Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
STjk6HCD1P.exe

Overview

General Information

Sample name:STjk6HCD1P.exe
renamed because original name is a hash value
Original sample name:c75b5515952ea615219e1991c4592236.exe
Analysis ID:1445944
MD5:c75b5515952ea615219e1991c4592236
SHA1:2ade0a6c621b36f727e461059c3cdf2126d4bfca
SHA256:2b3aa9f8d949be0919837b8f00c79700c0db437a6a8f042fcff2ec4b2c03c584
Tags:exe
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • STjk6HCD1P.exe (PID: 3744 cmdline: "C:\Users\user\Desktop\STjk6HCD1P.exe" MD5: C75B5515952EA615219E1991C4592236)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: STjk6HCD1P.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: STjk6HCD1P.exeStatic PE information: certificate valid
Source: STjk6HCD1P.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00406435 FindFirstFileA,FindClose,0_2_00406435
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00405889 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405889
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: STjk6HCD1P.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: STjk6HCD1P.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00405326 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405326
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_6E441D68 GetDlgCtrlID,OpenClipboard,GetClipboardData,GlobalLock,lstrlenA,SendMessageA,GlobalUnlock,CloseClipboard,CallWindowProcA,0_2_6E441D68
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00403312 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403312
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_004067BE0_2_004067BE
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_6E491A980_2_6E491A98
Source: STjk6HCD1P.exe, 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameKsodrSetup.exe2 vs STjk6HCD1P.exe
Source: STjk6HCD1P.exeBinary or memory string: OriginalFilenameKsodrSetup.exe2 vs STjk6HCD1P.exe
Source: STjk6HCD1P.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: clean5.winEXE@1/4@1/0
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00403312 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403312
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_004045D7 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004045D7
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
Source: C:\Users\user\Desktop\STjk6HCD1P.exeMutant created: \Sessions\1\BaseNamedObjects\{53172BE5-3880-4172-A62C-B5EB4447E1DB}
Source: C:\Users\user\Desktop\STjk6HCD1P.exeMutant created: \Sessions\1\BaseNamedObjects\------------ksodr setup------------
Source: C:\Users\user\Desktop\STjk6HCD1P.exeFile created: C:\Users\user\AppData\Local\Temp\nsd6C9.tmpJump to behavior
Source: STjk6HCD1P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\STjk6HCD1P.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeFile read: C:\Users\user\Desktop\STjk6HCD1P.exeJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeFile written: C:\Users\user\AppData\Local\Temp\nsj786.tmp\ioSpecial.iniJump to behavior
Source: STjk6HCD1P.exeStatic PE information: certificate valid
Source: STjk6HCD1P.exeStatic file information: File size 45208600 > 1048576
Source: STjk6HCD1P.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_6E491A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6E491A98
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_6E492F60 push eax; ret 0_2_6E492F8E
Source: C:\Users\user\Desktop\STjk6HCD1P.exeFile created: C:\Users\user\AppData\Local\Temp\nsj786.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\STjk6HCD1P.exeFile created: C:\Users\user\AppData\Local\Temp\nsj786.tmp\InstallOptions.dllJump to dropped file
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_6E44140B wsprintfA,lstrcpyA,GetPrivateProfileStringA,lstrcpyA,CharNextA,0_2_6E44140B
Source: C:\Users\user\Desktop\STjk6HCD1P.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\STjk6HCD1P.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj786.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\STjk6HCD1P.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj786.tmp\InstallOptions.dllJump to dropped file
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00406435 FindFirstFileA,FindClose,0_2_00406435
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00405889 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405889
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
Source: C:\Users\user\Desktop\STjk6HCD1P.exeAPI call chain: ExitProcess graph end nodegraph_0-5020
Source: C:\Users\user\Desktop\STjk6HCD1P.exeAPI call chain: ExitProcess graph end nodegraph_0-5195
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_6E491A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6E491A98
Source: C:\Users\user\Desktop\STjk6HCD1P.exeCode function: 0_2_00403312 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403312
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping3
File and Directory Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory3
System Information Discovery
Remote Desktop Protocol2
Clipboard Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
STjk6HCD1P.exe4%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsj786.tmp\InstallOptions.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsj786.tmp\System.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
171.39.242.20.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorSTjk6HCD1P.exefalse
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorSTjk6HCD1P.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1445944
    Start date and time:2024-05-22 20:10:20 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:STjk6HCD1P.exe
    renamed because original name is a hash value
    Original Sample Name:c75b5515952ea615219e1991c4592236.exe
    Detection:CLEAN
    Classification:clean5.winEXE@1/4@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 48
    • Number of non-executed functions: 39
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: STjk6HCD1P.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsj786.tmp\System.dllSecuriteInfo.com.Heur.29658.32746.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Heur.29658.32746.exeGet hashmaliciousUnknownBrowse
        hd2018 v1.0.35.exeGet hashmaliciousUnknownBrowse
          https://sourceforge.net/projects/docfetcher/files/docfetcher/1.1.25/docfetcher_1.1.25_win32_setup.exe/downloadGet hashmaliciousUnknownBrowse
            ocs-office.exeGet hashmaliciousUnknownBrowse
              KONTRAKT 2456325670-pdf.exeGet hashmaliciousUnknownBrowse
                geobase.exeGet hashmaliciousUnknownBrowse
                  MDE_File_Sample_6c33b1c2e09d85df2a40f639249fcd58a9b2532f3c1157367d33927c7f2c4444.zipGet hashmaliciousUnknownBrowse
                    PAYNOW_2023_08_002783pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      PAYNOW_2023_08_002783pdf.exeGet hashmaliciousGuLoaderBrowse
                        C:\Users\user\AppData\Local\Temp\nsj786.tmp\InstallOptions.dllSecuriteInfo.com.Heur.29658.32746.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Heur.29658.32746.exeGet hashmaliciousUnknownBrowse
                            hd2018 v1.0.35.exeGet hashmaliciousUnknownBrowse
                              Setup.exeGet hashmaliciousUnknownBrowse
                                1dGBb5N0oG.exeGet hashmaliciousAsyncRATBrowse
                                  Uninstall.exeGet hashmaliciousUnknownBrowse
                                    WebCubeAgentSetup.exeGet hashmaliciousUnknownBrowse
                                      683A2C5A072FF18213A03D08456CD84CAD5A3BB1312D1.exeGet hashmaliciousUnknownBrowse
                                        2DAAD8278E0DDD4D247303ACED4B1D41C75CE94BE3A9E.exeGet hashmaliciousUnknownBrowse
                                          Process:C:\Users\user\Desktop\STjk6HCD1P.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):14848
                                          Entropy (8bit):5.559990598476678
                                          Encrypted:false
                                          SSDEEP:192:E4n3T5aK+dHCMR1aQR9RuZl3WWmU7WYZsw1JpVGnrjaK72dwF7dBOne:tn3T5KdHCMRD/R1cOnrja+BO
                                          MD5:5F35212D7E90EE622B10BE39B09BD270
                                          SHA1:C4BC9593902ADF6DAAEF37E456DC6100D50D0925
                                          SHA-256:31944B93E44301974D9C6F810D2DA792E34A53DCACD619A08CB0385AC59E513D
                                          SHA-512:7514810367F56D994C6D5703B56AC16124FAB5DFDCFBE337D4413274C1FF9037A2EE623E49AB2FB6227412AB29FCC49A3ADA1391910D44C2B5DE0ADEB3E7C2F0
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: SecuriteInfo.com.Heur.29658.32746.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Heur.29658.32746.exe, Detection: malicious, Browse
                                          • Filename: hd2018 v1.0.35.exe, Detection: malicious, Browse
                                          • Filename: Setup.exe, Detection: malicious, Browse
                                          • Filename: 1dGBb5N0oG.exe, Detection: malicious, Browse
                                          • Filename: Uninstall.exe, Detection: malicious, Browse
                                          • Filename: WebCubeAgentSetup.exe, Detection: malicious, Browse
                                          • Filename: 683A2C5A072FF18213A03D08456CD84CAD5A3BB1312D1.exe, Detection: malicious, Browse
                                          • Filename: 2DAAD8278E0DDD4D247303ACED4B1D41C75CE94BE3A9E.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L.p|.q./.q./.q./.q./Bq./.~C/.q./\R./.q./\R//.q./.w./.q./.Q./.q./Rich.q./........................PE..L...|.$_...........!.........<.......).......0............................................@......................... 8..p...<1.......p..........................D....................................................0..<............................text...K........................... ..`.rdata.......0....... ..............@..@.data... (...@.......*..............@....rsrc........p.......2..............@..@.reloc..B............4..............@..B........................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\STjk6HCD1P.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):11776
                                          Entropy (8bit):5.855045165595541
                                          Encrypted:false
                                          SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                          MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                          SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                          SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                          SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: SecuriteInfo.com.Heur.29658.32746.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Heur.29658.32746.exe, Detection: malicious, Browse
                                          • Filename: hd2018 v1.0.35.exe, Detection: malicious, Browse
                                          • Filename: , Detection: malicious, Browse
                                          • Filename: ocs-office.exe, Detection: malicious, Browse
                                          • Filename: KONTRAKT 2456325670-pdf.exe, Detection: malicious, Browse
                                          • Filename: geobase.exe, Detection: malicious, Browse
                                          • Filename: MDE_File_Sample_6c33b1c2e09d85df2a40f639249fcd58a9b2532f3c1157367d33927c7f2c4444.zip, Detection: malicious, Browse
                                          • Filename: PAYNOW_2023_08_002783pdf.exe, Detection: malicious, Browse
                                          • Filename: PAYNOW_2023_08_002783pdf.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\STjk6HCD1P.exe
                                          File Type:Generic INItialization configuration [Field 1]
                                          Category:dropped
                                          Size (bytes):642
                                          Entropy (8bit):6.385736718316872
                                          Encrypted:false
                                          SSDEEP:12:lOu8dfAgQRvAYfnwh8mO4gNhJ2uijj4gNDBivup3SbY5Gzn:6kRvAYfnwh8mO1Ncj1ZBivu4uGzn
                                          MD5:94740F4A460E681D8A2D8049BB60E15E
                                          SHA1:0341DA4ECD78CF25C1CE8D5F1AF9CD4769B17B82
                                          SHA-256:C478BD3110458BBB3821C99709F6A199D5EE4EF545834FA2C7EDB72D703CAEE8
                                          SHA-512:E9FBFC4310A4D371C299FE699426C55529853A94EC12639A79268BA5729845ABB4DE190EA229B57DBBC0C2D6D5289A527D752D831FE39376D2DCDE7C8047BD14
                                          Malicious:false
                                          Reputation:low
                                          Preview:[Settings]..Rect=1044..NumFields=3..RTL=0..NextButtonText=..CancelEnabled=..[Field 1]..Type=bitmap..Left=0..Right=109..Top=0..Bottom=193..Flags=RESIZETOFIT..Text=C:\Users\user\AppData\Local\Temp\nsj786.tmp\modern-wizard.bmp..HWND=66696..[Field 2]..Type=label..Left=120..Right=315..Top=10..Text=............................Bottom=38..HWND=66698..[Field 3]..Type=label..Left=120..Right=315..Top=45..Bottom=185..Text=.......................................\r\n\r\n......................................................................................\r\n\r\n.... [.....(N)] ........HWND=66700..
                                          Process:C:\Users\user\Desktop\STjk6HCD1P.exe
                                          File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
                                          Category:dropped
                                          Size (bytes):26494
                                          Entropy (8bit):1.9568109962493656
                                          Encrypted:false
                                          SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
                                          MD5:CBE40FD2B1EC96DAEDC65DA172D90022
                                          SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
                                          SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
                                          SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.999156422153217
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:STjk6HCD1P.exe
                                          File size:45'208'600 bytes
                                          MD5:c75b5515952ea615219e1991c4592236
                                          SHA1:2ade0a6c621b36f727e461059c3cdf2126d4bfca
                                          SHA256:2b3aa9f8d949be0919837b8f00c79700c0db437a6a8f042fcff2ec4b2c03c584
                                          SHA512:65686328dc3ccec012871be9a1dcdc0aee0b0337ddf2ceeb689c4427a7a626091153a296a24ff4108dcca4e6247c2505e9375057172c56584f75dc82de4acb61
                                          SSDEEP:786432:fV/UMe6yXkT3cCJ8FI5G4FtOOVPILJ8G+WwwlavmeeOEcI0wP0XECxgejlot:fVsMgXB2wpO1ILCTwlavmdOTLUCxLot
                                          TLSH:A1A733825A52EBD5CD0A95B1D093DFDAC3B2AE39D94D5C446CC673920CAFE12023F627
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L.....$_.................b...........3............@
                                          Icon Hash:58787ce686ccf0c4
                                          Entrypoint:0x403312
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x5F24D6A7 [Sat Aug 1 02:42:47 2020 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:ced282d9b261d1462772017fe2f6972b
                                          Signature Valid:true
                                          Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                          Signature Validation Error:The operation completed successfully
                                          Error Number:0
                                          Not Before, Not After
                                          • 14/10/2021 01:00:00 17/10/2024 00:59:59
                                          Subject Chain
                                          • CN="Zhuhai Kingsoft Office Software Co., Ltd.", O="Zhuhai Kingsoft Office Software Co., Ltd.", L=\u73e0\u6d77\u5e02, S=\u5e7f\u4e1c\u7701, C=CN
                                          Version:3
                                          Thumbprint MD5:DA43D378BBB1A0C48EBE7974BC4570F6
                                          Thumbprint SHA-1:F4CB57DB2BE6530631B1346E181CE63B926A3553
                                          Thumbprint SHA-256:B802830546A68BC260F4AC3CC9533ED1BCD8621081F5FF35E9E68CF33679BB1E
                                          Serial:05A81D3B96270D9A1DEB07CD8867D0A9
                                          Instruction
                                          sub esp, 00000184h
                                          push ebx
                                          push esi
                                          push edi
                                          xor ebx, ebx
                                          push 00008001h
                                          mov dword ptr [esp+18h], ebx
                                          mov dword ptr [esp+10h], 0040A198h
                                          mov dword ptr [esp+20h], ebx
                                          mov byte ptr [esp+14h], 00000020h
                                          call dword ptr [004080B8h]
                                          call dword ptr [004080BCh]
                                          and eax, BFFFFFFFh
                                          cmp ax, 00000006h
                                          mov dword ptr [0042472Ch], eax
                                          je 00007F81A9450E23h
                                          push ebx
                                          call 00007F81A9453F86h
                                          cmp eax, ebx
                                          je 00007F81A9450E19h
                                          push 00000C00h
                                          call eax
                                          mov esi, 004082A0h
                                          push esi
                                          call 00007F81A9453F02h
                                          push esi
                                          call dword ptr [004080CCh]
                                          lea esi, dword ptr [esi+eax+01h]
                                          cmp byte ptr [esi], bl
                                          jne 00007F81A9450DFDh
                                          push 0000000Bh
                                          call 00007F81A9453F5Ah
                                          push 00000009h
                                          call 00007F81A9453F53h
                                          push 00000007h
                                          mov dword ptr [00424724h], eax
                                          call 00007F81A9453F47h
                                          cmp eax, ebx
                                          je 00007F81A9450E21h
                                          push 0000001Eh
                                          call eax
                                          test eax, eax
                                          je 00007F81A9450E19h
                                          or byte ptr [0042472Fh], 00000040h
                                          push ebp
                                          call dword ptr [00408038h]
                                          push ebx
                                          call dword ptr [00408288h]
                                          mov dword ptr [004247F8h], eax
                                          push ebx
                                          lea eax, dword ptr [esp+38h]
                                          push 00000160h
                                          push eax
                                          push ebx
                                          push 0041FCE8h
                                          call dword ptr [0040816Ch]
                                          push 0040A188h
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84380xa0.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2f0000x48728.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x2b18b880x4890
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x60d50x620083acff9b8bf5b52f9975f8acdcabf744False0.6630660076530612data6.4176717642026535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x80000x12740x1400b8e42f3d3b81b0e2a4080ab31bc2d1f4False0.4337890625data5.061067348371254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0xa0000x1a8380x600599a2f85a30bf72bff5e1c2e854c43eeFalse0.4361979166666667data3.9951628803851107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x250000xa0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x2f0000x487280x48800c49e56e0fce0482c864cc23eb005f867False0.19864964978448277data5.465499503098057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x2f3280x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.17513758617628783
                                          RT_ICON0x713500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.1937759336099585
                                          RT_ICON0x738f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6428236397748592
                                          RT_ICON0x749a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5543710021321961
                                          RT_ICON0x758480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.694043321299639
                                          RT_ICON0x760f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5122832369942196
                                          RT_ICON0x766580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7340425531914894
                                          RT_DIALOG0x76ac00x10cdataEnglishUnited States0.5111940298507462
                                          RT_DIALOG0x76bd00x1eedataEnglishUnited States0.3866396761133603
                                          RT_DIALOG0x76dc00xe4dataEnglishUnited States0.6359649122807017
                                          RT_DIALOG0x76ea80xdadataEnglishUnited States0.6376146788990825
                                          RT_GROUP_ICON0x76f880x68dataEnglishUnited States0.6826923076923077
                                          RT_VERSION0x76ff00x304dataChineseChina0.538860103626943
                                          RT_MANIFEST0x772f80x430XML 1.0 document, ASCII text, with very long lines (1072), with no line terminatorsEnglishUnited States0.5139925373134329
                                          DLLImport
                                          ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                          SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                          ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                          USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          ChineseChina
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 22, 2024 20:11:44.710938931 CEST5363509162.159.36.2192.168.2.4
                                          May 22, 2024 20:11:45.192761898 CEST4970053192.168.2.41.1.1.1
                                          May 22, 2024 20:11:45.239712000 CEST53497001.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          May 22, 2024 20:11:45.192761898 CEST192.168.2.41.1.1.10x6ee3Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          May 22, 2024 20:11:45.239712000 CEST1.1.1.1192.168.2.40x6ee3Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:0
                                          Start time:14:11:12
                                          Start date:22/05/2024
                                          Path:C:\Users\user\Desktop\STjk6HCD1P.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\STjk6HCD1P.exe"
                                          Imagebase:0x400000
                                          File size:45'208'600 bytes
                                          MD5 hash:C75B5515952EA615219E1991C4592236
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:17.2%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:16.5%
                                            Total number of Nodes:1826
                                            Total number of Limit Nodes:47
