4675->4678 4679 4bed440 4676->4679 4678->4678 4680 4bed471 4679->4680 4680->4680 4681 4bed480 NtAllocateVirtualMemory 4680->4681 4682 4bed495 4681->4682 4682->4682 5591 4053ca 5592 4053da 5591->5592 5593 4053ee 5591->5593 5594 4053e0 5592->5594 5603 405437 5592->5603 5595 4053f6 IsWindowVisible 5593->5595 5601 40540d 5593->5601 5597 404390 SendMessageW 5594->5597 5598 405403 5595->5598 5595->5603 5596 40543c CallWindowProcW 5599 4053ea 5596->5599 5597->5599 5604 404cff SendMessageW 5598->5604 5601->5596 5609 404d7f 5601->5609 5603->5596 5605 404d22 GetMessagePos ScreenToClient SendMessageW 5604->5605 5606 404d5e SendMessageW 5604->5606 5607 404d56 5605->5607 5608 404d5b 5605->5608 5606->5607 5607->5601 5608->5606 5618 4063ee lstrcpynW 5609->5618 5611 404d92 5619 406335 wsprintfW 5611->5619 5613 404d9c 5614 40140b 2 API calls 5613->5614 5615 404da5 5614->5615 5620 4063ee lstrcpynW 5615->5620 5617 404dac 5617->5603 5618->5611 5619->5613 5620->5617 5624 4016cc 5625 402d3e 17 API calls 5624->5625 5626 4016d2 GetFullPathNameW 5625->5626 5627 4016ec 5626->5627 5628 40170e 5626->5628 5627->5628 5631 40674c 2 API calls 5627->5631 5629 402bc2 5628->5629 5630 401723 GetShortPathNameW 5628->5630 5630->5629 5632 4016fe 5631->5632 5632->5628 5634 4063ee lstrcpynW 5632->5634 5634->5628 5227 401e4e GetDC 5228 402d1c 17 API calls 5227->5228 5229 401e60 GetDeviceCaps MulDiv ReleaseDC 5228->5229 5230 402d1c 17 API calls 5229->5230 5231 401e91 5230->5231 5232 40642b 17 API calls 5231->5232 5233 401ece CreateFontIndirectW 5232->5233 5234 402630 5233->5234 5635 402acf 5636 402d1c 17 API calls 5635->5636 5637 402ad5 5636->5637 5638 402b12 5637->5638 5640 402925 5637->5640 5641 402ae7 5637->5641 5639 40642b 17 API calls 5638->5639 5638->5640 5639->5640 5641->5640 5643 406335 wsprintfW 5641->5643 5643->5640 4849 4020d0 4850 4020e2 4849->4850 4851 402194 4849->4851 4852 402d3e 17 API calls 4850->4852 4854 401423 24 API calls 4851->4854 4853 4020e9 4852->4853 4855 402d3e 17 API calls 4853->4855 4860 4022ee 4854->4860 4856 4020f2 4855->4856 4857 402108 LoadLibraryExW 4856->4857 4858 4020fa GetModuleHandleW 4856->4858 4857->4851 4859 402119 4857->4859 4858->4857 4858->4859 4872 406852 4859->4872 4863 402163 4865 405456 24 API calls 4863->4865 4864 40212a 4866 402132 4864->4866 4867 402149 4864->4867 4869 40213a 4865->4869 4868 401423 24 API calls 4866->4868 4877 6d4a1777 4867->4877 4868->4869 4869->4860 4870 402186 FreeLibrary 4869->4870 4870->4860 4919 406410 WideCharToMultiByte 4872->4919 4874 40686f 4875 406876 GetProcAddress 4874->4875 4876 402124 4874->4876 4875->4876 4876->4863 4876->4864 4878 6d4a17aa 4877->4878 4920 6d4a1b5f 4878->4920 4880 6d4a17b1 4881 6d4a18d6 4880->4881 4882 6d4a17c9 4880->4882 4883 6d4a17c2 4880->4883 4881->4869 4952 6d4a23e0 4882->4952 4968 6d4a239e 4883->4968 4888 6d4a180f 4981 6d4a25b5 4888->4981 4889 6d4a182d 4894 6d4a187e 4889->4894 4895 6d4a1833 4889->4895 4890 6d4a17f8 4903 6d4a17ee 4890->4903 4978 6d4a2d83 4890->4978 4891 6d4a17df 4893 6d4a17e5 4891->4893 4900 6d4a17f0 4891->4900 4893->4903 4962 6d4a2af8 4893->4962 4898 6d4a25b5 10 API calls 4894->4898 5000 6d4a15c6 4895->5000 4904 6d4a186f 4898->4904 4899 6d4a1815 4992 6d4a15b4 4899->4992 4972 6d4a2770 4900->4972 4903->4888 4903->4889 4910 6d4a18c5 4904->4910 5006 6d4a2578 4904->5006 4907 6d4a17f6 4907->4903 4908 6d4a25b5 10 API calls 4908->4904 4910->4881 4912 6d4a18cf GlobalFree 4910->4912 4912->4881 4916 6d4a18b1 4916->4910 5010 6d4a153d wsprintfW 4916->5010 4918 6d4a18aa FreeLibrary 4918->4916 4919->4874 5013 6d4a121b GlobalAlloc 4920->5013 4922 6d4a1b86 5014 6d4a121b GlobalAlloc 4922->5014 4924 6d4a1dcb GlobalFree GlobalFree GlobalFree 4925 6d4a1de8 4924->4925 4936 6d4a1e32 4924->4936 4926 6d4a21de 4925->4926 4933 6d4a1dfd 4925->4933 4925->4936 4928 6d4a2200 GetModuleHandleW 4926->4928 4926->4936 4927 6d4a1c86 GlobalAlloc 4944 6d4a1b91 4927->4944 4930 6d4a2211 LoadLibraryW 4928->4930 4931 6d4a2226 4928->4931 4929 6d4a1cef GlobalFree 4929->4944 4930->4931 4930->4936 5021 6d4a161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4931->5021 4932 6d4a1cd1 lstrcpyW 4935 6d4a1cdb lstrcpyW 4932->4935 4933->4936 5017 6d4a122c 4933->5017 4935->4944 4936->4880 4937 6d4a2278 4937->4936 4941 6d4a2285 lstrlenW 4937->4941 4938 6d4a2086 5020 6d4a121b GlobalAlloc 4938->5020 5022 6d4a161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4941->5022 4942 6d4a2238 4942->4937 4950 6d4a2262 GetProcAddress 4942->4950 4944->4924 4944->4927 4944->4929 4944->4932 4944->4935 4944->4936 4944->4938 4945 6d4a1fc7 GlobalFree 4944->4945 4946 6d4a210e 4944->4946 4947 6d4a122c 2 API calls 4944->4947 5015 6d4a158f GlobalSize GlobalAlloc 4944->5015 4945->4944 4946->4936 4949 6d4a2176 lstrcpyW 4946->4949 4947->4944 4949->4936 4950->4937 4951 6d4a208f 4951->4880 4958 6d4a23f8 4952->4958 4954 6d4a2521 GlobalFree 4957 6d4a17cf 4954->4957 4954->4958 4955 6d4a24cb GlobalAlloc CLSIDFromString 4955->4954 4956 6d4a24a0 GlobalAlloc WideCharToMultiByte 4956->4954 4957->4890 4957->4891 4957->4903 4958->4954 4958->4955 4958->4956 4959 6d4a122c GlobalAlloc lstrcpynW 4958->4959 4961 6d4a24ea 4958->4961 5024 6d4a12ba 4958->5024 4959->4958 4961->4954 5028 6d4a2704 4961->5028 4964 6d4a2b0a 4962->4964 4963 6d4a2baf CreateFileA 4967 6d4a2bcd 4963->4967 4964->4963 4966 6d4a2c99 4966->4903 5031 6d4a2aa2 4967->5031 4969 6d4a23b3 4968->4969 4970 6d4a23be GlobalAlloc 4969->4970 4971 6d4a17c8 4969->4971 4970->4969 4971->4882 4976 6d4a27a0 4972->4976 4973 6d4a283b GlobalAlloc 4977 6d4a285e 4973->4977 4974 6d4a284e 4975 6d4a2854 GlobalSize 4974->4975 4974->4977 4975->4977 4976->4973 4976->4974 4977->4907 4979 6d4a2d8e 4978->4979 4980 6d4a2dce GlobalFree 4979->4980 5035 6d4a121b GlobalAlloc 4981->5035 4983 6d4a265a StringFromGUID2 4986 6d4a25bf 4983->4986 4984 6d4a266b lstrcpynW 4984->4986 4985 6d4a2638 MultiByteToWideChar 4985->4986 4986->4983 4986->4984 4986->4985 4987 6d4a267e wsprintfW 4986->4987 4988 6d4a26a2 GlobalFree 4986->4988 4989 6d4a26d7 GlobalFree 4986->4989 4990 6d4a1272 2 API calls 4986->4990 5036 6d4a12e1 4986->5036 4987->4986 4988->4986 4989->4899 4990->4986 5040 6d4a121b GlobalAlloc 4992->5040 4994 6d4a15b9 4995 6d4a15c6 2 API calls 4994->4995 4996 6d4a15c3 4995->4996 4997 6d4a1272 4996->4997 4998 6d4a127b GlobalAlloc lstrcpynW 4997->4998 4999 6d4a12b5 GlobalFree 4997->4999 4998->4999 4999->4904 5002 6d4a15d2 wsprintfW 5000->5002 5003 6d4a15ff lstrcpyW 5000->5003 5005 6d4a1618 5002->5005 5003->5005 5005->4908 5007 6d4a2586 5006->5007 5009 6d4a1891 5006->5009 5008 6d4a25a2 GlobalFree 5007->5008 5007->5009 5008->5007 5009->4916 5009->4918 5011 6d4a1272 2 API calls 5010->5011 5012 6d4a155e 5011->5012 5012->4910 5013->4922 5014->4944 5016 6d4a15ad 5015->5016 5016->4944 5023 6d4a121b GlobalAlloc 5017->5023 5019 6d4a123b lstrcpynW 5019->4936 5020->4951 5021->4942 5022->4936 5023->5019 5025 6d4a12c1 5024->5025 5026 6d4a122c 2 API calls 5025->5026 5027 6d4a12df 5026->5027 5027->4958 5029 6d4a2768 5028->5029 5030 6d4a2712 VirtualAlloc 5028->5030 5029->4961 5030->5029 5032 6d4a2aad 5031->5032 5033 6d4a2ab2 GetLastError 5032->5033 5034 6d4a2abd 5032->5034 5033->5034 5034->4966 5035->4986 5037 6d4a12ea 5036->5037 5038 6d4a130c 5036->5038 5037->5038 5039 6d4a12f0 lstrcpyW 5037->5039 5038->4986 5039->5038 5040->4994 5235 6d4a1058 5237 6d4a1074 5235->5237 5236 6d4a10dd 5237->5236 5239 6d4a1092 5237->5239 5248 6d4a1516 5237->5248 5240 6d4a1516 GlobalFree 5239->5240 5241 6d4a10a2 5240->5241 5242 6d4a10a9 GlobalSize 5241->5242 5243 6d4a10b2 5241->5243 5242->5243 5244 6d4a10c7 5243->5244 5245 6d4a10b6 GlobalAlloc 5243->5245 5247 6d4a10d2 GlobalFree 5244->5247 5246 6d4a153d 3 API calls 5245->5246 5246->5244 5247->5236 5249 6d4a151c 5248->5249 5250 6d4a1522 5249->5250 5251 6d4a152e GlobalFree 5249->5251 5250->5239 5251->5239 5644 6d4a18d9 5645 6d4a18fc 5644->5645 5646 6d4a1931 GlobalFree 5645->5646 5647 6d4a1943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5645->5647 5646->5647 5648 6d4a1272 2 API calls 5647->5648 5649 6d4a1ace GlobalFree GlobalFree 5648->5649 5046 6d4a29df 5047 6d4a2a2f 5046->5047 5048 6d4a29ef VirtualProtect 5046->5048 5048->5047 5650 4028d5 5651 4028dd 5650->5651 5652 4028e1 FindNextFileW 5651->5652 5655 4028f3 5651->5655 5653 40293a 5652->5653 5652->5655 5656 4063ee lstrcpynW 5653->5656 5656->5655 5252 401956 5253 402d3e 17 API calls 5252->5253 5254 40195d lstrlenW 5253->5254 5255 402630 5254->5255 5099 4014d7 5104 402d1c 5099->5104 5101 4014dd Sleep 5103 402bc2 5101->5103 5105 40642b 17 API calls 5104->5105 5106 402d31 5105->5106 5106->5101 5130 40175c 5131 402d3e 17 API calls 5130->5131 5132 401763 5131->5132 5133 405f13 2 API calls 5132->5133 5134 40176a 5133->5134 5135 405f13 2 API calls 5134->5135 5135->5134 5256 401d5d 5257 402d1c 17 API calls 5256->5257 5258 401d6e SetWindowLongW 5257->5258 5259 402bc2 5258->5259 5136 401ede 5137 402d1c 17 API calls 5136->5137 5138 401ee4 5137->5138 5139 402d1c 17 API calls 5138->5139 5140 401ef0 5139->5140 5141 401f07 EnableWindow 5140->5141 5142 401efc ShowWindow 5140->5142 5143 402bc2 5141->5143 5142->5143 5657 6d4a16d4 5658 6d4a1703 5657->5658 5659 6d4a1b5f 22 API calls 5658->5659 5660 6d4a170a 5659->5660 5661 6d4a171d 5660->5661 5662 6d4a1711 5660->5662 5664 6d4a1727 5661->5664 5665 6d4a1744 5661->5665 5663 6d4a1272 2 API calls 5662->5663 5666 6d4a171b 5663->5666 5667 6d4a153d 3 API calls 5664->5667 5668 6d4a174a 5665->5668 5669 6d4a176e 5665->5669 5671 6d4a172c 5667->5671 5672 6d4a15b4 3 API calls 5668->5672 5670 6d4a153d 3 API calls 5669->5670 5670->5666 5673 6d4a15b4 3 API calls 5671->5673 5674 6d4a174f 5672->5674 5675 6d4a1732 5673->5675 5676 6d4a1272 2 API calls 5674->5676 5678 6d4a1272 2 API calls 5675->5678 5677 6d4a1755 GlobalFree 5676->5677 5677->5666 5679 6d4a1769 GlobalFree 5677->5679 5680 6d4a1738 GlobalFree 5678->5680 5679->5666 5680->5666 5260 401563 5261 402b08 5260->5261 5264 406335 wsprintfW 5261->5264 5263 402b0d 5264->5263 5681 4026e4 5682 402d1c 17 API calls 5681->5682 5689 4026f3 5682->5689 5683 402830 5684 40273d ReadFile 5684->5683 5684->5689 5685 405f67 ReadFile 5685->5689 5686 402832 5694 406335 wsprintfW 5686->5694 5687 40277d MultiByteToWideChar 5687->5689 5688 405fc5 5 API calls 5688->5689 5689->5683 5689->5684 5689->5685 5689->5686 5689->5687 5689->5688 5691 4027a3 SetFilePointer MultiByteToWideChar 5689->5691 5693 402843 5689->5693 5691->5689 5692 402864 SetFilePointer 5692->5683 5693->5683 5693->5692 5694->5683 5265 6d4a166d 5266 6d4a1516 GlobalFree 5265->5266 5268 6d4a1685 5266->5268 5267 6d4a16cb GlobalFree 5268->5267 5269 6d4a16a0 5268->5269 5270 6d4a16b7 VirtualFree 5268->5270 5269->5267 5270->5267 5271 401968 5272 402d1c 17 API calls 5271->5272 5273 40196f 5272->5273 5274 402d1c 17 API calls 5273->5274 5275 40197c 5274->5275 5276 402d3e 17 API calls 5275->5276 5277 401993 lstrlenW 5276->5277 5279 4019a4 5277->5279 5278 4019e5 5279->5278 5283 4063ee lstrcpynW 5279->5283 5281 4019d5 5281->5278 5282 4019da lstrlenW 5281->5282 5282->5278 5283->5281 5284 40166a 5285 402d3e 17 API calls 5284->5285 5286 401670 5285->5286 5287 40674c 2 API calls 5286->5287 5288 401676 5287->5288 4683 403e6b 4684 403e83 4683->4684 4685 403fbe 4683->4685 4684->4685 4686 403e8f 4684->4686 4687 40400f 4685->4687 4688 403fcf GetDlgItem GetDlgItem 4685->4688 4689 403e9a SetWindowPos 4686->4689 4690 403ead 4686->4690 4692 404069 4687->4692 4697 401389 2 API calls 4687->4697 4691 404344 18 API calls 4688->4691 4689->4690 4694 403eb2 ShowWindow 4690->4694 4695 403eca 4690->4695 4696 403ff9 SetClassLongW 4691->4696 4693 404390 SendMessageW 4692->4693 4715 403fb9 4692->4715 4713 40407b 4693->4713 4694->4695 4698 403ed2 DestroyWindow 4695->4698 4699 403eec 4695->4699 4700 40140b 2 API calls 4696->4700 4701 404041 4697->4701 4753 4042cd 4698->4753 4702 403ef1 SetWindowLongW 4699->4702 4703 403f02 4699->4703 4700->4687 4701->4692 4704 404045 SendMessageW 4701->4704 4702->4715 4707 403fab 4703->4707 4708 403f0e GetDlgItem 4703->4708 4704->4715 4705 40140b 2 API calls 4705->4713 4706 4042cf DestroyWindow EndDialog 4706->4753 4763 4043ab 4707->4763 4709 403f21 SendMessageW IsWindowEnabled 4708->4709 4710 403f3e 4708->4710 4709->4710 4709->4715 4714 403f43 4710->4714 4717 403f4b 4710->4717 4718 403f92 SendMessageW 4710->4718 4719 403f5e 4710->4719 4712 4042fe ShowWindow 4712->4715 4713->4705 4713->4706 4713->4715 4716 40642b 17 API calls 4713->4716 4725 404344 18 API calls 4713->4725 4744 40420f DestroyWindow 4713->4744 4754 404344 4713->4754 4760 40431d 4714->4760 4716->4713 4717->4714 4717->4718 4718->4707 4721 403f66 4719->4721 4722 403f7b 4719->4722 4726 40140b 2 API calls 4721->4726 4724 40140b 2 API calls 4722->4724 4723 403f79 4723->4707 4727 403f82 4724->4727 4725->4713 4726->4714 4727->4707 4727->4714 4729 4040f6 GetDlgItem 4730 404113 ShowWindow KiUserCallbackDispatcher 4729->4730 4731 40410b 4729->4731 4757 404366 KiUserCallbackDispatcher 4730->4757 4731->4730 4733 40413d EnableWindow 4738 404151 4733->4738 4734 404156 GetSystemMenu EnableMenuItem SendMessageW 4735 404186 SendMessageW 4734->4735 4734->4738 4735->4738 4737 403e4c 18 API calls 4737->4738 4738->4734 4738->4737 4758 404379 SendMessageW 4738->4758 4759 4063ee lstrcpynW 4738->4759 4740 4041b5 lstrlenW 4741 40642b 17 API calls 4740->4741 4742 4041cb SetWindowTextW 4741->4742 4743 401389 2 API calls 4742->4743 4743->4713 4745 404229 CreateDialogParamW 4744->4745 4744->4753 4746 40425c 4745->4746 4745->4753 4747 404344 18 API calls 4746->4747 4748 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4747->4748 4749 401389 2 API calls 4748->4749 4750 4042ad 4749->4750 4750->4715 4751 4042b5 ShowWindow 4750->4751 4752 404390 SendMessageW 4751->4752 4752->4753 4753->4712 4753->4715 4755 40642b 17 API calls 4754->4755 4756 40434f SetDlgItemTextW 4755->4756 4756->4729 4757->4733 4758->4738 4759->4740 4761 404324 4760->4761 4762 40432a SendMessageW 4760->4762 4761->4762 4762->4723 4764 40446e 4763->4764 4765 4043c3 GetWindowLongW 4763->4765 4764->4715 4765->4764 4766 4043d8 4765->4766 4766->4764 4767 404405 GetSysColor 4766->4767 4768 404408 4766->4768 4767->4768 4769 404418 SetBkMode 4768->4769 4770 40440e SetTextColor 4768->4770 4771 404430 GetSysColor 4769->4771 4772 404436 4769->4772 4770->4769 4771->4772 4773 40443d SetBkColor 4772->4773 4774 404447 4772->4774 4773->4774 4774->4764 4775 404461 CreateBrushIndirect 4774->4775 4776 40445a DeleteObject 4774->4776 4775->4764 4776->4775 5695 6d4a10e1 5696 6d4a1111 5695->5696 5697 6d4a11d8 GlobalFree 5696->5697 5698 6d4a12ba 2 API calls 5696->5698 5699 6d4a11d3 5696->5699 5700 6d4a1272 2 API calls 5696->5700 5701 6d4a1164 GlobalAlloc 5696->5701 5702 6d4a11f8 GlobalFree 5696->5702 5703 6d4a12e1 lstrcpyW 5696->5703 5704 6d4a11c4 GlobalFree 5696->5704 5698->5696 5699->5697 5700->5704 5701->5696 5702->5696 5703->5696 5704->5696 5705 4023ec 5706 402d3e 17 API calls 5705->5706 5707 4023fb 5706->5707 5708 402d3e 17 API calls 5707->5708 5709 402404 5708->5709 5710 402d3e 17 API calls 5709->5710 5711 40240e GetPrivateProfileStringW 5710->5711 5712 4047ee 5713 404824 5712->5713 5714 4047fe 5712->5714 5716 4043ab 8 API calls 5713->5716 5715 404344 18 API calls 5714->5715 5717 40480b SetDlgItemTextW 5715->5717 5718 404830 5716->5718 5717->5713 4808 40176f 4809 402d3e 17 API calls 4808->4809 4810 401776 4809->4810 4811 401796 4810->4811 4812 40179e 4810->4812 4847 4063ee lstrcpynW 4811->4847 4848 4063ee lstrcpynW 4812->4848 4815 40179c 4819 40669d 5 API calls 4815->4819 4816 4017a9 4817 405cc3 3 API calls 4816->4817 4818 4017af lstrcatW 4817->4818 4818->4815 4834 4017bb 4819->4834 4820 40674c 2 API calls 4820->4834 4821 405ebf 2 API calls 4821->4834 4823 4017cd CompareFileTime 4823->4834 4824 40188d 4825 405456 24 API calls 4824->4825 4828 401897 4825->4828 4826 405456 24 API calls 4836 401879 4826->4836 4827 4063ee lstrcpynW 4827->4834 4829 40324c 31 API calls 4828->4829 4830 4018aa 4829->4830 4831 4018be SetFileTime 4830->4831 4832 4018d0 CloseHandle 4830->4832 4831->4832 4835 4018e1 4832->4835 4832->4836 4833 40642b 17 API calls 4833->4834 4834->4820 4834->4821 4834->4823 4834->4824 4834->4827 4834->4833 4841 405a54 MessageBoxIndirectW 4834->4841 4844 401864 4834->4844 4846 405ee4 GetFileAttributesW CreateFileW 4834->4846 4837 4018e6 4835->4837 4838 4018f9 4835->4838 4839 40642b 17 API calls 4837->4839 4840 40642b 17 API calls 4838->4840 4842 4018ee lstrcatW 4839->4842 4843 401901 4840->4843 4841->4834 4842->4843 4843->4836 4845 405a54 MessageBoxIndirectW 4843->4845 4844->4826 4844->4836 4845->4836 4846->4834 4847->4815 4848->4816 5289 401a72 5290 402d1c 17 API calls 5289->5290 5291 401a7b 5290->5291 5292 402d1c 17 API calls 5291->5292 5293 401a20 5292->5293 5041 401573 5042 401583 ShowWindow 5041->5042 5043 40158c 5041->5043 5042->5043 5044 402bc2 5043->5044 5045 40159a ShowWindow 5043->5045 5045->5044 5719 4014f5 SetForegroundWindow 5720 402bc2 5719->5720 5721 401ff6 5722 402d3e 17 API calls 5721->5722 5723 401ffd 5722->5723 5724 40674c 2 API calls 5723->5724 5725 402003 5724->5725 5726 402014 5725->5726 5728 406335 wsprintfW 5725->5728 5728->5726 5294 401b77 5295 402d3e 17 API calls 5294->5295 5296 401b7e 5295->5296 5297 402d1c 17 API calls 5296->5297 5298 401b87 wsprintfW 5297->5298 5299 402bc2 5298->5299 5729 4022f7 5730 402d3e 17 API calls 5729->5730 5731 4022fd 5730->5731 5732 402d3e 17 API calls 5731->5732 5733 402306 5732->5733 5734 402d3e 17 API calls 5733->5734 5735 40230f 5734->5735 5736 40674c 2 API calls 5735->5736 5737 402318 5736->5737 5738 402329 lstrlenW lstrlenW 5737->5738 5742 40231c 5737->5742 5740 405456 24 API calls 5738->5740 5739 405456 24 API calls 5743 402324 5739->5743 5741 402367 SHFileOperationW 5740->5741 5741->5742 5741->5743 5742->5739 5742->5743 5300 40447a lstrcpynW lstrlenW 5301 40167b 5302 402d3e 17 API calls 5301->5302 5303 401682 5302->5303 5304 402d3e 17 API calls 5303->5304 5305 40168b 5304->5305 5306 402d3e 17 API calls 5305->5306 5307 401694 MoveFileW 5306->5307 5308 4016a7 5307->5308 5314 4016a0 5307->5314 5309 40674c 2 API calls 5308->5309 5312 4022ee 5308->5312 5311 4016b6 5309->5311 5310 401423 24 API calls 5310->5312 5311->5312 5313 4061b4 36 API calls 5311->5313 5313->5314 5314->5310 5315 403a7b 5316 403a86 5315->5316 5317 403a8a 5316->5317 5318 403a8d GlobalAlloc 5316->5318 5318->5317 5319 40237b 5320 402382 5319->5320 5321 402395 5319->5321 5322 40642b 17 API calls 5320->5322 5323 40238f 5322->5323 5323->5321 5324 405a54 MessageBoxIndirectW 5323->5324 5324->5321 5744 4019ff 5745 402d3e 17 API calls 5744->5745 5746 401a06 5745->5746 5747 402d3e 17 API calls 5746->5747 5748 401a0f 5747->5748 5749 401a16 lstrcmpiW 5748->5749 5750 401a28 lstrcmpW 5748->5750 5751 401a1c 5749->5751 5750->5751 5325 401000 5326 401037 BeginPaint GetClientRect 5325->5326 5328 40100c DefWindowProcW 5325->5328 5329 4010f3 5326->5329 5330 401179 5328->5330 5331 401073 CreateBrushIndirect FillRect DeleteObject 5329->5331 5332 4010fc 5329->5332 5331->5329 5333 401102 CreateFontIndirectW 5332->5333 5334 401167 EndPaint 5332->5334 5333->5334 5335 401112 6 API calls 5333->5335 5334->5330 5335->5334 5752 401d81 5753 401d94 GetDlgItem 5752->5753 5754 401d87 5752->5754 5756 401d8e 5753->5756 5755 402d1c 17 API calls 5754->5755 5755->5756 5757 402d3e 17 API calls 5756->5757 5759 401dd5 GetClientRect LoadImageW SendMessageW 5756->5759 5757->5759 5760 401e33 5759->5760 5762 401e3f 5759->5762 5761 401e38 DeleteObject 5760->5761 5760->5762 5761->5762 5336 402902 5337 402d3e 17 API calls 5336->5337 5338 402909 FindFirstFileW 5337->5338 5339 402931 5338->5339 5340 40291c 5338->5340 5341 40293a 5339->5341 5344 406335 wsprintfW 5339->5344 5345 4063ee lstrcpynW 5341->5345 5344->5341 5345->5340 5763 402482 5764 402d3e 17 API calls 5763->5764 5765 402494 5764->5765 5766 402d3e 17 API calls 5765->5766 5767 40249e 5766->5767 5780 402dce 5767->5780 5770 402bc2 5771 4024d6 5773 402d1c 17 API calls 5771->5773 5776 4024e2 5771->5776 5772 402d3e 17 API calls 5775 4024cc lstrlenW 5772->5775 5773->5776 5774 402501 RegSetValueExW 5778 402517 RegCloseKey 5774->5778 5775->5771 5776->5774 5777 40324c 31 API calls 5776->5777 5777->5774 5778->5770 5781 402de9 5780->5781 5784 406289 5781->5784 5785 406298 5784->5785 5786 4062a3 RegCreateKeyExW 5785->5786 5787 4024ae 5785->5787 5786->5787 5787->5770 5787->5771 5787->5772 5346 404503 5347 404635 5346->5347 5348 40451b 5346->5348 5349 40469f 5347->5349 5353 404769 5347->5353 5356 404670 GetDlgItem SendMessageW 5347->5356 5352 404344 18 API calls 5348->5352 5350 4046a9 GetDlgItem 5349->5350 5349->5353 5351 40472a 5350->5351 5355 4046c3 5350->5355 5351->5353 5360 40473c 5351->5360 5357 404582 5352->5357 5354 4043ab 8 API calls 5353->5354 5358 404764 5354->5358 5355->5351 5359 4046e9 SendMessageW LoadCursorW SetCursor 5355->5359 5379 404366 KiUserCallbackDispatcher 5356->5379 5362 404344 18 API calls 5357->5362 5383 4047b2 5359->5383 5364 404752 5360->5364 5365 404742 SendMessageW 5360->5365 5367 40458f CheckDlgButton 5362->5367 5364->5358 5370 404758 SendMessageW 5364->5370 5365->5364 5366 40469a 5380 40478e 5366->5380 5377 404366 KiUserCallbackDispatcher 5367->5377 5370->5358 5372 4045ad GetDlgItem 5378 404379 SendMessageW 5372->5378 5374 4045c3 SendMessageW 5375 4045e0 GetSysColor 5374->5375 5376 4045e9 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5374->5376 5375->5376 5376->5358 5377->5372 5378->5374 5379->5366 5381 4047a1 SendMessageW 5380->5381 5382 40479c 5380->5382 5381->5349 5382->5381 5386 405a1a ShellExecuteExW 5383->5386 5385 404718 LoadCursorW SetCursor 5385->5351 5386->5385 5387 401503 5388 40150b 5387->5388 5390 40151e 5387->5390 5389 402d1c 17 API calls 5388->5389 5389->5390 5788 402889 5789 402890 5788->5789 5790 402b0d 5788->5790 5791 402d1c 17 API calls 5789->5791 5792 402897 5791->5792 5793 4028a6 SetFilePointer 5792->5793 5793->5790 5794 4028b6 5793->5794 5796 406335 wsprintfW 5794->5796 5796->5790 5391 6d4a1000 5394 6d4a101b 5391->5394 5395 6d4a1516 GlobalFree 5394->5395 5396 6d4a1020 5395->5396 5397 6d4a1027 GlobalAlloc 5396->5397 5398 6d4a1024 5396->5398 5397->5398 5399 6d4a153d 3 API calls 5398->5399 5400 6d4a1019 5399->5400 5797 404b8b 5798 404bb7 5797->5798 5799 404b9b 5797->5799 5800 404bea 5798->5800 5801 404bbd SHGetPathFromIDListW 5798->5801 5808 405a38 GetDlgItemTextW 5799->5808 5804 404bd4 SendMessageW 5801->5804 5805 404bcd 5801->5805 5803 404ba8 SendMessageW 5803->5798 5804->5800 5806 40140b 2 API calls 5805->5806 5806->5804 5808->5803 5401 40190c 5402 401943 5401->5402 5403 402d3e 17 API calls 5402->5403 5404 401948 5403->5404 5405 405b00 67 API calls 5404->5405 5406 401951 5405->5406 5407 40190f 5408 402d3e 17 API calls 5407->5408 5409 401916 5408->5409 5410 405a54 MessageBoxIndirectW 5409->5410 5411 40191f 5410->5411 5809 401491 5810 405456 24 API calls 5809->5810 5811 401498 5810->5811 5412 401f12 5413 402d3e 17 API calls 5412->5413 5414 401f18 5413->5414 5415 402d3e 17 API calls 5414->5415 5416 401f21 5415->5416 5417 402d3e 17 API calls 5416->5417 5418 401f2a 5417->5418 5419 402d3e 17 API calls 5418->5419 5420 401f33 5419->5420 5421 401423 24 API calls 5420->5421 5422 401f3a 5421->5422 5429 405a1a ShellExecuteExW 5422->5429 5424 401f82 5427 402925 5424->5427 5430 40688e WaitForSingleObject 5424->5430 5426 401f9f CloseHandle 5426->5427 5429->5424 5431 4068a8 5430->5431 5432 4068ba GetExitCodeProcess 5431->5432 5433 40681f 2 API calls 5431->5433 5432->5426 5434 4068af WaitForSingleObject 5433->5434 5434->5431 5435 402614 5436 402d3e 17 API calls 5435->5436 5437 40261b 5436->5437 5440 405ee4 GetFileAttributesW CreateFileW 5437->5440 5439 402627 5440->5439 5049 405595 5050 4055b6 GetDlgItem GetDlgItem GetDlgItem 5049->5050 5051 40573f 5049->5051 5095 404379 SendMessageW 5050->5095 5053 405770 5051->5053 5054 405748 GetDlgItem CreateThread CloseHandle 5051->5054 5055 40579b 5053->5055 5057 4057c0 5053->5057 5058 405787 ShowWindow ShowWindow 5053->5058 5054->5053 5098 405529 5 API calls 5054->5098 5059 4057a7 5055->5059 5060 4057fb 5055->5060 5056 405626 5061 40562d GetClientRect GetSystemMetrics SendMessageW SendMessageW 5056->5061 5065 4043ab 8 API calls 5057->5065 5097 404379 SendMessageW 5058->5097 5063 4057d5 ShowWindow 5059->5063 5064 4057af 5059->5064 5060->5057 5068 405809 SendMessageW 5060->5068 5066 40569b 5061->5066 5067 40567f SendMessageW SendMessageW 5061->5067 5071 4057f5 5063->5071 5072 4057e7 5063->5072 5069 40431d SendMessageW 5064->5069 5070 4057ce 5065->5070 5073 4056a0 SendMessageW 5066->5073 5074 4056ae 5066->5074 5067->5066 5068->5070 5075 405822 CreatePopupMenu 5068->5075 5069->5057 5077 40431d SendMessageW 5071->5077 5076 405456 24 API calls 5072->5076 5073->5074 5079 404344 18 API calls 5074->5079 5078 40642b 17 API calls 5075->5078 5076->5071 5077->5060 5080 405832 AppendMenuW 5078->5080 5081 4056be 5079->5081 5082 405862 TrackPopupMenu 5080->5082 5083 40584f GetWindowRect 5080->5083 5084 4056c7 ShowWindow 5081->5084 5085 4056fb GetDlgItem SendMessageW 5081->5085 5082->5070 5086 40587d 5082->5086 5083->5082 5087 4056ea 5084->5087 5088 4056dd ShowWindow 5084->5088 5085->5070 5089 405722 SendMessageW SendMessageW 5085->5089 5090 405899 SendMessageW 5086->5090 5096 404379 SendMessageW 5087->5096 5088->5087 5089->5070 5090->5090 5091 4058b6 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5090->5091 5093 4058db SendMessageW 5091->5093 5093->5093 5094 405904 GlobalUnlock SetClipboardData CloseClipboard 5093->5094 5094->5070 5095->5056 5096->5085 5097->5055 5812 402596 5813 402d7e 17 API calls 5812->5813 5814 4025a0 5813->5814 5815 402d1c 17 API calls 5814->5815 5816 4025a9 5815->5816 5817 4025d1 RegEnumValueW 5816->5817 5818 4025c5 RegEnumKeyW 5816->5818 5819 402925 5816->5819 5820 4025e6 RegCloseKey 5817->5820 5818->5820 5820->5819 5441 401d17 5442 402d1c 17 API calls 5441->5442 5443 401d1d IsWindow 5442->5443 5444 401a20 5443->5444 5107 401b9b 5108 401ba8 5107->5108 5109 401bec 5107->5109 5112 401c31 5108->5112 5115 401bbf 5108->5115 5110 401bf1 5109->5110 5111 401c16 GlobalAlloc 5109->5111 5121 402395 5110->5121 5128 4063ee lstrcpynW 5110->5128 5113 40642b 17 API calls 5111->5113 5114 40642b 17 API calls 5112->5114 5112->5121 5113->5112 5117 40238f 5114->5117 5126 4063ee lstrcpynW 5115->5126 5117->5121 5122 405a54 MessageBoxIndirectW 5117->5122 5119 401c03 GlobalFree 5119->5121 5120 401bce 5127 4063ee lstrcpynW 5120->5127 5122->5121 5124 401bdd 5129 4063ee lstrcpynW 5124->5129 5126->5120 5127->5124 5128->5119 5129->5121 5822 402b9d SendMessageW 5823 402bc2 5822->5823 5824 402bb7 InvalidateRect 5822->5824 5824->5823 5825 40149e 5826 402395 5825->5826 5827 4014ac PostQuitMessage 5825->5827 5827->5826 4370 402522 4381 402d7e 4370->4381 4373 402d3e 17 API calls 4374 402535 4373->4374 4375 402540 RegQueryValueExW 4374->4375 4380 402925 4374->4380 4376 402560 4375->4376 4377 402566 RegCloseKey 4375->4377 4376->4377 4386 406335 wsprintfW 4376->4386 4377->4380 4382 402d3e 17 API calls 4381->4382 4383 402d95 4382->4383 4384 40625b RegOpenKeyExW 4383->4384 4385 40252c 4384->4385 4385->4373 4386->4377 4387 4034a2 SetErrorMode GetVersion 4388 4034e1 4387->4388 4389 4034e7 4387->4389 4390 4067e3 5 API calls 4388->4390 4391 406773 3 API calls 4389->4391 4390->4389 4392 4034fd lstrlenA 4391->4392 4392->4389 4393 40350d 4392->4393 4394 4067e3 5 API calls 4393->4394 4395 403514 4394->4395 4396 4067e3 5 API calls 4395->4396 4397 40351b 4396->4397 4398 4067e3 5 API calls 4397->4398 4399 403527 #17 OleInitialize SHGetFileInfoW 4398->4399 4477 4063ee lstrcpynW 4399->4477 4402 403573 GetCommandLineW 4478 4063ee lstrcpynW 4402->4478 4404 403585 4405 405cf0 CharNextW 4404->4405 4406 4035aa CharNextW 4405->4406 4407 4036d4 GetTempPathW 4406->4407 4410 4035c3 4406->4410 4479 403471 4407->4479 4409 4036ec 4411 4036f0 GetWindowsDirectoryW lstrcatW 4409->4411 4412 403746 DeleteFileW 4409->4412 4413 405cf0 CharNextW 4410->4413 4419 4036bf 4410->4419 4424 4036bd 4410->4424 4415 403471 12 API calls 4411->4415 4489 403015 GetTickCount GetModuleFileNameW 4412->4489 4413->4410 4416 40370c 4415->4416 4416->4412 4417 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4416->4417 4418 403471 12 API calls 4417->4418 4423 40373e 4418->4423 4573 4063ee lstrcpynW 4419->4573 4420 4037fd 4517 403abd 4420->4517 4421 40375a 4421->4420 4426 405cf0 CharNextW 4421->4426 4429 40380d 4421->4429 4423->4412 4423->4429 4424->4407 4444 403779 4426->4444 4576 4039e3 4429->4576 4430 403947 4433 4039cb ExitProcess 4430->4433 4434 40394f GetCurrentProcess OpenProcessToken 4430->4434 4431 403827 4583 405a54 4431->4583 4439 403967 LookupPrivilegeValueW AdjustTokenPrivileges 4434->4439 4440 40399b 4434->4440 4437 4037d7 4441 405dcb 18 API calls 4437->4441 4438 40383d 4442 4059bf 5 API calls 4438->4442 4439->4440 4443 4067e3 5 API calls 4440->4443 4445 4037e3 4441->4445 4446 403842 lstrcatW 4442->4446 4447 4039a2 4443->4447 4444->4437 4444->4438 4445->4429 4574 4063ee lstrcpynW 4445->4574 4448 403853 lstrcatW 4446->4448 4449 40385e lstrcatW lstrcmpiW 4446->4449 4450 4039b7 ExitWindowsEx 4447->4450 4453 4039c4 4447->4453 4448->4449 4449->4429 4452 40387a 4449->4452 4450->4433 4450->4453 4455 403886 4452->4455 4456 40387f 4452->4456 4592 40140b 4453->4592 4454 4037f2 4575 4063ee lstrcpynW 4454->4575 4460 4059a2 2 API calls 4455->4460 4459 405925 4 API calls 4456->4459 4461 403884 4459->4461 4462 40388b SetCurrentDirectoryW 4460->4462 4461->4462 4463 4038a6 4462->4463 4464 40389b 4462->4464 4588 4063ee lstrcpynW 4463->4588 4587 4063ee lstrcpynW 4464->4587 4467 40642b 17 API calls 4468 4038e5 DeleteFileW 4467->4468 4469 4038f2 CopyFileW 4468->4469 4474 4038b4 4468->4474 4469->4474 4470 40393b 4471 4061b4 36 API calls 4470->4471 4471->4429 4472 4061b4 36 API calls 4472->4474 4473 40642b 17 API calls 4473->4474 4474->4467 4474->4470 4474->4472 4474->4473 4476 403926 CloseHandle 4474->4476 4589 4059d7 CreateProcessW 4474->4589 4476->4474 4477->4402 4478->4404 4480 40669d 5 API calls 4479->4480 4482 40347d 4480->4482 4481 403487 4481->4409 4482->4481 4483 405cc3 3 API calls 4482->4483 4484 40348f 4483->4484 4485 4059a2 2 API calls 4484->4485 4486 403495 4485->4486 4595 405f13 4486->4595 4599 405ee4 GetFileAttributesW CreateFileW 4489->4599 4491 403055 4512 403065 4491->4512 4600 4063ee lstrcpynW 4491->4600 4493 40307b 4494 405d0f 2 API calls 4493->4494 4495 403081 4494->4495 4601 4063ee lstrcpynW 4495->4601 4497 40308c GetFileSize 4498 403186 4497->4498 4510 4030a3 4497->4510 4602 402fb1 4498->4602 4500 40318f 4502 4031bf GlobalAlloc 4500->4502 4500->4512 4637 40345a SetFilePointer 4500->4637 4613 40345a SetFilePointer 4502->4613 4504 4031f2 4508 402fb1 6 API calls 4504->4508 4506 4031a8 4509 403444 ReadFile 4506->4509 4507 4031da 4614 40324c 4507->4614 4508->4512 4513 4031b3 4509->4513 4510->4498 4510->4504 4510->4512 4514 402fb1 6 API calls 4510->4514 4634 403444 4510->4634 4512->4421 4513->4502 4513->4512 4514->4510 4515 4031e6 4515->4512 4515->4515 4516 403223 SetFilePointer 4515->4516 4516->4512 4518 4067e3 5 API calls 4517->4518 4519 403ad1 4518->4519 4520 403ad7 GetUserDefaultUILanguage 4519->4520 4521 403ae9 4519->4521 4643 406335 wsprintfW 4520->4643 4523 4062bc 3 API calls 4521->4523 4525 403b19 4523->4525 4524 403ae7 4644 403d93 4524->4644 4526 403b38 lstrcatW 4525->4526 4527 4062bc 3 API calls 4525->4527 4526->4524 4527->4526 4530 405dcb 18 API calls 4531 403b6a 4530->4531 4532 403bfe 4531->4532 4534 4062bc 3 API calls 4531->4534 4533 405dcb 18 API calls 4532->4533 4535 403c04 4533->4535 4536 403b9c 4534->4536 4537 403c14 LoadImageW 4535->4537 4538 40642b 17 API calls 4535->4538 4536->4532 4541 403bbd lstrlenW 4536->4541 4544 405cf0 CharNextW 4536->4544 4539 403cba 4537->4539 4540 403c3b RegisterClassW 4537->4540 4538->4537 4543 40140b 2 API calls 4539->4543 4542 403c71 SystemParametersInfoW CreateWindowExW 4540->4542 4572 403cc4 4540->4572 4545 403bf1 4541->4545 4546 403bcb lstrcmpiW 4541->4546 4542->4539 4547 403cc0 4543->4547 4548 403bba 4544->4548 4550 405cc3 3 API calls 4545->4550 4546->4545 4549 403bdb GetFileAttributesW 4546->4549 4552 403d93 18 API calls 4547->4552 4547->4572 4548->4541 4551 403be7 4549->4551 4553 403bf7 4550->4553 4551->4545 4554 405d0f 2 API calls 4551->4554 4555 403cd1 4552->4555 4659 4063ee lstrcpynW 4553->4659 4554->4545 4557 403d60 4555->4557 4558 403cdd ShowWindow 4555->4558 4652 405529 OleInitialize 4557->4652 4559 406773 3 API calls 4558->4559 4561 403cf5 4559->4561 4563 403d03 GetClassInfoW 4561->4563 4566 406773 3 API calls 4561->4566 4562 403d66 4564 403d82 4562->4564 4565 403d6a 4562->4565 4568 403d17 GetClassInfoW RegisterClassW 4563->4568 4569 403d2d DialogBoxParamW 4563->4569 4567 40140b 2 API calls 4564->4567 4570 40140b 2 API calls 4565->4570 4565->4572 4566->4563 4567->4572 4568->4569 4571 40140b 2 API calls 4569->4571 4570->4572 4571->4572 4572->4429 4573->4424 4574->4454 4575->4420 4577 4039fb 4576->4577 4578 4039ed CloseHandle 4576->4578 4671 403a28 4577->4671 4578->4577 4581 405b00 67 API calls 4582 403816 OleUninitialize 4581->4582 4582->4430 4582->4431 4584 405a69 4583->4584 4585 403835 ExitProcess 4584->4585 4586 405a7d MessageBoxIndirectW 4584->4586 4586->4585 4587->4463 4588->4474 4590 405a16 4589->4590 4591 405a0a CloseHandle 4589->4591 4590->4474 4591->4590 4593 401389 2 API calls 4592->4593 4594 401420 4593->4594 4594->4433 4596 405f20 GetTickCount GetTempFileNameW 4595->4596 4597 4034a0 4596->4597 4598 405f56 4596->4598 4597->4409 4598->4596 4598->4597 4599->4491 4600->4493 