                                            execution_graph 5867 401d44 5868 402bac 17 API calls 5867->5868 5869 401d52 SetWindowLongA 5868->5869 5870 402a5a 5869->5870 4771 401746 4777 402bce 4771->4777 4775 401754 4776 405c89 2 API calls 4775->4776 4776->4775 4778 402bda 4777->4778 4779 406154 17 API calls 4778->4779 4780 402bfb 4779->4780 4781 40174d 4780->4781 4782 40639c 5 API calls 4780->4782 4783 405c89 4781->4783 4782->4781 4784 405c94 GetTickCount GetTempFileNameA 4783->4784 4785 405cc1 4784->4785 4786 405cc5 4784->4786 4785->4784 4785->4786 4786->4775 5871 401947 5872 402bce 17 API calls 5871->5872 5873 40194e lstrlenA 5872->5873 5874 402620 5873->5874 4787 6e44274c SetWindowLongA SendMessageA ShowWindow 4788 6e4427a8 KiUserCallbackDispatcher IsDialogMessageA 4787->4788 4789 6e4427c7 IsDialogMessageA 4788->4789 4790 6e4427ee 4788->4790 4789->4790 4791 6e4427d8 TranslateMessage DispatchMessageA 4789->4791 4790->4788 4792 6e4427f6 4790->4792 4791->4790 4793 6e442803 SetWindowLongA DestroyWindow 4792->4793 4815 6e4410dc 4792->4815 4795 6e44283d 4793->4795 4796 6e442828 ShowWindow 4793->4796 4834 6e44100f 4795->4834 4796->4795 4799 6e44100f GlobalFree 4800 6e442853 4799->4800 4801 6e44100f GlobalFree 4800->4801 4802 6e44285e 4801->4802 4803 6e44100f GlobalFree 4802->4803 4804 6e442869 4803->4804 4805 6e44100f GlobalFree 4804->4805 4814 6e442874 4805->4814 4806 6e4428c5 4807 6e44100f GlobalFree 4806->4807 4809 6e4428d0 4807->4809 4808 6e44100f GlobalFree 4808->4814 4837 6e442b06 4809->4837 4812 6e4428a7 DeleteObject 4812->4814 4813 6e4428b6 DestroyIcon 4813->4814 4814->4806 4814->4808 4814->4812 4814->4813 4840 6e441000 GlobalAlloc 4815->4840 4817 6e441361 wsprintfA WritePrivateProfileStringA 4818 6e44100f GlobalFree 4817->4818 4819 6e441393 4818->4819 4819->4793 4820 6e4412dd SendMessageA wsprintfA 4821 6e441300 wsprintfA WritePrivateProfileStringA 4820->4821 4833 6e4410ee 4821->4833 4822 6e441202 SendMessageA 4823 6e44122b GetWindowTextA 4822->4823 4822->4833 4823->4821 4823->4833 4824 6e441159 lstrlenA 4824->4833 4825 6e44100f GlobalFree 4825->4833 4826 6e441000 GlobalAlloc 4826->4833 4827 6e441197 SendMessageA 4828 6e4411af SendMessageA 4827->4828 4827->4833 4828->4833 4829 6e4412b6 CharNextA CharNextA 4829->4833 4830 6e4411c6 lstrcatA 4831 6e4411d2 SendMessageA lstrcatA 4830->4831 4831->4833 4832 6e44128d CharNextA lstrcpynA 4832->4829 4833->4817 4833->4819 4833->4820 4833->4821 4833->4822 4833->4823 4833->4824 4833->4825 4833->4826 4833->4827 4833->4828 4833->4829 4833->4830 4833->4831 4833->4832 4835 6e441016 GlobalFree 4834->4835 4836 6e44101c 4834->4836 4835->4836 4836->4799 4838 6e442b0f GlobalAlloc lstrcpynA 4837->4838 4839 6e4428f7 4837->4839 4838->4839 4840->4833 5875 404b4a GetDlgItem GetDlgItem 5876 404ba0 7 API calls 5875->5876 5881 404dc7 5875->5881 5877 404c48 DeleteObject 5876->5877 5878 404c3c SendMessageA 5876->5878 5879 404c53 5877->5879 5878->5877 5880 404c8a 5879->5880 5882 406154 17 API calls 5879->5882 5883 404145 18 API calls 5880->5883 5889 404ea9 5881->5889 5907 404e36 5881->5907 5929 404a98 SendMessageA 5881->5929 5887 404c6c SendMessageA SendMessageA 5882->5887 5888 404c9e 5883->5888 5884 404f55 5885 404f67 5884->5885 5886 404f5f SendMessageA 5884->5886 5896 404f80 5885->5896 5897 404f79 ImageList_Destroy 5885->5897 5909 404f90 5885->5909 5886->5885 5887->5879 5893 404145 18 API calls 5888->5893 5889->5884 5894 404f02 SendMessageA 5889->5894 5918 404dba 5889->5918 5890 404e9b SendMessageA 5890->5889 5891 4041ac 8 API calls 5895 405155 5891->5895 5908 404caf 5893->5908 5899 404f17 SendMessageA 5894->5899 5894->5918 5900 404f89 GlobalFree 5896->5900 5896->5909 5897->5896 5898 405109 5903 40511b ShowWindow GetDlgItem ShowWindow 5898->5903 5898->5918 5902 404f2a 5899->5902 5900->5909 5901 404d89 GetWindowLongA SetWindowLongA 5904 404da2 5901->5904 5914 404f3b SendMessageA 5902->5914 5903->5918 5905 404da7 ShowWindow 5904->5905 5906 404dbf 5904->5906 5927 40417a SendMessageA 5905->5927 5928 40417a SendMessageA 5906->5928 5907->5889 5907->5890 5908->5901 5910 404d84 5908->5910 5913 404d01 SendMessageA 5908->5913 5915 404d53 SendMessageA 5908->5915 5916 404d3f SendMessageA 5908->5916 5909->5898 5922 404fcb 5909->5922 5934 404b18 5909->5934 5910->5901 5910->5904 5913->5908 5914->5884 5915->5908 5916->5908 5918->5891 5919 4050d5 5920 4050df InvalidateRect 5919->5920 5923 4050eb 5919->5923 5920->5923 5921 404ff9 SendMessageA 5925 40500f 5921->5925 5922->5921 5922->5925 5923->5898 5943 404a53 5923->5943 5924 405083 SendMessageA SendMessageA 5924->5925 5925->5919 5925->5924 5927->5918 5928->5881 5930 404af7 SendMessageA 5929->5930 5931 404abb GetMessagePos ScreenToClient SendMessageA 5929->5931 5933 404aef 5930->5933 5932 404af4 5931->5932 5931->5933 5932->5930 5933->5907 5946 4060c1 lstrcpynA 5934->5946 5936 404b2b 5947 40601f wsprintfA 5936->5947 5938 404b35 5939 40140b 2 API calls 5938->5939 5940 404b3e 5939->5940 5948 4060c1 lstrcpynA 5940->5948 5942 404b45 5942->5922 5949 40498e 5943->5949 5945 404a68 5945->5898 5946->5936 5947->5938 5948->5942 5950 4049a4 5949->5950 5951 406154 17 API calls 5950->5951 5952 404a08 5951->5952 5953 406154 17 API calls 5952->5953 5954 404a13 5953->5954 5955 406154 17 API calls 5954->5955 5956 404a29 lstrlenA wsprintfA SetDlgItemTextA 5955->5956 5956->5945 5957 6e491058 5959 6e491074 5957->5959 5958 6e4910dc 5959->5958 5960 6e491091 5959->5960 5970 6e4914bb 5959->5970 5962 6e4914bb GlobalFree 5960->5962 5963 6e4910a1 5962->5963 5964 6e4910a8 GlobalSize 5963->5964 5965 6e4910b1 5963->5965 5964->5965 5966 6e4910b5 GlobalAlloc 5965->5966 5967 6e4910c6 5965->5967 5968 6e4914e2 3 API calls 5966->5968 5969 6e4910d1 GlobalFree 5967->5969 5968->5967 5969->5958 5972 6e4914c1 5970->5972 5971 6e4914c7 5971->5960 5972->5971 5973 6e4914d3 GlobalFree 5972->5973 5973->5960 5974 6e49225a 5975 6e4922c4 5974->5975 5976 6e4922cf GlobalAlloc 5975->5976 5977 6e4922ee 5975->5977 5976->5975 5438 401759 5439 402bce 17 API calls 5438->5439 5440 401760 5439->5440 5441 401786 5440->5441 5442 40177e 5440->5442 5478 4060c1 lstrcpynA 5441->5478 5477 4060c1 lstrcpynA 5442->5477 5445 401791 5447 405a59 3 API calls 5445->5447 5446 401784 5449 40639c 5 API calls 5446->5449 5448 401797 lstrcatA 5447->5448 5448->5446 5452 4017a3 5449->5452 5450 406435 2 API calls 5450->5452 5452->5450 5453 405c35 2 API calls 5452->5453 5454 4017ba CompareFileTime 5452->5454 5455 40187e 5452->5455 5458 4060c1 lstrcpynA 5452->5458 5463 406154 17 API calls 5452->5463 5473 4057dd MessageBoxIndirectA 5452->5473 5475 401855 5452->5475 5476 405c5a GetFileAttributesA CreateFileA 5452->5476 5453->5452 5454->5452 5456 4051e8 24 API calls 5455->5456 5459 401888 5456->5459 5457 4051e8 24 API calls 5465 40186a 5457->5465 5458->5452 5460 4030d8 35 API calls 5459->5460 5461 40189b 5460->5461 5462 4018af SetFileTime 5461->5462 5464 4018c1 FindCloseChangeNotification 5461->5464 5462->5464 5463->5452 5464->5465 5466 4018d2 5464->5466 5467 4018d7 5466->5467 5468 4018ea 5466->5468 5469 406154 17 API calls 5467->5469 5470 406154 17 API calls 5468->5470 5471 4018df lstrcatA 5469->5471 5472 4018f2 5470->5472 5471->5472 5472->5465 5474 4057dd MessageBoxIndirectA 5472->5474 5473->5452 5474->5465 5475->5457 5475->5465 5476->5452 5477->5446 5478->5445 5978 401959 5979 402bac 17 API calls 5978->5979 5980 401960 5979->5980 5981 402bac 17 API calls 5980->5981 5982 40196d 5981->5982 5983 402bce 17 API calls 5982->5983 5984 401984 lstrlenA 5983->5984 5986 401994 5984->5986 5985 4019d4 5986->5985 5990 4060c1 lstrcpynA 5986->5990 5988 4019c4 5988->5985 5989 4019c9 lstrlenA 5988->5989 5989->5985 5990->5988 5991 40515c 5992 405180 5991->5992 5993 40516c 5991->5993 5994 405188 IsWindowVisible 5992->5994 5997 40519f 5992->5997 5995 405172 5993->5995 6003 4051c9 5993->6003 5996 405195 5994->5996 5994->6003 5999 404191 SendMessageA 5995->5999 6000 404a98 5 API calls 5996->6000 5998 4051ce CallWindowProcA 5997->5998 6002 404b18 4 API calls 5997->6002 6001 40517c 5998->6001 5999->6001 6000->5997 6002->6003 6003->5998 6011 40275d 6012 402763 6011->6012 6013 40276b FindClose 6012->6013 6014 402a5a 6012->6014 6013->6014 6015 401a5e 6016 402bac 17 API calls 6015->6016 6017 401a67 6016->6017 6018 402bac 17 API calls 6017->6018 6019 401a0e 6018->6019 6020 401563 6021 4029a5 6020->6021 6024 40601f wsprintfA 6021->6024 6023 4029aa 6024->6023 6025 401b63 6026 402bce 17 API calls 6025->6026 6027 401b6a 6026->6027 6028 402bac 17 API calls 6027->6028 6029 401b73 wsprintfA 6028->6029 6030 402a5a 6029->6030 6031 401d65 6032 401d78 GetDlgItem 6031->6032 6033 401d6b 6031->6033 6035 401d72 6032->6035 6034 402bac 17 API calls 6033->6034 6034->6035 6036 401db9 GetClientRect LoadImageA SendMessageA 6035->6036 6038 402bce 17 API calls 6035->6038 6039 401e1a 6036->6039 6041 401e26 6036->6041 6038->6036 6040 401e1f DeleteObject 6039->6040 6039->6041 6040->6041 6042 6e441c6d GetDlgCtrlID 6043 6e441c84 6042->6043 6044 6e441c88 6043->6044 6045 6e441ca3 6043->6045 6046 6e441d38 6043->6046 6048 6e441cff MapWindowPoints PtInRect 6045->6048 6050 6e441ca8 6045->6050 6047 6e441cd0 CallWindowProcA 6046->6047 6049 6e441d44 LoadCursorA 6046->6049 6047->6044 6048->6044 6049->6047 6051 6e441d59 SetCursor 6049->6051 6050->6044 6050->6047 6051->6044 6052 40166a 6053 402bce 17 API calls 6052->6053 6054 401671 6053->6054 6055 402bce 17 API calls 6054->6055 6056 40167a 6055->6056 6057 402bce 17 API calls 6056->6057 6058 401683 MoveFileA 6057->6058 6059 401696 6058->6059 6060 40168f 6058->6060 6061 406435 2 API calls 6059->6061 6064 4022e2 6059->6064 6062 401423 24 API calls 6060->6062 6063 4016a5 6061->6063 6062->6064 6063->6064 6065 405ea0 36 API calls 6063->6065 6065->6060 6066 40216b 6067 402bce 17 API calls 6066->6067 6068 402172 6067->6068 6069 402bce 17 API calls 6068->6069 6070 40217c 6069->6070 6071 402bce 17 API calls 6070->6071 6072 402186 6071->6072 6073 402bce 17 API calls 6072->6073 6074 402193 6073->6074 6075 402bce 17 API calls 6074->6075 6076 40219d 6075->6076 6077 4021df CoCreateInstance 6076->6077 6078 402bce 17 API calls 6076->6078 6081 4021fe 6077->6081 6083 4022ac 6077->6083 6078->6077 6079 401423 24 API calls 6080 4022e2 6079->6080 6082 40228c MultiByteToWideChar 6081->6082 6081->6083 6082->6083 6083->6079 6083->6080 6084 6e441d68 GetDlgCtrlID 6085 6e441d7b 6084->6085 6086 6e441d7f 6085->6086 6087 6e441d9e OpenClipboard 6085->6087 6088 6e441e2f CallWindowProcA 6085->6088 6087->6088 6089 6e441daf GetClipboardData 6087->6089 6088->6086 6090 6e441e24 CloseClipboard 6089->6090 6091 6e441dbf GlobalLock 6089->6091 6090->6086 6091->6090 6092 6e441dcc lstrlenA 6091->6092 6098 6e441000 GlobalAlloc 6092->6098 6094 6e441e1a GlobalUnlock 6094->6090 6095 6e441e03 SendMessageA 6097 6e44100f GlobalFree 6095->6097 6096 6e441ddf 6096->6094 6096->6095 6097->6094 6098->6096 6099 40266d 6100 402bac 17 API calls 6099->6100 6101 402677 6100->6101 6102 405cd2 ReadFile 6101->6102 6103 4026e7 6101->6103 6104 4026f7 6101->6104 6107 4026e5 6101->6107 6102->6101 6108 40601f wsprintfA 6103->6108 6106 40270d SetFilePointer 6104->6106 6104->6107 6106->6107 6108->6107 6109 40236d 6110 402374 6109->6110 6113 402387 6109->6113 6111 406154 17 API calls 6110->6111 6112 402381 6111->6112 6112->6113 6114 4057dd MessageBoxIndirectA 6112->6114 6114->6113 6115 40156f 6116 401586 6115->6116 6117 40157f ShowWindow 6115->6117 6118 401594 ShowWindow 6116->6118 6119 402a5a 6116->6119 6117->6116 6118->6119 4866 403c71 4867 403dc4 4866->4867 4868 403c89 4866->4868 4869 403e15 4867->4869 4870 403dd5 GetDlgItem GetDlgItem 4867->4870 4868->4867 4871 403c95 4868->4871 4875 403e6f 4869->4875 4883 401389 2 API calls 4869->4883 4874 404145 18 API calls 4870->4874 4872 403ca0 SetWindowPos 4871->4872 4873 403cb3 4871->4873 4872->4873 4876 403cd0 4873->4876 4877 403cb8 ShowWindow 4873->4877 4878 403dff SetClassLongA 4874->4878 4884 403dbf 4875->4884 4938 404191 4875->4938 4880 403cf2 4876->4880 4881 403cd8 DestroyWindow 4876->4881 4877->4876 4882 40140b 2 API calls 4878->4882 4886 403cf7 SetWindowLongA 4880->4886 4887 403d08 4880->4887 4885 4040ef 4881->4885 4882->4869 4888 403e47 4883->4888 4885->4884 4894 4040ff ShowWindow 4885->4894 4886->4884 4891 403db1 4887->4891 4892 403d14 GetDlgItem 4887->4892 4888->4875 4893 403e4b SendMessageA 4888->4893 4889 40140b 2 API calls 4906 403e81 4889->4906 4890 4040d0 DestroyWindow EndDialog 4890->4885 4960 4041ac 4891->4960 4895 403d44 4892->4895 4896 403d27 SendMessageA IsWindowEnabled 4892->4896 4893->4884 4894->4884 4899 403d51 4895->4899 4900 403d64 4895->4900 4901 403d98 SendMessageA 4895->4901 4910 403d49 4895->4910 4896->4884 4896->4895 4898 406154 17 API calls 4898->4906 4899->4901 4899->4910 4903 403d81 4900->4903 4904 403d6c 4900->4904 4901->4891 4908 40140b 2 API calls 4903->4908 4954 40140b 4904->4954 4905 403d7f 4905->4891 4906->4884 4906->4889 4906->4890 4906->4898 4909 404145 18 API calls 4906->4909 4928 404010 DestroyWindow 4906->4928 4941 404145 4906->4941 4911 403d88 4908->4911 4909->4906 4957 40411e 4910->4957 4911->4891 4911->4910 4913 403efc GetDlgItem 4914 403f11 4913->4914 4915 403f19 ShowWindow KiUserCallbackDispatcher 4913->4915 4914->4915 4944 404167 EnableWindow 4915->4944 4917 403f43 EnableWindow 4922 403f57 4917->4922 4918 403f5c GetSystemMenu EnableMenuItem SendMessageA 4919 403f8c SendMessageA 4918->4919 4918->4922 4919->4922 4922->4918 4945 40417a SendMessageA 4922->4945 4946 403c52 4922->4946 4949 4060c1 lstrcpynA 4922->4949 4924 403fbb lstrlenA 4925 406154 17 API calls 4924->4925 4926 403fcc SetWindowTextA 4925->4926 4950 401389 4926->4950 4928->4885 4929 40402a CreateDialogParamA 4928->4929 4929->4885 4930 40405d 4929->4930 4931 404145 18 API calls 4930->4931 4932 404068 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4931->4932 4933 401389 2 API calls 4932->4933 4934 4040ae 4933->4934 4934->4884 4935 4040b6 ShowWindow 4934->4935 4936 404191 SendMessageA 4935->4936 4937 4040ce 4936->4937 4937->4885 4939 4041a9 4938->4939 4940 40419a SendMessageA 4938->4940 4939->4906 4940->4939 4942 406154 17 API calls 4941->4942 4943 404150 SetDlgItemTextA 4942->4943 4943->4913 4944->4917 4945->4922 4947 406154 17 API calls 4946->4947 4948 403c60 SetWindowTextA 4947->4948 4948->4922 4949->4924 4952 401390 4950->4952 4951 4013fe 4951->4906 4952->4951 4953 4013cb MulDiv SendMessageA 4952->4953 4953->4952 4955 401389 2 API calls 4954->4955 4956 401420 4955->4956 4956->4910 4958 404125 4957->4958 4959 40412b SendMessageA 4957->4959 4958->4959 4959->4905 4961 40426f 4960->4961 4962 4041c4 GetWindowLongA 4960->4962 4961->4884 4962->4961 4963 4041d9 4962->4963 4963->4961 4964 404206 GetSysColor 4963->4964 4965 404209 4963->4965 4964->4965 4966 404219 SetBkMode 4965->4966 4967 40420f SetTextColor 4965->4967 4968 404231 GetSysColor 4966->4968 4969 404237 4966->4969 4967->4966 4968->4969 4970 404248 4969->4970 4971 40423e SetBkColor 4969->4971 4970->4961 4972 404262 CreateBrushIndirect 4970->4972 4973 40425b DeleteObject 4970->4973 4971->4970 4972->4961 4973->4972 6120 402476 6121 402bce 17 API calls 6120->6121 6122 402488 6121->6122 6123 402bce 17 API calls 6122->6123 6124 402492 6123->6124 6137 402c5e 6124->6137 6127 402a5a 6128 4024c7 6130 4024d3 6128->6130 6132 402bac 17 API calls 6128->6132 6129 402bce 17 API calls 6131 4024c0 lstrlenA 6129->6131 6133 4024f5 RegSetValueExA 6130->6133 6135 4030d8 35 API calls 6130->6135 6131->6128 6132->6130 6134 40250b RegCloseKey 6133->6134 6134->6127 6135->6133 6138 402c79 6137->6138 6141 405f75 6138->6141 6142 405f84 6141->6142 6143 4024a2 6142->6143 6144 405f8f RegCreateKeyExA 6142->6144 6143->6127 6143->6128 6143->6129 6144->6143 6145 402777 6146 40277d 6145->6146 6147 402781 FindNextFileA 6146->6147 6150 402793 6146->6150 6148 4027d2 6147->6148 6147->6150 6151 4060c1 lstrcpynA 6148->6151 6151->6150 6152 40427b lstrcpynA lstrlenA 6153 401f7b 6154 402bce 17 API calls 6153->6154 6155 401f81 6154->6155 6156 4051e8 24 API calls 6155->6156 6157 401f8b 6156->6157 6158 405760 2 API calls 6157->6158 6159 401f91 6158->6159 6160 4027bf 6159->6160 6164 401fb2 CloseHandle 6159->6164 6166 40653f WaitForSingleObject 6159->6166 6163 401fa6 6163->6164 6171 40601f wsprintfA 6163->6171 6164->6160 6167 406559 6166->6167 6168 40656b GetExitCodeProcess 6167->6168 6169 406506 2 API calls 6167->6169 6168->6163 6170 406560 WaitForSingleObject 6169->6170 6170->6167 6171->6164 6179 401000 6180 401037 BeginPaint GetClientRect 6179->6180 6181 40100c DefWindowProcA 6179->6181 6183 4010f3 6180->6183 6184 401179 6181->6184 6185 401073 CreateBrushIndirect FillRect DeleteObject 6183->6185 6186 4010fc 6183->6186 6185->6183 6187 401102 CreateFontIndirectA 6186->6187 6188 401167 EndPaint 6186->6188 6187->6188 6189 401112 6 API calls 6187->6189 6188->6184 6189->6188 6190 401900 6191 402bce 17 API calls 6190->6191 6192 401907 6191->6192 6193 4057dd MessageBoxIndirectA 6192->6193 6194 401910 6193->6194 6195 401502 6196 40150a 6195->6196 6198 40151d 6195->6198 6197 402bac 17 API calls 6196->6197 6197->6198 6199 402604 6200 402bce 17 API calls 6199->6200 6201 40260b 6200->6201 6204 405c5a GetFileAttributesA CreateFileA 6201->6204 6203 402617 6204->6203 6205 6e441a01 6206 6e441a85 CallWindowProcA 6205->6206 6214 6e441a17 6205->6214 6207 6e441ad8 6206->6207 6211 6e441aa4 6206->6211 6208 6e441a79 6209 6e4410dc 20 API calls 6208->6209 6213 6e441a7e 6209->6213 6210 6e441ac0 PostMessageA 6210->6207 6211->6207 6211->6210 6212 6e441a40 SendMessageA 6212->6214 6213->6206 6214->6206 6214->6208 6214->6212 6215 6e441ae1 6214->6215 6216 6e441b17 6215->6216 6217 6e441ae7 GetWindowTextA MessageBoxA 6215->6217 6219 6e441071 SendMessageA 6216->6219 6217->6216 6219->6207 6220 6e491000 6223 6e49101b 6220->6223 6224 6e4914bb GlobalFree 6223->6224 6225 6e491020 6224->6225 6226 6e491027 GlobalAlloc 6225->6226 6227 6e491024 6225->6227 6226->6227 6228 6e4914e2 3 API calls 6227->6228 6229 6e491019 6228->6229 4974 403312 SetErrorMode GetVersion 4975 403353 4974->4975 4976 403359 4974->4976 4977 4064ca 5 API calls 4975->4977 5064 40645c GetSystemDirectoryA 4976->5064 4977->4976 4979 40336f lstrlenA 4979->4976 4980 40337e 4979->4980 5067 4064ca GetModuleHandleA 4980->5067 4983 4064ca 5 API calls 4984 40338c 4983->4984 4985 4064ca 5 API calls 4984->4985 4986 403398 #17 OleInitialize SHGetFileInfoA 4985->4986 5073 4060c1 lstrcpynA 4986->5073 4989 4033e4 GetCommandLineA 5074 4060c1 lstrcpynA 4989->5074 4991 4033f6 4992 405a84 CharNextA 4991->4992 4993 40341f CharNextA 4992->4993 5001 40342f 4993->5001 4994 4034f9 4995 40350c GetTempPathA 4994->4995 5075 4032e1 4995->5075 4997 403524 4998 403528 GetWindowsDirectoryA lstrcatA 4997->4998 4999 40357e DeleteFileA 4997->4999 5002 4032e1 12 API calls 4998->5002 5085 402ea1 GetTickCount GetModuleFileNameA 4999->5085 5000 405a84 CharNextA 5000->5001 5001->4994 5001->5000 5005 4034fb 5001->5005 5004 403544 5002->5004 5004->4999 5008 403548 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 5004->5008 5169 4060c1 lstrcpynA 5005->5169 5006 403592 5009 403618 5006->5009 5013 405a84 CharNextA 5006->5013 5059 403628 5006->5059 5011 4032e1 12 API calls 5008->5011 5113 4038d4 5009->5113 5015 403576 5011->5015 5016 4035ad 5013->5016 5015->4999 5015->5059 5023 4035f3 5016->5023 5024 403658 5016->5024 5017 403760 5020 4037e2 ExitProcess 5017->5020 5021 403768 GetCurrentProcess OpenProcessToken 5017->5021 5018 403642 5193 4057dd 5018->5193 5026 4037b3 5021->5026 5027 403783 LookupPrivilegeValueA AdjustTokenPrivileges 5021->5027 5170 405b47 5023->5170 5197 405748 5024->5197 5030 4064ca 5 API calls 5026->5030 5027->5026 5033 4037ba 5030->5033 5036 4037cf ExitWindowsEx 5033->5036 5037 4037db 5033->5037 5034 403679 lstrcatA lstrcmpiA 5039 403695 5034->5039 5034->5059 5035 40366e lstrcatA 5035->5034 5036->5020 5036->5037 5040 40140b 2 API calls 5037->5040 5042 4036a1 5039->5042 5043 40369a 5039->5043 5040->5020 5041 40360d 5185 4060c1 lstrcpynA 5041->5185 5205 40572b CreateDirectoryA 5042->5205 5200 4056ae CreateDirectoryA 5043->5200 5048 4036a6 SetCurrentDirectoryA 5049 4036c0 5048->5049 5050 4036b5 5048->5050 5209 4060c1 lstrcpynA 5049->5209 5208 4060c1 lstrcpynA 5050->5208 5053 406154 17 API calls 5054 4036ff DeleteFileA 5053->5054 5055 40370c CopyFileA 5054->5055 5060 4036ce 5054->5060 5055->5060 5056 403754 5057 405ea0 36 API calls 5056->5057 5057->5059 5186 4037fa 5059->5186 5060->5053 5060->5056 5061 406154 17 API calls 5060->5061 5063 403740 CloseHandle 5060->5063 5210 405ea0 MoveFileExA 5060->5210 5214 405760 CreateProcessA 5060->5214 5061->5060 5063->5060 5065 40647e wsprintfA LoadLibraryExA 5064->5065 5065->4979 5068 4064f0 GetProcAddress 5067->5068 5069 4064e6 5067->5069 5071 403385 5068->5071 5070 40645c 3 API calls 5069->5070 5072 4064ec 5070->5072 5071->4983 5072->5068 5072->5071 5073->4989 5074->4991 5076 40639c 5 API calls 5075->5076 5078 4032ed 5076->5078 5077 4032f7 5077->4997 5078->5077 5217 405a59 lstrlenA CharPrevA 5078->5217 5081 40572b 2 API calls 5082 403305 5081->5082 5083 405c89 2 API calls 5082->5083 5084 403310 5083->5084 5084->4997 5220 405c5a GetFileAttributesA CreateFileA 5085->5220 5087 402ee1 5106 402ef1 5087->5106 5221 4060c1 lstrcpynA 5087->5221 5089 402f07 5222 405aa0 lstrlenA 5089->5222 5093 402f18 GetFileSize 5094 403012 5093->5094 5108 402f2f 5093->5108 5227 402e3d 5094->5227 5096 40301b 5098 40304b GlobalAlloc 5096->5098 5096->5106 5263 4032ca SetFilePointer 5096->5263 5238 4032ca SetFilePointer 5098->5238 5100 40307e 5103 402e3d 6 API calls 5100->5103 5102 403066 5239 4030d8 5102->5239 5103->5106 5104 403034 5107 4032b4 ReadFile 5104->5107 5106->5006 5109 40303f 5107->5109 5108->5094 5108->5100 5108->5106 5110 402e3d 6 API calls 5108->5110 5260 4032b4 5108->5260 5109->5098 5109->5106 5110->5108 5111 403072 5111->5106 5111->5111 5112 4030af SetFilePointer 5111->5112 5112->5106 5114 4064ca 5 API calls 5113->5114 5115 4038e8 5114->5115 5116 403900 5115->5116 5117 4038ee 5115->5117 5118 405fa8 3 API calls 5116->5118 5300 40601f wsprintfA 5117->5300 5119 40392b 5118->5119 5121 403949 lstrcatA 5119->5121 5122 405fa8 3 API calls 5119->5122 5123 4038fe 5121->5123 5122->5121 5292 403b99 5123->5292 5126 405b47 18 API calls 5127 40397b 5126->5127 5128 403a04 5127->5128 5130 405fa8 3 API calls 5127->5130 5129 405b47 18 API calls 5128->5129 5131 403a0a 5129->5131 5139 4039a7 5130->5139 5132 403a1a LoadImageA 5131->5132 5133 406154 17 API calls 5131->5133 5134 403ac0 5132->5134 5135 403a41 RegisterClassA 5132->5135 5133->5132 5137 40140b 2 API calls 5134->5137 5136 403a77 SystemParametersInfoA CreateWindowExA 5135->5136 5168 403aca 5135->5168 5136->5134 5142 403ac6 5137->5142 5138 4039c3 lstrlenA 5140 4039d1 lstrcmpiA 5138->5140 5141 4039f7 5138->5141 5139->5128 5139->5138 5143 405a84 CharNextA 5139->5143 5140->5141 5144 4039e1 GetFileAttributesA 5140->5144 5145 405a59 3 API calls 5141->5145 5148 403b99 18 API calls 5142->5148 5142->5168 5146 4039c1 5143->5146 5147 4039ed 5144->5147 5149 4039fd 5145->5149 5146->5138 5147->5141 5150 405aa0 2 API calls 5147->5150 5151 403ad7 5148->5151 5301 4060c1 lstrcpynA 5149->5301 5150->5141 5153 403ae3 ShowWindow 5151->5153 5154 403b66 5151->5154 5156 40645c 3 API calls 5153->5156 5302 4052ba OleInitialize 5154->5302 5158 403afb 5156->5158 5157 403b6c 5159 403b70 5157->5159 5160 403b88 5157->5160 5161 403b09 GetClassInfoA 5158->5161 5163 40645c 3 API calls 5158->5163 5167 40140b 2 API calls 5159->5167 5159->5168 5162 40140b 2 API calls 5160->5162 5164 403b33 DialogBoxParamA 5161->5164 5165 403b1d GetClassInfoA RegisterClassA 5161->5165 5162->5168 5163->5161 5166 40140b 2 API calls 5164->5166 5165->5164 5166->5168 5167->5168 5168->5059 5169->4995 5310 4060c1 lstrcpynA 5170->5310 5172 405b58 5311 405af2 CharNextA CharNextA 5172->5311 5175 4035fe 5175->5059 5184 4060c1 lstrcpynA 5175->5184 5176 40639c 5 API calls 5182 405b6e 5176->5182 5177 405b99 lstrlenA 5178 405ba4 5177->5178 5177->5182 5180 405a59 3 API calls 5178->5180 5181 405ba9 GetFileAttributesA 5180->5181 5181->5175 5182->5175 5182->5177 5183 405aa0 2 API calls 5182->5183 5317 406435 FindFirstFileA 5182->5317 5183->5177 5184->5041 5185->5009 5187 403812 5186->5187 5188 403804 CloseHandle 5186->5188 5320 40383f 5187->5320 5188->5187 5194 4057f2 5193->5194 5195 403650 ExitProcess 5194->5195 5196 405806 MessageBoxIndirectA 5194->5196 5196->5195 5198 4064ca 5 API calls 5197->5198 5199 40365d lstrcatA 5198->5199 5199->5034 5199->5035 5201 40369f 5200->5201 5202 4056ff GetLastError 5200->5202 5201->5048 5202->5201 5203 40570e SetFileSecurityA 5202->5203 5203->5201 5204 405724 GetLastError 5203->5204 5204->5201 5206 40573b 5205->5206 5207 40573f GetLastError 5205->5207 5206->5048 5207->5206 5208->5049 5209->5060 5211 405eb4 5210->5211 5213 405ec1 5210->5213 5378 405d30 5211->5378 5213->5060 5215 405793 CloseHandle 5214->5215 5216 40579f 5214->5216 5215->5216 5216->5060 5218 405a73 lstrcatA 5217->5218 5219 4032ff 5217->5219 5218->5219 5219->5081 5220->5087 5221->5089 5223 405aad 5222->5223 5224 405ab2 CharPrevA 5223->5224 5225 402f0d 5223->5225 5224->5223 5224->5225 5226 4060c1 lstrcpynA 5225->5226 5226->5093 5228 402e46 5227->5228 5229 402e5e 5227->5229 5230 402e56 5228->5230 5231 402e4f DestroyWindow 5228->5231 5232 402e66 5229->5232 5233 402e6e GetTickCount 5229->5233 5230->5096 5231->5230 5264 406506 5232->5264 5235 402e7c CreateDialogParamA ShowWindow 5233->5235 5236 402e9f 5233->5236 5235->5236 5236->5096 5238->5102 5240 4030ee 5239->5240 5241 403119 5240->5241 5278 4032ca SetFilePointer 5240->5278 5243 4032b4 ReadFile 5241->5243 5244 403124 5243->5244 5245 403254 5244->5245 5246 403136 GetTickCount 5244->5246 5248 40323e 5244->5248 5247 403258 5245->5247 5252 403270 5245->5252 5256 403149 5246->5256 5249 4032b4 ReadFile 5247->5249 5248->5111 5249->5248 5250 4032b4 ReadFile 5250->5252 5251 4032b4 ReadFile 5251->5256 5252->5248 5252->5250 5253 405d01 WriteFile 5252->5253 5253->5252 5255 4031af GetTickCount 5255->5256 5256->5248 5256->5251 5256->5255 5257 4031d8 MulDiv wsprintfA 5256->5257 5268 40660f 5256->5268 5276 405d01 WriteFile 5256->5276 5279 4051e8 5257->5279 5290 405cd2 ReadFile 5260->5290 5263->5104 5265 406523 PeekMessageA 5264->5265 5266 402e6c 5265->5266 5267 406519 DispatchMessageA 5265->5267 5266->5096 5267->5265 5269 406634 5268->5269 5270 40663c 5268->5270 5269->5256 5270->5269 5271 4066c3 GlobalFree 5270->5271 5272 4066cc GlobalAlloc 5270->5272 5273 406743 GlobalAlloc 5270->5273 5274 40673a GlobalFree 5270->5274 5271->5272 5272->5269 5275 4066e0 5272->5275 5273->5269 5273->5270 5274->5273 5275->5270 5277 405d1f 5276->5277 5277->5256 5278->5241 5280 4052a6 5279->5280 5281 405203 5279->5281 5280->5256 5282 405220 lstrlenA 5281->5282 5283 406154 17 API calls 5281->5283 5284 405249 5282->5284 5285 40522e lstrlenA 5282->5285 5283->5282 5287 40525c 5284->5287 5288 40524f SetWindowTextA 5284->5288 5285->5280 5286 405240 lstrcatA 5285->5286 5286->5284 5287->5280 5289 405262 SendMessageA SendMessageA SendMessageA 5287->5289 5288->5287 5289->5280 5291 4032c7 5290->5291 5291->5108 5293 403bad 5292->5293 5309 40601f wsprintfA 5293->5309 5295 403c1e 5296 403c52 18 API calls 5295->5296 5298 403c23 5296->5298 5297 403959 5297->5126 5298->5297 5299 406154 17 API calls 5298->5299 5299->5298 5300->5123 5301->5128 5303 404191 SendMessageA 5302->5303 5304 4052dd 5303->5304 5307 401389 2 API calls 5304->5307 5308 405304 5304->5308 5305 404191 SendMessageA 5306 405316 OleUninitialize 5305->5306 5306->5157 5307->5304 5308->5305 5309->5295 5310->5172 5312 405b0d 5311->5312 5316 405b1d 5311->5316 5313 405b18 CharNextA 5312->5313 5312->5316 5314 405b3d 5313->5314 5314->5175 5314->5176 5315 405a84 CharNextA 5315->5316 5316->5314 5316->5315 5318 406456 5317->5318 5319 40644b FindClose 5317->5319 5318->5182 5319->5318 5321 40384d 5320->5321 5322 403817 5321->5322 5323 403852 FreeLibrary GlobalFree 5321->5323 5324 405889 5322->5324 5323->5322 5323->5323 5325 405b47 18 API calls 5324->5325 5326 4058a9 5325->5326 5327 4058b1 DeleteFileA 5326->5327 5328 4058c8 5326->5328 5329 403631 OleUninitialize 5327->5329 5331 405a00 5328->5331 5365 4060c1 lstrcpynA 5328->5365 5329->5017 5329->5018 5331->5329 5337 406435 2 API calls 5331->5337 5332 4058ee 5333 405901 5332->5333 5334 4058f4 lstrcatA 5332->5334 5336 405aa0 2 API calls 5333->5336 5335 405907 5334->5335 5338 405915 lstrcatA 5335->5338 5339 40590c 5335->5339 