4601->4497 4603 402fd2 4602->4603 4604 402fba 4602->4604 4607 402fe2 GetTickCount 4603->4607 4608 402fda 4603->4608 4605 402fc3 DestroyWindow 4604->4605 4606 402fca 4604->4606 4605->4606 4606->4500 4609 402ff0 CreateDialogParamW ShowWindow 4607->4609 4610 403013 4607->4610 4638 40681f 4608->4638 4609->4610 4610->4500 4613->4507 4616 403265 4614->4616 4615 403293 4618 403444 ReadFile 4615->4618 4616->4615 4642 40345a SetFilePointer 4616->4642 4619 40329e 4618->4619 4620 4032b0 GetTickCount 4619->4620 4621 4033dd 4619->4621 4629 4033c7 4619->4629 4620->4629 4633 4032dc 4620->4633 4622 40341f 4621->4622 4627 4033e1 4621->4627 4623 403444 ReadFile 4622->4623 4623->4629 4624 403444 ReadFile 4624->4633 4625 403444 ReadFile 4625->4627 4626 405f96 WriteFile 4626->4627 4627->4625 4627->4626 4627->4629 4628 403332 GetTickCount 4628->4633 4629->4515 4630 403357 MulDiv wsprintfW 4631 405456 24 API calls 4630->4631 4631->4633 4632 405f96 WriteFile 4632->4633 4633->4624 4633->4628 4633->4629 4633->4630 4633->4632 4635 405f67 ReadFile 4634->4635 4636 403457 4635->4636 4636->4510 4637->4506 4639 40683c PeekMessageW 4638->4639 4640 406832 DispatchMessageW 4639->4640 4641 402fe0 4639->4641 4640->4639 4641->4500 4642->4615 4643->4524 4645 403da7 4644->4645 4660 406335 wsprintfW 4645->4660 4647 403e18 4661 403e4c 4647->4661 4649 403b48 4649->4530 4650 403e1d 4650->4649 4651 40642b 17 API calls 4650->4651 4651->4650 4664 404390 4652->4664 4654 404390 SendMessageW 4656 405585 OleUninitialize 4654->4656 4655 40554c 4658 405573 4655->4658 4667 401389 4655->4667 4656->4562 4658->4654 4659->4532 4660->4647 4662 40642b 17 API calls 4661->4662 4663 403e5a SetWindowTextW 4662->4663 4663->4650 4665 4043a8 4664->4665 4666 404399 SendMessageW 4664->4666 4665->4655 4666->4665 4669 401390 4667->4669 4668 4013fe 4668->4655 4669->4668 4670 4013cb MulDiv SendMessageW 4669->4670 4670->4669 4672 403a36 4671->4672 4673 403a3b FreeLibrary GlobalFree 4672->4673 4674 403a00 4672->4674 4673->4673 4673->4674 4674->4581 5828 4021a2 5829 402d3e 17 API calls 5828->5829 5830 4021a9 5829->5830 5831 402d3e 17 API calls 5830->5831 5832 4021b3 5831->5832 5833 402d3e 17 API calls 5832->5833 5834 4021bd 5833->5834 5835 402d3e 17 API calls 5834->5835 5836 4021c7 5835->5836 5837 402d3e 17 API calls 5836->5837 5839 4021d1 5837->5839 5838 402210 CoCreateInstance 5843 40222f 5838->5843 5839->5838 5840 402d3e 17 API calls 5839->5840 5840->5838 5841 401423 24 API calls 5842 4022ee 5841->5842 5843->5841 5843->5842 5844 4015a3 5845 402d3e 17 API calls 5844->5845 5846 4015aa SetFileAttributesW 5845->5846 5847 4015bc 5846->5847 5848 401fa4 5849 402d3e 17 API calls 5848->5849 5850 401faa 5849->5850 5851 405456 24 API calls 5850->5851 5852 401fb4 5851->5852 5853 4059d7 2 API calls 5852->5853 5854 401fba 5853->5854 5855 401fdd CloseHandle 5854->5855 5856 40688e 5 API calls 5854->5856 5859 402925 5854->5859 5855->5859 5858 401fcf 5856->5858 5858->5855 5861 406335 wsprintfW 5858->5861 5861->5855 5862 6d4a2ca3 5863 6d4a2cbb 5862->5863 5864 6d4a158f 2 API calls 5863->5864 5865 6d4a2cd6 5864->5865 5445 40202a 5446 402d3e 17 API calls 5445->5446 5447 402031 5446->5447 5448 4067e3 5 API calls 5447->5448 5449 402040 5448->5449 5450 40205c GlobalAlloc 5449->5450 5453 4020c4 5449->5453 5451 402070 5450->5451 5450->5453 5452 4067e3 5 API calls 5451->5452 5454 402077 5452->5454 5455 4067e3 5 API calls 5454->5455 5456 402081 5455->5456 5456->5453 5460 406335 wsprintfW 5456->5460 5458 4020b6 5461 406335 wsprintfW 5458->5461 5460->5458 5461->5453 5866 4023aa 5867 4023b2 5866->5867 5868 4023b8 5866->5868 5869 402d3e 17 API calls 5867->5869 5870 4023c6 5868->5870 5872 402d3e 17 API calls 5868->5872 5869->5868 5871 4023d4 5870->5871 5873 402d3e 17 API calls 5870->5873 5874 402d3e 17 API calls 5871->5874 5872->5870 5873->5871 5875 4023dd WritePrivateProfileStringW 5874->5875 5462 402f2b 5463 402f56 5462->5463 5464 402f3d SetTimer 5462->5464 5465 402fab 5463->5465 5466 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5463->5466 5464->5463 5466->5465 4777 40242c 4778 402434 4777->4778 4779 40245f 4777->4779 4780 402d7e 17 API calls 4778->4780 4781 402d3e 17 API calls 4779->4781 4782 40243b 4780->4782 4783 402466 4781->4783 4784 402445 4782->4784 4787 402473 4782->4787 4789 402dfc 4783->4789 4786 402d3e 17 API calls 4784->4786 4788 40244c RegDeleteValueW RegCloseKey 4786->4788 4788->4787 4790 402e09 4789->4790 4791 402e10 4789->4791 4790->4787 4791->4790 4793 402e41 4791->4793 4794 40625b RegOpenKeyExW 4793->4794 4795 402e6f 4794->4795 4796 402f24 4795->4796 4797 402e79 4795->4797 4796->4790 4798 402e7f RegEnumValueW 4797->4798 4802 402ea2 4797->4802 4799 402f09 RegCloseKey 4798->4799 4798->4802 4799->4796 4800 402ede RegEnumKeyW 4801 402ee7 RegCloseKey 4800->4801 4800->4802 4803 4067e3 5 API calls 4801->4803 4802->4799 4802->4800 4802->4801 4804 402e41 6 API calls 4802->4804 4805 402ef7 4803->4805 4804->4802 4806 402f19 4805->4806 4807 402efb RegDeleteKeyW 4805->4807 4806->4796 4807->4796 5467 401a30 5468 402d3e 17 API calls 5467->5468 5469 401a39 ExpandEnvironmentStringsW 5468->5469 5470 401a4d 5469->5470 5472 401a60 5469->5472 5471 401a52 lstrcmpW 5470->5471 5470->5472 5471->5472 5876 404db1 GetDlgItem GetDlgItem 5877 404e05 7 API calls 5876->5877 5891 40502f 5876->5891 5878 404ea2 SendMessageW 5877->5878 5879 404eaf DeleteObject 5877->5879 5878->5879 5880 404eba 5879->5880 5882 404ef1 5880->5882 5885 40642b 17 API calls 5880->5885 5881 405117 5884 4051c0 5881->5884 5887 405022 5881->5887 5894 40516d SendMessageW 5881->5894 5883 404344 18 API calls 5882->5883 5886 404f05 5883->5886 5888 4051d5 5884->5888 5889 4051c9 SendMessageW 5884->5889 5890 404ed3 SendMessageW SendMessageW 5885->5890 5893 404344 18 API calls 5886->5893 5896 4043ab 8 API calls 5887->5896 5897 4051e7 ImageList_Destroy 5888->5897 5898 4051ee 5888->5898 5905 4051fe 5888->5905 5889->5888 5890->5880 5891->5881 5892 404cff 5 API calls 5891->5892 5908 4050a1 5891->5908 5892->5908 5909 404f16 5893->5909 5894->5887 5900 405182 SendMessageW 5894->5900 5895 405109 SendMessageW 5895->5881 5901 4053c3 5896->5901 5897->5898 5902 4051f7 GlobalFree 5898->5902 5898->5905 5899 405377 5899->5887 5906 405389 ShowWindow GetDlgItem ShowWindow 5899->5906 5904 405195 5900->5904 5902->5905 5903 404ff1 GetWindowLongW SetWindowLongW 5907 40500a 5903->5907 5915 4051a6 SendMessageW 5904->5915 5905->5899 5919 404d7f 4 API calls 5905->5919 5921 405239 5905->5921 5906->5887 5910 405027 5907->5910 5911 40500f ShowWindow 5907->5911 5908->5881 5908->5895 5909->5903 5914 404f69 SendMessageW 5909->5914 5916 404fec 5909->5916 5917 404fa7 SendMessageW 5909->5917 5918 404fbb SendMessageW 5909->5918 5929 404379 SendMessageW 5910->5929 5928 404379 SendMessageW 5911->5928 5914->5909 5915->5884 5916->5903 5916->5907 5917->5909 5918->5909 5919->5921 5920 405343 5922 40534d InvalidateRect 5920->5922 5924 405359 5920->5924 5923 405267 SendMessageW 5921->5923 5926 40527d 5921->5926 5922->5924 5923->5926 5924->5899 5927 404cba 20 API calls 5924->5927 5925 4052f1 SendMessageW SendMessageW 5925->5926 5926->5920 5926->5925 5927->5899 5928->5887 5929->5891 5935 4044b4 lstrlenW 5936 4044d3 5935->5936 5937 4044d5 WideCharToMultiByte 5935->5937 5936->5937 5473 404835 5474 404861 5473->5474 5475 404872 5473->5475 5534 405a38 GetDlgItemTextW 5474->5534 5477 40487e GetDlgItem 5475->5477 5483 4048dd 5475->5483 5479 404892 5477->5479 5478 40486c 5480 40669d 5 API calls 5478->5480 5481 4048a6 SetWindowTextW 5479->5481 5485 405d6e 4 API calls 5479->5485 5480->5475 5486 404344 18 API calls 5481->5486 5482 404b70 5489 4043ab 8 API calls 5482->5489 5483->5482 5487 40642b 17 API calls 5483->5487 5496 4049c1 5483->5496 5491 40489c 5485->5491 5492 4048c2 5486->5492 5493 404951 SHBrowseForFolderW 5487->5493 5488 4049f1 5494 405dcb 18 API calls 5488->5494 5490 404b84 5489->5490 5491->5481 5499 405cc3 3 API calls 5491->5499 5495 404344 18 API calls 5492->5495 5493->5496 5497 404969 CoTaskMemFree 5493->5497 5498 4049f7 5494->5498 5500 4048d0 5495->5500 5496->5482 5536 405a38 GetDlgItemTextW 5496->5536 5501 405cc3 3 API calls 5497->5501 5537 4063ee lstrcpynW 5498->5537 5499->5481 5535 404379 SendMessageW 5500->5535 5503 404976 5501->5503 5506 4049ad SetDlgItemTextW 5503->5506 5510 40642b 17 API calls 5503->5510 5505 4048d6 5508 4067e3 5 API calls 5505->5508 5506->5496 5507 404a0e 5509 4067e3 5 API calls 5507->5509 5508->5483 5516 404a15 5509->5516 5511 404995 lstrcmpiW 5510->5511 5511->5506 5514 4049a6 lstrcatW 5511->5514 5512 404a56 5538 4063ee lstrcpynW 5512->5538 5514->5506 5515 404a5d 5517 405d6e 4 API calls 5515->5517 5516->5512 5520 405d0f 2 API calls 5516->5520 5522 404aae 5516->5522 5518 404a63 GetDiskFreeSpaceW 5517->5518 5521 404a87 MulDiv 5518->5521 5518->5522 5520->5516 5521->5522 5523 404b1f 5522->5523 5539 404cba 5522->5539 5524 404b42 5523->5524 5526 40140b 2 API calls 5523->5526 5550 404366 KiUserCallbackDispatcher 5524->5550 5526->5524 5529 404b21 SetDlgItemTextW 5529->5523 5530 404b11 5542 404bf1 5530->5542 5531 404b5e 5531->5482 5533 40478e SendMessageW 5531->5533 5533->5482 5534->5478 5535->5505 5536->5488 5537->5507 5538->5515 5540 404bf1 20 API calls 5539->5540 5541 404b0c 5540->5541 5541->5529 5541->5530 5543 404c0a 5542->5543 5544 40642b 17 API calls 5543->5544 5545 404c6e 5544->5545 5546 40642b 17 API calls 5545->5546 5547 404c79 5546->5547 5548 40642b 17 API calls 5547->5548 5549 404c8f lstrlenW wsprintfW SetDlgItemTextW 5548->5549 5549->5523 5550->5531 5551 401735 5552 402d3e 17 API calls 5551->5552 5553 40173c SearchPathW 5552->5553 5554 401757 5553->5554 5555 402636 5556 402665 5555->5556 5557 40264a 5555->5557 5559 402695 5556->5559 5560 40266a 5556->5560 5558 402d1c 17 API calls 5557->5558 5568 402651 5558->5568 5562 402d3e 17 API calls 5559->5562 5561 402d3e 17 API calls 5560->5561 5563 402671 5561->5563 5564 40269c lstrlenW 5562->5564 5572 406410 WideCharToMultiByte 5563->5572 5564->5568 5566 402685 lstrlenA 5566->5568 5567 4026c9 5569 4026df 5567->5569 5570 405f96 WriteFile 5567->5570 5568->5567 5568->5569 5573 405fc5 SetFilePointer 5568->5573 5570->5569 5572->5566 5574 405fe1 5573->5574 5575 405ff9 5573->5575 5576 405f67 ReadFile 5574->5576 5575->5567 5577 405fed 5576->5577 5577->5575 5578 406002 SetFilePointer 5577->5578 5579 40602a SetFilePointer 5577->5579 5578->5579 5580 40600d 5578->5580 5579->5575 5581 405f96 WriteFile 5580->5581 5581->5575 5582 6d4a103d 5583 6d4a101b 5 API calls 5582->5583 5584 6d4a1056 5583->5584 5585 401d38 5586 402d1c 17 API calls 5585->5586 5587 401d3f 5586->5587 5588 402d1c 17 API calls 5587->5588 5589 401d4b GetDlgItem 5588->5589 5590 402630 5589->5590 5938 4014b8 5939 4014be 5938->5939 5940 401389 2 API calls 5939->5940 5941 4014c6 5940->5941 5942 4028bb 5943 4028c1 5942->5943 5944 402bc2 5943->5944 5945 4028c9 FindClose 5943->5945 5945->5944

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 7 4034eb 1->7 4 4034f7-40350b call 406773 lstrlenA 2->4 9 40350d-403529 call 4067e3 * 3 4->9 7->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 21 403533 17->21 21->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 30 4035d2-4035d6 28->30 31 4035cb-4035d0 28->31 38 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->38 39 403746-403760 DeleteFileW call 403015 29->39 33 4035d8-4035dc 30->33 34 4035dd-4035e1 30->34 31->30 31->31 33->34 36 4036a0-4036ad call 405cf0 34->36 37 4035e7-4035ed 34->37 54 4036b1-4036b7 36->54 55 4036af-4036b0 36->55 42 403608-403641 37->42 43 4035ef-4035f7 37->43 38->39 52 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 38->52 56 403811-403821 call 4039e3 OleUninitialize 39->56 57 403766-40376c 39->57 50 403643-403648 42->50 51 40365e-403698 42->51 48 4035f9-4035fc 43->48 49 4035fe 43->49 48->42 48->49 49->42 50->51 58 40364a-403652 50->58 51->36 53 40369a-40369e 51->53 52->39 52->56 53->36 60 4036bf-4036cd call 4063ee 53->60 54->28 61 4036bd 54->61 55->54 75 403947-40394d 56->75 76 403827-403837 call 405a54 ExitProcess 56->76 62 403801-403808 call 403abd 57->62 63 403772-40377d call 405cf0 57->63 65 403654-403657 58->65 66 403659 58->66 68 4036d2 60->68 61->68 74 40380d 62->74 80 4037cb-4037d5 63->80 81 40377f-4037b4 63->81 65->51 65->66 66->51 68->29 74->56 78 4039cb-4039d3 75->78 79 40394f-403965 GetCurrentProcess OpenProcessToken 75->79 82 4039d5 78->82 83 4039d9-4039dd ExitProcess 78->83 87 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 79->87 88 40399b-4039a9 call 4067e3 79->88 85 4037d7-4037e5 call 405dcb 80->85 86 40383d-403851 call 4059bf lstrcatW 80->86 89 4037b6-4037ba 81->89 82->83 85->56 99 4037e7-4037fd call 4063ee * 2 85->99 100 403853-403859 lstrcatW 86->100 101 40385e-403878 lstrcatW lstrcmpiW 86->101 87->88 102 4039b7-4039c2 ExitWindowsEx 88->102 103 4039ab-4039b5 88->103 93 4037c3-4037c7 89->93 94 4037bc-4037c1 89->94 93->89 98 4037c9 93->98 94->93 94->98 98->80 99->62 100->101 101->56 105 40387a-40387d 101->105 102->78 106 4039c4-4039c6 call 40140b 102->106 103->102 103->106 108 403886 call 4059a2 105->108 109 40387f-403884 call 405925 105->109 106->78 117 40388b-403899 SetCurrentDirectoryW 108->117 109->117 118 4038a6-4038cf call 4063ee 117->118 119 40389b-4038a1 call 4063ee 117->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 128 40393b-403942 call 4061b4 126->128 127->126 129 403904-403924 call 4061b4 call 40642b call 4059d7 127->129 128->56 129->126 138 403926-40392d CloseHandle 129->138 138->126
                                APIs
                                • SetErrorMode.KERNELBASE ref: 004034C5
                                • GetVersion.KERNEL32 ref: 004034CB
                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                                • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                                • OleInitialize.OLE32(00000000), ref: 00403542
                                • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                                • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000020,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                                  • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                  • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                                • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                                • ExitProcess.KERNEL32 ref: 00403837
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                                • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\02Eh1ah35H.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                                • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                                • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                                • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                                • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                                • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                                • ExitProcess.KERNEL32 ref: 004039DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                • String ID: "C:\Users\user\Desktop\02Eh1ah35H.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires$C:\Users\user\Desktop$C:\Users\user\Desktop\02Eh1ah35H.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$kernel32::EnumResourceTypesA(i 0,i r8,i 0)$~nsu
                                • API String ID: 3441113951-3019674826
                                • Opcode ID: ef7bc40cfc21a65b5c7abadd4c778368bce5dd0c15bdea56e8fa6b9d03db3f5a
                                • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                                • Opcode Fuzzy Hash: ef7bc40cfc21a65b5c7abadd4c778368bce5dd0c15bdea56e8fa6b9d03db3f5a
                                • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 139 405595-4055b0 140 4055b6-40567d GetDlgItem * 3 call 404379 call 404cd2 GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 40573f-405746 139->141 159 40569b-40569e 140->159 160 40567f-405699 SendMessageW * 2 140->160 143 405770-40577d 141->143 144 405748-40576a GetDlgItem CreateThread CloseHandle 141->144 145 40579b-4057a5 143->145 146 40577f-405785 143->146 144->143 150 4057a7-4057ad 145->150 151 4057fb-4057ff 145->151 148 4057c0-4057c9 call 4043ab 146->148 149 405787-405796 ShowWindow * 2 call 404379 146->149 163 4057ce-4057d2 148->163 149->145 156 4057d5-4057e5 ShowWindow 150->156 157 4057af-4057bb call 40431d 150->157 151->148 154 405801-405807 151->154 154->148 161 405809-40581c SendMessageW 154->161 164 4057f5-4057f6 call 40431d 156->164 165 4057e7-4057f0 call 405456 156->165 157->148 166 4056a0-4056ac SendMessageW 159->166 167 4056ae-4056c5 call 404344 159->167 160->159 168 405822-40584d CreatePopupMenu call 40642b AppendMenuW 161->168 169 40591e-405920 161->169 164->151 165->164 166->167 178 4056c7-4056db ShowWindow 167->178 179 4056fb-40571c GetDlgItem SendMessageW 167->179 176 405862-405877 TrackPopupMenu 168->176 177 40584f-40585f GetWindowRect 168->177 169->163 176->169 180 40587d-405894 176->180 177->176 181 4056ea 178->181 182 4056dd-4056e8 ShowWindow 178->182 179->169 183 405722-40573a SendMessageW * 2 179->183 184 405899-4058b4 SendMessageW 180->184 185 4056f0-4056f6 call 404379 181->185 182->185 183->169 184->184 186 4058b6-4058d9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4058db-405902 SendMessageW 186->188 188->188 189 405904-405918 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->169
                                APIs
                                • GetDlgItem.USER32(?,00000403), ref: 004055F3
                                • GetDlgItem.USER32(?,000003EE), ref: 00405602
                                • GetClientRect.USER32(?,?), ref: 0040563F
                                • GetSystemMetrics.USER32(00000002), ref: 00405646
                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405667
                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405678
                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040568B
                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405699
                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056AC
                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056CE
                                • ShowWindow.USER32(?,00000008), ref: 004056E2
                                • GetDlgItem.USER32(?,000003EC), ref: 00405703
                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405713
                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040572C
                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405738
                                • GetDlgItem.USER32(?,000003F8), ref: 00405611
                                  • Part of subcall function 00404379: SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                • GetDlgItem.USER32(?,000003EC), ref: 00405755
                                • CreateThread.KERNELBASE(00000000,00000000,Function_00005529,00000000), ref: 00405763
                                • CloseHandle.KERNELBASE(00000000), ref: 0040576A
                                • ShowWindow.USER32(00000000), ref: 0040578E
                                • ShowWindow.USER32(?,00000008), ref: 00405793
                                • ShowWindow.USER32(00000008), ref: 004057DD
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405811
                                • CreatePopupMenu.USER32 ref: 00405822
                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405836
                                • GetWindowRect.USER32(?,?), ref: 00405856
                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040586F
                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A7
                                • OpenClipboard.USER32(00000000), ref: 004058B7
                                • EmptyClipboard.USER32 ref: 004058BD
                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C9
                                • GlobalLock.KERNEL32(00000000), ref: 004058D3
                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E7
                                • GlobalUnlock.KERNEL32(00000000), ref: 00405907
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405912
                                • CloseClipboard.USER32 ref: 00405918
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                • String ID: {
                                • API String ID: 590372296-366298937
                                • Opcode ID: 76257269951a7008dfdc90867c28ba5585546a04cccc1881335d18026b5b47bc
                                • Instruction ID: ce320b3aa05de7a86cd71a66421b7d26801e1fa413e38a053d13c4a4e4f3a794
                                • Opcode Fuzzy Hash: 76257269951a7008dfdc90867c28ba5585546a04cccc1881335d18026b5b47bc
                                • Instruction Fuzzy Hash: 43B15BB1900608FFDB119F64DD89EAE7B79FB44354F00802AFA45B61A0CB794E51DFA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 435 405b00-405b26 call 405dcb 438 405b28-405b3a DeleteFileW 435->438 439 405b3f-405b46 435->439 440 405cbc-405cc0 438->440 441 405b48-405b4a 439->441 442 405b59-405b69 call 4063ee 439->442 443 405b50-405b53 441->443 444 405c6a-405c6f 441->444 448 405b78-405b79 call 405d0f 442->448 449 405b6b-405b76 lstrcatW 442->449 443->442 443->444 444->440 447 405c71-405c74 444->447 450 405c76-405c7c 447->450 451 405c7e-405c86 call 40674c 447->451 452 405b7e-405b82 448->452 449->452 450->440 451->440 458 405c88-405c9c call 405cc3 call 405ab8 451->458 456 405b84-405b8c 452->456 457 405b8e-405b94 lstrcatW 452->457 456->457 459 405b99-405bb5 lstrlenW FindFirstFileW 456->459 457->459 475 405cb4-405cb7 call 405456 458->475 476 405c9e-405ca1 458->476 460 405bbb-405bc3 459->460 461 405c5f-405c63 459->461 463 405be3-405bf7 call 4063ee 460->463 464 405bc5-405bcd 460->464 461->444 466 405c65 461->466 477 405bf9-405c01 463->477 478 405c0e-405c19 call 405ab8 463->478 467 405c42-405c52 FindNextFileW 464->467 468 405bcf-405bd7 464->468 466->444 467->460 474 405c58-405c59 FindClose 467->474 468->463 471 405bd9-405be1 468->471 471->463 471->467 474->461 475->440 476->450 479 405ca3-405cb2 call 405456 call 4061b4 476->479 477->467 480 405c03-405c0c call 405b00 477->480 488 405c3a-405c3d call 405456 478->488 489 405c1b-405c1e 478->489 479->440 480->467 488->467 492 405c20-405c30 call 405456 call 4061b4 489->492 493 405c32-405c38 489->493 492->467 493->467
                                APIs
                                • DeleteFileW.KERNELBASE(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                                • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B71
                                • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B94
                                • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B9A
                                • FindFirstFileW.KERNEL32(007A3F50,?,?,?,0040A014,?,007A3F50,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405BAA
                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C4A
                                • FindClose.KERNEL32(00000000), ref: 00405C59
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                • String ID: "C:\Users\user\Desktop\02Eh1ah35H.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                                • API String ID: 2035342205-1192855190
                                • Opcode ID: 9bcf84aa20197a85572e9300232fccf325a3569ae83ff5500f6c5511c7c60933
                                • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                                • Opcode Fuzzy Hash: 9bcf84aa20197a85572e9300232fccf325a3569ae83ff5500f6c5511c7c60933
                                • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                                APIs
                                • FindFirstFileW.KERNELBASE(76F93420,007A4F98,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00405E14,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                                • FindClose.KERNEL32(00000000), ref: 00406763
                                Strings
                                • C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp, xrefs: 0040674C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp
                                • API String ID: 2295610775-4001973324
                                • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                                • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC
                                APIs
                                • NtAllocateVirtualMemory.NTDLL ref: 04BED482
                                Memory Dump Source
                                • Source File: 00000000.00000002.3820795220.0000000004635000.00000040.00001000.00020000.00000000.sdmp, Offset: 04635000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_4635000_02Eh1ah35H.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: 15f387c8b69663545b54c22fe359b94a23d2c9de8b929611358e4d5029be4df6
                                • Instruction ID: 93fd314a7d417f4fbacba6e163932d401105e31975e2a1ee8cf124793f58e54a
                                • Opcode Fuzzy Hash: 15f387c8b69663545b54c22fe359b94a23d2c9de8b929611358e4d5029be4df6
                                • Instruction Fuzzy Hash: A4F06D7160074A8FCB29CE7889D83C937A2AFD9304F108229C9048F344DB34E9498B00

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 190 403e6b-403e7d 191 403e83-403e89 190->191 192 403fbe-403fcd 190->192 191->192 193 403e8f-403e98 191->193 194 40401c-404031 192->194 195 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 192->195 196 403e9a-403ea7 SetWindowPos 193->196 197 403ead-403eb0 193->197 199 404071-404076 call 404390 194->199 200 404033-404036 194->200 195->194 196->197 202 403eb2-403ec4 ShowWindow 197->202 203 403eca-403ed0 197->203 209 40407b-404096 199->209 205 404038-404043 call 401389 200->205 206 404069-40406b 200->206 202->203 210 403ed2-403ee7 DestroyWindow 203->210 211 403eec-403eef 203->211 205->206 221 404045-404064 SendMessageW 205->221 206->199 208 404311 206->208 216 404313-40431a 208->216 214 404098-40409a call 40140b 209->214 215 40409f-4040a5 209->215 217 4042ee-4042f4 210->217 219 403ef1-403efd SetWindowLongW 211->219 220 403f02-403f08 211->220 214->215 224 4040ab-4040b6 215->224 225 4042cf-4042e8 DestroyWindow EndDialog 215->225 217->208 223 4042f6-4042fc 217->223 219->216 226 403fab-403fb9 call 4043ab 220->226 227 403f0e-403f1f GetDlgItem 220->227 221->216 223->208 231 4042fe-404307 ShowWindow 223->231 224->225 232 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 224->232 225->217 226->216 228 403f21-403f38 SendMessageW IsWindowEnabled 227->228 229 403f3e-403f41 227->229 228->208 228->229 233 403f43-403f44 229->233 234 403f46-403f49 229->234 231->208 260 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 232->260 261 40410b-404110 232->261 237 403f74-403f79 call 40431d 233->237 238 403f57-403f5c 234->238 239 403f4b-403f51 234->239 237->226 241 403f92-403fa5 SendMessageW 238->241 243 403f5e-403f64 238->243 239->241 242 403f53-403f55 239->242 241->226 242->237 246 403f66-403f6c call 40140b 243->246 247 403f7b-403f84 call 40140b 243->247 258 403f72 246->258 247->226 256 403f86-403f90 247->256 256->258 258->237 264 404151-404152 260->264 265 404154 260->265 261->260 266 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404186-404197 SendMessageW 266->267 268 404199 266->268 269 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 267->269 268->269 269->209 280 4041e4-4041e6 269->280 280->209 281 4041ec-4041f0 280->281 282 4041f2-4041f8 281->282 283 40420f-404223 DestroyWindow 281->283 282->208 284 4041fe-404204 282->284 283->217 285 404229-404256 CreateDialogParamW 283->285 284->209 286 40420a 284->286 285->217 287 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->287 286->208 287->208 292 4042b5-4042c8 ShowWindow call 404390 287->292 294 4042cd 292->294 294->217
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                                • ShowWindow.USER32(?), ref: 00403EC4
                                • DestroyWindow.USER32 ref: 00403ED8
                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                                • GetDlgItem.USER32(?,?), ref: 00403F15
                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                                • IsWindowEnabled.USER32(00000000), ref: 00403F30
                                • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                                • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                                • GetDlgItem.USER32(?,00000003), ref: 004040F9
                                • ShowWindow.USER32(00000000,?), ref: 0040411A
                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                                • EnableWindow.USER32(?,?), ref: 00404147
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                                • EnableMenuItem.USER32(00000000), ref: 00404164
                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                                • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                                • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                                • ShowWindow.USER32(?,0000000A), ref: 00404301
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                • String ID:
                                • API String ID: 3282139019-0
                                • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                                • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 295 403abd-403ad5 call 4067e3 298 403ad7-403ae2 GetUserDefaultUILanguage call 406335 295->298 299 403ae9-403b20 call 4062bc 295->299 302 403ae7 298->302 305 403b22-403b33 call 4062bc 299->305 306 403b38-403b3e lstrcatW 299->306 304 403b43-403b6c call 403d93 call 405dcb 302->304 312 403b72-403b77 304->312 313 403bfe-403c06 call 405dcb 304->313 305->306 306->304 312->313 315 403b7d-403ba5 call 4062bc 312->315 319 403c14-403c39 LoadImageW 313->319 320 403c08-403c0f call 40642b 313->320 315->313 321 403ba7-403bab 315->321 323 403cba-403cc2 call 40140b 319->323 324 403c3b-403c6b RegisterClassW 319->324 320->319 325 403bbd-403bc9 lstrlenW 321->325 326 403bad-403bba call 405cf0 321->326 337 403cc4-403cc7 323->337 338 403ccc-403cd7 call 403d93 323->338 327 403c71-403cb5 SystemParametersInfoW CreateWindowExW 324->327 328 403d89 324->328 332 403bf1-403bf9 call 405cc3 call 4063ee 325->332 333 403bcb-403bd9 lstrcmpiW 325->333 326->325 327->323 331 403d8b-403d92 328->331 332->313 333->332 336 403bdb-403be5 GetFileAttributesW 333->336 340 403be7-403be9 336->340 341 403beb-403bec call 405d0f 336->341 337->331 347 403d60-403d61 call 405529 338->347 348 403cdd-403cf7 ShowWindow call 406773 338->348 340->332 340->341 341->332 352 403d66-403d68 347->352 353 403d03-403d15 GetClassInfoW 348->353 354 403cf9-403cfe call 406773 348->354 355 403d82-403d84 call 40140b 352->355 356 403d6a-403d70 352->356 359 403d17-403d27 GetClassInfoW RegisterClassW 353->359 360 403d2d-403d50 DialogBoxParamW call 40140b 353->360 354->353 355->328 356->337 361 403d76-403d7d call 40140b 356->361 359->360 365 403d55-403d5e call 403a0d 360->365 361->337 365->331
                                APIs
                                  • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                  • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                • GetUserDefaultUILanguage.KERNELBASE(00000002,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000), ref: 00403AD7
                                  • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                                • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",00000000), ref: 00403B3E
                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,76F93420), ref: 00403BBE
                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                                • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires), ref: 00403C25
                                • RegisterClassW.USER32(007A7A00), ref: 00403C62
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                                • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                                • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                                • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                                • RegisterClassW.USER32(007A7A00), ref: 00403D27
                                • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                • String ID: "C:\Users\user\Desktop\02Eh1ah35H.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                • API String ID: 606308-804502245