5336->5335 5340 405a1a 5337->5340 5341 405920 lstrlenA FindFirstFileA 5338->5341 5339->5338 5339->5341 5340->5329 5342 405a1e 5340->5342 5344 4059f6 5341->5344 5364 405944 5341->5364 5343 405a59 3 API calls 5342->5343 5345 405a24 5343->5345 5344->5331 5347 405841 5 API calls 5345->5347 5346 405a84 CharNextA 5346->5364 5348 405a30 5347->5348 5349 405a4a 5348->5349 5352 405a34 5348->5352 5353 4051e8 24 API calls 5349->5353 5350 4059d5 FindNextFileA 5354 4059ed FindClose 5350->5354 5350->5364 5352->5329 5355 4051e8 24 API calls 5352->5355 5353->5329 5354->5344 5356 405a41 5355->5356 5357 405ea0 36 API calls 5356->5357 5360 405a48 5357->5360 5359 405889 60 API calls 5359->5364 5360->5329 5361 4051e8 24 API calls 5361->5350 5362 4051e8 24 API calls 5362->5364 5363 405ea0 36 API calls 5363->5364 5364->5346 5364->5350 5364->5359 5364->5361 5364->5362 5364->5363 5366 4060c1 lstrcpynA 5364->5366 5367 405841 5364->5367 5365->5332 5366->5364 5375 405c35 GetFileAttributesA 5367->5375 5370 40586e 5370->5364 5371 405864 DeleteFileA 5373 40586a 5371->5373 5372 40585c RemoveDirectoryA 5372->5373 5373->5370 5374 40587a SetFileAttributesA 5373->5374 5374->5370 5376 40584d 5375->5376 5377 405c47 SetFileAttributesA 5375->5377 5376->5370 5376->5371 5376->5372 5377->5376 5379 405d56 5378->5379 5380 405d7c GetShortPathNameA 5378->5380 5405 405c5a GetFileAttributesA CreateFileA 5379->5405 5382 405d91 5380->5382 5383 405e9b 5380->5383 5382->5383 5385 405d99 wsprintfA 5382->5385 5383->5213 5384 405d60 CloseHandle GetShortPathNameA 5384->5383 5386 405d74 5384->5386 5387 406154 17 API calls 5385->5387 5386->5380 5386->5383 5388 405dc1 5387->5388 5406 405c5a GetFileAttributesA CreateFileA 5388->5406 5390 405dce 5390->5383 5391 405ddd GetFileSize GlobalAlloc 5390->5391 5392 405e94 CloseHandle 5391->5392 5393 405dff 5391->5393 5392->5383 5394 405cd2 ReadFile 5393->5394 5395 405e07 5394->5395 5395->5392 5407 405bbf lstrlenA 5395->5407 5398 405e32 5400 405bbf 4 API calls 5398->5400 5399 405e1e lstrcpyA 5401 405e40 5399->5401 5400->5401 5402 405e77 SetFilePointer 5401->5402 5403 405d01 WriteFile 5402->5403 5404 405e8d GlobalFree 5403->5404 5404->5392 5405->5384 5406->5390 5408 405c00 lstrlenA 5407->5408 5409 405c08 5408->5409 5410 405bd9 lstrcmpiA 5408->5410 5409->5398 5409->5399 5410->5409 5411 405bf7 CharNextA 5410->5411 5411->5408 5421 402516 5432 402c0e 5421->5432 5424 402bce 17 API calls 5425 402529 5424->5425 5426 402533 RegQueryValueExA 5425->5426 5427 4027bf 5425->5427 5428 402559 RegCloseKey 5426->5428 5429 402553 5426->5429 5428->5427 5429->5428 5437 40601f wsprintfA 5429->5437 5433 402bce 17 API calls 5432->5433 5434 402c25 5433->5434 5435 405f47 RegOpenKeyExA 5434->5435 5436 402520 5435->5436 5436->5424 5437->5428 6237 401a1e 6238 402bce 17 API calls 6237->6238 6239 401a27 ExpandEnvironmentStringsA 6238->6239 6240 401a3b 6239->6240 6242 401a4e 6239->6242 6241 401a40 lstrcmpA 6240->6241 6240->6242 6241->6242 6243 40171f 6244 402bce 17 API calls 6243->6244 6245 401726 SearchPathA 6244->6245 6246 401741 6245->6246 6247 401d1f 6248 402bac 17 API calls 6247->6248 6249 401d26 6248->6249 6250 402bac 17 API calls 6249->6250 6251 401d32 GetDlgItem 6250->6251 6252 402620 6251->6252 6253 402421 6254 402453 6253->6254 6255 402428 6253->6255 6257 402bce 17 API calls 6254->6257 6256 402c0e 17 API calls 6255->6256 6260 40242f 6256->6260 6258 40245a 6257->6258 6264 402c8c 6258->6264 6261 402467 6260->6261 6262 402bce 17 API calls 6260->6262 6263 402440 RegDeleteValueA RegCloseKey 6262->6263 6263->6261 6265 402c98 6264->6265 6266 402c9f 6264->6266 6265->6261 6266->6265 6268 402cd0 6266->6268 6269 405f47 RegOpenKeyExA 6268->6269 6271 402cfe 6269->6271 6270 402da8 6270->6265 6271->6270 6272 402d0e RegEnumValueA 6271->6272 6276 402d31 6271->6276 6273 402d98 RegCloseKey 6272->6273 6272->6276 6273->6270 6274 402d6d RegEnumKeyA 6275 402d76 RegCloseKey 6274->6275 6274->6276 6277 4064ca 5 API calls 6275->6277 6276->6273 6276->6274 6276->6275 6278 402cd0 6 API calls 6276->6278 6279 402d86 6277->6279 6278->6276 6279->6270 6280 402d8a RegDeleteKeyA 6279->6280 6280->6270 6281 402626 6282 40262b 6281->6282 6283 40263f 6281->6283 6284 402bac 17 API calls 6282->6284 6285 402bce 17 API calls 6283->6285 6287 402634 6284->6287 6286 402646 lstrlenA 6285->6286 6286->6287 6288 402668 6287->6288 6289 405d01 WriteFile 6287->6289 6289->6288 6290 405326 6291 4054d1 6290->6291 6292 405348 GetDlgItem GetDlgItem GetDlgItem 6290->6292 6294 405501 6291->6294 6295 4054d9 GetDlgItem CreateThread CloseHandle 6291->6295 6335 40417a SendMessageA 6292->6335 6297 40552f 6294->6297 6298 405550 6294->6298 6299 405517 ShowWindow ShowWindow 6294->6299 6295->6294 6296 4053b8 6304 4053bf GetClientRect GetSystemMetrics SendMessageA SendMessageA 6296->6304 6301 405563 ShowWindow 6297->6301 6302 40553f 6297->6302 6305 40558a 6297->6305 6303 4041ac 8 API calls 6298->6303 6337 40417a SendMessageA 6299->6337 6309 405583 6301->6309 6310 405575 6301->6310 6307 40411e SendMessageA 6302->6307 6308 40555c 6303->6308 6311 405411 SendMessageA SendMessageA 6304->6311 6312 40542d 6304->6312 6305->6298 6306 405597 SendMessageA 6305->6306 6306->6308 6313 4055b0 CreatePopupMenu 6306->6313 6307->6298 6317 40411e SendMessageA 6309->6317 6316 4051e8 24 API calls 6310->6316 6311->6312 6314 405440 6312->6314 6315 405432 SendMessageA 6312->6315 6318 406154 17 API calls 6313->6318 6319 404145 18 API calls 6314->6319 6315->6314 6316->6309 6317->6305 6320 4055c0 AppendMenuA 6318->6320 6321 405450 6319->6321 6322 4055f1 TrackPopupMenu 6320->6322 6323 4055de GetWindowRect 6320->6323 6324 405459 ShowWindow 6321->6324 6325 40548d GetDlgItem SendMessageA 6321->6325 6322->6308 6326 40560d 6322->6326 6323->6322 6327 40547c 6324->6327 6328 40546f ShowWindow 6324->6328 6325->6308 6329 4054b4 SendMessageA SendMessageA 6325->6329 6330 40562c SendMessageA 6326->6330 6336 40417a SendMessageA 6327->6336 6328->6327 6329->6308 6330->6330 6331 405649 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 6330->6331 6333 40566b SendMessageA 6331->6333 6333->6333 6334 40568d GlobalUnlock SetClipboardData CloseClipboard 6333->6334 6334->6308 6335->6296 6336->6325 6337->6297 6338 6e441b23 6339 6e441b32 6338->6339 6340 6e441b89 6338->6340 6341 6e441b6d 6339->6341 6342 6e441b39 6339->6342 6344 6e441b84 6340->6344 6346 6e441b9c DrawTextA 6340->6346 6353 6e441779 6341->6353 6342->6344 6345 6e441b56 SendMessageA 6342->6345 6345->6344 6347 6e441bdc 6346->6347 6348 6e441c38 6347->6348 6349 6e441bf9 GetWindowLongA 6347->6349 6348->6344 6352 6e441c4a DrawFocusRect 6348->6352 6350 6e441c17 DrawTextA 6349->6350 6351 6e441c08 SetTextColor 6349->6351 6350->6348 6351->6350 6352->6344 6359 6e44178c 6353->6359 6354 6e4417eb 6354->6344 6355 6e4418f8 6355->6354 6358 6e441901 SendMessageA 6355->6358 6356 6e4419de 6356->6355 6360 6e4419ea ShellExecuteA 6356->6360 6357 6e44181a 6361 6e441923 GetWindowTextA 6357->6361 6362 6e441823 6357->6362 6358->6354 6359->6354 6359->6355 6359->6356 6359->6357 6360->6355 6363 6e441975 GetCurrentDirectoryA 6361->6363 6362->6355 6364 6e4418c0 SHBrowseForFolderA 6362->6364 6365 6e44185e SHGetDesktopFolder lstrlenA 6362->6365 6366 6e441993 GetOpenFileNameA 6363->6366 6367 6e44198b GetSaveFileNameA 6363->6367 6364->6355 6369 6e4418d0 SHGetPathFromIDListA 6364->6369 6382 6e441000 GlobalAlloc 6365->6382 6379 6e441999 6366->6379 6367->6379 6370 6e4418f1 CoTaskMemFree 6369->6370 6371 6e4418e2 6369->6371 6370->6355 6375 6e441087 SetWindowTextA 6371->6375 6372 6e44187b MultiByteToWideChar 6378 6e4418a8 6372->6378 6373 6e4419c3 6374 6e441087 SetWindowTextA 6373->6374 6377 6e4419d2 SetCurrentDirectoryA 6374->6377 6375->6370 6376 6e4419a9 CommDlgExtendedError 6376->6355 6376->6379 6377->6355 6380 6e44100f GlobalFree 6378->6380 6379->6355 6379->6363 6379->6373 6379->6376 6381 6e4418ae 6380->6381 6381->6364 6382->6372 4841 6e492921 4842 6e492971 4841->4842 4843 6e492931 VirtualProtect 4841->4843 4843->4842 6383 404928 6384 404954 6383->6384 6385 404938 6383->6385 6387 404987 6384->6387 6388 40495a SHGetPathFromIDListA 6384->6388 6394 4057c1 GetDlgItemTextA 6385->6394 6390 404971 SendMessageA 6388->6390 6391 40496a 6388->6391 6389 404945 SendMessageA 6389->6384 6390->6387 6393 40140b 2 API calls 6391->6393 6393->6390 6394->6389 4844 401c2e 4845 402bac 17 API calls 4844->4845 4846 401c35 4845->4846 4847 402bac 17 API calls 4846->4847 4848 401c42 4847->4848 4849 402bce 17 API calls 4848->4849 4853 401c57 4848->4853 4849->4853 4850 402bce 17 API calls 4854 401c67 4850->4854 4851 401c72 4855 402bac 17 API calls 4851->4855 4852 401cbe 4856 402bce 17 API calls 4852->4856 4853->4850 4853->4854 4854->4851 4854->4852 4857 401c77 4855->4857 4858 401cc3 4856->4858 4859 402bac 17 API calls 4857->4859 4860 402bce 17 API calls 4858->4860 4861 401c83 4859->4861 4862 401ccc FindWindowExA 4860->4862 4863 401c90 SendMessageTimeoutA 4861->4863 4864 401cae SendMessageA 4861->4864 4865 401cea 4862->4865 4863->4865 4864->4865 6395 6e491638 6396 6e491667 6395->6396 6397 6e491a98 18 API calls 6396->6397 6398 6e49166e 6397->6398 6399 6e491681 6398->6399 6400 6e491675 6398->6400 6402 6e4916a8 6399->6402 6403 6e49168b 6399->6403 6401 6e491266 2 API calls 6400->6401 6406 6e49167f 6401->6406 6404 6e4916ae 6402->6404 6405 6e4916d2 6402->6405 6407 6e4914e2 3 API calls 6403->6407 6408 6e491559 3 API calls 6404->6408 6409 6e4914e2 3 API calls 6405->6409 6410 6e491690 6407->6410 6411 6e4916b3 6408->6411 6409->6406 6412 6e491559 3 API calls 6410->6412 6413 6e491266 2 API calls 6411->6413 6414 6e491696 6412->6414 6415 6e4916b9 GlobalFree 6413->6415 6416 6e491266 2 API calls 6414->6416 6415->6406 6417 6e4916cd GlobalFree 6415->6417 6418 6e49169c GlobalFree 6416->6418 6417->6406 6418->6406 6419 6e49103d 6420 6e49101b 5 API calls 6419->6420 6421 6e491056 6420->6421 5418 402a35 SendMessageA 5419 402a4f InvalidateRect 5418->5419 5420 402a5a 5418->5420 5419->5420 6422 401e35 GetDC 6423 402bac 17 API calls 6422->6423 6424 401e47 GetDeviceCaps MulDiv ReleaseDC 6423->6424 6425 402bac 17 API calls 6424->6425 6426 401e78 6425->6426 6427 406154 17 API calls 6426->6427 6428 401eb5 CreateFontIndirectA 6427->6428 6429 402620 6428->6429 6430 6e491837 6432 6e49185a 6430->6432 6431 6e49189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 6434 6e491266 2 API calls 6431->6434 6432->6431 6433 6e49188a GlobalFree 6432->6433 6433->6431 6435 6e491a1e GlobalFree GlobalFree 6434->6435 4718 401ec5 4726 402bac 4718->4726 4720 401ecb 4721 402bac 17 API calls 4720->4721 4722 401ed7 4721->4722 4723 401ee3 ShowWindow 4722->4723 4724 401eee EnableWindow 4722->4724 4725 402a5a 4723->4725 4724->4725 4729 406154 4726->4729 4728 402bc1 4728->4720 4733 406161 4729->4733 4730 406383 4731 406398 4730->4731 4762 4060c1 lstrcpynA 4730->4762 4731->4728 4733->4730 4734 40635d lstrlenA 4733->4734 4737 406154 10 API calls 4733->4737 4739 406279 GetSystemDirectoryA 4733->4739 4740 40628c GetWindowsDirectoryA 4733->4740 4742 4062c0 SHGetSpecialFolderLocation 4733->4742 4743 406154 10 API calls 4733->4743 4744 406306 lstrcatA 4733->4744 4746 405fa8 4733->4746 4751 40639c 4733->4751 4760 40601f wsprintfA 4733->4760 4761 4060c1 lstrcpynA 4733->4761 4734->4733 4737->4734 4739->4733 4740->4733 4742->4733 4745 4062d8 SHGetPathFromIDListA CoTaskMemFree 4742->4745 4743->4733 4744->4733 4745->4733 4763 405f47 4746->4763 4749 40600b 4749->4733 4750 405fdc RegQueryValueExA RegCloseKey 4750->4749 4757 4063a8 4751->4757 4752 406410 4753 406414 CharPrevA 4752->4753 4755 40642f 4752->4755 4753->4752 4754 406405 CharNextA 4754->4752 4754->4757 4755->4733 4757->4752 4757->4754 4758 4063f3 CharNextA 4757->4758 4759 406400 CharNextA 4757->4759 4767 405a84 4757->4767 4758->4757 4759->4754 4760->4733 4761->4733 4762->4731 4764 405f56 4763->4764 4765 405f5a 4764->4765 4766 405f5f RegOpenKeyExA 4764->4766 4765->4749 4765->4750 4766->4765 4768 405a8a 4767->4768 4769 405a9d 4768->4769 4770 405a90 CharNextA 4768->4770 4769->4757 4770->4768 6446 401fcb 6447 402bce 17 API calls 6446->6447 6448 401fd2 6447->6448 6449 406435 2 API calls 6448->6449 6450 401fd8 6449->6450 6452 401fea 6450->6452 6453 40601f wsprintfA 6450->6453 6453->6452 6454 4014d6 6455 402bac 17 API calls 6454->6455 6456 4014dc Sleep 6455->6456 6458 402a5a 6456->6458 6459 4045d7 6460 404603 6459->6460 6461 404614 6459->6461 6520 4057c1 GetDlgItemTextA 6460->6520 6463 404620 GetDlgItem 6461->6463 6470 40467f 6461->6470 6465 404634 6463->6465 6464 40460e 6467 40639c 5 API calls 6464->6467 6468 404648 SetWindowTextA 6465->6468 6473 405af2 4 API calls 6465->6473 6466 404763 6469 40490d 6466->6469 6522 4057c1 GetDlgItemTextA 6466->6522 6467->6461 6474 404145 18 API calls 6468->6474 6472 4041ac 8 API calls 6469->6472 6470->6466 6470->6469 6475 406154 17 API calls 6470->6475 6477 404921 6472->6477 6478 40463e 6473->6478 6479 404664 6474->6479 6480 4046f3 SHBrowseForFolderA 6475->6480 6476 404793 6481 405b47 18 API calls 6476->6481 6478->6468 6487 405a59 3 API calls 6478->6487 6482 404145 18 API calls 6479->6482 6480->6466 6483 40470b CoTaskMemFree 6480->6483 6484 404799 6481->6484 6485 404672 6482->6485 6486 405a59 3 API calls 6483->6486 6523 4060c1 lstrcpynA 6484->6523 6521 40417a SendMessageA 6485->6521 6489 404718 6486->6489 6487->6468 6492 40474f SetDlgItemTextA 6489->6492 6496 406154 17 API calls 6489->6496 6491 404678 6494 4064ca 5 API calls 6491->6494 6492->6466 6493 4047b0 6495 4064ca 5 API calls 6493->6495 6494->6470 6503 4047b7 6495->6503 6497 404737 lstrcmpiA 6496->6497 6497->6492 6500 404748 lstrcatA 6497->6500 6498 4047f3 6524 4060c1 lstrcpynA 6498->6524 6500->6492 6501 4047fa 6502 405af2 4 API calls 6501->6502 6504 404800 GetDiskFreeSpaceA 6502->6504 6503->6498 6507 405aa0 2 API calls 6503->6507 6509 40484b 6503->6509 6506 404824 MulDiv 6504->6506 6504->6509 6506->6509 6507->6503 6508 4048bc 6511 4048df 6508->6511 6513 40140b 2 API calls 6508->6513 6509->6508 6510 404a53 20 API calls 6509->6510 6512 4048a9 6510->6512 6525 404167 EnableWindow 6511->6525 6515 4048be SetDlgItemTextA 6512->6515 6516 4048ae 6512->6516 6513->6511 6515->6508 6518 40498e 20 API calls 6516->6518 6517 4048fb 6517->6469 6526 404530 6517->6526 6518->6508 6520->6464 6521->6491 6522->6476 6523->6493 6524->6501 6525->6517 6527 404543 SendMessageA 6526->6527 6528 40453e 6526->6528 6527->6469 6528->6527 6529 6e4915d1 6530 6e4914bb GlobalFree 6529->6530 6532 6e4915e9 6530->6532 6531 6e49162f GlobalFree 6532->6531 6533 6e491604 6532->6533 6534 6e49161b VirtualFree 6532->6534 6533->6531 6534->6531 6535 4029de 6536 4064ca 5 API calls 6535->6536 6537 4029e5 6536->6537 6538 402bce 17 API calls 6537->6538 6539 4029ee 6538->6539 6540 402a2a 6539->6540 6545 406114 6539->6545 6542 4029fc 6542->6540 6549 4060fe 6542->6549 6546 40611f 6545->6546 6547 406142 IIDFromString 6546->6547 6548 40613b 6546->6548 6547->6542 6548->6542 6552 4060e3 WideCharToMultiByte 6549->6552 6551 402a1d CoTaskMemFree 6551->6540 6552->6551 6553 4027df 6554 402bce 17 API calls 6553->6554 6556 4027ed 6554->6556 6555 402803 6558 405c35 2 API calls 6555->6558 6556->6555 6557 402bce 17 API calls 6556->6557 6557->6555 6559 402809 6558->6559 6581 405c5a GetFileAttributesA CreateFileA 6559->6581 6561 402816 6562 402822 GlobalAlloc 6561->6562 6563 4028bf 6561->6563 6564 4028b6 CloseHandle 6562->6564 6565 40283b 6562->6565 6566 4028c7 DeleteFileA 6563->6566 6567 4028da 6563->6567 6564->6563 6582 4032ca SetFilePointer 6565->6582 6566->6567 6569 402841 6570 4032b4 ReadFile 6569->6570 6571 40284a GlobalAlloc 6570->6571 6572 402894 6571->6572 6573 40285a 6571->6573 6575 405d01 WriteFile 6572->6575 6574 4030d8 35 API calls 6573->6574 6580 402867 6574->6580 6576 4028a0 GlobalFree 6575->6576 6577 4030d8 35 API calls 6576->6577 6578 4028b3 6577->6578 6578->6564 6579 40288b GlobalFree 6579->6572 6580->6579 6581->6561 6582->6569 6583 4028e0 6584 402bac 17 API calls 6583->6584 6585 4028e6 6584->6585 6586 402925 6585->6586 6587 40290e 6585->6587 6596 4027bf 6585->6596 6588 40293f 6586->6588 6589 40292f 6586->6589 6590 402922 6587->6590 6591 402913 6587->6591 6593 406154 17 API calls 6588->6593 6592 402bac 17 API calls 6589->6592 6598 40601f wsprintfA 6590->6598 6597 4060c1 lstrcpynA 6591->6597 6592->6596 6593->6596 6597->6596 6598->6596 6599 4023e0 6600 402bce 17 API calls 6599->6600 6601 4023f1 6600->6601 6602 402bce 17 API calls 6601->6602 6603 4023fa 6602->6603 6604 402bce 17 API calls 6603->6604 6605 402404 GetPrivateProfileStringA 6604->6605 6606 6e4910e0 6607 6e49110e 6606->6607 6608 6e4911c4 GlobalFree 6607->6608 6609 6e4912ad 2 API calls 6607->6609 6610 6e4911c3 6607->6610 6611 6e491266 2 API calls 6607->6611 6612 6e491155 GlobalAlloc 6607->6612 6613 6e4911ea GlobalFree 6607->6613 6614 6e4911b1 GlobalFree 6607->6614 6615 6e4912d1 lstrcpyA 6607->6615 6609->6607 6610->6608 6611->6614 6612->6607 6613->6607 6614->6607 6615->6607 6616 6e492be3 6617 6e492bfb 6616->6617 6618 6e491534 2 API calls 6617->6618 6619 6e492c16 6618->6619 6620 4022eb 6621 402bce 17 API calls 6620->6621 6622 4022f1 6621->6622 6623 402bce 17 API calls 6622->6623 6624 4022fa 6623->6624 6625 402bce 17 API calls 6624->6625 6626 402303 6625->6626 6627 406435 2 API calls 6626->6627 6628 40230c 6627->6628 6629 40231d lstrlenA lstrlenA 6628->6629 6633 402310 6628->6633 6631 4051e8 24 API calls 6629->6631 6630 4051e8 24 API calls 6634 402318 6630->6634 6632 402359 SHFileOperationA 6631->6632 6632->6633 6632->6634 6633->6630 6633->6634 6635 4019ed 6636 402bce 17 API calls 6635->6636 6637 4019f4 6636->6637 6638 402bce 17 API calls 6637->6638 6639 4019fd 6638->6639 6640 401a04 lstrcmpiA 6639->6640 6641 401a16 lstrcmpA 6639->6641 6642 401a0a 6640->6642 6641->6642 6650 4014f4 SetForegroundWindow 6651 402a5a 6650->6651 6659 401ef9 6660 402bce 17 API calls 6659->6660 6661 401eff 6660->6661 6662 402bce 17 API calls 6661->6662 6663 401f08 6662->6663 6664 402bce 17 API calls 6663->6664 6665 401f11 6664->6665 6666 402bce 17 API calls 6665->6666 6667 401f1a 6666->6667 6668 401423 24 API calls 6667->6668 6669 401f21 6668->6669 6676 4057a3 ShellExecuteExA 6669->6676 6671 401f5c 6672 40653f 5 API calls 6671->6672 6673 4027bf 6671->6673 6674 401f76 CloseHandle 6672->6674 6674->6673 6676->6671 6677 6e4428ff 6678 6e442937 6677->6678 6679 6e44292c 6677->6679 6681 6e441e49 72 API calls 6678->6681 6680 6e442b06 2 API calls 6679->6680 6682 6e442936 6680->6682 6683 6e44293c 6681->6683 6683->6682 6684 6e442ac6 2 API calls 6683->6684 6685 6e442946 6684->6685 6685->6685 6686 401ffb 6687 402bce 17 API calls 6686->6687 6688 402002 6687->6688 6689 4064ca 5 API calls 6688->6689 6690 402011 6689->6690 6691 402029 GlobalAlloc 6690->6691 6692 402091 6690->6692 6691->6692 6693 40203d 6691->6693 6694 4064ca 5 API calls 6693->6694 6695 402044 6694->6695 6696 4064ca 5 API calls 6695->6696 6697 40204e 6696->6697 6697->6692 6701 40601f wsprintfA 6697->6701 6699 402085 6702 40601f wsprintfA 6699->6702 6701->6699 6702->6692 6703 4018fd 6704 401934 6703->6704 6705 402bce 17 API calls 6704->6705 6706 401939 6705->6706 6707 405889 67 API calls 6706->6707 6708 401942 6707->6708 6709 401b87 6710 401b94 6709->6710 6711 401bd8 6709->6711 6712 401c1c 6710->6712 6717 401bab 6710->6717 6713 401c01 GlobalAlloc 6711->6713 6714 401bdc 6711->6714 6715 406154 17 API calls 6712->6715 6727 402387 6712->6727 6716 406154 17 API calls 6713->6716 6714->6727 6730 4060c1 lstrcpynA 6714->6730 6720 402381 6715->6720 6716->6712 6728 4060c1 lstrcpynA 6717->6728 6723 4057dd MessageBoxIndirectA 6720->6723 6720->6727 6721 401bee GlobalFree 6721->6727 6722 401bba 6729 4060c1 lstrcpynA 6722->6729 6723->6727 6725 401bc9 6731 4060c1 lstrcpynA 6725->6731 6728->6722 6729->6725 6730->6721 6731->6727 6732 402588 6733 402c0e 17 API calls 6732->6733 6734 402592 6733->6734 6735 402bac 17 API calls 6734->6735 6736 40259b 6735->6736 6737 4025c2 RegEnumValueA 6736->6737 6738 4025b6 RegEnumKeyA 6736->6738 6740 4027bf 6736->6740 6739 4025d7 RegCloseKey 6737->6739 6738->6739 6739->6740 6742 401490 6743 4051e8 24 API calls 6742->6743 6744 401497 6743->6744 6745 404590 6746 4045a0 6745->6746 6747 4045c6 6745->6747 6749 404145 18 API calls 6746->6749 6748 4041ac 8 API calls 6747->6748 6750 4045d2 6748->6750 6751 4045ad SetDlgItemTextA 6749->6751 6751->6747 6752 403892 6753 40389d 6752->6753 6754 4038a4 GlobalAlloc 6753->6754 6755 4038a1 6753->6755 6754->6755 6756 6e441097 6757 6e4410d6 6756->6757 6758 6e44109f GetWindowTextA 6756->6758 6758->6757 6759 6e4410c5 SendMessageA 6758->6759 6759->6757 5502 40239c 5503 4023a4 5502->5503 5504 4023aa 5502->5504 5506 402bce 17 API calls 5503->5506 5505 4023ba 5504->5505 5507 402bce 17 API calls 5504->5507 5508 4023c8 5505->5508 5509 402bce 17 API calls 5505->5509 5506->5504 5507->5505 5510 402bce 17 API calls 5508->5510 5509->5508 5511 4023d1 WritePrivateProfileStringA 5510->5511 5512 40209d 5513 4020af 5512->5513 5523 40215d 5512->5523 5514 402bce 17 API calls 5513->5514 5515 4020b6 5514->5515 5517 402bce 17 API calls 5515->5517 5516 401423 24 API calls 5521 4022e2 5516->5521 5518 4020bf 5517->5518 5519 4020d4 LoadLibraryExA 5518->5519 5520 4020c7 GetModuleHandleA 5518->5520 5522 4020e4 GetProcAddress 5519->5522 5519->5523 5520->5519 5520->5522 5524 402130 5522->5524 5525 4020f3 5522->5525 5523->5516 5526 4051e8 24 API calls 5524->5526 5527 402112 5525->5527 5528 4020fb 5525->5528 5529 402103 5526->5529 5534 6e4916db 5527->5534 5576 6e44294b 5527->5576 5530 401423 24 API calls 5528->5530 5529->5521 5531 402151 FreeLibrary 5529->5531 5530->5529 5531->5521 5535 6e49170b 5534->5535 5584 6e491a98 5535->5584 5537 6e491712 5538 6e491834 5537->5538 5539 6e49172a 5537->5539 5540 6e491723 5537->5540 5538->5529 5618 6e4922f1 5539->5618 5635 6e4922af 5540->5635 5545 6e49178e 5550 6e4917dc 5545->5550 5551 6e491794 5545->5551 5546 6e491770 5648 6e4924d8 5546->5648 5547 6e491759 5560 6e49174f 5547->5560 5645 6e492cc3 5547->5645 5548 6e491740 5555 6e491751 5548->5555 5556 6e491746 5548->5556 5553 6e4924d8 11 API calls 5550->5553 5667 6e49156b 5551->5667 5561 6e4917cd 5553->5561 5554 6e491776 5659 6e491559 5554->5659 5639 6e4926b2 5555->5639 5556->5560 5629 6e492a38 5556->5629 5560->5545 5560->5546 5567 6e491823 5561->5567 5673 6e49249e 5561->5673 5564 6e4924d8 11 API calls 5564->5561 5566 6e491757 5566->5560 5567->5538 5569 6e49182d GlobalFree 5567->5569 5569->5538 5573 6e49180f 5573->5567 5677 6e4914e2 wsprintfA 5573->5677 5574 6e491808 FreeLibrary 5574->5573 5577 6e44297f 5576->5577 5578 6e442994 5577->5578 5579 6e442988 5577->5579 5708 6e441e49 5578->5708 5580 6e442b06 2 API calls 5579->5580 5582 6e442992 5580->5582 5582->5529 5680 6e491215 GlobalAlloc 5584->5680 5586 6e491abf 5681 6e491215 GlobalAlloc 5586->5681 5588 6e491d00 GlobalFree GlobalFree GlobalFree 5589 6e491d1d 5588->5589 5607 6e491d67 5588->5607 5590 6e4920f1 5589->5590 5598 6e491d32 5589->5598 5589->5607 5592 6e492113 GetModuleHandleA 5590->5592 5590->5607 5591 6e491bbd GlobalAlloc 5611 6e491aca 5591->5611 5595 6e492139 5592->5595 5596 6e492124 LoadLibraryA 5592->5596 5593 6e491c08 lstrcpyA 5597 6e491c12 lstrcpyA 5593->5597 5594 6e491c26 GlobalFree 5594->5611 5688 6e4915c2 GetProcAddress 5595->5688 5596->5595 5596->5607 5597->5611 5598->5607 5684 6e491224 5598->5684 5600 6e49218a 5603 6e492197 lstrlenA 5600->5603 5600->5607 5601 6e491fb7 5687 6e491215 GlobalAlloc 5601->5687 5689 6e4915c2 GetProcAddress 5603->5689 5605 6e491ef9 GlobalFree 5605->5611 5606 6e492033 5606->5607 5614 6e49208c lstrcpyA 5606->5614 5607->5537 5608 6e49214b 5608->5600 5616 6e492174 GetProcAddress 5608->5616 5610 6e4921b0 5610->5607 5611->5588 5611->5591 5611->5593 5611->5594 5611->5597 5611->5601 5611->5605 5611->5606 5611->5607 5612 6e491224 2 API calls 5611->5612 5613 6e491c64 5611->5613 5612->5611 5613->5611 5682 6e491534 GlobalSize GlobalAlloc 5613->5682 5614->5607 5616->5600 5617 6e491fbf 5617->5537 5619 6e49230a 5618->5619 5621 6e492446 GlobalFree 5619->5621 5622 6e4923b8 GlobalAlloc MultiByteToWideChar 5619->5622 5624 6e492405 5619->5624 5625 6e491224 GlobalAlloc lstrcpynA 5619->5625 5691 6e4912ad 5619->5691 5621->5619 5623 6e491730 5621->5623 5622->5624 5626 6e4923e4 GlobalAlloc 5622->5626 5623->5547 5623->5548 5623->5560 5624->5621 5695 6e492646 5624->5695 5625->5619 5627 6e4923fc GlobalFree 5626->5627 5627->5621 5631 6e492a4a 5629->5631 5630 6e492aef CreateMutexA 5634 6e492b0d 5630->5634 5631->5630 5633 6e492bd9 5633->5560 5698 6e4929e4 5634->5698 5636 6e4922c4 5635->5636 5637 6e4922cf GlobalAlloc 5636->5637 5638 6e491729 5636->5638 5637->5636 5638->5539 5643 6e4926e2 5639->5643 5640 6e49277d GlobalAlloc 5644 6e4927a0 5640->5644 5641 6e492790 5642 6e492796 GlobalSize 5641->5642 5641->5644 5642->5644 5643->5640 5643->5641 5644->5566 5646 6e492cce 5645->5646 5647 6e492d0e GlobalFree 5646->5647 5702 6e491215 GlobalAlloc 5648->5702 5650 6e492598 WideCharToMultiByte 5656 6e4924e4 5650->5656 5651 6e492563 lstrcpynA 5651->5656 5652 6e492574 StringFromGUID2 WideCharToMultiByte 5652->5656 5653 6e4925b9 wsprintfA 5653->5656 5654 6e4925dd GlobalFree 5654->5656 5655 6e492617 GlobalFree 5655->5554 5656->5650 5656->5651 5656->5652 5656->5653 5656->5654 5656->5655 5657 6e491266 2 API calls 5656->5657 5703 6e4912d1 5656->5703 5657->5656 5707 6e491215 GlobalAlloc 5659->5707 5661 6e49155e 5662 6e49156b 2 API calls 5661->5662 5663 6e491568 5662->5663 5664 6e491266 5663->5664 5665 6e4912a8 GlobalFree 5664->5665 5666 6e49126f GlobalAlloc lstrcpynA 5664->5666 5665->5561 5666->5665 5668 6e4915a4 lstrcpyA 5667->5668 5669 6e491577 wsprintfA 5667->5669 5672 6e4915bd 5668->5672 5669->5672 5672->5564 5674 6e4924ac 5673->5674 5675 6e4917ef 5673->5675 5674->5675 5676 6e4924c5 GlobalFree 5674->5676 5675->5573 5675->5574 5676->5674 5678 6e491266 2 API calls 5677->5678 5679 6e491503 5678->5679 5679->5567 5680->5586 5681->5611 5683 6e491552 5682->5683 5683->5613 5690 6e491215 GlobalAlloc 5684->5690 5686 6e491233 lstrcpynA 5686->5607 5687->5617 5688->5608 5689->5610 5690->5686 5692 6e4912b4 5691->5692 5693 6e491224 2 API calls 5692->5693 5694 6e4912cf 5693->5694 5694->5619 5696 6e4926aa 5695->5696 5697 6e492654 VirtualAlloc 5695->5697 5696->5624 5697->5696 5699 6e4929ef 5698->5699 5700 6e4929f4 GetLastError 5699->5700 5701 6e4929ff 5699->5701 5700->5701 5701->5633 5702->5656 5704 6e4912f9 5703->5704 5705 6e4912da 5703->5705 5704->5656 5705->5704 5706 6e4912e0 lstrcpyA 5705->5706 5706->5704 5707->5661 5709 6e441e70 5708->5709 5714 6e441e80 5708->5714 5824 6e442ac6 5709->5824 5711 6e442734 5713 6e442ac6 2 API calls 5711->5713 5712 6e441e76 5715 6e442b06 2 API calls 5712->5715 5713->5712 5714->5711 5780 6e44140b 5714->5780 5716 6e44271c 5715->5716 5716->5529 5719 6e441ebd GetDlgItem 