                                • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                                • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 368 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 371 403065-40306a 368->371 372 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 368->372 373 403245-403249 371->373 380 4030a3 372->380 381 403188-403196 call 402fb1 372->381 383 4030a8-4030bf 380->383 388 403198-40319b 381->388 389 4031eb-4031f0 381->389 384 4030c1 383->384 385 4030c3-4030cc call 403444 383->385 384->385 394 4031f2-4031fa call 402fb1 385->394 395 4030d2-4030d9 385->395 391 40319d-4031b5 call 40345a call 403444 388->391 392 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 388->392 389->373 391->389 414 4031b7-4031bd 391->414 392->389 419 4031fc-40320d 392->419 394->389 398 403155-403159 395->398 399 4030db-4030ef call 405e9f 395->399 403 403163-403169 398->403 404 40315b-403162 call 402fb1 398->404 399->403 417 4030f1-4030f8 399->417 410 403178-403180 403->410 411 40316b-403175 call 4068d0 403->411 404->403 410->383 418 403186 410->418 411->410 414->389 414->392 417->403 421 4030fa-403101 417->421 418->381 422 403215-40321a 419->422 423 40320f 419->423 421->403 425 403103-40310a 421->425 424 40321b-403221 422->424 423->422 424->424 426 403223-40323e SetFilePointer call 405e9f 424->426 425->403 427 40310c-403113 425->427 430 403243 426->430 427->403 429 403115-403135 427->429 429->389 431 40313b-40313f 429->431 430->373 432 403141-403145 431->432 433 403147-40314f 431->433 432->418 432->433 433->403 434 403151-403153 433->434 434->403
                                APIs
                                • GetTickCount.KERNEL32 ref: 00403026
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\02Eh1ah35H.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                  • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\02Eh1ah35H.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                  • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\02Eh1ah35H.exe,C:\Users\user\Desktop\02Eh1ah35H.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                • String ID: "C:\Users\user\Desktop\02Eh1ah35H.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\02Eh1ah35H.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                • API String ID: 2803837635-2762677474
                                • Opcode ID: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                                • Opcode Fuzzy Hash: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 499 40642b-406436 500 406438-406447 499->500 501 406449-40645f 499->501 500->501 502 406465-406472 501->502 503 406677-40667d 501->503 502->503 504 406478-40647f 502->504 505 406683-40668e 503->505 506 406484-406491 503->506 504->503 507 406690-406694 call 4063ee 505->507 508 406699-40669a 505->508 506->505 509 406497-4064a3 506->509 507->508 511 406664 509->511 512 4064a9-4064e7 509->512 515 406672-406675 511->515 516 406666-406670 511->516 513 406607-40660b 512->513 514 4064ed-4064f8 512->514 519 40660d-406613 513->519 520 40663e-406642 513->520 517 406511 514->517 518 4064fa-4064ff 514->518 515->503 516->503 523 406518-40651f 517->523 518->517 526 406501-406504 518->526 521 406623-40662f call 4063ee 519->521 522 406615-406621 call 406335 519->522 524 406651-406662 lstrlenW 520->524 525 406644-40664c call 40642b 520->525 536 406634-40663a 521->536 522->536 528 406521-406523 523->528 529 406524-406526 523->529 524->503 525->524 526->517 532 406506-406509 526->532 528->529 534 406561-406564 529->534 535 406528-40654f call 4062bc 529->535 532->517 537 40650b-40650f 532->537 540 406574-406577 534->540 541 406566-406572 GetSystemDirectoryW 534->541 547 406555-40655c call 40642b 535->547 548 4065ef-4065f2 535->548 536->524 539 40663c 536->539 537->523 543 4065ff-406605 call 40669d 539->543 545 4065e2-4065e4 540->545 546 406579-406587 GetWindowsDirectoryW 540->546 544 4065e6-4065ea 541->544 543->524 544->543 550 4065ec 544->550 545->544 549 406589-406593 545->549 546->545 547->544 548->543 553 4065f4-4065fa lstrcatW 548->553 555 406595-406598 549->555 556 4065ad-4065c3 SHGetSpecialFolderLocation 549->556 550->548 553->543 555->556 557 40659a-4065a1 555->557 558 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 556->558 559 4065de 556->559 561 4065a9-4065ab 557->561 558->544 558->559 559->545 561->544 561->556
                                APIs
                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                                • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                                • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                                • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                                • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                • API String ID: 717251189-1230650788
                                • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                                • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 562 40176f-401794 call 402d3e call 405d3a 567 401796-40179c call 4063ee 562->567 568 40179e-4017b0 call 4063ee call 405cc3 lstrcatW 562->568 573 4017b5-4017b6 call 40669d 567->573 568->573 577 4017bb-4017bf 573->577 578 4017c1-4017cb call 40674c 577->578 579 4017f2-4017f5 577->579 586 4017dd-4017ef 578->586 587 4017cd-4017db CompareFileTime 578->587 580 4017f7-4017f8 call 405ebf 579->580 581 4017fd-401819 call 405ee4 579->581 580->581 589 40181b-40181e 581->589 590 40188d-4018b6 call 405456 call 40324c 581->590 586->579 587->586 591 401820-40185e call 4063ee * 2 call 40642b call 4063ee call 405a54 589->591 592 40186f-401879 call 405456 589->592 602 4018b8-4018bc 590->602 603 4018be-4018ca SetFileTime 590->603 591->577 624 401864-401865 591->624 604 401882-401888 592->604 602->603 606 4018d0-4018db CloseHandle 602->606 603->606 607 402bcb 604->607 610 4018e1-4018e4 606->610 611 402bc2-402bc5 606->611 612 402bcd-402bd1 607->612 614 4018e6-4018f7 call 40642b lstrcatW 610->614 615 4018f9-4018fc call 40642b 610->615 611->607 621 401901-402390 614->621 615->621 625 402395-40239a 621->625 626 402390 call 405a54 621->626 624->604 627 401867-401868 624->627 625->612 626->625 627->592
                                APIs
                                • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires,?,?,00000031), ref: 004017B0
                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires,?,?,00000031), ref: 004017D5
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                  • Part of subcall function 00405456: lstrlenW.KERNEL32(007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                  • Part of subcall function 00405456: lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                  • Part of subcall function 00405456: lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,76F923A0), ref: 004054B1
                                  • Part of subcall function 00405456: SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                  • Part of subcall function 00405456: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                  • Part of subcall function 00405456: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                  • Part of subcall function 00405456: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                • String ID: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp$C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires$Call
                                • API String ID: 1941528284-169475660
                                • Opcode ID: 97aee72ff6c72179d07b6fee79d1c52bf4840d83196187cb81e3270487e243c2
                                • Instruction ID: cd03b910d30ecf031e582351f340fed2e2266b195dd1fdcb6122cfe31266ec79
                                • Opcode Fuzzy Hash: 97aee72ff6c72179d07b6fee79d1c52bf4840d83196187cb81e3270487e243c2
                                • Instruction Fuzzy Hash: 0B418571510508BACF11BFB5CD85DAE3A79EF45329B20423FF422B11E1DB3C8A519A6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 628 405456-40546b 629 405471-405482 628->629 630 405522-405526 628->630 631 405484-405488 call 40642b 629->631 632 40548d-405499 lstrlenW 629->632 631->632 634 4054b6-4054ba 632->634 635 40549b-4054ab lstrlenW 632->635 637 4054c9-4054cd 634->637 638 4054bc-4054c3 SetWindowTextW 634->638 635->630 636 4054ad-4054b1 lstrcatW 635->636 636->634 639 405513-405515 637->639 640 4054cf-405511 SendMessageW * 3 637->640 638->637 639->630 641 405517-40551a 639->641 640->639 641->630
                                APIs
                                • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,76F923A0), ref: 004054B1
                                • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                • String ID:
                                • API String ID: 2531174081-0
                                • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                                • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 642 405925-405970 CreateDirectoryW 643 405972-405974 642->643 644 405976-405983 GetLastError 642->644 645 40599d-40599f 643->645 644->645 646 405985-405999 SetFileSecurityW 644->646 646->643 647 40599b GetLastError 646->647 647->645
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                • GetLastError.KERNEL32 ref: 0040597C
                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                                • GetLastError.KERNEL32 ref: 0040599B
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                                • C:\Users\user\Desktop, xrefs: 00405925
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                • API String ID: 3449924974-1729097607
                                • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                                • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 648 406773-406793 GetSystemDirectoryW 649 406795 648->649 650 406797-406799 648->650 649->650 651 4067aa-4067ac 650->651 652 40679b-4067a4 650->652 654 4067ad-4067e0 wsprintfW LoadLibraryExW 651->654 652->651 653 4067a6-4067a8 652->653 653->654
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                • wsprintfW.USER32 ref: 004067C5
                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                • String ID: %s%S.dll$UXTHEME$\
                                • API String ID: 2200240437-1946221925
                                • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                                • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 655 40324c-403263 656 403265 655->656 657 40326c-403275 655->657 656->657 658 403277 657->658 659 40327e-403283 657->659 658->659 660 403293-4032a0 call 403444 659->660 661 403285-40328e call 40345a 659->661 665 403432 660->665 666 4032a6-4032aa 660->666 661->660 667 403434-403435 665->667 668 4032b0-4032d6 GetTickCount 666->668 669 4033dd-4033df 666->669 672 40343d-403441 667->672 673 40343a 668->673 674 4032dc-4032e4 668->674 670 4033e1-4033e4 669->670 671 40341f-403422 669->671 670->673 677 4033e6 670->677 675 403424 671->675 676 403427-403430 call 403444 671->676 673->672 678 4032e6 674->678 679 4032e9-4032f7 call 403444 674->679 675->676 676->665 688 403437 676->688 681 4033e9-4033ef 677->681 678->679 679->665 687 4032fd-403306 679->687 684 4033f1 681->684 685 4033f3-403401 call 403444 681->685 684->685 685->665 693 403403-40340f call 405f96 685->693 690 40330c-40332c call 40693e 687->690 688->673 697 403332-403345 GetTickCount 690->697 698 4033d5-4033d7 690->698 699 403411-40341b 693->699 700 4033d9-4033db 693->700 701 403390-403392 697->701 702 403347-40334f 697->702 698->667 699->681 703 40341d 699->703 700->667 706 403394-403398 701->706 707 4033c9-4033cd 701->707 704 403351-403355 702->704 705 403357-403388 MulDiv wsprintfW call 405456 702->705 703->673 704->701 704->705 713 40338d 705->713 710 40339a-4033a1 call 405f96 706->710 711 4033af-4033ba 706->711 707->674 708 4033d3 707->708 708->673 716 4033a6-4033a8 710->716 712 4033bd-4033c1 711->712 712->690 715 4033c7 712->715 713->701 715->673 716->700 717 4033aa-4033ad 716->717 717->712
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CountTick$wsprintf
                                • String ID: ... %d%%
                                • API String ID: 551687249-2449383134
                                • Opcode ID: 93e44d2671c096b7225e0ed32f8acedc4fb2cb11057b9db1c10a95020cbffac7
                                • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                                • Opcode Fuzzy Hash: 93e44d2671c096b7225e0ed32f8acedc4fb2cb11057b9db1c10a95020cbffac7
                                • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 718 405f13-405f1f 719 405f20-405f54 GetTickCount GetTempFileNameW 718->719 720 405f63-405f65 719->720 721 405f56-405f58 719->721 723 405f5d-405f60 720->723 721->719 722 405f5a 721->722 722->723
                                APIs
                                • GetTickCount.KERNEL32 ref: 00405F31
                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\02Eh1ah35H.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F18
                                • "C:\Users\user\Desktop\02Eh1ah35H.exe", xrefs: 00405F13
                                • nsa, xrefs: 00405F20
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CountFileNameTempTick
                                • String ID: "C:\Users\user\Desktop\02Eh1ah35H.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                • API String ID: 1716503409-544227239
                                • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                                • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 724 402e41-402e6a call 40625b 726 402e6f-402e73 724->726 727 402f24-402f28 726->727 728 402e79-402e7d 726->728 729 402ea2-402eb5 728->729 730 402e7f-402ea0 RegEnumValueW 728->730 732 402ede-402ee5 RegEnumKeyW 729->732 730->729 731 402f09-402f17 RegCloseKey 730->731 731->727 733 402eb7-402eb9 732->733 734 402ee7-402ef9 RegCloseKey call 4067e3 732->734 733->731 735 402ebb-402ecf call 402e41 733->735 740 402f19-402f1f 734->740 741 402efb-402f07 RegDeleteKeyW 734->741 735->734 742 402ed1-402edd 735->742 740->727 741->727 742->732
                                APIs
                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402E95
                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402EE1
                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402EEA
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F01
                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F0C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CloseEnum$DeleteValue
                                • String ID:
                                • API String ID: 1354259210-0
                                • Opcode ID: 62b78b0d49bd01798b93cc74e08c59fab283fd11ef2de5059a0807e48668f6f6
                                • Instruction ID: 6d47fb934da24c9d717e5f7ce43986d94c12ea4066fa177ccbd406c8c521aae0
                                • Opcode Fuzzy Hash: 62b78b0d49bd01798b93cc74e08c59fab283fd11ef2de5059a0807e48668f6f6
                                • Instruction Fuzzy Hash: D1215A71500109BBDF129F90CE89EEF7A7DEB54348F110076F909B21A0E7B49E54AAA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 743 6d4a1777-6d4a17b6 call 6d4a1b5f 747 6d4a17bc-6d4a17c0 743->747 748 6d4a18d6-6d4a18d8 743->748 749 6d4a17c9-6d4a17d6 call 6d4a23e0 747->749 750 6d4a17c2-6d4a17c8 call 6d4a239e 747->750 755 6d4a17d8-6d4a17dd 749->755 756 6d4a1806-6d4a180d 749->756 750->749 759 6d4a17f8-6d4a17fb 755->759 760 6d4a17df-6d4a17e0 755->760 757 6d4a180f-6d4a182b call 6d4a25b5 call 6d4a15b4 call 6d4a1272 GlobalFree 756->757 758 6d4a182d-6d4a1831 756->758 783 6d4a1885-6d4a1889 757->783 765 6d4a187e-6d4a1884 call 6d4a25b5 758->765 766 6d4a1833-6d4a187c call 6d4a15c6 call 6d4a25b5 758->766 759->756 761 6d4a17fd-6d4a17fe call 6d4a2d83 759->761 763 6d4a17e8-6d4a17e9 call 6d4a2af8 760->763 764 6d4a17e2-6d4a17e3 760->764 775 6d4a1803 761->775 778 6d4a17ee 763->778 771 6d4a17f0-6d4a17f6 call 6d4a2770 764->771 772 6d4a17e5-6d4a17e6 764->772 765->783 766->783 782 6d4a1805 771->782 772->756 772->763 775->782 778->775 782->756 786 6d4a188b-6d4a1899 call 6d4a2578 783->786 787 6d4a18c6-6d4a18cd 783->787 793 6d4a189b-6d4a189e 786->793 794 6d4a18b1-6d4a18b8 786->794 787->748 789 6d4a18cf-6d4a18d0 GlobalFree 787->789 789->748 793->794 795 6d4a18a0-6d4a18a8 793->795 794->787 796 6d4a18ba-6d4a18c5 call 6d4a153d 794->796 795->794 798 6d4a18aa-6d4a18ab FreeLibrary 795->798 796->787 798->794
                                APIs
                                  • Part of subcall function 6D4A1B5F: GlobalFree.KERNEL32(?), ref: 6D4A1DD4
                                  • Part of subcall function 6D4A1B5F: GlobalFree.KERNEL32(?), ref: 6D4A1DD9