5720 6e441ee3 GetDlgItem GetDlgItem GetDlgItem 5719->5720 5721 6e441ed3 5719->5721 5821 6e441087 5720->5821 5723 6e442ac6 2 API calls 5721->5723 5723->5712 5725 6e441087 SetWindowTextA 5726 6e441f23 5725->5726 5727 6e441087 SetWindowTextA 5726->5727 5728 6e441f34 5727->5728 5729 6e441f44 EnableWindow 5728->5729 5730 6e441f4d 5728->5730 5729->5730 5731 6e441f57 EnableWindow 5730->5731 5732 6e441f81 5730->5732 5733 6e441f68 GetSystemMenu EnableMenuItem 5731->5733 5734 6e441fa4 SendMessageA CreateDialogParamA 5732->5734 5735 6e441f8b ShowWindow 5732->5735 5733->5732 5737 6e442720 5734->5737 5738 6e441fdc GetWindowRect MapWindowPoints SetWindowPos SendMessageA 5734->5738 5735->5734 5740 6e442ac6 2 API calls 5737->5740 5739 6e4426d0 5738->5739 5774 6e442046 5738->5774 5838 6e441071 SendMessageA 5739->5838 5742 6e442726 5740->5742 5744 6e442b06 2 API calls 5742->5744 5743 6e4426db 5746 6e441087 SetWindowTextA 5743->5746 5744->5716 5745 6e4426ca 5745->5739 5745->5743 5747 6e4426e9 wsprintfA 5746->5747 5749 6e442b06 2 API calls 5747->5749 5748 6e442090 MapDialogRect 5748->5774 5749->5716 5750 6e4421b8 CreateWindowExA wsprintfA wsprintfA WritePrivateProfileStringA 5751 6e44224d SendMessageA 5750->5751 5750->5774 5751->5774 5752 6e442631 SendMessageA 5753 6e442647 GetWindowLongA SetWindowLongA 5752->5753 5752->5774 5753->5774 5755 6e442629 SendMessageA 5755->5774 5756 6e442286 SetWindowLongA 5756->5774 5757 6e4422ad LoadImageA 5757->5774 5758 6e4422e8 GetModuleHandleA LoadIconA 5758->5774 5759 6e441087 SetWindowTextA 5759->5774 5760 6e442479 SendMessageA 5764 6e442494 GetClientRect SetWindowPos 5760->5764 5760->5774 5762 6e442310 GetObjectA 5762->5760 5762->5774 5764->5774 5766 6e44257e CharNextA 5766->5774 5767 6e44100f GlobalFree 5767->5774 5768 6e44256c SendMessageA 5768->5774 5769 6e442342 CreateCompatibleDC SelectObject GetDIBits CreateRectRgn 5770 6e442450 SetWindowRgn DeleteObject DeleteObject 5769->5770 5769->5774 5772 6e44100f GlobalFree 5770->5772 5771 6e442612 SendMessageA 5771->5774 5776 6e4424e4 5771->5776 5772->5774 5773 6e4425b0 SendMessageA 5773->5776 5774->5745 5774->5748 5774->5750 5774->5752 5774->5756 5774->5757 5774->5758 5774->5759 5774->5760 5774->5762 5774->5766 5774->5767 5774->5768 5774->5769 5774->5770 5774->5771 5775 6e442412 CreateRectRgn CombineRgn DeleteObject 5774->5775 5774->5776 5829 6e442a6e 5774->5829 5833 6e441000 GlobalAlloc 5774->5833 5834 6e44101f lstrlenA 5774->5834 5775->5774 5776->5755 5776->5771 5776->5773 5776->5774 5777 6e4425d2 CharNextA 5776->5777 5778 6e4425e8 SendMessageA 5776->5778 5837 6e441071 SendMessageA 5776->5837 5777->5776 5778->5776 5779 6e4425fb SendMessageA 5778->5779 5779->5776 5839 6e4413d0 5780->5839 5783 6e4413d0 4 API calls 5784 6e441432 5783->5784 5785 6e4413d0 4 API calls 5784->5785 5786 6e441441 5785->5786 5787 6e4413d0 4 API calls 5786->5787 5788 6e441450 5787->5788 5844 6e4413ee GetPrivateProfileIntA 5788->5844 5790 6e441462 5845 6e4413ee GetPrivateProfileIntA 5790->5845 5792 6e441476 5846 6e4413ee GetPrivateProfileIntA 5792->5846 5794 6e441487 5847 6e4413ee GetPrivateProfileIntA 5794->5847 5796 6e441498 5848 6e4413ee GetPrivateProfileIntA 5796->5848 5798 6e4414a9 5849 6e4413ee GetPrivateProfileIntA 5798->5849 5800 6e4414b9 5801 6e4414d3 5800->5801 5856 6e441000 GlobalAlloc 5800->5856 5803 6e44175f 5801->5803 5804 6e441504 wsprintfA 5801->5804 5806 6e4429f1 lstrcmpiA 5801->5806 5807 6e4413a1 GetPrivateProfileStringA 5801->5807 5810 6e4413d0 GlobalAlloc lstrlenA lstrcpyA GetPrivateProfileStringA 5801->5810 5812 6e442a6e CharNextA 5801->5812 5813 6e442a6e CharNextA 5801->5813 5817 6e441649 CharNextA 5801->5817 5818 6e4413ee GetPrivateProfileIntA 5801->5818 5820 6e44101f GlobalAlloc lstrlenA lstrcpyA 5801->5820 5851 6e442a2b 5801->5851 5857 6e441000 GlobalAlloc 5801->5857 5858 6e441000 GlobalAlloc 5801->5858 5859 6e441767 GetSysColor 5801->5859 5803->5711 5803->5719 5850 6e4413a1 GetPrivateProfileStringA 5804->5850 5806->5801 5807->5801 5810->5801 5811 6e4415a5 lstrcpyA 5811->5801 5812->5801 5814 6e4415fe GetPrivateProfileStringA 5813->5814 5814->5801 5816 6e44162e lstrcpyA 5816->5801 5817->5801 5818->5801 5820->5801 5822 6e441094 5821->5822 5823 6e44108e SetWindowTextA 5821->5823 5822->5725 5823->5822 5825 6e442aff 5824->5825 5826 6e442ad0 5824->5826 5825->5712 5826->5825 5827 6e442af0 GlobalFree 5826->5827 5828 6e442add lstrcpyA 5826->5828 5827->5825 5828->5827 5830 6e442abf 5829->5830 5832 6e442a77 5829->5832 5830->5774 5831 6e442aa6 CharNextA 5831->5832 5832->5830 5832->5831 5833->5774 5866 6e441000 GlobalAlloc 5834->5866 5836 6e441030 lstrcpyA 5836->5774 5837->5774 5838->5743 5861 6e4413a1 GetPrivateProfileStringA 5839->5861 5841 6e4413d9 5842 6e4413e7 5841->5842 5843 6e44101f 3 API calls 5841->5843 5842->5783 5843->5842 5844->5790 5845->5792 5846->5794 5847->5796 5848->5798 5849->5800 5850->5801 5852 6e442a35 5851->5852 5853 6e442a42 CharNextA 5852->5853 5855 6e442a65 5852->5855 5862 6e4429f1 5852->5862 5853->5852 5855->5801 5856->5801 5857->5811 5858->5816 5860 6e441773 5859->5860 5860->5801 5861->5841 5864 6e442a1d 5862->5864 5865 6e4429fe 5862->5865 5863 6e442a02 lstrcmpiA 5863->5864 5863->5865 5864->5852 5865->5863 5865->5864 5866->5836 6760 40149d 6761 402387 6760->6761 6762 4014ab PostQuitMessage 6760->6762 6762->6761 6763 40159d 6764 402bce 17 API calls 6763->6764 6765 4015a4 SetFileAttributesA 6764->6765 6766 4015b6 6765->6766 6772 4027a1 6773 402bce 17 API calls 6772->6773 6774 4027a8 FindFirstFileA 6773->6774 6775 4027cb 6774->6775 6778 4027bb 6774->6778 6776 4027d2 6775->6776 6780 40601f wsprintfA 6775->6780 6781 4060c1 lstrcpynA 6776->6781 6780->6776 6781->6778 6789 6e4429a8 6790 6e4429d7 6789->6790 6791 6e4429cc 6789->6791 6792 6e442b06 2 API calls 6791->6792 6793 6e4429d6 6792->6793 6794 4042b0 6795 4043d2 6794->6795 6796 4042c6 6794->6796 6797 404441 6795->6797 6799 40450b 6795->6799 6804 404416 GetDlgItem SendMessageA 6795->6804 6798 404145 18 API calls 6796->6798 6797->6799 6800 40444b GetDlgItem 6797->6800 6801 40431c 6798->6801 6806 4041ac 8 API calls 6799->6806 6802 404461 6800->6802 6803 4044c9 6800->6803 6805 404145 18 API calls 6801->6805 6802->6803 6811 404487 SendMessageA LoadCursorA SetCursor 6802->6811 6803->6799 6807 4044db 6803->6807 6827 404167 EnableWindow 6804->6827 6809 404329 CheckDlgButton 6805->6809 6810 404506 6806->6810 6812 4044e1 SendMessageA 6807->6812 6813 4044f2 6807->6813 6825 404167 EnableWindow 6809->6825 6828 404554 6811->6828 6812->6813 6813->6810 6817 4044f8 SendMessageA 6813->6817 6814 40443c 6818 404530 SendMessageA 6814->6818 6817->6810 6818->6797 6819 404347 GetDlgItem 6826 40417a SendMessageA 6819->6826 6822 40435d SendMessageA 6823 404384 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 6822->6823 6824 40437b GetSysColor 6822->6824 6823->6810 6824->6823 6825->6819 6826->6822 6827->6814 6831 4057a3 ShellExecuteExA 6828->6831 6830 4044ba LoadCursorA SetCursor 6830->6803 6831->6830 6839 4014b7 6840 4014bd 6839->6840 6841 401389 2 API calls 6840->6841 6842 4014c5 6841->6842 6843 402dba 6844 402de2 6843->6844 6845 402dc9 SetTimer 6843->6845 6846 402e37 6844->6846 6847 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 6844->6847 6845->6844 6847->6846 5479 4015bb 5480 402bce 17 API calls 5479->5480 5481 4015c2 5480->5481 5482 405af2 4 API calls 5481->5482 5494 4015ca 5482->5494 5483 401624 5485 401652 5483->5485 5486 401629 5483->5486 5484 405a84 CharNextA 5484->5494 5489 401423 24 API calls 5485->5489 5498 401423 5486->5498 5496 40164a 5489->5496 5491 40572b 2 API calls 5491->5494 5492 405748 5 API calls 5492->5494 5493 40163b SetCurrentDirectoryA 5493->5496 5494->5483 5494->5484 5494->5491 5494->5492 5495 40160c GetFileAttributesA 5494->5495 5497 4056ae 4 API calls 5494->5497 5495->5494 5497->5494 5499 4051e8 24 API calls 5498->5499 5500 401431 5499->5500 5501 4060c1 lstrcpynA 5500->5501 5501->5493 6848 4016bb 6849 402bce 17 API calls 6848->6849 6850 4016c1 GetFullPathNameA 6849->6850 6852 4016d8 6850->6852 6857 4016f9 6850->6857 6851 40170d GetShortPathNameA 6853 402a5a 6851->6853 6854 406435 2 API calls 6852->6854 6852->6857 6855 4016e9 6854->6855 6855->6857 6858 4060c1 lstrcpynA 6855->6858 6857->6851 6857->6853 6858->6857 6859 4067be 6861 406642 6859->6861 6860 406fad 6861->6860 6862 4066c3 GlobalFree 6861->6862 6863 4066cc GlobalAlloc 6861->6863 6864 406743 GlobalAlloc 6861->6864 6865 40673a GlobalFree 6861->6865 6862->6863 6863->6860 6863->6861 6864->6860 6864->6861 6865->6864

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 178 403312-403351 SetErrorMode GetVersion 179 403353-40335b call 4064ca 178->179 180 403364 178->180 179->180 185 40335d 179->185 182 403369-40337c call 40645c lstrlenA 180->182 187 40337e-40339a call 4064ca * 3 182->187 185->180 194 4033ab-403409 #17 OleInitialize SHGetFileInfoA call 4060c1 GetCommandLineA call 4060c1 187->194 195 40339c-4033a2 187->195 202 403415-40342a call 405a84 CharNextA 194->202 203 40340b-403410 194->203 195->194 199 4033a4 195->199 199->194 206 4034ef-4034f3 202->206 203->202 207 4034f9 206->207 208 40342f-403432 206->208 209 40350c-403526 GetTempPathA call 4032e1 207->209 210 403434-403438 208->210 211 40343a-403442 208->211 220 403528-403546 GetWindowsDirectoryA lstrcatA call 4032e1 209->220 221 40357e-403598 DeleteFileA call 402ea1 209->221 210->210 210->211 212 403444-403445 211->212 213 40344a-40344d 211->213 212->213 215 403453-403457 213->215 216 4034df-4034ec call 405a84 213->216 218 403459-40345f 215->218 219 40346f-40349c 215->219 216->206 235 4034ee 216->235 223 403461-403463 218->223 224 403465 218->224 225 40349e-4034a4 219->225 226 4034af-4034dd 219->226 220->221 237 403548-403578 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032e1 220->237 238 40362c-40363c call 4037fa OleUninitialize 221->238 239 40359e-4035a4 221->239 223->219 223->224 224->219 230 4034a6-4034a8 225->230 231 4034aa 225->231 226->216 233 4034fb-403507 call 4060c1 226->233 230->226 230->231 231->226 233->209 235->206 237->221 237->238 250 403760-403766 238->250 251 403642-403652 call 4057dd ExitProcess 238->251 240 4035a6-4035b1 call 405a84 239->240 241 40361c-403623 call 4038d4 239->241 252 4035b3-4035dc 240->252 253 4035e7-4035f1 240->253 248 403628 241->248 248->238 255 4037e2-4037ea 250->255 256 403768-403781 GetCurrentProcess OpenProcessToken 250->256 257 4035de-4035e0 252->257 260 4035f3-403600 call 405b47 253->260 261 403658-40366c call 405748 lstrcatA 253->261 258 4037f0-4037f4 ExitProcess 255->258 259 4037ec 255->259 263 4037b3-4037c1 call 4064ca 256->263 264 403783-4037ad LookupPrivilegeValueA AdjustTokenPrivileges 256->264 257->253 265 4035e2-4035e5 257->265 259->258 260->238 272 403602-403618 call 4060c1 * 2 260->272 273 403679-403693 lstrcatA lstrcmpiA 261->273 274 40366e-403674 lstrcatA 261->274 275 4037c3-4037cd 263->275 276 4037cf-4037d9 ExitWindowsEx 263->276 264->263 265->253 265->257 272->241 273->238 279 403695-403698 273->279 274->273 275->276 277 4037db-4037dd call 40140b 275->277 276->255 276->277 277->255 283 4036a1 call 40572b 279->283 284 40369a-40369f call 4056ae 279->284 289 4036a6-4036b3 SetCurrentDirectoryA 283->289 284->289 291 4036c0-4036e8 call 4060c1 289->291 292 4036b5-4036bb call 4060c1 289->292 296 4036ee-40370a call 406154 DeleteFileA 291->296 292->291 299 40374b-403752 296->299 300 40370c-40371c CopyFileA 296->300 299->296 301 403754-40375b call 405ea0 299->301 300->299 302 40371e-40373e call 405ea0 call 406154 call 405760 300->302 301->238 302->299 311 403740-403747 CloseHandle 302->311 311->299
                                            APIs
                                            • SetErrorMode.KERNELBASE ref: 00403337
                                            • GetVersion.KERNEL32 ref: 0040333D
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403370
                                            • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033AC
                                            • OleInitialize.OLE32(00000000), ref: 004033B3
                                            • SHGetFileInfoA.SHELL32(0041FCE8,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 004033CF
                                            • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000007,00000009,0000000B), ref: 004033E4
                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\STjk6HCD1P.exe",00000020,"C:\Users\user\Desktop\STjk6HCD1P.exe",00000000,?,00000007,00000009,0000000B), ref: 00403420
                                            • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 0040351D
                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 0040352E
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 0040353A
                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 0040354E
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 00403556
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 00403567
                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040356F
                                            • DeleteFileA.KERNELBASE(2052,?,00000007,00000009,0000000B), ref: 00403583
                                              • Part of subcall function 004064CA: GetModuleHandleA.KERNEL32(?,?,?,00403385,0000000B), ref: 004064DC
                                              • Part of subcall function 004064CA: GetProcAddress.KERNEL32(00000000,?), ref: 004064F7
                                              • Part of subcall function 004038D4: lstrlenA.KERNEL32(show,?,?,?,show,00000000,C:\Program Files (x86)\Kingsoft DataRecovery Master,2052,00420D28,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D28,00000000,00000002,74DF3410), ref: 004039C4
                                              • Part of subcall function 004038D4: lstrcmpiA.KERNEL32(?,.exe), ref: 004039D7
                                              • Part of subcall function 004038D4: GetFileAttributesA.KERNEL32(show), ref: 004039E2
                                              • Part of subcall function 004038D4: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Program Files (x86)\Kingsoft DataRecovery Master), ref: 00403A2B
                                              • Part of subcall function 004038D4: RegisterClassA.USER32(00423EC0), ref: 00403A68
                                              • Part of subcall function 004037FA: CloseHandle.KERNEL32(000002D8,00403631,?,?,00000007,00000009,0000000B), ref: 00403805
                                            • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403631
                                            • ExitProcess.KERNEL32 ref: 00403652
                                            • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 0040376F
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403776
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378E
                                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AD
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004037D1
                                            • ExitProcess.KERNEL32 ref: 004037F4
                                              • Part of subcall function 004057DD: MessageBoxIndirectA.USER32(0040A218), ref: 00405838
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                            • String ID: "$"C:\Users\user\Desktop\STjk6HCD1P.exe"$.tmp$2052$C:\Program Files (x86)\Kingsoft DataRecovery Master$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\STjk6HCD1P.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`Kt$~nsu
                                            • API String ID: 3776617018-2730064989
                                            • Opcode ID: 9e76e0e7fa4598d4998c9c47d8edd6c076605abd8d11d3f634f2100633476e4e
                                            • Instruction ID: fed38e33bd1ad5050a1aac335cdd74565c3a3e786a0889b069c8e2b205acfbdc
                                            • Opcode Fuzzy Hash: 9e76e0e7fa4598d4998c9c47d8edd6c076605abd8d11d3f634f2100633476e4e
                                            • Instruction Fuzzy Hash: 7CC108702047406AD721AF759D49A2F3EACEF85306F45443FF581B62D2CB7C8A598B2E

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 6E4413EE: GetPrivateProfileIntA.KERNEL32(?,?,6E441462,NumFields), ref: 6E441402
                                            • wsprintfA.USER32 ref: 6E441527
                                            • lstrcpyA.KERNEL32(00000000,All Files|*.*,00000002,ListItems,All Files|*.*,State,6E444098,All Files|*.*,Flags,6E444098,All Files|*.*,6E444008,All Files|*.*,TYPE,CancelButtonText,Title), ref: 6E4415AA
                                            • GetPrivateProfileStringA.KERNEL32(6E446664,Filter,All Files|*.*,All Files|*.*,00002000,00000000), ref: 6E441619
                                            • lstrcpyA.KERNEL32(00000000,All Files|*.*,-00000002), ref: 6E441633
                                              • Part of subcall function 6E441000: GlobalAlloc.KERNEL32(00000040,?,6E441030,00000001), ref: 6E441006
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: PrivateProfilelstrcpy$AllocGlobalStringwsprintf
                                            • String ID: ...$@EDn$All Files|*.*$All Files|*.*$BOTTOM$BackButtonText$BackEnabled$CancelButtonText$CancelEnabled$CancelShow$Field %d$Filter$Flags$HWND2$LEFT$ListItems$MaxLen$MinLen$NextButtonText$NumFields$RIGHT$ROOT$RTL$Rect$Settings$State$T$TEXT$TOP$TYPE$Title$TxtColor$ValidateText$dfDn
                                            • API String ID: 3510956051-2063367539
                                            • Opcode ID: 595dfc9b62951116ccd34f68a99216d783f6931c2b1c5edb0d16c6c0cab57cdd
                                            • Instruction ID: e7cbd84cb1862dd7c88aec82daf13c999b66eb0accd922f2302bb9ff0efa186e
                                            • Opcode Fuzzy Hash: 595dfc9b62951116ccd34f68a99216d783f6931c2b1c5edb0d16c6c0cab57cdd
                                            • Instruction Fuzzy Hash: C0915AB0B00B45EBFB50EFF5D984E4ABBE9EB46398B10091FE1559BB00D734E4198B90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 751 405889-4058af call 405b47 754 4058b1-4058c3 DeleteFileA 751->754 755 4058c8-4058cf 751->755 756 405a52-405a56 754->756 757 4058d1-4058d3 755->757 758 4058e2-4058f2 call 4060c1 755->758 760 405a00-405a05 757->760 761 4058d9-4058dc 757->761 764 405901-405902 call 405aa0 758->764 765 4058f4-4058ff lstrcatA 758->765 760->756 763 405a07-405a0a 760->763 761->758 761->760 766 405a14-405a1c call 406435 763->766 767 405a0c-405a12 763->767 768 405907-40590a 764->768 765->768 766->756 775 405a1e-405a32 call 405a59 call 405841 766->775 767->756 771 405915-40591b lstrcatA 768->771 772 40590c-405913 768->772 774 405920-40593e lstrlenA FindFirstFileA 771->774 772->771 772->774 777 405944-40595b call 405a84 774->777 778 4059f6-4059fa 774->778 787 405a34-405a37 775->787 788 405a4a-405a4d call 4051e8 775->788 785 405966-405969 777->785 786 40595d-405961 777->786 778->760 780 4059fc 778->780 780->760 790 40596b-405970 785->790 791 40597c-40598a call 4060c1 785->791 786->785 789 405963 786->789 787->767 795 405a39-405a48 call 4051e8 call 405ea0 787->795 788->756 789->785 792 405972-405974 790->792 793 4059d5-4059e7 FindNextFileA 790->793 801 4059a1-4059ac call 405841 791->801 802 40598c-405994 791->802 792->791 797 405976-40597a 792->797 793->777 799 4059ed-4059f0 FindClose 793->799 795->756 797->791 797->793 799->778 811 4059cd-4059d0 call 4051e8 801->811 812 4059ae-4059b1 801->812 802->793 804 405996-40599f call 405889 802->804 804->793 811->793 814 4059b3-4059c3 call 4051e8 call 405ea0 812->814 815 4059c5-4059cb 812->815 814->793 815->793
                                            APIs
                                            • DeleteFileA.KERNELBASE(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B2
                                            • lstrcatA.KERNEL32(00421D30,\*.*,00421D30,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058FA
                                            • lstrcatA.KERNEL32(?,0040A014,?,00421D30,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040591B
                                            • lstrlenA.KERNEL32(?,?,0040A014,?,00421D30,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405921
                                            • FindFirstFileA.KERNEL32(00421D30,?,?,?,0040A014,?,00421D30,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405932
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059DF
                                            • FindClose.KERNEL32(00000000), ref: 004059F0
                                            Strings
                                            • \*.*, xrefs: 004058F4
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405896
                                            • "C:\Users\user\Desktop\STjk6HCD1P.exe", xrefs: 00405889
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\STjk6HCD1P.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                            • API String ID: 2035342205-497510136
                                            • Opcode ID: 26995f6469efc0b5a60458e08d56de8dc590e27ec954537a62243d1abfa56489
                                            • Instruction ID: 41c2b5987dba1b2e33ef8c3f02a16f7fa1ffbccb66a0b3bb43d54024ecdcecbe
                                            • Opcode Fuzzy Hash: 26995f6469efc0b5a60458e08d56de8dc590e27ec954537a62243d1abfa56489
                                            • Instruction Fuzzy Hash: 6251D070900A04EACB21AB618C89BBF7B78EF42724F54427BF851B51D1D73C4982DF6A
                                            APIs
                                            • FindFirstFileA.KERNELBASE(74DF3410,00422578,C:\Users\user\AppData\Local\Temp\nsj786.tmp,00405B8A,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00406440
                                            • FindClose.KERNEL32(00000000), ref: 0040644C
                                            Strings
                                            • x%B, xrefs: 00406436
                                            • C:\Users\user\AppData\Local\Temp\nsj786.tmp, xrefs: 00406435
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj786.tmp$x%B
                                            • API String ID: 2295610775-904953335
                                            • Opcode ID: f29c590cbb4ae7880d615934e2c411517b6bf54f8089bedae6efd123f54e346e
                                            • Instruction ID: 161293881315f5638f8ce2083a4c9c3eaa4ca925c072cbf9d6c71a91d4c8f3d6
                                            • Opcode Fuzzy Hash: f29c590cbb4ae7880d615934e2c411517b6bf54f8089bedae6efd123f54e346e
                                            • Instruction Fuzzy Hash: FED01231944130ABC3502B386E0C85B7B599F153313A2CB36F56AF12F0CB788C6296AC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 634db48916f7a97cd593a88a8f27a2a6a53995630c6979533469a6cf2a501d9c
                                            • Instruction ID: b77f02bc2ee5da486f1689b8d44b34109ba54b696cf3d27aba4845a127c97f42
                                            • Opcode Fuzzy Hash: 634db48916f7a97cd593a88a8f27a2a6a53995630c6979533469a6cf2a501d9c
                                            • Instruction Fuzzy Hash: CEF17671D00269CBCF28CFA8C8946ADBBB0FF44305F25856ED856BB281D7385A86CF44
                                            APIs
                                            • GetDlgItem.USER32(?), ref: 6E441ECA
                                              • Part of subcall function 6E442AC6: lstrcpyA.KERNEL32(?,?,?,6E44273A,00000000), ref: 6E442AE5
                                              • Part of subcall function 6E442AC6: GlobalFree.KERNEL32 ref: 6E442AF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FreeGlobalItemlstrcpy
                                            • String ID: $ $($D$Field %d$error creating dialog$error finding childwnd$error finding config$error finding mainwnd
                                            • API String ID: 962754457-34397940
                                            • Opcode ID: bf3b2222eefae83bbd6e16a82198d8b957bdc355304032caba3ee5a97e47c8e1
                                            • Instruction ID: ee6729ee92c11bc0bfe105d56a0d32ecd693f8e375a046a15acce64064d99345
                                            • Opcode Fuzzy Hash: bf3b2222eefae83bbd6e16a82198d8b957bdc355304032caba3ee5a97e47c8e1
                                            • Instruction Fuzzy Hash: 64529870A00619EFEF12EFF4D884FAEBBB9EB46300F10459AE910E7294CB749955CB54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 403 403c71-403c83 404 403dc4-403dd3 403->404 405 403c89-403c8f 403->405 406 403e22-403e37 404->406 407 403dd5-403e1d GetDlgItem * 2 call 404145 SetClassLongA call 40140b 404->407 405->404 408 403c95-403c9e 405->408 412 403e77-403e7c call 404191 406->412 413 403e39-403e3c 406->413 407->406 409 403ca0-403cad SetWindowPos 408->409 410 403cb3-403cb6 408->410 409->410 414 403cd0-403cd6 410->414 415 403cb8-403cca ShowWindow 410->415 425 403e81-403e9c 412->425 417 403e3e-403e49 call 401389 413->417 418 403e6f-403e71 413->418 420 403cf2-403cf5 414->420 421 403cd8-403ced DestroyWindow 414->421 415->414 417->418 440 403e4b-403e6a SendMessageA 417->440 418->412 424 404112 418->424 431 403cf7-403d03 SetWindowLongA 420->431 432 403d08-403d0e 420->432 428 4040ef-4040f5 421->428 430 404114-40411b 424->430 426 403ea5-403eab 425->426 427 403e9e-403ea0 call 40140b 425->427 436 4040d0-4040e9 DestroyWindow EndDialog 426->436 437 403eb1-403ebc 426->437 427->426 428->424 435 4040f7-4040fd 428->435 431->430 438 403db1-403dbf call 4041ac 432->438 439 403d14-403d25 GetDlgItem 432->439 435->424 441 4040ff-404108 ShowWindow 435->441 436->428 437->436 442 403ec2-403f0f call 406154 call 404145 * 3 GetDlgItem 437->442 438->430 443 403d44-403d47 439->443 444 403d27-403d3e SendMessageA IsWindowEnabled 439->444 440->430 441->424 473 403f11-403f16 442->473 474 403f19-403f55 ShowWindow KiUserCallbackDispatcher call 404167 EnableWindow 442->474 447 403d49-403d4a 443->447 448 403d4c-403d4f 443->448 444->424 444->443 451 403d7a-403d7f call 40411e 447->451 452 403d51-403d57 448->452 453 403d5d-403d62 448->453 451->438 455 403d98-403dab SendMessageA 452->455 458 403d59-403d5b 452->458 454 403d64-403d6a 453->454 453->455 459 403d81-403d8a call 40140b 454->459 460 403d6c-403d72 call 40140b 454->460 455->438 458->451 459->438 470 403d8c-403d96 459->470 469 403d78 460->469 469->451 470->469 473->474 477 403f57-403f58 474->477 478 403f5a 474->478 479 403f5c-403f8a GetSystemMenu EnableMenuItem SendMessageA 477->479 478->479 480 403f8c-403f9d SendMessageA 479->480 481 403f9f 479->481 482 403fa5-403fd8 call 40417a call 403c52 call 4060c1 lstrlenA call 406154 SetWindowTextA call 401389 480->482 481->482 492 403fdd-403fdf 482->492 492->425 493 403fe5-403fe7 492->493 493->425 494 403fed-403ff1 493->494 495 404010-404024 DestroyWindow 494->495 496 403ff3-403ff9 494->496 495->428 498 40402a-404057 CreateDialogParamA 495->498 496->424 497 403fff-404005 496->497 497->425 499 40400b 497->499 498->428 500 40405d-4040b4 call 404145 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 498->500 499->424 500->424 505 4040b6-4040ce ShowWindow call 404191 500->505 505->428
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CAD
                                            • ShowWindow.USER32(?), ref: 00403CCA
                                            • DestroyWindow.USER32 ref: 00403CDE
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403CFA
                                            • GetDlgItem.USER32(?,?), ref: 00403D1B
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D2F
                                            • IsWindowEnabled.USER32(00000000), ref: 00403D36
                                            • GetDlgItem.USER32(?,00000001), ref: 00403DE4
                                            • GetDlgItem.USER32(?,00000002), ref: 00403DEE
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403E08
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E59
                                            • GetDlgItem.USER32(?,00000003), ref: 00403EFF
                                            • ShowWindow.USER32(00000000,?), ref: 00403F20
                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F32
                                            • EnableWindow.USER32(?,?), ref: 00403F4D
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F63
                                            • EnableMenuItem.USER32(00000000), ref: 00403F6A
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F82
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403F95
                                            • lstrlenA.KERNEL32(00420D28,?,00420D28,00000000), ref: 00403FBF
                                            • SetWindowTextA.USER32(?,00420D28), ref: 00403FCE
                                            • ShowWindow.USER32(?,0000000A), ref: 00404102
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                            • String ID: (B
                                            • API String ID: 3282139019-3831730363
                                            • Opcode ID: 88472cc4d580f511b5a61cc057bfd9d3eebd51794cf4ea3c0b6aaec1f89545e8
                                            • Instruction ID: b3becc50dc3ae915ab1c9f271a4527fb908fa7fae9a455a684dda11466253fc4
                                            • Opcode Fuzzy Hash: 88472cc4d580f511b5a61cc057bfd9d3eebd51794cf4ea3c0b6aaec1f89545e8
                                            • Instruction Fuzzy Hash: 77C11071600204BFDB206F61ED49E2B3AB8FB85706F50053EF651B51F1CB799982AB2D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 508 4038d4-4038ec call 4064ca 511 403900-403931 call 405fa8 508->511 512 4038ee-4038fe call 40601f 508->512 517 403933-403944 call 405fa8 511->517 518 403949-40394f lstrcatA 511->518 520 403954-40397d call 403b99 call 405b47 512->520 517->518 518->520 526 403983-403988 520->526 527 403a04-403a0c call 405b47 520->527 526->527 528 40398a-4039ae call 405fa8 526->528 533 403a1a-403a3f LoadImageA 527->533 534 403a0e-403a15 call 406154 527->534 528->527 535 4039b0-4039b2 528->535 537 403ac0-403ac8 call 40140b 533->537 538 403a41-403a71 RegisterClassA 533->538 534->533 542 4039c3-4039cf lstrlenA 535->542 543 4039b4-4039c1 call 405a84 535->543 550 403ad2-403add call 403b99 537->550 551 403aca-403acd 537->551 539 403a77-403abb SystemParametersInfoA CreateWindowExA 538->539 540 403b8f 538->540 539->537 548 403b91-403b98 540->548 544 4039d1-4039df lstrcmpiA 542->544 545 4039f7-4039ff call 405a59 call 4060c1 542->545 543->542 544->545 549 4039e1-4039eb GetFileAttributesA 544->549 545->527 554 4039f1-4039f2 call 405aa0 549->554 555 4039ed-4039ef 549->555 561 403ae3-403afd ShowWindow call 40645c 550->561 562 403b66-403b6e call 4052ba 550->562 551->548 554->545 555->545 555->554 569 403b09-403b1b GetClassInfoA 561->569 570 403aff-403b04 call 40645c 561->570 567 403b70-403b76 562->567 568 403b88-403b8a call 40140b 562->568 567->551 571 403b7c-403b83 call 40140b 567->571 568->540 574 403b33-403b56 DialogBoxParamA call 40140b 569->574 575 403b1d-403b2d GetClassInfoA RegisterClassA 569->575 570->569 571->551 578 403b5b-403b64 call 403824 574->578 575->574 578->548
                                            APIs
                                              • Part of subcall function 004064CA: GetModuleHandleA.KERNEL32(?,?,?,00403385,0000000B), ref: 004064DC
                                              • Part of subcall function 004064CA: GetProcAddress.KERNEL32(00000000,?), ref: 004064F7
                                            • lstrcatA.KERNEL32(2052,00420D28,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D28,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\STjk6HCD1P.exe",00000000), ref: 0040394F
                                            • lstrlenA.KERNEL32(show,?,?,?,show,00000000,C:\Program Files (x86)\Kingsoft DataRecovery Master,2052,00420D28,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D28,00000000,00000002,74DF3410), ref: 004039C4
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004039D7
                                            • GetFileAttributesA.KERNEL32(show), ref: 004039E2
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Program Files (x86)\Kingsoft DataRecovery Master), ref: 00403A2B
                                              • Part of subcall function 0040601F: wsprintfA.USER32 ref: 0040602C
                                            • RegisterClassA.USER32(00423EC0), ref: 00403A68
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A80
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AB5
                                            • ShowWindow.USER32(00000005,00000000), ref: 00403AEB
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B17
                                            • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B24
                                            • RegisterClassA.USER32(00423EC0), ref: 00403B2D
                                            • DialogBoxParamA.USER32(?,00000000,00403C71,00000000), ref: 00403B4C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\STjk6HCD1P.exe"$(B$.DEFAULT\Control Panel\International$.exe$2052$C:\Program Files (x86)\Kingsoft DataRecovery Master$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$show
                                            • API String ID: 1975747703-4273126704
                                            • Opcode ID: c9078dae625b6f4b5fdad37e38e1f8e9c4a43360c011d7f7777f28fc6933afc9
                                            • Instruction ID: 8119f10372a92e3ad89c0c28339df669361e1c2b2a074a7ad4fa5a04607ec86b
                                            • Opcode Fuzzy Hash: c9078dae625b6f4b5fdad37e38e1f8e9c4a43360c011d7f7777f28fc6933afc9
                                            • Instruction Fuzzy Hash: CC61B4703402446ED620AF65AD45F3B3AACEB8574AF40053FF991B62E3CB7D5D029A2D

                                            Control-flow Graph

                                            APIs
                                            • SetWindowLongA.USER32(00000004,Function_00001A01), ref: 6E442766
                                            • SendMessageA.USER32(0000040D,00000000), ref: 6E442781
                                            • ShowWindow.USER32(00000008,0000040D,00000000), ref: 6E442794
                                            • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 6E4427B0
                                            • IsDialogMessageA.USER32(?), ref: 6E4427C1
                                            • IsDialogMessageA.USER32(?), ref: 6E4427D2
                                            • TranslateMessage.USER32(?), ref: 6E4427DD
                                            • DispatchMessageA.USER32(?), ref: 6E4427E8
                                            • SetWindowLongA.USER32(00000004), ref: 6E442811
                                            • DestroyWindow.USER32 ref: 6E442819
                                            • ShowWindow.USER32(?), ref: 6E44283B
                                            • DeleteObject.GDI32(?), ref: 6E4428AA
                                            • DestroyIcon.USER32(?,75BF7CE0), ref: 6E4428B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageWindow$DestroyDialogLongShow$CallbackDeleteDispatchDispatcherIconObjectSendTranslateUser
                                            • String ID: back$cancel$success
                                            • API String ID: 90777642-2779835836
                                            • Opcode ID: 84933ec9dce21b99dfe8c24a97bd87ebdddae3e3ad1f71544938683177eefa56
                                            • Instruction ID: ddac2340535540599155b8ba37d88c63b5bf7d28d66b07b15bdccbba59878251
                                            • Opcode Fuzzy Hash: 84933ec9dce21b99dfe8c24a97bd87ebdddae3e3ad1f71544938683177eefa56
                                            • Instruction Fuzzy Hash: 54416071720A45EFEF11BFF4EC44D497BBAF742B05B00066AF50292224CB329919DF65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 622 402ea1-402eef GetTickCount GetModuleFileNameA call 405c5a 625 402ef1-402ef6 622->625 626 402efb-402f29 call 4060c1 call 405aa0 call 4060c1 GetFileSize 622->626 627 4030d1-4030d5 625->627 634 403014-403022 call 402e3d 626->634 635 402f2f 626->635 641 403024-403027 634->641 642 403077-40307c 634->642 637 402f34-402f4b 635->637 639 402f4d 637->639 640 402f4f-402f58 call 4032b4 637->640 639->640 648 40307e-403086 call 402e3d 640->648 649 402f5e-402f65 640->649 644 403029-403041 call 4032ca call 4032b4 641->644 645 40304b-403075 GlobalAlloc call 4032ca call 4030d8 641->645 642->627 644->642 672 403043-403049 644->672 645->642 670 403088-403099 645->670 648->642 654 402fe1-402fe5 649->654 655 402f67-402f7b call 405c15 649->655 659 402fe7-402fee call 402e3d 654->659 660 402fef-402ff5 654->660 655->660 669 402f7d-402f84 655->669 659->660 666 403004-40300c 660->666 667 402ff7-403001 call 406581 660->667 666->637 671 403012 666->671 667->666 669->660 675 402f86-402f8d 669->675 676 4030a1-4030a6 670->676 677 40309b 670->677 671->634 672->642 672->645 675->660 678 402f8f-402f96 675->678 679 4030a7-4030ad 676->679 677->676 678->660 680 402f98-402f9f 678->680 679->679 681 4030af-4030ca SetFilePointer call 405c15 679->681 680->660 682 402fa1-402fc1 680->682 685 4030cf 681->685 682->642 684 402fc7-402fcb 682->684 686 402fd3-402fdb 684->686 687 402fcd-402fd1 684->687 685->627 686->660 688 402fdd-402fdf 686->688 687->671 687->686 688->660
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402EB2
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\STjk6HCD1P.exe,00000400), ref: 00402ECE
                                              • Part of subcall function 00405C5A: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\STjk6HCD1P.exe,80000000,00000003), ref: 00405C5E
                                              • Part of subcall function 00405C5A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C80
                                            • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\STjk6HCD1P.exe,C:\Users\user\Desktop\STjk6HCD1P.exe,80000000,00000003), ref: 00402F1A
                                            • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EA8
                                            • C:\Users\user\Desktop\STjk6HCD1P.exe, xrefs: 00402EB8, 00402EC7, 00402EDB, 00402EFB
                                            • Error launching installer, xrefs: 00402EF1
                                            • "C:\Users\user\Desktop\STjk6HCD1P.exe", xrefs: 00402EA1
                                            • C:\Users\user\Desktop, xrefs: 00402EFC, 00402F01, 00402F07
                                            • Inst, xrefs: 00402F86
                                            • Null, xrefs: 00402F98
                                            • soft, xrefs: 00402F8F
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403077
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\STjk6HCD1P.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\STjk6HCD1P.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-1509558435
                                            • Opcode ID: 1fdbf8666ac545bea4b4f259f72344d0a52c8dbd42631ed96dcafa73090d8d3a
                                            • Instruction ID: 301210c85c1c672c97290be40cd2ab013445f980247fce5a821d6afddb5369d2
                                            • Opcode Fuzzy Hash: 1fdbf8666ac545bea4b4f259f72344d0a52c8dbd42631ed96dcafa73090d8d3a
                                            • Instruction Fuzzy Hash: 8851C171A01204ABDF20AF65DD85BAE7FB8EB40369F11413BF504B22D5C7789E818B9D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 689 406154-40615f 690 406161-406170 689->690 691 406172-406188 689->691 690->691 692 406379-40637d 691->692 693 40618e-406199 691->693 695 406383-40638d 692->695 696 4061ab-4061b5 692->696 693->692 694 40619f-4061a6 693->694 694->692 697 406398-406399 695->697 698 40638f-406393 call 4060c1 695->698 696->695 699 4061bb-4061c2 696->699 698->697 701 4061c8-4061fc 699->701 702 40636c 699->702 703 406202-40620c 701->703 704 406319-40631c 701->704 705 406376-406378 702->705 706 40636e-406374 702->706 707 406226 703->707 708 40620e-406212 703->708 709 40634c-40634f 704->709 710 40631e-406321 704->710 705->692 706->692 713 40622d-406234 707->713 708->707 716 406214-406218 708->716 714 406351-406358 call 406154 709->714 715 40635d-40636a lstrlenA 709->715 711 406331-40633d call 4060c1 710->711 712 406323-40632f call 40601f 710->712 727 406342-406348 711->727 712->727 718 406236-406238 713->718 719 406239-40623b 713->719 714->715 715->692 716->707 722 40621a-40621e 716->722 718->719 725 406274-406277 719->725 726 40623d-406258 call 405fa8 719->726 722->707 723 406220-406224 722->723 723->713 730 406287-40628a 725->730 731 406279-406285 GetSystemDirectoryA 725->731 732 40625d-406260 726->732 727->715 729 40634a 727->729 733 406311-406317 call 40639c 729->733 735 4062f7-4062f9 730->735 736 40628c-40629a GetWindowsDirectoryA 730->736 734 4062fb-4062fe 731->734 737 406300-406304 732->737 738 406266-40626f call 406154 732->738 733->715 734->733 734->737 735->734 739 40629c-4062a6 735->739 736->735 737->733 744 406306-40630c lstrcatA 737->744 738->734 741 4062c0-4062d6 SHGetSpecialFolderLocation 739->741 742 4062a8-4062ab 739->742 747 4062f4 741->747 748 4062d8-4062f2 SHGetPathFromIDListA CoTaskMemFree 741->748 742->741 746 4062ad-4062be 742->746 744->733 746->734 746->741 747->735 748->734 748->747
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(show,00000400), ref: 0040627F
                                            • GetWindowsDirectoryA.KERNEL32(show,00000400,?,00420508,00000000,00405220,00420508,00000000), ref: 00406292
                                            • SHGetSpecialFolderLocation.SHELL32(00405220,00000000,?,00420508,00000000,00405220,00420508,00000000), ref: 004062CE
                                            • SHGetPathFromIDListA.SHELL32(00000000,show), ref: 004062DC
                                            • CoTaskMemFree.OLE32(00000000), ref: 004062E8
                                            • lstrcatA.KERNEL32(show,\Microsoft\Internet Explorer\Quick Launch), ref: 0040630C
                                            • lstrlenA.KERNEL32(show,?,00420508,00000000,00405220,00420508,00000000,00000000,004178E0,00000000), ref: 0040635E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$show
                                            • API String ID: 717251189-787680486
                                            • Opcode ID: b9f03b5936b094526a68e4ab87593b997b03d55e1f088675cc754777caf79d28
                                            • Instruction ID: 8fbc972aa6bd3719c406fe4e3ec738975147f7369702dd1472e60f0af39698f0
                                            • Opcode Fuzzy Hash: b9f03b5936b094526a68e4ab87593b997b03d55e1f088675cc754777caf79d28
                                            • Instruction Fuzzy Hash: 31610671900111AADF20AF65DC84BBE3BA4AB46310F12417FE953B62D1C73C49A2CB9D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 820 4030d8-4030ec 821 4030f5-4030fd 820->821 822 4030ee 820->822 823 403104-403109 821->823 824 4030ff 821->824 822->821 825 403119-403126 call 4032b4 823->825 826 40310b-403114 call 4032ca 823->826 824->823 830 40326b 825->830 831 40312c-403130 825->831 826->825 832 40326d-40326e 830->832 833 403254-403256 831->833 834 403136-403156 GetTickCount call 4065ef 831->834 836 4032ad-4032b1 832->836 837 403258-40325b 833->837 838 40329f-4032a3 833->838 844 4032aa 834->844 846 40315c-403164 834->846 839 403260-403269 call 4032b4 837->839 840 40325d 837->840 841 403270-403276 838->841 842 4032a5 838->842 839->830 853 4032a7 839->853 840->839 847 403278 841->847 848 40327b-403289 call 4032b4 841->848 842->844 844->836 850 403166 846->850 851 403169-403177 call 4032b4 846->851 847->848 848->830 857 40328b-403297 call 405d01 848->857 850->851 851->830 858 40317d-403186 851->858 853->844 863 403250-403252 857->863 864 403299-40329c 857->864 860 40318c-4031a9 call 40660f 858->860 866 40324c-40324e 860->866 867 4031af-4031c6 GetTickCount 860->867 863->832 864->838 866->832 868 4031c8-4031d0 867->868 869 40320b-40320d 867->869 872 4031d2-4031d6 868->872 873 4031d8-403208 MulDiv wsprintfA call 4051e8 868->873 870 403240-403244 869->870 871 40320f-403213 869->871 870->846 876 40324a 870->876 874 403215-40321a call 405d01 871->874 875 403228-40322e 871->875 872->869 872->873 873->869 881 40321f-403221 874->881 880 403234-403238 875->880 876->844 880->860 882 40323e 880->882 881->863 883 403223-403226 881->883 882->844 883->880
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%$8A$8A$xA$xA
                                            • API String ID: 551687249-266981132
                                            • Opcode ID: 2779a8c27ab4fa154f89a57db0462927349ddc59ff22a4c54c6aa2d2765dcfd2
                                            • Instruction ID: 5859ff30484dbc6f12110d744d50748fce684291dc682ebadfc23bb097a10b04
                                            • Opcode Fuzzy Hash: 2779a8c27ab4fa154f89a57db0462927349ddc59ff22a4c54c6aa2d2765dcfd2
                                            • Instruction Fuzzy Hash: BA515E71900219ABCB10AF66D944A9F7BACEF44756F1481BFE810B72D1C738CA41CBAD

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 884 401759-40177c call 402bce call 405ac6 889 401786-401798 call 4060c1 call 405a59 lstrcatA 884->889 890 40177e-401784 call 4060c1 884->890 896 40179d-4017a3 call 40639c 889->896 890->896 900 4017a8-4017ac 896->900 901 4017ae-4017b8 call 406435 900->901 902 4017df-4017e2 900->902 910 4017ca-4017dc 901->910 911 4017ba-4017c8 CompareFileTime 901->911 904 4017e4-4017e5 call 405c35 902->904 905 4017ea-401806 call 405c5a 902->905 904->905 912 401808-40180b 905->912 913 40187e-4018a7 call 4051e8 call 4030d8 905->913 910->902 911->910 914 401860-40186a call 4051e8 912->914 915 40180d-40184f call 4060c1 * 2 call 406154 call 4060c1 call 4057dd 912->915 927 4018a9-4018ad 913->927 928 4018af-4018bb SetFileTime 913->928 925 401873-401879 914->925 915->900 949 401855-401856 915->949 929 402a63 925->929 927->928 931 4018c1-4018cc FindCloseChangeNotification 927->931 928->931 932 402a65-402a69 929->932 934 4018d2-4018d5 931->934 935 402a5a-402a5d 931->935 937 4018d7-4018e8 call 406154 lstrcatA 934->937 938 4018ea-4018ed call 406154 934->938 935->929 943 4018f2-402382 937->943 938->943 947 402387-40238c 943->947 948 402382 call 4057dd 943->948 947->932 948->947 949->925 950 401858-401859 949->950 950->914
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,show,0042A800,00000000,00000000,00000031), ref: 00401798
                                            • CompareFileTime.KERNEL32(-00000014,?,show,show,00000000,00000000,show,0042A800,00000000,00000000,00000031), ref: 004017C2
                                              • Part of subcall function 004060C1: lstrcpynA.KERNEL32(?,?,00000400,004033E4,00423F20,NSIS Error,?,00000007,00000009,0000000B), ref: 004060CE
                                              • Part of subcall function 004051E8: lstrlenA.KERNEL32(00420508,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                              • Part of subcall function 004051E8: lstrlenA.KERNEL32(00403208,00420508,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                              • Part of subcall function 004051E8: lstrcatA.KERNEL32(00420508,00403208,00403208,00420508,00000000,004178E0,00000000), ref: 00405244
                                              • Part of subcall function 004051E8: SetWindowTextA.USER32(00420508,00420508), ref: 00405256
                                              • Part of subcall function 004051E8: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                              • Part of subcall function 004051E8: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                              • Part of subcall function 004051E8: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj786.tmp$C:\Users\user\AppData\Local\Temp\nsj786.tmp\InstallOptions.dll$show
                                            • API String ID: 1941528284-2625788989
                                            • Opcode ID: 2476305132f036933cb377fb0227cb92ca1979367da5a6612f823a9c05f9f285
                                            • Instruction ID: ad8319ac8819e3f4f0647767249a41d8ee4e375b3a8deda6b30fbb54af0d7a5d
                                            • Opcode Fuzzy Hash: 2476305132f036933cb377fb0227cb92ca1979367da5a6612f823a9c05f9f285
                                            • Instruction Fuzzy Hash: D641B731900515BACF10BFA5CC45DAF3669EF45369B21423BF422B21E1CA7C8A528A6D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 951 4056ae-4056f9 CreateDirectoryA 952 4056fb-4056fd 951->952 953 4056ff-40570c GetLastError 951->953 954 405726-405728 952->954 953->954 955 40570e-405722 SetFileSecurityA 953->955 955->952 956 405724 GetLastError 955->956 956->954
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056F1
                                            • GetLastError.KERNEL32 ref: 00405705
                                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040571A
                                            • GetLastError.KERNEL32 ref: 00405724
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004056D4
                                            • C:\Users\user\Desktop, xrefs: 004056AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                            • API String ID: 3449924974-2028306314
                                            • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                            • Instruction ID: 8fda383858cfa3d81fea8572b973588b51770532f266deb4a47d6cf866d68d21
                                            • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                            • Instruction Fuzzy Hash: 5E010871C00219EADF009BA0D944BEFBBB4EB04354F00403AD545B6190EB799648DF99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 957 40645c-40647c GetSystemDirectoryA 958 406480-406482 957->958 959 40647e 957->959 960 406492-406494 958->960 961 406484-40648c 958->961 959->958 963 406495-4064c7 wsprintfA LoadLibraryExA 960->963 961->960 962 40648e-406490 961->962 962->963
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406473
                                            • wsprintfA.USER32 ref: 004064AC
                                            • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064C0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                            • Instruction ID: 6b99be200e9776e1d1f000c3a85ac26a44316f32ef7d7cf08124b5af377bafc3
                                            • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                            • Instruction Fuzzy Hash: C2F0FC305502096BDB15DB64DD0DFEB375CEB08304F1400BAA986E10C1EA78E5258B6D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 964 405c89-405c93 965 405c94-405cbf GetTickCount GetTempFileNameA 964->965 966 405cc1-405cc3 965->966 967 405cce-405cd0 965->967 966->965 968 405cc5 966->968 969 405cc8-405ccb 967->969 968->969
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405C9D
                                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CB7
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C8C
                                            • "C:\Users\user\Desktop\STjk6HCD1P.exe", xrefs: 00405C89
                                            • nsa, xrefs: 00405C94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: "C:\Users\user\Desktop\STjk6HCD1P.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-3051972606
                                            • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                            • Instruction ID: eb5fe80d68cc8fd1173ec18eddb4fdb1002e2dce10a9d595da193ea2316e06a4
                                            • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                            • Instruction Fuzzy Hash: BCF08236308308ABEB118F56ED04B9B7FACDF91750F10803BFA44DB280D6B499558798

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 970 6e4916db-6e491717 call 6e491a98 974 6e49171d-6e491721 970->974 975 6e491834-6e491836 970->975 976 6e49172a-6e491737 call 6e4922f1 974->976 977 6e491723-6e491729 call 6e4922af 974->977 982 6e491739-6e49173e 976->982 983 6e491767-6e49176e 976->983 977->976 986 6e491759-6e49175c 982->986 987 6e491740-6e491741 982->987 984 6e49178e-6e491792 983->984 985 6e491770-6e49178c call 6e4924d8 call 6e491559 call 6e491266 GlobalFree 983->985 992 6e4917dc-6e4917e2 call 6e4924d8 984->992 993 6e491794-6e4917da call 6e49156b call 6e4924d8 984->993 1009 6e4917e3-6e4917e7 985->1009 986->983 988 6e49175e-6e49175f call 6e492cc3 986->988 990 6e491749-6e49174a call 6e492a38 987->990 991 6e491743-6e491744 987->991 1002 6e491764 988->1002 1005 6e49174f 990->1005 997 6e491751-6e491757 call 6e4926b2 991->997 998 6e491746-6e491747 991->998 992->1009 993->1009 1008 6e491766 997->1008 998->983 998->990 1002->1008 1005->1002 1008->983 1013 6e4917e9-6e4917f7 call 6e49249e 1009->1013 1014 6e491824-6e49182b 1009->1014 1020 6e4917f9-6e4917fc 1013->1020 1021 6e49180f-6e491816 1013->1021 1014->975 1016 6e49182d-6e49182e GlobalFree 1014->1016 1016->975 1020->1021 1022 6e4917fe-6e491806 1020->1022 1021->1014 1023 6e491818-6e491823 call 6e4914e2 1021->1023 1022->1021 1024 6e491808-6e491809 FreeLibrary 1022->1024 1023->1014 1024->1021