                                  • Part of subcall function 6D4A1B5F: GlobalFree.KERNEL32(?), ref: 6D4A1DDE
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A1825
                                • FreeLibrary.KERNEL32(?), ref: 6D4A18AB
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A18D0
                                  • Part of subcall function 6D4A239E: GlobalAlloc.KERNEL32(00000040,?), ref: 6D4A23CF
                                  • Part of subcall function 6D4A2770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6D4A17F6,00000000), ref: 6D4A2840
                                  • Part of subcall function 6D4A15C6: wsprintfW.USER32 ref: 6D4A15F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc$Librarywsprintf
                                • String ID:
                                • API String ID: 3962662361-3916222277
                                • Opcode ID: f8b2570c176abf8cb02f7ca3c7b316f15b4b3d598da4af4387d9c257423d2506
                                • Instruction ID: 1d14fca8b81b4c8172ffe772c366f0116c4fc22688d33e3fb3f4392196f3c801
                                • Opcode Fuzzy Hash: f8b2570c176abf8cb02f7ca3c7b316f15b4b3d598da4af4387d9c257423d2506
                                • Instruction Fuzzy Hash: A241B3714082469ADF10DF74D8C4FAA37A8BF25354F2C406DEA599E28EDB74CD84D7A0
                                APIs
                                  • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,?,00405DE2,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                  • Part of subcall function 00405925: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires,?,00000000,000000F0), ref: 0040164D
                                Strings
                                • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires, xrefs: 00401640
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires
                                • API String ID: 1892508949-1817558097
                                • Opcode ID: 80fd5ec796b1b368ed682b76771a31175e10dfebd9dfd37df4bee3ba0698d93a
                                • Instruction ID: df70cc4d1a75ed244d2a997ae4edf05539497ac8b3a7dfb8588bf84231242a1b
                                • Opcode Fuzzy Hash: 80fd5ec796b1b368ed682b76771a31175e10dfebd9dfd37df4bee3ba0698d93a
                                • Instruction Fuzzy Hash: 2811E231504104EBCF206FA5CD4099F37B0EF25329B28493BEA11B12F1D63E4A819B5E
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 004020FB
                                  • Part of subcall function 00405456: lstrlenW.KERNEL32(007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                  • Part of subcall function 00405456: lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,76F923A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                  • Part of subcall function 00405456: lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,76F923A0), ref: 004054B1
                                  • Part of subcall function 00405456: SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                  • Part of subcall function 00405456: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                  • Part of subcall function 00405456: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                  • Part of subcall function 00405456: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040210C
                                • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402189
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                • String ID:
                                • API String ID: 334405425-0
                                • Opcode ID: 5c833f01b377be5376766f2e6cb9e4f555552131171d122c413b7556d1d1ded2
                                • Instruction ID: a0686faca365a727748c0602422b19a99e1e577425e3ae8133f46283b43b75e6
                                • Opcode Fuzzy Hash: 5c833f01b377be5376766f2e6cb9e4f555552131171d122c413b7556d1d1ded2
                                • Instruction Fuzzy Hash: 63219671600104EBCF10AFA5CE49A9E7A71AF55358F70413BF515B91E0CBBD8E829A2E
                                APIs
                                • GlobalFree.KERNEL32(00000000), ref: 00401C0B
                                • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$AllocFree
                                • String ID: Call
                                • API String ID: 3394109436-1824292864
                                • Opcode ID: c08fe461fcbc7eb508863a6e274c322000732a28328c89134215c3cfb5836e23
                                • Instruction ID: 2334a48e4172ebb904b3f5af91f3a45bddc9a396230004d4704967bba2e99f69
                                • Opcode Fuzzy Hash: c08fe461fcbc7eb508863a6e274c322000732a28328c89134215c3cfb5836e23
                                • Instruction Fuzzy Hash: 822162736001109BDB20AF64DDC495A73B4AB18328725453BF952F72D0C6B8A8508BAD
                                APIs
                                • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402553
                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000000,00000011,00000002), ref: 004025F5
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CloseQueryValue
                                • String ID:
                                • API String ID: 3356406503-0
                                • Opcode ID: c4931dbd72d9995d666128c08bbc003a5423e9f1551f9922d5dd2e0fdbfca249
                                • Instruction ID: ca3dd7d1b7a13d3c8a9a28b827632004175b2a1fd75c59dcebef83c1aa991e75
                                • Opcode Fuzzy Hash: c4931dbd72d9995d666128c08bbc003a5423e9f1551f9922d5dd2e0fdbfca249
                                • Instruction Fuzzy Hash: 00113AB1911219EBDF14DFA4DE589AEB774FF04354B20843BE402B62D0D7B88A44DB6E
                                APIs
                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                                • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                                APIs
                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040244E
                                • RegCloseKey.ADVAPI32(00000000), ref: 00402457
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CloseDeleteValue
                                • String ID:
                                • API String ID: 2831762973-0
                                • Opcode ID: d01278e6f8cc288e6040235642a3087c6766f337411ac542237e970b9f885c9a
                                • Instruction ID: b1f28ea4fe1f397702134e154a5d50ad3aafc71d487b2ad51b946e19fd30fa70
                                • Opcode Fuzzy Hash: d01278e6f8cc288e6040235642a3087c6766f337411ac542237e970b9f885c9a
                                • Instruction Fuzzy Hash: 3CF09672A00120ABDB10AFA89B4DAAE73B5AF45314F12443FF651B71C1DAFC5D01963E
                                APIs
                                • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Window$EnableShow
                                • String ID:
                                • API String ID: 1136574915-0
                                • Opcode ID: a206bc09d31208a55ef0f8a5c470fd50e96019e1354e9f0dd429e4c405301b30
                                • Instruction ID: a2c3742fa11dc5cf357e4fc2c1b39d3237f925362780464401897514ce5169fc
                                • Opcode Fuzzy Hash: a206bc09d31208a55ef0f8a5c470fd50e96019e1354e9f0dd429e4c405301b30
                                • Instruction Fuzzy Hash: 64E09A72A042009FD704EFA4AE488AEB3B4EB90325B20497FE401F20C1CBB85D00862E
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: ed0fba548ae3e193f0e5ef583f5be9fd2d24872a13bb97bcc89e0a3ab6842b84
                                • Instruction ID: b2fefa23d47a0510f6e3c17d58d1e446f1e854612225740054352d4863a47d08
                                • Opcode Fuzzy Hash: ed0fba548ae3e193f0e5ef583f5be9fd2d24872a13bb97bcc89e0a3ab6842b84
                                • Instruction Fuzzy Hash: 5CE0BF76B24114ABCB18DFA8ED90C6E77B6EB95310720847AE512B3690C679AD10CB68
                                APIs
                                • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                  • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                  • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                                  • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                • String ID:
                                • API String ID: 2547128583-0
                                • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                                • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\02Eh1ah35H.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID:
                                • API String ID: 415043291-0
                                • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,?,00405AC4,?,?,00000000,00405C9A,?,?,?,?), ref: 00405EC4
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405ED8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                • Instruction ID: 9f802252afbb128bb6d2778500f244350c46036787b5d1505cff2c7139ff2394
                                • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                • Instruction Fuzzy Hash: 3CD0C9725055306BC2102728EE0C89BBB55EB64271B114A35F9A5A62B0CB304C528A98
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                                • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CreateDirectoryErrorLast
                                • String ID:
                                • API String ID: 1375471231-0
                                • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                                • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                                APIs
                                • CreateFileA.KERNELBASE(00000000), ref: 6D4A2BB7
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 4bcb9717e783afeb679455ec8030b92366da5576ebbb965e0db2f1dc56e9760a
                                • Instruction ID: f0f9254ea2215fec550b38de27fad037294769a95f01ad9ddd084509b23cd197
                                • Opcode Fuzzy Hash: 4bcb9717e783afeb679455ec8030b92366da5576ebbb965e0db2f1dc56e9760a
                                • Instruction Fuzzy Hash: C2418E71408215EFDB30EF66DAD4F6E3B74EB2A314F29942AD6048621CDB34DD41EAD1
                                APIs
                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                                • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                                APIs
                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                                APIs
                                • VirtualProtect.KERNELBASE(6D4A505C,00000004,00000040,6D4A504C), ref: 6D4A29FD
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: d51a6f6020852e9dd3b915f32401b97fa2ecc7677eee439d52af14f6993f1ccf
                                • Instruction ID: c0715d86b0a066f23b7cbc712d7db7bdad87ad04f82054c85eb3dd98fc862f4f
                                • Opcode Fuzzy Hash: d51a6f6020852e9dd3b915f32401b97fa2ecc7677eee439d52af14f6993f1ccf
                                • Instruction Fuzzy Hash: 23F092B054C2A0EECB50EF288664B2E3FF0B71F304B1D852AE148D624EE3748C44DB91
                                APIs
                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                                • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                                APIs
                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                                • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                                APIs
                                • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                APIs
                                • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                                • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                                APIs
                                • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CallbackDispatcherUser
                                • String ID:
                                • API String ID: 2492992576-0
                                • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                                • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                                APIs
                                • Sleep.KERNELBASE(00000000), ref: 004014EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 105fb3db34f0ab7e38f6648118bc74ea061e25b53dce703b88c99de24f5127b8
                                • Instruction ID: a18cf0c9a9b021ee27972f2e0a35f90bb7c2f66644072f7244457554decb08b2
                                • Opcode Fuzzy Hash: 105fb3db34f0ab7e38f6648118bc74ea061e25b53dce703b88c99de24f5127b8
                                • Instruction Fuzzy Hash: 0AD05EB3A201008BC700DFB8BE8545E73B8EA903193308837D452E2091E6B889518629
                                APIs
                                • GetDlgItem.USER32(?,000003FB), ref: 00404884
                                • SetWindowTextW.USER32(00000000,-007A9000), ref: 004048AE
                                • SHBrowseForFolderW.SHELL32(?), ref: 0040495F
                                • CoTaskMemFree.OLE32(00000000), ref: 0040496A
                                • lstrcmpiW.KERNEL32(Call,007A1F48,00000000,?,-007A9000), ref: 0040499C
                                • lstrcatW.KERNEL32(-007A9000,Call), ref: 004049A8
                                • SetDlgItemTextW.USER32(?,000003FB,-007A9000), ref: 004049BA
                                  • Part of subcall function 00405A38: GetDlgItemTextW.USER32(?,?,00000400,004049F1), ref: 00405A4B
                                  • Part of subcall function 0040669D: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                  • Part of subcall function 0040669D: CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                  • Part of subcall function 0040669D: CharNextW.USER32(?,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                  • Part of subcall function 0040669D: CharPrevW.USER32(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                • GetDiskFreeSpaceW.KERNEL32(0079FF18,?,?,0000040F,?,0079FF18,0079FF18,-007A9000,00000001,0079FF18,-007A9000,-007A9000,000003FB,-007A9000), ref: 00404A7D
                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A98
                                  • Part of subcall function 00404BF1: lstrlenW.KERNEL32(007A1F48,007A1F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,-007A9000), ref: 00404C92
                                  • Part of subcall function 00404BF1: wsprintfW.USER32 ref: 00404C9B
                                  • Part of subcall function 00404BF1: SetDlgItemTextW.USER32(?,007A1F48), ref: 00404CAE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires$Call
                                • API String ID: 2624150263-1928916289
                                • Opcode ID: d6791cdbf7c3281003b221a05808b40c9ad422951b6e996bdb0757aefb9ec102
                                • Instruction ID: 411b0bed4dd1c8854bcfe70218cd405116d93f5cc49f5f9e093397eef6854a11
                                • Opcode Fuzzy Hash: d6791cdbf7c3281003b221a05808b40c9ad422951b6e996bdb0757aefb9ec102
                                • Instruction Fuzzy Hash: 78A17FB1A00209ABDB11EFA5CD81AAF77B8EF84314F10843BF601B62D1D77C99418F69
                                APIs
                                  • Part of subcall function 6D4A121B: GlobalAlloc.KERNEL32(00000040,?,6D4A123B,?,6D4A12DF,00000019,6D4A11BE,-000000A0), ref: 6D4A1225
                                • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6D4A1C8D
                                • lstrcpyW.KERNEL32(00000008,?), ref: 6D4A1CD5
                                • lstrcpyW.KERNEL32(00000808,?), ref: 6D4A1CDF
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A1CF2
                                • GlobalFree.KERNEL32(?), ref: 6D4A1DD4
                                • GlobalFree.KERNEL32(?), ref: 6D4A1DD9
                                • GlobalFree.KERNEL32(?), ref: 6D4A1DDE
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A1FC8
                                • lstrcpyW.KERNEL32(?,?), ref: 6D4A2182
                                • GetModuleHandleW.KERNEL32(00000008), ref: 6D4A2201
                                • LoadLibraryW.KERNEL32(00000008), ref: 6D4A2212
                                • GetProcAddress.KERNEL32(?,?), ref: 6D4A226C