                                            APIs
                                              • Part of subcall function 6E491A98: GlobalFree.KERNEL32(?), ref: 6E491D09
                                              • Part of subcall function 6E491A98: GlobalFree.KERNEL32(?), ref: 6E491D0E
                                              • Part of subcall function 6E491A98: GlobalFree.KERNEL32(?), ref: 6E491D13
                                            • GlobalFree.KERNEL32(00000000), ref: 6E491786
                                            • FreeLibrary.KERNEL32(?), ref: 6E491809
                                            • GlobalFree.KERNEL32(00000000), ref: 6E49182E
                                              • Part of subcall function 6E4922AF: GlobalAlloc.KERNEL32(00000040,?), ref: 6E4922E0
                                              • Part of subcall function 6E4926B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E491757,00000000), ref: 6E492782
                                              • Part of subcall function 6E49156B: wsprintfA.USER32 ref: 6E491599
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc$Librarywsprintf
                                            • String ID:
                                            • API String ID: 3962662361-3916222277
                                            • Opcode ID: cf732593abf30cc2306ae3b1691b6b569008c540b7d532c3bb35605d1eccc7dc
                                            • Instruction ID: bf62289a735b21d1c077879252b8d96b61ba2a211125c663b09b834bed4d149b
                                            • Opcode Fuzzy Hash: cf732593abf30cc2306ae3b1691b6b569008c540b7d532c3bb35605d1eccc7dc
                                            • Instruction Fuzzy Hash: 3541C3714002069ADB40AFF4A8C4FD63FACBB05358F0588ABE915BA385DF748449E7E1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1027 401c2e-401c4e call 402bac * 2 1032 401c50-401c57 call 402bce 1027->1032 1033 401c5a-401c5e 1027->1033 1032->1033 1034 401c60-401c67 call 402bce 1033->1034 1035 401c6a-401c70 1033->1035 1034->1035 1038 401c72-401c8e call 402bac * 2 1035->1038 1039 401cbe-401ce4 call 402bce * 2 FindWindowExA 1035->1039 1051 401c90-401cac SendMessageTimeoutA 1038->1051 1052 401cae-401cbc SendMessageA 1038->1052 1050 401cea 1039->1050 1053 401ced-401cf0 1050->1053 1051->1053 1052->1050 1054 401cf6 1053->1054 1055 402a5a-402a69 1053->1055 1054->1055
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 7b70566c870daa96221156bf416f9a378a332c342d8049e94ba7da889c6dd66f
                                            • Instruction ID: 51da54adcba92585663a26c7e1368d4a3271239daaedb1c2ef7502cbfef702b9
                                            • Opcode Fuzzy Hash: 7b70566c870daa96221156bf416f9a378a332c342d8049e94ba7da889c6dd66f
                                            • Instruction Fuzzy Hash: 05216071A44208BEEB059FB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28
                                            APIs
                                            • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                                              • Part of subcall function 004051E8: lstrlenA.KERNEL32(00420508,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                              • Part of subcall function 004051E8: lstrlenA.KERNEL32(00403208,00420508,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                              • Part of subcall function 004051E8: lstrcatA.KERNEL32(00420508,00403208,00403208,00420508,00000000,004178E0,00000000), ref: 00405244
                                              • Part of subcall function 004051E8: SetWindowTextA.USER32(00420508,00420508), ref: 00405256
                                              • Part of subcall function 004051E8: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                              • Part of subcall function 004051E8: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                              • Part of subcall function 004051E8: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: bffba7cbc9bf954fca620dd5c6f657cd012cb4ee7ac81d79640b952aa277a1c5
                                            • Instruction ID: 1a7932fae63aa7fb20f888994d80958c5ec2ba2518727ce514c528d89b281485
                                            • Opcode Fuzzy Hash: bffba7cbc9bf954fca620dd5c6f657cd012cb4ee7ac81d79640b952aa277a1c5
                                            • Instruction Fuzzy Hash: 08210B32A00125EBCF207FA58F49B5F76B0AF50359F21423BF211B61D1CBBC8982965E
                                            APIs
                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,show,00420508,?,?,?,00000002,show,?,0040625D,80000002), ref: 00405FEE
                                            • RegCloseKey.KERNELBASE(?,?,0040625D,80000002,Software\Microsoft\Windows\CurrentVersion,show,show,show,?,00420508), ref: 00405FF9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue
                                            • String ID: show
                                            • API String ID: 3356406503-839833857
                                            • Opcode ID: 4cc92a42e5629c7bbcd5378a5bb523b692adcb537e29c9598c16d659ab369d15
                                            • Instruction ID: bc2ee3056b47e5ed157b0296f64e65c5d928d18fe46a96bfb4a95e0d5f896fcd
                                            • Opcode Fuzzy Hash: 4cc92a42e5629c7bbcd5378a5bb523b692adcb537e29c9598c16d659ab369d15
                                            • Instruction Fuzzy Hash: C7015A72540209AADF22CF61CC09FDB3BA8EF95364F01403AF955A6190D778D964DFA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 126d375e0cd8dd3c96d9f56c9c2b4ea3570e5546f357d91bfce8ff404d349699
                                            • Instruction ID: 2508fafb39113fa530b835c7ee7350b0f579aeff726ee83cf5aef614fa8a9c48
                                            • Opcode Fuzzy Hash: 126d375e0cd8dd3c96d9f56c9c2b4ea3570e5546f357d91bfce8ff404d349699
                                            • Instruction Fuzzy Hash: A3A14271E00229CBDB28CFA8C8547ADBBB1FF44305F15816AD856BB281C7786A96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d0c270478a2f9a3adf3a01af42e260dfbb4be2f4416bec3860fa0cf1f45473d
                                            • Instruction ID: f0f32deb93356653934a7f7f8ad788a679267befe7528616fd809e2a8ddaf9c6
                                            • Opcode Fuzzy Hash: 7d0c270478a2f9a3adf3a01af42e260dfbb4be2f4416bec3860fa0cf1f45473d
                                            • Instruction Fuzzy Hash: C8913070D00229CBDF28CF98C854BADBBB1FF44305F15816AD856BB281C779AA96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79859cd80aa4a68261cc067353b3b3a3bb11021b997dedf9f01a815f4beecf4f
                                            • Instruction ID: e43b34c51a548f07c4fb140720fe79cc87a03685924cd857d2d075badb14d917
                                            • Opcode Fuzzy Hash: 79859cd80aa4a68261cc067353b3b3a3bb11021b997dedf9f01a815f4beecf4f
                                            • Instruction Fuzzy Hash: 2F815371D04229CBDF24CFA8C8847ADBBB1FB44305F25816AD456BB281C738AA96DF05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51f3059c0ab10d0f6eca9bda3b9c7ef9d62a7fb15769fd34cf569834d4f38521
                                            • Instruction ID: 30cc61a65d8e7361f2687543d4853da4ee9de610700e1b42b944a6768b2f9653
                                            • Opcode Fuzzy Hash: 51f3059c0ab10d0f6eca9bda3b9c7ef9d62a7fb15769fd34cf569834d4f38521
                                            • Instruction Fuzzy Hash: D4817771D04229CBDF24CFA9C8447AEBBB0FF44305F21816AD856BB281C7796A86DF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae4b4001fee964b3ec39fcc62e642dbd1d089b63cfe1c3a3d4f330af07c9f72e
                                            • Instruction ID: 0ea1ed3bc64708edefeb163875b4580728164d017b9a5fabf4c3c9e69b53418c
                                            • Opcode Fuzzy Hash: ae4b4001fee964b3ec39fcc62e642dbd1d089b63cfe1c3a3d4f330af07c9f72e
                                            • Instruction Fuzzy Hash: 96712371D00229CBDF24CF98C854BADBBB1FF48305F15816AD856B7281C7395A96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 46e38dc9042d38c3d36f7f10ec43a7b3aa55cd06347f931a7d3c587032d94121
                                            • Instruction ID: f909a51a05dfa9c5f202b5373a38b9e5f11f80519cee44c22f430a43d8e85a48
                                            • Opcode Fuzzy Hash: 46e38dc9042d38c3d36f7f10ec43a7b3aa55cd06347f931a7d3c587032d94121
                                            • Instruction Fuzzy Hash: 74713371E00229CBDF28CF98C844BADBBB1FF44305F15816AD856BB281C7796A96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0acf286bb029991ed8d3626521cf090d2a7bfbfd73cbce5b83777d77729d6ca6
                                            • Instruction ID: 8ba59c5cd0d20fcb356abc66f065f0fd9b5ab0142fa9d7a08340707df7706276
                                            • Opcode Fuzzy Hash: 0acf286bb029991ed8d3626521cf090d2a7bfbfd73cbce5b83777d77729d6ca6
                                            • Instruction Fuzzy Hash: 2A715571D00229CBDF28CF98C844BADBBB1FF44305F15816AD856B7281C779AA96DF44
                                            APIs
                                            • GetPrivateProfileStringA.KERNEL32(6E4413D9,6E446810,All Files|*.*,00002000,6E4413D9,?), ref: 6E4413C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID: All Files|*.*
                                            • API String ID: 1096422788-1532680088
                                            • Opcode ID: 30c60f53812c1d86c550c6addfb1ae795253939fc3c96f0dbadc0727894d0c48
                                            • Instruction ID: 13e35255ea4d5859a25c047d5cd91d95744c02e142e854a8f639134ad54ac8b0
                                            • Opcode Fuzzy Hash: 30c60f53812c1d86c550c6addfb1ae795253939fc3c96f0dbadc0727894d0c48
                                            • Instruction Fuzzy Hash: 4EC01231366A80EAEF12BF70ED0AF007A32E392B81F210091B202290A9C6761034DA0D
                                            APIs
                                              • Part of subcall function 00405AF2: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj786.tmp,?,00405B5E,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B00
                                              • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B05
                                              • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B19
                                            • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                              • Part of subcall function 004056AE: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056F1
                                            • SetCurrentDirectoryA.KERNEL32(00000000,0042A800,00000000,00000000,000000F0), ref: 0040163C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                            • String ID:
                                            • API String ID: 1892508949-0
                                            • Opcode ID: fa060cad98318146cab1ede39612207b8ee0d3f57803be6218a14482ee073574
                                            • Instruction ID: 89ad01db463442aa800da85bb51449bf5fbab0d3eae07559ae4194fd3409cb5d
                                            • Opcode Fuzzy Hash: fa060cad98318146cab1ede39612207b8ee0d3f57803be6218a14482ee073574
                                            • Instruction Fuzzy Hash: 05110831604051DBCF307FA54D409BF37B4DE92725B28067FE491B22D3DA3D49426A2E
                                            APIs
                                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000000,00000011,00000002), ref: 004025E5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue
                                            • String ID:
                                            • API String ID: 3356406503-0
                                            • Opcode ID: 99d067ba53c68b4b5eadc8599882447ea9fe418bf381795e758ee2d4d8692173
                                            • Instruction ID: 437baf6ee5044995b1412423b5e3b65e4335dbcf1792c75f9ce6e92cdad8e97d
                                            • Opcode Fuzzy Hash: 99d067ba53c68b4b5eadc8599882447ea9fe418bf381795e758ee2d4d8692173
                                            • Instruction Fuzzy Hash: A311C171A00205EFDF24CF64CE985AE7AB4EF00355F20843FE442B72C0D6B88A86DB19
                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 1fe9c1000dbda7a9d39110f4f9bff940efbdf01e75595cec207c4de3ebb5c286
                                            • Instruction ID: 30547d814f52c0c9fa729df1a4499858ceafdecff29ed48dfb424bf33c152dfa
                                            • Opcode Fuzzy Hash: 1fe9c1000dbda7a9d39110f4f9bff940efbdf01e75595cec207c4de3ebb5c286
                                            • Instruction Fuzzy Hash: 3401D131B242109BE7194B389E05B2A36A8E710315F51823AB951F65F1D778CC129B4C
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                                            • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Window$EnableShow
                                            • String ID:
                                            • API String ID: 1136574915-0
                                            • Opcode ID: 6a26dec6efc9efd6d24620a0f8830cb51993f5e7c1da2ddf268d3c6f38c59558
                                            • Instruction ID: 072171f2c40e2d9643691c2b2adc0adbcd400d7244dcd95e94f09ced2b5de2f2
                                            • Opcode Fuzzy Hash: 6a26dec6efc9efd6d24620a0f8830cb51993f5e7c1da2ddf268d3c6f38c59558
                                            • Instruction Fuzzy Hash: A3E09232B04200EFD714EFA5EA8856E7BB0EB80325B20413FF001F10C1CA7848418A59
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,?,00403385,0000000B), ref: 004064DC
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004064F7
                                              • Part of subcall function 0040645C: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406473
                                              • Part of subcall function 0040645C: wsprintfA.USER32 ref: 004064AC
                                              • Part of subcall function 0040645C: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064C0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                            • String ID:
                                            • API String ID: 2547128583-0
                                            • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                            • Instruction ID: b1d6ada99e6651afe610309d4c68ede8e1123b1e5f34d771ce11ce336b0a7369
                                            • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                            • Instruction Fuzzy Hash: 1AE086326042116BD21067705E0893B72A89E84700302443EF946F2144DB39EC35A76D
                                            APIs
                                            • SendMessageA.USER32(?,0000000B,?), ref: 00402A44
                                            • InvalidateRect.USER32(?), ref: 00402A54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: InvalidateMessageRectSend
                                            • String ID:
                                            • API String ID: 909852535-0
                                            • Opcode ID: 3d9fbd4ee8ae42f85cf40c2cec7e739c6f9535f8c09e175a815cebd43255ba59
                                            • Instruction ID: 0995a1f0418a1c2383998730734b38987ccb2285e11a7e6c18e81d3d7b02300c
                                            • Opcode Fuzzy Hash: 3d9fbd4ee8ae42f85cf40c2cec7e739c6f9535f8c09e175a815cebd43255ba59
                                            • Instruction Fuzzy Hash: 73E08C72700508EFEB10DBA4ED849AE7BB9FB80316F00047AF202B00A0DB304C51DB28
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\STjk6HCD1P.exe,80000000,00000003), ref: 00405C5E
                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                            • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                                            • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                            • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(?,?,0040584D,?,?,00000000,00405A30,?,?,?,?), ref: 00405C3A
                                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405C4E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                                            • Instruction ID: 59cc3d86ab4e26752c0bcc3731729734fb3652f4f3e26a658c09c1975061a851
                                            • Opcode Fuzzy Hash: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                                            • Instruction Fuzzy Hash: B6D0A932004021ABC2002728AE0888BBB50DB00270702CA35FDA4A22B1DB300C969A98
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(?,00000000,00403305,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00405731
                                            • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 0040573F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                            • Instruction ID: fe143fb7e2c59eb3603aebef79fe73c29c1fae3f16fa91b3bf8fea648d0a9a1d
                                            • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                            • Instruction Fuzzy Hash: 61C04C30604505EFD7515B209E09B177A94AB50781F15443DA146E10A0DF388455ED2D
                                            APIs
                                            • CreateMutexA.KERNELBASE(00000000), ref: 6E492AF7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CreateMutex
                                            • String ID:
                                            • API String ID: 1964310414-0
                                            • Opcode ID: f9a10e4e3bd1504e99429f85834ae03dcf97447bf4791a2ca7fbd946cb81a25e
                                            • Instruction ID: 22463db64ddf4e3474c3252fad4472746aeaa4f1a8bd05c919037ded8a36e705
                                            • Opcode Fuzzy Hash: f9a10e4e3bd1504e99429f85834ae03dcf97447bf4791a2ca7fbd946cb81a25e
                                            • Instruction Fuzzy Hash: 2C414E72604604AFDB20EFF4F881F993FA8FB55398F104C2BD414B7204DB349942AB99
                                            APIs
                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite
                                            • String ID:
                                            • API String ID: 390214022-0
                                            • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                            • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                                            • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                            • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                                            APIs
                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000020,?,00403295,00000000,004138E0,00000020,004138E0,00000020,000000FF,00000004,00000000), ref: 00405D15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                            • Instruction ID: 9463c3abe6280d084d74f54212381f1c7099d27a46d02ce49af031ea16a2316f
                                            • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                            • Instruction Fuzzy Hash: 8BE0E63251065DABEF105F55AC04AEB775CEF15350F008437F955E3150D671E8619BA4
                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032C7,00000000,00000000,00403124,000000FF,00000004,00000000,00000000,00000000), ref: 00405CE6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                            • Instruction ID: 0f3a91911b7368544d0479776f9460b67210371169305fae4b72b28e49471388
                                            • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                            • Instruction Fuzzy Hash: 56E0EC3221835EEBEF109E559C04EEB7B6CEB05360F044437FD5AE2150D671E861ABA4
                                            APIs
                                            • VirtualProtect.KERNELBASE(6E49404C,00000004,00000040,6E49403C), ref: 6E49293F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 23e8f944b2dd8eb902d56aaf480a93addfdf39a49199daf590a0e21bb992225f
                                            • Instruction ID: eee162d9e1d49571d3a6f42d4ea3b354a4d9d06fdb81981abd745f88bc363405
                                            • Opcode Fuzzy Hash: 23e8f944b2dd8eb902d56aaf480a93addfdf39a49199daf590a0e21bb992225f
                                            • Instruction Fuzzy Hash: 02F092B1508A80DECB60EFB9E4D5B053FE0B32B3D4B01452AE168F7242E33448469B11
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,00420508,?,?,00405FD5,00420508,?,?,?,00000002,show), ref: 00405F6B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                            • Instruction ID: fced92d9612f5b6fa1e6e2d4533c029b8c19dcfe99612180af7d1277f5ba7959
                                            • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                            • Instruction Fuzzy Hash: 50D0123200420EBBDF115FA0DD01FAB3B2DEB08310F104426FE19A41A1D776D534AB68
                                            APIs
                                            • SetDlgItemTextA.USER32(?,?,00000000), ref: 0040415F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: ItemText
                                            • String ID:
                                            • API String ID: 3367045223-0
                                            • Opcode ID: a655565df94921e4d4899cb04f6ec973a58b4b96c9531fe5b0d13a6cc83c0652
                                            • Instruction ID: 21bbd7c15cb97c81146a81cd8c2f88b6aedba798d60f639f159e06c3151a4658
                                            • Opcode Fuzzy Hash: a655565df94921e4d4899cb04f6ec973a58b4b96c9531fe5b0d13a6cc83c0652
                                            • Instruction Fuzzy Hash: F2C04C75148240FFE641A755CC42F1FB7D9EF94319F00C52EB55CA51D2C63584249A26
                                            APIs
                                            • SendMessageA.USER32(00000028,?,00000001,00403FAA), ref: 00404188
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 4b8775389032d73bb0cdc78c7cec40c6840668cae09c009f0c0f7bab9180220a
                                            • Instruction ID: 12fa0bd368318515ea3e07217fdd1357908c491f7ba982cdf3d5e787ac9e46f9
                                            • Opcode Fuzzy Hash: 4b8775389032d73bb0cdc78c7cec40c6840668cae09c009f0c0f7bab9180220a
                                            • Instruction Fuzzy Hash: C5B09236284A00ABDE218B10DE09F457AA2E7A8742F028028B240240B0CAB200A1EB08
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 004032D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                            • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                                            • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                            • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                                            APIs
                                            • GetPrivateProfileIntA.KERNEL32(?,?,6E441462,NumFields), ref: 6E441402
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: PrivateProfile
                                            • String ID:
                                            • API String ID: 1469295129-0
                                            • Opcode ID: f6db92b13795972ea4e8cb83539cf23a07eee38cc2bf023a6667a7b5fffaf792
                                            • Instruction ID: 09d57dd10539b0c5c66abc144765554c0d5d8720b82c045c39787287e742361b
                                            • Opcode Fuzzy Hash: f6db92b13795972ea4e8cb83539cf23a07eee38cc2bf023a6667a7b5fffaf792
                                            • Instruction Fuzzy Hash: 8FC04C36614500EFCF027B60D904815FB62F759710B008444B25500028C2324534EB01
                                            APIs
                                            • GlobalAlloc.KERNELBASE(00000040,6E491233,?,6E4912CF,-6E49404B,6E4911AB,-000000A0), ref: 6E49121D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: AllocGlobal
                                            • String ID:
                                            • API String ID: 3761449716-0
                                            • Opcode ID: 455c9797fb35d1f00750ad8f1619928e1cdd402965d28f6e88c8e7e3b4bf3ff7
                                            • Instruction ID: c00bb2f88ea0ec33df8d5e14ba77358efcfe0381d3746a1d607c49983368393a
                                            • Opcode Fuzzy Hash: 455c9797fb35d1f00750ad8f1619928e1cdd402965d28f6e88c8e7e3b4bf3ff7
                                            • Instruction Fuzzy Hash: 28A00275944900DBDE41FBF1E95EF143B21F76B741F008040E32974198C6754411DB35
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 00405385
                                            • GetDlgItem.USER32(?,000003EE), ref: 00405394
                                            • GetClientRect.USER32(?,?), ref: 004053D1
                                            • GetSystemMetrics.USER32(00000002), ref: 004053D8
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053F9
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040540A
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040541D
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040542B
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040543E
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405460
                                            • ShowWindow.USER32(?,00000008), ref: 00405474
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405495
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054A5
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054BE
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054CA
                                            • GetDlgItem.USER32(?,000003F8), ref: 004053A3
                                              • Part of subcall function 0040417A: SendMessageA.USER32(00000028,?,00000001,00403FAA), ref: 00404188
                                            • GetDlgItem.USER32(?,000003EC), ref: 004054E6
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000052BA,00000000), ref: 004054F4
                                            • CloseHandle.KERNEL32(00000000), ref: 004054FB
                                            • ShowWindow.USER32(00000000), ref: 0040551E
                                            • ShowWindow.USER32(?,00000008), ref: 00405525
                                            • ShowWindow.USER32(00000008), ref: 0040556B
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040559F
                                            • CreatePopupMenu.USER32 ref: 004055B0
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055C5
                                            • GetWindowRect.USER32(?,000000FF), ref: 004055E5
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055FE
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040563A
                                            • OpenClipboard.USER32(00000000), ref: 0040564A
                                            • EmptyClipboard.USER32 ref: 00405650
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405659
                                            • GlobalLock.KERNEL32(00000000), ref: 00405663
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405677
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405690
                                            • SetClipboardData.USER32(00000001,00000000), ref: 0040569B
                                            • CloseClipboard.USER32 ref: 004056A1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID: (B
                                            • API String ID: 590372296-3831730363
                                            • Opcode ID: d3419562442177eea9b62adf59552d27b6df34544d2fada850110dc2e5599538
                                            • Instruction ID: fe21aa704c045a880c187f0605a512594e5ece0db8e286b19571ae5c45aa8885
                                            • Opcode Fuzzy Hash: d3419562442177eea9b62adf59552d27b6df34544d2fada850110dc2e5599538
                                            • Instruction Fuzzy Hash: 23A15B71900608BFDB119FA4DE89EAE7B79FB48355F00403AFA41BA1A0C7794E51DF58
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 00404626
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404650
                                            • SHBrowseForFolderA.SHELL32(?,00420100,?), ref: 00404701
                                            • CoTaskMemFree.OLE32(00000000), ref: 0040470C
                                            • lstrcmpiA.KERNEL32(show,00420D28), ref: 0040473E
                                            • lstrcatA.KERNEL32(?,show), ref: 0040474A
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040475C
                                              • Part of subcall function 004057C1: GetDlgItemTextA.USER32(?,?,00000400,00404793), ref: 004057D4
                                              • Part of subcall function 0040639C: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\STjk6HCD1P.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 004063F4
                                              • Part of subcall function 0040639C: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406401
                                              • Part of subcall function 0040639C: CharNextA.USER32(?,"C:\Users\user\Desktop\STjk6HCD1P.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406406
                                              • Part of subcall function 0040639C: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406416
                                            • GetDiskFreeSpaceA.KERNEL32(0041FCF8,?,?,0000040F,?,0041FCF8,0041FCF8,?,00000001,0041FCF8,?,?,000003FB,?), ref: 0040481A
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404835
                                              • Part of subcall function 0040498E: lstrlenA.KERNEL32(00420D28,00420D28,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048A9,000000DF,00000000,00000400,?), ref: 00404A2C
                                              • Part of subcall function 0040498E: wsprintfA.USER32 ref: 00404A34
                                              • Part of subcall function 0040498E: SetDlgItemTextA.USER32(?,00420D28), ref: 00404A47
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: (B$A$C:\Program Files (x86)\Kingsoft DataRecovery Master$show
                                            • API String ID: 2624150263-1311103444
                                            • Opcode ID: e6e408a563ecea602c0a6dfa5c805507a5dd8bebb4c2c52a138c8c5013cba04b
                                            • Instruction ID: 23887ea06715a98946f15fa8ab5ee03a9679ba0c83a6df36e4e3dfda0b9dc378
                                            • Opcode Fuzzy Hash: e6e408a563ecea602c0a6dfa5c805507a5dd8bebb4c2c52a138c8c5013cba04b
                                            • Instruction Fuzzy Hash: C9A183B1900209ABDB11EFA5CD85AAFB7B8EF85314F10843BF601B72D1D77C89418B69
                                            APIs
                                              • Part of subcall function 6E491215: GlobalAlloc.KERNELBASE(00000040,6E491233,?,6E4912CF,-6E49404B,6E4911AB,-000000A0), ref: 6E49121D
                                            • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6E491BC4
                                            • lstrcpyA.KERNEL32(00000008,?), ref: 6E491C0C
                                            • lstrcpyA.KERNEL32(00000408,?), ref: 6E491C16
                                            • GlobalFree.KERNEL32(00000000), ref: 6E491C29
                                            • GlobalFree.KERNEL32(?), ref: 6E491D09
                                            • GlobalFree.KERNEL32(?), ref: 6E491D0E
                                            • GlobalFree.KERNEL32(?), ref: 6E491D13
                                            • GlobalFree.KERNEL32(00000000), ref: 6E491EFA
                                            • lstrcpyA.KERNEL32(?,?), ref: 6E492098
                                            • GetModuleHandleA.KERNEL32(00000008), ref: 6E492114
                                            • LoadLibraryA.KERNEL32(00000008), ref: 6E492125
                                            • GetProcAddress.KERNEL32(?,?), ref: 6E49217E
                                            • lstrlenA.KERNEL32(00000408), ref: 6E492198
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                            • String ID:
                                            • API String ID: 245916457-0
                                            • Opcode ID: acb354d250812260e4a6ff0ce7952f6f5a4030f85c6a2f7532a34254b23e0545
                                            • Instruction ID: 9ac573155c42787e3255968a510d5f9c2e62fba2d4259ae495f5552116ddcb00
                                            • Opcode Fuzzy Hash: acb354d250812260e4a6ff0ce7952f6f5a4030f85c6a2f7532a34254b23e0545
                                            • Instruction Fuzzy Hash: 8822AB7195420A9EDB50CFF98484BADBFF8BB06304F12452FD1A5B3380DBB4594AEB90
                                            APIs
                                            • GetDlgCtrlID.USER32(?), ref: 6E441D6F
                                            • OpenClipboard.USER32(?), ref: 6E441DA1
                                            • GetClipboardData.USER32(00000001), ref: 6E441DB2
                                            • GlobalLock.KERNEL32(00000000), ref: 6E441DC0
                                            • lstrlenA.KERNEL32(00000000), ref: 6E441DCE
                                            • SendMessageA.USER32(?,000000C2,00000001,00000000), ref: 6E441E0E
                                            • GlobalUnlock.KERNEL32(?,00000001), ref: 6E441E1D
                                            • CloseClipboard.USER32 ref: 6E441E24
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Clipboard$Global$CloseCtrlDataLockMessageOpenSendUnlocklstrlen
                                            • String ID:
                                            • API String ID: 639725540-0
                                            • Opcode ID: 150cb31bfc44774c86d72ca5647df4d7fb03ff3b8913950f10a4090a38d9b984
                                            • Instruction ID: 15dfa03285d850f626e367c6ecc273a0b642421c9ab9c214dac3294aba213e15
                                            • Opcode Fuzzy Hash: 150cb31bfc44774c86d72ca5647df4d7fb03ff3b8913950f10a4090a38d9b984
                                            • Instruction Fuzzy Hash: 4121B075300A05EBFF022FB4DC48F8A3B6AEF46745F10852AF84585214DB71C8298B90
                                            APIs
                                            • CoCreateInstance.OLE32(00408418,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID:
                                            • API String ID: 123533781-0
                                            • Opcode ID: b310643681fa9cba3794e279dcc61ed4778adefa45a21dd0207e9f0972d22f6f
                                            • Instruction ID: 1d5fc0eda79a0a672284adf98007a832727f4b93af1a8b9a4894ceaf33dc30f5
                                            • Opcode Fuzzy Hash: b310643681fa9cba3794e279dcc61ed4778adefa45a21dd0207e9f0972d22f6f
                                            • Instruction Fuzzy Hash: 45510471A00208AFCB00DFE4CA88A9D7BB6EF48314F2041BAF515EB2D1DA799981CB54
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: 88b92a63b67db3c6ea186fc9624545be7e507cb46778454c336e293156349447
                                            • Instruction ID: 13e9d4e2be50c596067d6900ef2af7155ed35788a2bbd6a4100e2a10f5e5ac7a
                                            • Opcode Fuzzy Hash: 88b92a63b67db3c6ea186fc9624545be7e507cb46778454c336e293156349447
                                            • Instruction Fuzzy Hash: 0AF0A771604110DFD710EB649949AEE77A8DF51314F20057BF112B20C2D7B889469B2A
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B61
                                            • GetDlgItem.USER32(?,00000408), ref: 00404B6E
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BBD
                                            • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404BD4
                                            • SetWindowLongA.USER32(?,000000FC,0040515C), ref: 00404BEE
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C00
                                            • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C14
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404C2A
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C36
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C46
                                            • DeleteObject.GDI32(00000110), ref: 00404C4B
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C76
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C82
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D1C
                                            • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D4C
                                              • Part of subcall function 0040417A: SendMessageA.USER32(00000028,?,00000001,00403FAA), ref: 00404188
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D60
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404D8E
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404D9C
                                            • ShowWindow.USER32(?,00000005), ref: 00404DAC
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EA7
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F0C
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F21
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F45
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F65
                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F7A
                                            • GlobalFree.KERNEL32(?), ref: 00404F8A
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405003
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 004050AC
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050BB
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050E5
                                            • ShowWindow.USER32(?,00000000), ref: 00405133
                                            • GetDlgItem.USER32(?,000003FE), ref: 0040513E
                                            • ShowWindow.USER32(00000000), ref: 00405145
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 2564846305-813528018
                                            • Opcode ID: 978ecd055ebf43ea6b523d6689dc18b759a0b0fdc29e4d3947c73573fc9385a9
                                            • Instruction ID: 035ac8a7469eee7f523ea9a41678d20bac9593c5f5e0b875cc373c12e4cd4a79
                                            • Opcode Fuzzy Hash: 978ecd055ebf43ea6b523d6689dc18b759a0b0fdc29e4d3947c73573fc9385a9
                                            • Instruction Fuzzy Hash: 63025DB0A00209AFDF209F94DD45AAE7BB5FB84354F50813AF610BA2E1D7799D42CF58
                                            APIs
                                              • Part of subcall function 6E441000: GlobalAlloc.KERNEL32(00000040,?,6E441030,00000001), ref: 6E441006
                                            • lstrlenA.KERNEL32(?,00002000), ref: 6E44115C
                                            • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 6E4411A2
                                            • SendMessageA.USER32(?,00000187,00000000,00000000), ref: 6E4411B8
                                            • lstrcatA.KERNEL32(00000000,6E4444B8,?,00000187,00000000,00000000,?,0000018B,00000000,00000000,00002000), ref: 6E4411CC
                                            • SendMessageA.USER32(?,00000189,00000000,00002000), ref: 6E4411DD
                                            • lstrcatA.KERNEL32(00000000,00002000,?,00000189,00000000,00002000,?,00000187,00000000,00000000,?,0000018B,00000000,00000000,00002000), ref: 6E4411E7
                                            • SendMessageA.USER32(?,0000000E,00000000,00000000), ref: 6E441207
                                            • GetWindowTextA.USER32(00001FFF,00000001,00001FFF), ref: 6E44123A
                                            • CharNextA.USER32(00000000,00002000), ref: 6E44128E
                                            • lstrcpynA.KERNEL32(00000000,00000000,00000000), ref: 6E44129E
                                            • CharNextA.USER32(00000000,00002000), ref: 6E4412B7
                                            • CharNextA.USER32(00000001), ref: 6E4412C0
                                            • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 6E4412E5
                                            • wsprintfA.USER32 ref: 6E4412F7
                                            • wsprintfA.USER32 ref: 6E44130F
                                            • WritePrivateProfileStringA.KERNEL32(6E446648,State,00000000), ref: 6E441325
                                            • wsprintfA.USER32 ref: 6E44136D
                                            • WritePrivateProfileStringA.KERNEL32(Settings,State,00000000), ref: 6E441387
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$CharNextwsprintf$PrivateProfileStringWritelstrcat$AllocGlobalTextWindowlstrcpynlstrlen
                                            • String ID: Field %d$HfDn$Settings$State$T
                                            • API String ID: 1338839387-1285016519
                                            • Opcode ID: 274a00126621b0c085d7a2a3b5449ba6917cb506a38a27551ed6ddd278e1eae4
                                            • Instruction ID: fbf0d429ff86b82ad0da3889f43df2c4b67c95e6e2a5605d9d1e0a79fe438157
                                            • Opcode Fuzzy Hash: 274a00126621b0c085d7a2a3b5449ba6917cb506a38a27551ed6ddd278e1eae4
                                            • Instruction Fuzzy Hash: E6711230304682EFF702AFB4DC49F5BBBA8FB46749F00491AF441E6742D778952987A2
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040433B
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 0040434F
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040436D
                                            • GetSysColor.USER32(?), ref: 0040437E
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040438D
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040439C
                                            • lstrlenA.KERNEL32(?), ref: 0040439F
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043AE
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043C3
                                            • GetDlgItem.USER32(?,0000040A), ref: 00404425
                                            • SendMessageA.USER32(00000000), ref: 00404428
                                            • GetDlgItem.USER32(?,000003E8), ref: 00404453
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404493
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 004044A2
                                            • SetCursor.USER32(00000000), ref: 004044AB
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004044C1
                                            • SetCursor.USER32(00000000), ref: 004044C4
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004044F0
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404504
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                            • String ID: N$show${B@
                                            • API String ID: 3103080414-1465207460
                                            • Opcode ID: acb20318001dbc993e8a8a4388a34ea8f8254a099665a8e39094a0f64cc29e55
                                            • Instruction ID: c600905809f0113b99b24623cb0d1ad186d6442f8c09b0c76a4ffb62e5d10872
                                            • Opcode Fuzzy Hash: acb20318001dbc993e8a8a4388a34ea8f8254a099665a8e39094a0f64cc29e55
                                            • Instruction Fuzzy Hash: 5661C7B1A00209BFEB109F60CD45F6A7B69FB84714F10813AFB057A1D1C7B89951CF98
                                            APIs
                                            • SHGetDesktopFolder.SHELL32(00000045,?,?), ref: 6E441862
                                            • lstrlenA.KERNEL32(?,?,?), ref: 6E44186B
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000002,00000002,?,?), ref: 6E441888
                                            • SHBrowseForFolderA.SHELL32(?,?,?), ref: 6E4418C4
                                            • SHGetPathFromIDListA.SHELL32(00000000,?,?,?), ref: 6E4418D8
                                            • CoTaskMemFree.OLE32(00000000,?,?), ref: 6E4418F2
                                            • SendMessageA.USER32(00000408,00000001,00000000,?), ref: 6E441916
                                            • GetWindowTextA.USER32(?,?,00000104), ref: 6E44196A
                                            • GetCurrentDirectoryA.KERNEL32(00002000,All Files|*.*,?,?), ref: 6E44197B
                                            • GetSaveFileNameA.COMDLG32(0000004C,?,?), ref: 6E44198B
                                            • GetOpenFileNameA.COMDLG32(0000004C,?,?), ref: 6E441993
                                            • CommDlgExtendedError.COMDLG32(?,?), ref: 6E4419A9
                                            • SetCurrentDirectoryA.KERNEL32(All Files|*.*,?,?,?,?), ref: 6E4419D3
                                            • ShellExecuteA.SHELL32(00000000,?,00000000,00000000,0000000A), ref: 6E4419F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CurrentDirectoryFileFolderName$BrowseByteCharCommDesktopErrorExecuteExtendedFreeFromListMessageMultiOpenPathSaveSendShellTaskTextWideWindowlstrlen
                                            • String ID: All Files|*.*$E$L
                                            • API String ID: 3574472847-3122172703
                                            • Opcode ID: 28ab588b862a9c29fd5a0b87015f32ed9301386b2509e0928ae3e6f8e41c6b1a
                                            • Instruction ID: 4976ab4e892c8d04feb99bb75a0c2a00263ea2c1a4f530af4e03bf8b3e97075e
                                            • Opcode Fuzzy Hash: 28ab588b862a9c29fd5a0b87015f32ed9301386b2509e0928ae3e6f8e41c6b1a
                                            • Instruction Fuzzy Hash: 7871B070B00648DFEB61EFB5C888E9EBBB9FB46700F10055AE506A7350C7359A99CF20
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: 927d9f4f17401607196459c248a51bb8bdb5d1fd0febad51b1ec1e4e61243643
                                            • Instruction ID: f39fc87f540bacaa9a77f224585c2e26811c2c777a6195e868dd16c74e67a44d
                                            • Opcode Fuzzy Hash: 927d9f4f17401607196459c248a51bb8bdb5d1fd0febad51b1ec1e4e61243643
                                            • Instruction Fuzzy Hash: AA419D71800209AFCF058FA5DE459AF7FB9FF45315F00802AF591AA1A0CB34DA55DFA4
                                            APIs
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EC1,?,?), ref: 00405D61
                                            • GetShortPathNameA.KERNEL32(?,00422AB8,00000400), ref: 00405D6A
                                              • Part of subcall function 00405BBF: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BCF
                                              • Part of subcall function 00405BBF: lstrlenA.KERNEL32(00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C01
                                            • GetShortPathNameA.KERNEL32(?,00422EB8,00000400), ref: 00405D87
                                            • wsprintfA.USER32 ref: 00405DA5
                                            • GetFileSize.KERNEL32(00000000,00000000,00422EB8,C0000000,00000004,00422EB8,?,?,?,?,?), ref: 00405DE0
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405DEF
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E27
                                            • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,004226B8,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405E7D
                                            • GlobalFree.KERNEL32(00000000), ref: 00405E8E
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E95
                                              • Part of subcall function 00405C5A: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\STjk6HCD1P.exe,80000000,00000003), ref: 00405C5E
                                              • Part of subcall function 00405C5A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                            • String ID: %s=%s$[Rename]
                                            • API String ID: 2171350718-1727408572
                                            • Opcode ID: 58e7088ff9b5cc87adf318d52b3a35de943ed58b69230702f7486ba729a2ba76
                                            • Instruction ID: e2b4b59c5115c054d9977882ffa936deea793db07019febf4a6c543227337bd7
                                            • Opcode Fuzzy Hash: 58e7088ff9b5cc87adf318d52b3a35de943ed58b69230702f7486ba729a2ba76
                                            • Instruction Fuzzy Hash: 39312431205B15BBD2207B65AD48F6B3A5CDF45754F14003BFA85F62C2DBBCE9028AAD
                                            APIs
                                            • GlobalFree.KERNEL32(00000000), ref: 6E492447
                                              • Part of subcall function 6E491224: lstrcpynA.KERNEL32(00000000,?,6E4912CF,-6E49404B,6E4911AB,-000000A0), ref: 6E491234
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6E4923C2
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6E4923D7
                                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6E4923E8
                                            • CLSIDFromString.OLE32(00000000,00000000), ref: 6E4923F6
                                            • GlobalFree.KERNEL32(00000000), ref: 6E4923FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                            • String ID: @Hmu
                                            • API String ID: 3730416702-887474944
                                            • Opcode ID: cb3e4f6039c47165e4cad66b0b8efb4a58035488c784836999d309a9e9c68aca
                                            • Instruction ID: 4bc7b0f55b992b63503af066ae1a979e6dd5a24592f3b5c294fd46c49cb48fdc
                                            • Opcode Fuzzy Hash: cb3e4f6039c47165e4cad66b0b8efb4a58035488c784836999d309a9e9c68aca
                                            • Instruction Fuzzy Hash: 09418B71508701DFD7209FB6A844F6A7BE8FB42315F00491BE459FB280DB709905DBA5
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\STjk6HCD1P.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 004063F4
                                            • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406401
                                            • CharNextA.USER32(?,"C:\Users\user\Desktop\STjk6HCD1P.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406406
                                            • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032ED,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00406416
                                            Strings
                                            • *?|<>/":, xrefs: 004063E4
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040639D
                                            • "C:\Users\user\Desktop\STjk6HCD1P.exe", xrefs: 004063D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\STjk6HCD1P.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-1499477269
                                            • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                            • Instruction ID: d9f0ee3981b821fe41e3526cabf2d3b5ed91aab2121061eeaaee8554b2496e7d
                                            • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                            • Instruction Fuzzy Hash: 161108518047A129FB3206384C44B777FD84F97760F1A507BE9C2722C2D67C5CA68BAD