                                • lstrlenW.KERNEL32(00000808), ref: 6D4A2286
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                • String ID:
                                • API String ID: 245916457-0
                                • Opcode ID: 804005afbc10fd17dd5f51dfd56573a4b6a2651649fb728cbc5d65d27efce559
                                • Instruction ID: 2d2c99ea9d7d89b0237b8f44c42f7cef6e893cc4fb392fe7631042f3b8f35239
                                • Opcode Fuzzy Hash: 804005afbc10fd17dd5f51dfd56573a4b6a2651649fb728cbc5d65d27efce559
                                • Instruction Fuzzy Hash: D622C071D18246DEDB20CFA9C480EEEB7B0FB29315F68852ED165E7288DB709D81DB50
                                APIs
                                • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402221
                                Strings
                                • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires, xrefs: 00402261
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CreateInstance
                                • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\inspires
                                • API String ID: 542301482-1817558097
                                • Opcode ID: b4712aa48105cc69b095c3f87a81c369142c56c2de636fbf5eab3f9b3d428366
                                • Instruction ID: 318f5a272383e4943f9a7a1f828131c4cf43be91e798f39f03958dcf779540d2
                                • Opcode Fuzzy Hash: b4712aa48105cc69b095c3f87a81c369142c56c2de636fbf5eab3f9b3d428366
                                • Instruction Fuzzy Hash: 67412771A00208AFCF00DFE4C989A9E7BB6FF48304B2045AAF515EB2D1DB799981CB54
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402911
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: FileFindFirst
                                • String ID:
                                • API String ID: 1974802433-0
                                • Opcode ID: 9f6b3688567407df88bc885cd05bd46b036fdb5e920d3cf82a61260b0db69743
                                • Instruction ID: c1f6bc4fbd4392edc64dd94dfb26af21a0adc514685abdce03c7c09792edecab
                                • Opcode Fuzzy Hash: 9f6b3688567407df88bc885cd05bd46b036fdb5e920d3cf82a61260b0db69743
                                • Instruction Fuzzy Hash: FAF08CB1A00104ABC700DFA4DD499AEB378EF10324F70857BE911F21E0D7B89E109B3A
                                APIs
                                • GetDlgItem.USER32(?,000003F9), ref: 00404DC8
                                • GetDlgItem.USER32(?,00000408), ref: 00404DD5
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E21
                                • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404E38
                                • SetWindowLongW.USER32(?,000000FC,004053CA), ref: 00404E52
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E66
                                • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404E7A
                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404E8F
                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404E9B
                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EAD
                                • DeleteObject.GDI32(00000110), ref: 00404EB2
                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EDD
                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EE9
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F84
                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404FB4
                                  • Part of subcall function 00404379: SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FC8
                                • GetWindowLongW.USER32(?,000000F0), ref: 00404FF6
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405004
                                • ShowWindow.USER32(?,00000005), ref: 00405014
                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405115
                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405177
                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040518C
                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B0
                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D3
                                • ImageList_Destroy.COMCTL32(?), ref: 004051E8
                                • GlobalFree.KERNEL32(?), ref: 004051F8
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405271
                                • SendMessageW.USER32(?,00001102,?,?), ref: 0040531A
                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405329
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00405353
                                • ShowWindow.USER32(?,00000000), ref: 004053A1
                                • GetDlgItem.USER32(?,000003FE), ref: 004053AC
                                • ShowWindow.USER32(00000000), ref: 004053B3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                • String ID: $M$N
                                • API String ID: 2564846305-813528018
                                • Opcode ID: c3ac8b7f72e1706bd9280966f96f37ce41592bed6db73bdefb319f52e69f62e5
                                • Instruction ID: 7baa9a5517a4605733e15ddb68db2cf5b5f1e79b3ae63259faab1fa91bacf49a
                                • Opcode Fuzzy Hash: c3ac8b7f72e1706bd9280966f96f37ce41592bed6db73bdefb319f52e69f62e5
                                • Instruction Fuzzy Hash: 24127A70900609EFDB20CF65CC45AAF7BB5FB85314F10817AEA10BA2E1DB798951DF58
                                APIs
                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045A1
                                • GetDlgItem.USER32(?,000003E8), ref: 004045B5
                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045D2
                                • GetSysColor.USER32(?), ref: 004045E3
                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004045F1
                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004045FF
                                • lstrlenW.KERNEL32(?), ref: 00404604
                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404611
                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404626
                                • GetDlgItem.USER32(?,0000040A), ref: 0040467F
                                • SendMessageW.USER32(00000000), ref: 00404686
                                • GetDlgItem.USER32(?,000003E8), ref: 004046B1
                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004046F4
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404702
                                • SetCursor.USER32(00000000), ref: 00404705
                                • LoadCursorW.USER32(00000000,00007F00), ref: 0040471E
                                • SetCursor.USER32(00000000), ref: 00404721
                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404750
                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404762
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                • String ID: Call$N$zD@
                                • API String ID: 3103080414-4182535457
                                • Opcode ID: edd6e1ed575ff481441806d0cdfc4cc3cbf57af2bc668ca3fdfe935b7b56bb3e
                                • Instruction ID: a130e1d57a17a91ade9f3fb54c611fa5fc44c03720afd6b67d12dead6e9fe9b9
                                • Opcode Fuzzy Hash: edd6e1ed575ff481441806d0cdfc4cc3cbf57af2bc668ca3fdfe935b7b56bb3e
                                • Instruction Fuzzy Hash: 3D6181B1900209BFDB10AF60DD85E6A7BA9FB85354F00803AFB05B72D1C778A951CF99
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,?,?), ref: 00406075
                                • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                                  • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E59
                                  • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E8B
                                • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                                • wsprintfA.USER32 ref: 004060B9
                                • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?,?,?,?,?), ref: 004060F4
                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406103
                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040613B
                                • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                                • GlobalFree.KERNEL32(00000000), ref: 004061A2
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A9
                                  • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\02Eh1ah35H.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                  • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                • String ID: %ls=%ls$[Rename]$Uz$]z$]z
                                • API String ID: 2171350718-2304911260
                                • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                                • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                                APIs
                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                • BeginPaint.USER32(?,?), ref: 00401047
                                • GetClientRect.USER32(?,?), ref: 0040105B
                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                • DeleteObject.GDI32(?), ref: 004010ED
                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                • DrawTextW.USER32(00000000,007A7A60,000000FF,00000010,00000820), ref: 00401156
                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                • DeleteObject.GDI32(?), ref: 00401165
                                • EndPaint.USER32(?,?), ref: 0040116E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                • String ID: F
                                • API String ID: 941294808-1304234792
                                • Opcode ID: 88f198494482b5c6c442ae986b6c1e2dc60a71cbe67cc352e3a5a4066e9850df
                                • Instruction ID: d956376f91ba3d110af617c57d1628f0fb3f6748c3ab60faf4ed9a16e53922cc
                                • Opcode Fuzzy Hash: 88f198494482b5c6c442ae986b6c1e2dc60a71cbe67cc352e3a5a4066e9850df
                                • Instruction Fuzzy Hash: 78418B71800209AFCF058FA5CE459AF7BB9FF45315F00802AF991AA1A0CB389A55DFA4
                                APIs
                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                • CharNextW.USER32(?,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                • CharPrevW.USER32(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\02Eh1ah35H.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                                • "C:\Users\user\Desktop\02Eh1ah35H.exe", xrefs: 0040669D
                                • *?|<>/":, xrefs: 004066EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Char$Next$Prev
                                • String ID: "C:\Users\user\Desktop\02Eh1ah35H.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 589700163-2442422335
                                • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                                • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                                APIs
                                • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                                • GetSysColor.USER32(00000000), ref: 00404406
                                • SetTextColor.GDI32(?,00000000), ref: 00404412
                                • SetBkMode.GDI32(?,?), ref: 0040441E
                                • GetSysColor.USER32(?), ref: 00404431
                                • SetBkColor.GDI32(?,?), ref: 00404441
                                • DeleteObject.GDI32(?), ref: 0040445B
                                • CreateBrushIndirect.GDI32(?), ref: 00404465
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                • String ID:
                                • API String ID: 2320649405-0
                                • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                                • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                                APIs
                                • ReadFile.KERNEL32(?,?,?,?), ref: 00402750
                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 0040278B
                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027AE
                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027C4
                                  • Part of subcall function 00405FC5: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FDB
                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402870
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                • String ID: 9
                                • API String ID: 163830602-2366072709
                                • Opcode ID: 9ec651210d820e9b24df916f481368169d6e1ca8bc1240ea0af3f2247977670f
                                • Instruction ID: d74bd8ffb6d519048d690203a29de729842be89db78b0864c200dffe12222895
                                • Opcode Fuzzy Hash: 9ec651210d820e9b24df916f481368169d6e1ca8bc1240ea0af3f2247977670f
                                • Instruction Fuzzy Hash: 1451F875D00219ABDF20DF95CA89AAEBB79FF04304F10817BE501B62D0E7B49D82CB58
                                APIs
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D1A
                                • GetMessagePos.USER32 ref: 00404D22
                                • ScreenToClient.USER32(?,?), ref: 00404D3C
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D4E
                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D74
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Message$Send$ClientScreen
                                • String ID: f
                                • API String ID: 41195575-1993550816
                                • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                • Instruction ID: 46b4da8a0d4c37396bcf421d2915c418c0d79b1a62bcd48facf8de7c649397b3
                                • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                • Instruction Fuzzy Hash: 80015E7190021DBADB00DBA4DD85FFEBBBCAF54711F10012BBB50B61D0DBB4AA058BA5
                                APIs
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6D4A2238,?,00000808), ref: 6D4A1635
                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6D4A2238,?,00000808), ref: 6D4A163C
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6D4A2238,?,00000808), ref: 6D4A1650
                                • GetProcAddress.KERNEL32(8"Jm,00000000), ref: 6D4A1657
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A1660
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                • String ID: 8"Jm
                                • API String ID: 1148316912-377956278
                                • Opcode ID: 7dd5046844410af2ea9ee647d115651ed5e9361a3d5661b0e3baf759a5a5d56a
                                • Instruction ID: eb473c422ec2ed8191d6c4cfdd49507b1775a4c3a9d1ea16242e73fcc3d53fc1
                                • Opcode Fuzzy Hash: 7dd5046844410af2ea9ee647d115651ed5e9361a3d5661b0e3baf759a5a5d56a
                                • Instruction Fuzzy Hash: 1EF0A27210A1387BDA212AAACC4CD9FBEACDF8F2F5B150215F71C911948A619D01D7F1
                                APIs
                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                • MulDiv.KERNEL32(0006BA15,00000064,0006BC19), ref: 00402F74
                                • wsprintfW.USER32 ref: 00402F84
                                • SetWindowTextW.USER32(?,?), ref: 00402F94
                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                Strings
                                • verifying installer: %d%%, xrefs: 00402F7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Text$ItemTimerWindowwsprintf
                                • String ID: verifying installer: %d%%
                                • API String ID: 1451636040-82062127
                                • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                                • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                                APIs
                                  • Part of subcall function 6D4A121B: GlobalAlloc.KERNEL32(00000040,?,6D4A123B,?,6D4A12DF,00000019,6D4A11BE,-000000A0), ref: 6D4A1225