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 004041C9
                                            • GetSysColor.USER32(00000000), ref: 00404207
                                            • SetTextColor.GDI32(?,00000000), ref: 00404213
                                            • SetBkMode.GDI32(?,?), ref: 0040421F
                                            • GetSysColor.USER32(?), ref: 00404232
                                            • SetBkColor.GDI32(?,?), ref: 00404242
                                            • DeleteObject.GDI32(?), ref: 0040425C
                                            • CreateBrushIndirect.GDI32(?), ref: 00404266
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                            • Instruction ID: aaf6f474a4af46f2497c0aff4df426b114d26e681d2b1e7af029b8f8d9950092
                                            • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                            • Instruction Fuzzy Hash: 422162B16007049BCB20DF78D908F5BBBF8AF81754B048A6EF992A22E1D734E944CB54
                                            APIs
                                              • Part of subcall function 6E491215: GlobalAlloc.KERNELBASE(00000040,6E491233,?,6E4912CF,-6E49404B,6E4911AB,-000000A0), ref: 6E49121D
                                            • GlobalFree.KERNEL32(?), ref: 6E4925DE
                                            • GlobalFree.KERNEL32(00000000), ref: 6E492618
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 1e564d1c9ab33674b8b43bdac1ab043494776637462428b6414964253f7fbe21
                                            • Instruction ID: 05cb4f2451f63a0015689c5ff68d82aa2e048a02cb75ec765d805f6b68798594
                                            • Opcode Fuzzy Hash: 1e564d1c9ab33674b8b43bdac1ab043494776637462428b6414964253f7fbe21
                                            • Instruction Fuzzy Hash: D1418D71148601EFCB019FB5EC98D6A7FAAFB87314B00492EF515B7210EB319D09EBA5
                                            APIs
                                            • SendMessageA.USER32(?,0000000E,00000000,00000000), ref: 6E441A49
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 6E441A97
                                            • PostMessageA.USER32(00000010,00000000,00000000), ref: 6E441AD2
                                            • GetWindowTextA.USER32(?,00000400,?), ref: 6E441AF9
                                            • MessageBoxA.USER32(00000000,?,00000030), ref: 6E441B11
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Message$Window$CallPostProcSendText
                                            • String ID: x
                                            • API String ID: 630778482-2363233923
                                            • Opcode ID: eba99deb29067d1513c4aa614f3a74bbfde90daa76d61e472766e6bce9f6500a
                                            • Instruction ID: 90501ac5a61102ee001fb5bb8ea446e3b83acd2fe976243cb6e1de1a36422149
                                            • Opcode Fuzzy Hash: eba99deb29067d1513c4aa614f3a74bbfde90daa76d61e472766e6bce9f6500a
                                            • Instruction Fuzzy Hash: 3431CC70750B05EBEF21AFB1DD40F8A77B9FB01B15F00496EEA02A1690C3719A69CF50
                                            APIs
                                            • lstrlenA.KERNEL32(00420508,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000,?), ref: 00405221
                                            • lstrlenA.KERNEL32(00403208,00420508,00000000,004178E0,00000000,?,?,?,?,?,?,?,?,?,00403208,00000000), ref: 00405231
                                            • lstrcatA.KERNEL32(00420508,00403208,00403208,00420508,00000000,004178E0,00000000), ref: 00405244
                                            • SetWindowTextA.USER32(00420508,00420508), ref: 00405256
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040527C
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405296
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052A4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2531174081-0
                                            • Opcode ID: f27698f2302dc729cc4947e7290bf36b72ac2c2b5ce3f33cd80fa01ec77ea105
                                            • Instruction ID: 13bf9d5a188301c634d68c5bb2c809f87baf544d33da629d3068cd84ff66c9cb
                                            • Opcode Fuzzy Hash: f27698f2302dc729cc4947e7290bf36b72ac2c2b5ce3f33cd80fa01ec77ea105
                                            • Instruction Fuzzy Hash: 7F218C71E00518BBDB119FA5DD81A9EBFB9EF09354F14807AF544B6290C7798A808F98
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AB3
                                            • GetMessagePos.USER32 ref: 00404ABB
                                            • ScreenToClient.USER32(?,?), ref: 00404AD5
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404AE7
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B0D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                            • Instruction ID: c5e689f19116b5cd7588311b3231e42886eb7a503382143ef86565be6c6ceac4
                                            • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                            • Instruction Fuzzy Hash: 98015E71A40219BADB00DBA4DD85BFFBBBCAF59711F10016BBB40B61D0C7B499458BA8
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                                            • MulDiv.KERNEL32(02B18B83,00000064,?), ref: 00402E00
                                            • wsprintfA.USER32 ref: 00402E10
                                            • SetWindowTextA.USER32(?,?), ref: 00402E20
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402E0A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: c12f5796f431ffac12d06fef0705727a44af994ad502cf00351caa1c45e3c2e6
                                            • Instruction ID: 483ea5b0a2f0e0c8b194c47557f81135a9cf1dc15d145a61dc19a9cae62ee66c
                                            • Opcode Fuzzy Hash: c12f5796f431ffac12d06fef0705727a44af994ad502cf00351caa1c45e3c2e6
                                            • Instruction Fuzzy Hash: CD014F70640209BBEF10AF60DE09EEE37A9AB04305F008039FA06A51D0DBB499559B59
                                            APIs
                                            • SendMessageA.USER32(?,?,?), ref: 6E441B63
                                            • DrawTextA.USER32(?,-6E446804,000000FF,?,00000414), ref: 6E441BCA
                                            • GetWindowLongA.USER32(?,000000EB), ref: 6E441BFE
                                            • SetTextColor.GDI32(?,?), ref: 6E441C11
                                            • DrawTextA.USER32(?,?,000000FF,?,?), ref: 6E441C36
                                            • DrawFocusRect.USER32(?,00000010), ref: 6E441C51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: DrawText$ColorFocusLongMessageRectSendWindow
                                            • String ID:
                                            • API String ID: 491839470-0
                                            • Opcode ID: cde268b0a65c57fb2a66f188baf6f5f21d41d0a4001e148ad3f8cc2c112363ad
                                            • Instruction ID: a318c038657add26ec34631452d6da6e7beb6baa370b7efc5c786545042ab499
                                            • Opcode Fuzzy Hash: cde268b0a65c57fb2a66f188baf6f5f21d41d0a4001e148ad3f8cc2c112363ad
                                            • Instruction Fuzzy Hash: 06416D71A0026AEFEF01DFB4CC84E9A3BB5FB06314F00455AF9109B2A6D375D969CB50
                                            APIs
                                            • GetDlgCtrlID.USER32(?), ref: 6E441C78
                                            • CallWindowProcA.USER32(?,?,?,?,?), ref: 6E441CDD
                                            • MapWindowPoints.USER32(00000000,?,?,00000001), ref: 6E441D1A
                                            • PtInRect.USER32(-6E446828,?,?), ref: 6E441D2A
                                            • LoadCursorA.USER32(00000000,00007F89), ref: 6E441D4B
                                            • SetCursor.USER32(00000000), ref: 6E441D5A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960035862.000000006E441000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E440000, based on PE: true
                                            • Associated: 00000000.00000002.2959998368.000000006E440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960064758.000000006E443000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960092893.000000006E444000.00000004.00000001.01000000.00000006.sdmpDownload File
                                            • Associated: 00000000.00000002.2960120638.000000006E448000.00000002.00000001.01000000.00000006.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e440000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CursorWindow$CallCtrlLoadPointsProcRect
                                            • String ID:
                                            • API String ID: 3496465773-0
                                            • Opcode ID: bbcbbd1585a7c28459438aafcbc9aa2528a96720981cecb3cee4a930a87d0b65
                                            • Instruction ID: c8d4a2153efeb484d841a439f2cb48d7f94a13145d3ef72e5c95f664fcc9c4f6
                                            • Opcode Fuzzy Hash: bbcbbd1585a7c28459438aafcbc9aa2528a96720981cecb3cee4a930a87d0b65
                                            • Instruction Fuzzy Hash: C6212232754A1AEBFB119FF8DD48F9A3BE8EB06700F00061AF502C6380D3B5E5658790
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                                            • GlobalFree.KERNEL32(?), ref: 0040288E
                                            • GlobalFree.KERNEL32(00000000), ref: 004028A1
                                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: ee4a68396c29b08b741c613ff754ff0f0653b24d2e102e37bfb1fe53aeee4bcb
                                            • Instruction ID: 07af861edfd5d45cc772d4460453d41526fe3ac71611944f2ada717c13252223
                                            • Opcode Fuzzy Hash: ee4a68396c29b08b741c613ff754ff0f0653b24d2e102e37bfb1fe53aeee4bcb
                                            • Instruction Fuzzy Hash: 83218D72800128BBDF217FA5CE48D9E7E79EF09364F10423EF551762D1C67949418FA8
                                            APIs
                                            • lstrlenA.KERNEL32(00420D28,00420D28,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048A9,000000DF,00000000,00000400,?), ref: 00404A2C
                                            • wsprintfA.USER32 ref: 00404A34
                                            • SetDlgItemTextA.USER32(?,00420D28), ref: 00404A47
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s$(B
                                            • API String ID: 3540041739-1796307841
                                            • Opcode ID: e7c66190fb260b440250c96ec47e9d60e1422182a5b9567c4571bd7753034b60
                                            • Instruction ID: 1301199a10d6bfa0f795ae51e8cceb2c664c9f74d195b05cdaf9af1bfefcf64c
                                            • Opcode Fuzzy Hash: e7c66190fb260b440250c96ec47e9d60e1422182a5b9567c4571bd7753034b60
                                            • Instruction Fuzzy Hash: 7A11B7B36041286BEB0066799C46EAF32D9DB85374F250237FA26F61D1E9788C5281A9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: FreeGlobal
                                            • String ID:
                                            • API String ID: 2979337801-0
                                            • Opcode ID: cc1ba92ec1c598dd764560db2ab7d7c00ee2f82367220ad8017eaccf061dcd00
                                            • Instruction ID: 329005f89f7399ffaa2fc297c71d06b6f98c7bf9ff3b00f9aa7ce19b6323cc04
                                            • Opcode Fuzzy Hash: cc1ba92ec1c598dd764560db2ab7d7c00ee2f82367220ad8017eaccf061dcd00
                                            • Instruction Fuzzy Hash: 3651ED32E44089AEDB409FF9C884EAEBFBDAB46349F07045BD414B7704C6719E4AF691
                                            APIs
                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CloseEnum$DeleteValue
                                            • String ID:
                                            • API String ID: 1354259210-0
                                            • Opcode ID: e0560c3492abfc6ba69bbbbd147d7cad17a6c92fce96212b07645899f063db07
                                            • Instruction ID: 479b5507277e1ed98100a043d195c8e3d67278c142fcba22c9f5c581f71d1c0c
                                            • Opcode Fuzzy Hash: e0560c3492abfc6ba69bbbbd147d7cad17a6c92fce96212b07645899f063db07
                                            • Instruction Fuzzy Hash: DE215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11A0E7B48E94AA68
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401D7E
                                            • GetClientRect.USER32(?,?), ref: 00401DCC
                                            • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                                            • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                                            • DeleteObject.GDI32(00000000), ref: 00401E20
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: 92fb06419dcf22d7c561d1c1cd7314035e184999ef60ddcb5701d42bd4b0d5ab
                                            • Instruction ID: 377f1368a79285744d6b6cf0b5e74a57d9b5ac4df0fb29ad0ac025f91be5ae75
                                            • Opcode Fuzzy Hash: 92fb06419dcf22d7c561d1c1cd7314035e184999ef60ddcb5701d42bd4b0d5ab
                                            • Instruction Fuzzy Hash: C8212872A00109AFCF15DFA4DD85AAEBBB5EB88300F24417EF911F62A1CB389941DB54
                                            APIs
                                            • GetDC.USER32(?), ref: 00401E38
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                                            • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                                            • CreateFontIndirectA.GDI32(0040B808), ref: 00401EBA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: fc9f16b01a24cae65528eb59c91fd2b9324a8e2726ec0d721fc5ceb8334f1a1e
                                            • Instruction ID: 57a26ad33cd6426129b0cba3998c620b955dd558a32440fd51a8b23e498893f8
                                            • Opcode Fuzzy Hash: fc9f16b01a24cae65528eb59c91fd2b9324a8e2726ec0d721fc5ceb8334f1a1e
                                            • Instruction Fuzzy Hash: 3E019672500240AFE7007BB0AE4A7997FF8D755301F108839F241B62F2C67800458BAC
                                            APIs
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000023,00000011,00000002), ref: 004024C1
                                            • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000000,00000011,00000002), ref: 00402501
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000000,00000011,00000002), ref: 004025E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CloseValuelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj786.tmp
                                            • API String ID: 2655323295-49727112
                                            • Opcode ID: 097285ea3bbb312b2181d04ac4d3b00894dd1fc18a6866c423278cd1736175d0
                                            • Instruction ID: f8ac89c5eddf20255a64599a8c35fdda00ac4070600c31cba318713478050a06
                                            • Opcode Fuzzy Hash: 097285ea3bbb312b2181d04ac4d3b00894dd1fc18a6866c423278cd1736175d0
                                            • Instruction Fuzzy Hash: A311B171E00214AFEF10AFA5CE49EAE7A74EB40314F21803AF505F71C1C6B89D419B28
                                            APIs
                                              • Part of subcall function 004060C1: lstrcpynA.KERNEL32(?,?,00000400,004033E4,00423F20,NSIS Error,?,00000007,00000009,0000000B), ref: 004060CE
                                              • Part of subcall function 00405AF2: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj786.tmp,?,00405B5E,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B00
                                              • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B05
                                              • Part of subcall function 00405AF2: CharNextA.USER32(00000000), ref: 00405B19
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B9A
                                            • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00405BAA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsj786.tmp
                                            • API String ID: 3248276644-3373921131
                                            • Opcode ID: 833d5d7d4d88ab044a5975486a6ace5c2f1c8b1622a9b4308b288e25f9abd96d
                                            • Instruction ID: e51454695f06d4bf62575f1f71cc8d9d2da662beaff56aa2e5751c7b88ff0260
                                            • Opcode Fuzzy Hash: 833d5d7d4d88ab044a5975486a6ace5c2f1c8b1622a9b4308b288e25f9abd96d
                                            • Instruction Fuzzy Hash: 47F02835601E6029C622223A0C45BAF3A65CE8232474D013FFC51B52C2DB3CB943DE6E
                                            APIs
                                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00405A5F
                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403524,?,00000007,00000009,0000000B), ref: 00405A68
                                            • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405A79
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A59
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-3081826266
                                            • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                            • Instruction ID: 4e9c794251620aa29aecb4049673505928abe3d31fb5bce1aa7abaa38b2a0d50
                                            • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                            • Instruction Fuzzy Hash: 2DD0A7A22015347AD20166254C06DDB690C8F02310B050066F200B2191C63C4C1147FD
                                            APIs
                                            • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsj786.tmp,?,00405B5E,C:\Users\user\AppData\Local\Temp\nsj786.tmp,C:\Users\user\AppData\Local\Temp\nsj786.tmp,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058A9,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B00
                                            • CharNextA.USER32(00000000), ref: 00405B05
                                            • CharNextA.USER32(00000000), ref: 00405B19
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsj786.tmp, xrefs: 00405AF3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsj786.tmp
                                            • API String ID: 3213498283-49727112
                                            • Opcode ID: 1e979eba324918ca677e02d4c6d61fe282ba8a8b0f982e42ab73b577f73820d9
                                            • Instruction ID: 371d989ad5315216d0c0cc34824f97af3956e00fc8829d3fd4d1a8d6fd0debac
                                            • Opcode Fuzzy Hash: 1e979eba324918ca677e02d4c6d61fe282ba8a8b0f982e42ab73b577f73820d9
                                            • Instruction Fuzzy Hash: 84F06251E14F956FFB3292680C44B777AA8CB95751F14407BD680762C286BC78408FAA
                                            APIs
                                            • DestroyWindow.USER32(?,00000000,0040301B,00000001), ref: 00402E50
                                            • GetTickCount.KERNEL32 ref: 00402E6E
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                                            • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: d2a126c8e87298d62dcb77b716532c519560652f5a9048845524fe30780812a8
                                            • Instruction ID: 90c5076a8d782885986fbf54e6784afd95d1d531b418d8ad00c0f3389847d2fc
                                            • Opcode Fuzzy Hash: d2a126c8e87298d62dcb77b716532c519560652f5a9048845524fe30780812a8
                                            • Instruction Fuzzy Hash: E1F05E30A41620EBC621BB60FE0CA8B7BA4FB84B81705493AF049B11E8C77448878BDC
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 0040518B
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 004051DC
                                              • Part of subcall function 00404191: SendMessageA.USER32(00010486,00000000,00000000,00000000), ref: 004041A3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: 4e0d83b517ec3755641dbbc7163631964c054c7a669fd012e4d2f406caf64491
                                            • Instruction ID: 1a2e93e4b5b60595961c78cfe9b1f953e315c10ea79d8335bfdfcc16afa4850a
                                            • Opcode Fuzzy Hash: 4e0d83b517ec3755641dbbc7163631964c054c7a669fd012e4d2f406caf64491
                                            • Instruction Fuzzy Hash: 8B015E31A10709ABEB215F51DD85B5B3A7AEB84314F600537F6007A1D1C73A9C929A69
                                            APIs
                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422530,Error launching installer), ref: 00405789
                                            • CloseHandle.KERNEL32(?), ref: 00405796
                                            Strings
                                            • Error launching installer, xrefs: 00405773
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: c3c80266f92bd9d667c92bf3182b136ee7f32a01548fe2ad44771ad24a16863f
                                            • Instruction ID: 07a2ea870b6c965c9c8bd0de01314bb8301d1462abb1d5e573899e5cf6f1fbe8
                                            • Opcode Fuzzy Hash: c3c80266f92bd9d667c92bf3182b136ee7f32a01548fe2ad44771ad24a16863f
                                            • Instruction Fuzzy Hash: EEE04FB0A00309BFEB009B60ED45F7B77ACEB04204F408421BD44F2150E77498148A78
                                            APIs
                                            • FreeLibrary.KERNEL32(?,74DF3410,00000000,C:\Users\user\AppData\Local\Temp\,00403817,00403631,?,?,00000007,00000009,0000000B), ref: 00403859
                                            • GlobalFree.KERNEL32(?), ref: 00403860
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040383F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Free$GlobalLibrary
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 1100898210-3081826266
                                            • Opcode ID: d577bf8b0ad620a88e67a325e5e326df37630095cafad59fd52e64b4463e9122
                                            • Instruction ID: 8a9dc77c7c1ee1b135259636166a50b6bf5175fc084ac984c046f8d06e3dc5f9
                                            • Opcode Fuzzy Hash: d577bf8b0ad620a88e67a325e5e326df37630095cafad59fd52e64b4463e9122
                                            • Instruction Fuzzy Hash: 1BE0EC3350152057C661AF5AAA0475ABAEC7F48B22F05847AF884BB2618B745C429BDC
                                            APIs
                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\STjk6HCD1P.exe,C:\Users\user\Desktop\STjk6HCD1P.exe,80000000,00000003), ref: 00405AA6
                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\STjk6HCD1P.exe,C:\Users\user\Desktop\STjk6HCD1P.exe,80000000,00000003), ref: 00405AB4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-224404859
                                            • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                            • Instruction ID: b7fadc1cb965da237d7d6f6ff84102907be402caa55b699d9cfbdae9487d107c
                                            • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                            • Instruction Fuzzy Hash: 98D0A9B25099B06EF303A2108C01B8F6A88CF13300F0A00A2E580E21A1C37C4C428BFD
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6E49115B
                                            • GlobalFree.KERNEL32(00000000), ref: 6E4911B4
                                            • GlobalFree.KERNEL32(?), ref: 6E4911C7
                                            • GlobalFree.KERNEL32(?), ref: 6E4911F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2960161907.000000006E491000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E490000, based on PE: true
                                            • Associated: 00000000.00000002.2960141690.000000006E490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960183013.000000006E493000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2960203297.000000006E495000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6e490000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 3831cf3cda4ce69b2c1647fbf66a270d3ec4d84481c219daee9259735b6fcd07
                                            • Instruction ID: a6bcdbce0021e3d795608549cf1fd7cc36ca325a5f809e974fe4d7cae26b3a23
                                            • Opcode Fuzzy Hash: 3831cf3cda4ce69b2c1647fbf66a270d3ec4d84481c219daee9259735b6fcd07
                                            • Instruction Fuzzy Hash: 9431C0B1404641AFDB00AFF8E889E2A7FACFB1B294B06051BE865F2354D730AC06DB50
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BCF
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BE7
                                            • CharNextA.USER32(00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BF8
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E1A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2958629752.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2958598285.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958653266.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958674948.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.000000000042F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2958799598.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_STjk6HCD1P.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                            • Instruction ID: 9eba209a39fe6667a971e8652d35f93e0e0dd93f5ee50219908c4175a565a31b
                                            • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                            • Instruction Fuzzy Hash: C7F0F631204914FFDB02DFA4DD40D9FBBA8EF56350B2540B9E840F7211D634EE01ABA8