                                • GlobalFree.KERNEL32(?), ref: 6D4A26A3
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A26D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: 65180c48078e4656d6cfb5969b088c52ed57c213c3496959658ffdd9cc959a5e
                                • Instruction ID: 545faa91da2bc3fcffba7caad64c5a9a6f5798ca9ab4a8a13e272e6a21df1ed7
                                • Opcode Fuzzy Hash: 65180c48078e4656d6cfb5969b088c52ed57c213c3496959658ffdd9cc959a5e
                                • Instruction Fuzzy Hash: CD31AD31509112EFDB259F66C9E4D2E7BB6FBA630432D512DE20597258CF30DC05EB61
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 0040299B
                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029B7
                                • GlobalFree.KERNEL32(?), ref: 004029F0
                                • GlobalFree.KERNEL32(00000000), ref: 00402A03
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402A1B
                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402A2F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                • String ID:
                                • API String ID: 2667972263-0
                                • Opcode ID: 9a7f16dab41c655e637aa095d71f48b0dcdd0dbed15c15d8c7bb14721209ca4d
                                • Instruction ID: a183675b87451ddc5318bffc5c3e349b28a5858cebf66036b341c16136851789
                                • Opcode Fuzzy Hash: 9a7f16dab41c655e637aa095d71f48b0dcdd0dbed15c15d8c7bb14721209ca4d
                                • Instruction Fuzzy Hash: B521AE71800124BBDF216FA5DE4999F7E79EF04364F10023AF560762E1CB784D419B98
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: FreeGlobal
                                • String ID:
                                • API String ID: 2979337801-0
                                • Opcode ID: 8ec6db4a3331fcf45760873a4a83613b86b2b46349f4a6811e22a0c138ba2f92
                                • Instruction ID: c204cc67e1b5b8ac589c2cb6f2cd1861a6e84cfa91dbe9a7e9d1d31e970a8f92
                                • Opcode Fuzzy Hash: 8ec6db4a3331fcf45760873a4a83613b86b2b46349f4a6811e22a0c138ba2f92
                                • Instruction Fuzzy Hash: B251D332D1C05A9BCB11DFA88480DBEBABAFB75354F2D8259D504A330CD7709E82C791
                                APIs
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A2522
                                  • Part of subcall function 6D4A122C: lstrcpynW.KERNEL32(00000000,?,6D4A12DF,00000019,6D4A11BE,-000000A0), ref: 6D4A123C
                                • GlobalAlloc.KERNEL32(00000040), ref: 6D4A24A8
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6D4A24C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                • String ID:
                                • API String ID: 4216380887-0
                                • Opcode ID: ad50d541f2a7e5d1742f362a0270efff0ae43a9bde634a3db678dace38070369
                                • Instruction ID: 155308dcc48c7235cb7c58c53e9bdca2c599d98ac228849526765403ed7b6a58
                                • Opcode Fuzzy Hash: ad50d541f2a7e5d1742f362a0270efff0ae43a9bde634a3db678dace38070369
                                • Instruction Fuzzy Hash: 0341E4B140C306DFD724DF6AC890E6A77F8FB6A304F18881DE5499A589DF309D41DBA1
                                APIs
                                • GetDlgItem.USER32(?,?), ref: 00401D9A
                                • GetClientRect.USER32(?,?), ref: 00401DE5
                                • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                • DeleteObject.GDI32(00000000), ref: 00401E39
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                • String ID:
                                • API String ID: 1849352358-0
                                • Opcode ID: 72141a0695bd09deaf038b4057165ceb7fe748d1dd496bc1742fd2fda8c47cb7
                                • Instruction ID: b40b93da7826e3b7615b819c1b58470e7634271ab5df736de73e72df9abaa9c9
                                • Opcode Fuzzy Hash: 72141a0695bd09deaf038b4057165ceb7fe748d1dd496bc1742fd2fda8c47cb7
                                • Instruction Fuzzy Hash: 1521F572904119AFCB05DFA4DE45AEEBBB5EB08304F14403AF945F62A0CB389D51DB99
                                APIs
                                • GetDC.USER32(?), ref: 00401E51
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CapsCreateDeviceFontIndirectRelease
                                • String ID:
                                • API String ID: 3808545654-0
                                • Opcode ID: a771a12b6b1f9eb28fc4aa732c56658ca34c83768ad7333c3b90bf9ccbdf4b02
                                • Instruction ID: e0f466a359637f901669b8d4edcb0a2768f8d1cf7dbd19b4a84ec7a1be175679
                                • Opcode Fuzzy Hash: a771a12b6b1f9eb28fc4aa732c56658ca34c83768ad7333c3b90bf9ccbdf4b02
                                • Instruction Fuzzy Hash: 3301D871950651EFEB006BB4AE89BDA3FB0AF15300F10493AF141B71E2C6B90404DB2D
                                APIs
                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: MessageSend$Timeout
                                • String ID: !
                                • API String ID: 1777923405-2657877971
                                • Opcode ID: 979e86d2c84321a506bd374142032a088a90d10552bd354102554aa37ba48567
                                • Instruction ID: 189cbaabe8764c773f58747126bd63a1e8498669fac95269da527f62f649557f
                                • Opcode Fuzzy Hash: 979e86d2c84321a506bd374142032a088a90d10552bd354102554aa37ba48567
                                • Instruction Fuzzy Hash: EE21AD7195420AAEEF05AFB4DD4AAAE7BB0EF44304F10453EF601B61D1D7B84941CBA8
                                APIs
                                • lstrlenW.KERNEL32(007A1F48,007A1F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,-007A9000), ref: 00404C92
                                • wsprintfW.USER32 ref: 00404C9B
                                • SetDlgItemTextW.USER32(?,007A1F48), ref: 00404CAE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: ItemTextlstrlenwsprintf
                                • String ID: %u.%u%s%s
                                • API String ID: 3540041739-3551169577
                                • Opcode ID: 37836083cc55521027f8373fcaefe3c58d3b132896e9bd9a1ff8b63297692a70
                                • Instruction ID: 3d6b25ca05220dcf043cb3c1ab85a77e0c97cb6522f385c7b59333deb0f41e84
                                • Opcode Fuzzy Hash: 37836083cc55521027f8373fcaefe3c58d3b132896e9bd9a1ff8b63297692a70
                                • Instruction Fuzzy Hash: 4811EB736041283BEB00A5AD9D45EDE3688DBC5334F254637FA26F31D1E978C81182E8
                                APIs
                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000023,00000011,00000002), ref: 004024CD
                                • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000000,00000011,00000002), ref: 0040250D
                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000000,00000011,00000002), ref: 004025F5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CloseValuelstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp
                                • API String ID: 2655323295-4001973324
                                • Opcode ID: 7daaa867e9da28a2930db7b37df5dfdc19be89cd1d3ff8a61dbf0427a346cfd9
                                • Instruction ID: b5ab21fa5db9dca98c90a3684f9c4c1c94415ceb852b3cd4d8f68548cc0c41e7
                                • Opcode Fuzzy Hash: 7daaa867e9da28a2930db7b37df5dfdc19be89cd1d3ff8a61dbf0427a346cfd9
                                • Instruction Fuzzy Hash: D311AF71E00108BEEB00AFA5CE49AAE7BB9EF44314F20443AF514B71D1D6B88D409668
                                APIs
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                  • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,?,00405DE2,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                                • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp
                                • API String ID: 3248276644-1273951999
                                • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                                • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE
                                APIs
                                • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,?,00405DE2,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                • CharNextW.USER32(00000000), ref: 00405D81
                                • CharNextW.USER32(00000000), ref: 00405D99
                                Strings
                                • C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp, xrefs: 00405D6F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CharNext
                                • String ID: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp
                                • API String ID: 3213498283-4001973324
                                • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                                • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                                • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CharPrevlstrcatlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 2659869361-297319885
                                • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                                • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                                APIs
                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dll), ref: 0040268D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: lstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp$C:\Users\user\AppData\Local\Temp\nsbBEAE.tmp\System.dll
                                • API String ID: 1659193697-3945793924
                                • Opcode ID: bd38f659e256a09bfdae8fa8d4f0e721d731d784e9f16bc2970e2de0a2b6f4fc
                                • Instruction ID: b6edfc9972aa644188961ebceaa73704b58c28032334693464610e5b401fed5f
                                • Opcode Fuzzy Hash: bd38f659e256a09bfdae8fa8d4f0e721d731d784e9f16bc2970e2de0a2b6f4fc
                                • Instruction Fuzzy Hash: CF110D71A10305AACB00ABB08F4AAAE77719F55748F61443FF502F61C1D6FC4951565E
                                APIs
                                • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                • GetTickCount.KERNEL32 ref: 00402FE2
                                • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                • String ID:
                                • API String ID: 2102729457-0
                                • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                                • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                                APIs
                                • IsWindowVisible.USER32(?), ref: 004053F9
                                • CallWindowProcW.USER32(?,?,?,?), ref: 0040544A
                                  • Part of subcall function 00404390: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Window$CallMessageProcSendVisible
                                • String ID:
                                • API String ID: 3748168415-3916222277
                                • Opcode ID: 63f07d3bfe87a358a7903b8c4052eed0806f84f2521abbc8f8e3291c3210bf1f
                                • Instruction ID: 5f6fd1bc1cb6019f344e496d8f57972e5ce8a9055d244d91c322c77d39ebf2aa
                                • Opcode Fuzzy Hash: 63f07d3bfe87a358a7903b8c4052eed0806f84f2521abbc8f8e3291c3210bf1f
                                • Instruction Fuzzy Hash: 63018431101608AFEF205F11DD80BDB3725EB95355F508037FA00762E1C77A8C919A6D
                                APIs
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                                • RegCloseKey.ADVAPI32(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CloseQueryValue
                                • String ID: Call
                                • API String ID: 3356406503-1824292864
                                • Opcode ID: e4d53d9119acc97e3ded4dfe14f35fc16891fc75654ca884eca869e70a2bebda
                                • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                                • Opcode Fuzzy Hash: e4d53d9119acc97e3ded4dfe14f35fc16891fc75654ca884eca869e70a2bebda
                                • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4
                                APIs
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                                • CloseHandle.KERNEL32(?), ref: 00405A0D
                                Strings
                                • Error launching installer, xrefs: 004059EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CloseCreateHandleProcess
                                • String ID: Error launching installer
                                • API String ID: 3712363035-66219284
                                • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                                • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                                APIs
                                • FreeLibrary.KERNEL32(6D4A0000,76F93420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                                • GlobalFree.KERNEL32(00A2FB38), ref: 00403A49
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Free$GlobalLibrary
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 1100898210-297319885
                                • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                                • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\02Eh1ah35H.exe,C:\Users\user\Desktop\02Eh1ah35H.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\02Eh1ah35H.exe,C:\Users\user\Desktop\02Eh1ah35H.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: CharPrevlstrlen
                                • String ID: C:\Users\user\Desktop
                                • API String ID: 2709904686-2743851969
                                • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                                • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 6D4A116A
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A11C7
                                • GlobalFree.KERNEL32(00000000), ref: 6D4A11D9
                                • GlobalFree.KERNEL32(?), ref: 6D4A1203
                                Memory Dump Source
                                • Source File: 00000000.00000002.3822713846.000000006D4A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D4A0000, based on PE: true
                                • Associated: 00000000.00000002.3822691187.000000006D4A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822729792.000000006D4A4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.3822747209.000000006D4A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d4a0000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: f26ec22045d1a3df23ff1619d7bfb0178d76d44720f2b9ca2b04ec01963e54f7
                                • Instruction ID: a59a67f107b71ec4c4c8b553c6ba8f35bdb0368252ab0441a75abd7ad664ce77
                                • Opcode Fuzzy Hash: f26ec22045d1a3df23ff1619d7bfb0178d76d44720f2b9ca2b04ec01963e54f7
                                • Instruction Fuzzy Hash: 253163B25082129BDB00DF68C955E397BF8FB6A350B1D4519E944E725CE774DC01C7A0
                                APIs
                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E59
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                                • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E82
                                • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E8B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3819777383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.3819760678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819797897.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3819818423.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3820197544.00000000007C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_02Eh1ah35H.jbxd
                                Similarity
                                • API ID: lstrlen$CharNextlstrcmpi
                                • String ID:
                                • API String ID: 190613189-0
                                • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                                • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9