Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dIPYIbWXs1.exe

Overview

General Information

Sample name:dIPYIbWXs1.exe
renamed because original name is a hash value
Original sample name:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97.exe
Analysis ID:1569083
MD5:da70482b3bd657ff83625fbcf998ec60
SHA1:864575ce9283c21c44bad550416ff35f3d38cb0f
SHA256:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97
Tags:exeuser-adrian__luca
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • dIPYIbWXs1.exe (PID: 6772 cmdline: "C:\Users\user\Desktop\dIPYIbWXs1.exe" MD5: DA70482B3BD657FF83625FBCF998EC60)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: dIPYIbWXs1.exeAvira: detected
Source: dIPYIbWXs1.exeReversingLabs: Detection: 55%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.2% probability
Source: dIPYIbWXs1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: dIPYIbWXs1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
Source: dIPYIbWXs1.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: dIPYIbWXs1.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040535C
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Windows\resources\0809Jump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Windows\Arder.lnkJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004069450_2_00406945
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040711C0_2_0040711C
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6F951A980_2_6F951A98
Source: dIPYIbWXs1.exeStatic PE information: invalid certificate
Source: dIPYIbWXs1.exe, 00000000.00000000.1754634562.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs dIPYIbWXs1.exe
Source: dIPYIbWXs1.exeBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs dIPYIbWXs1.exe
Source: dIPYIbWXs1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@1/8@0/0
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040460D
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Users\user\tranchetJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Users\user\AppData\Local\Temp\nsq7CE6.tmpJump to behavior
Source: dIPYIbWXs1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: dIPYIbWXs1.exeReversingLabs: Detection: 55%
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile read: C:\Users\user\Desktop\dIPYIbWXs1.exeJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Arder.lnk.0.drLNK file: ..\Users\user\Disannex.And37
Source: dIPYIbWXs1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6F951A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6F951A98
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6F952F60 push eax; ret 0_2_6F952F8E
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Users\user\AppData\Local\Temp\nsv88CE.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv88CE.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeAPI call chain: ExitProcess graph end nodegraph_0-4005
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeAPI call chain: ExitProcess graph end nodegraph_0-4010
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6F951A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6F951A98
Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Access Token Manipulation
11
Masquerading
OS Credential Dumping2
File and Directory Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory3
System Information Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
dIPYIbWXs1.exe55%ReversingLabsWin32.Trojan.Leonem
dIPYIbWXs1.exe100%AviraTR/Injector.mrwst
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsv88CE.tmp\System.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrordIPYIbWXs1.exefalse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrordIPYIbWXs1.exefalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1569083
    Start date and time:2024-12-05 13:00:11 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 56s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:dIPYIbWXs1.exe
    renamed because original name is a hash value
    Original Sample Name:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97.exe
    Detection:MAL
    Classification:mal60.winEXE@1/8@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 48
    • Number of non-executed functions: 28
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtCreateKey calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: dIPYIbWXs1.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsv88CE.tmp\System.dlleAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
      eAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
        RFQ-24064562-SUPPLY-NOv-ORDER.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
          LkzvfB4VFj.exeGet hashmaliciousFormBook, GuLoaderBrowse
            LkzvfB4VFj.exeGet hashmaliciousGuLoaderBrowse
              z120X20SO__UK__EKMELAMA.exeGet hashmaliciousGuLoader, RemcosBrowse
                Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                  Produkttyper.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    Impressionist.exeGet hashmaliciousGuLoaderBrowse
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):11776
                      Entropy (8bit):5.854450882766351
                      Encrypted:false
                      SSDEEP:192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
                      MD5:34442E1E0C2870341DF55E1B7B3CCCDC
                      SHA1:99B2FA21AEAD4B6CCD8FF2F6D3D3453A51D9C70C
                      SHA-256:269D232712C86983336BADB40B9E55E80052D8389ED095EBF9214964D43B6BB1
                      SHA-512:4A8C57FB12997438B488B862F3FC9DC0F236E07BB47B2BCE6053DCB03AC7AD171842F02AC749F02DDA4719C681D186330524CD2953D33CB50854844E74B33D51
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                      • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                      • Filename: RFQ-24064562-SUPPLY-NOv-ORDER.com.exe, Detection: malicious, Browse
                      • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                      • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                      • Filename: z120X20SO__UK__EKMELAMA.exe, Detection: malicious, Browse
                      • Filename: Quotation-GINC-19-00204.exe, Detection: malicious, Browse
                      • Filename: Produkttyper.exe, Detection: malicious, Browse
                      • Filename: Impressionist.exe, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....`...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):210093
                      Entropy (8bit):7.502700121282951
                      Encrypted:false
                      SSDEEP:6144:f7wFK87cxzGweAviFN6KGCx2Qxo2AvCDG6P:fe7cs0KFEjQxo23B
                      MD5:B509D01147AF9F5FF51786E462472C80
                      SHA1:3081D1F6DD366EB3AA1ED3BAA1356E74B6E35E63
                      SHA-256:2A27D685E02EA3783C98AA267333B802A8CD50347556464B892D535DFDE46DE8
                      SHA-512:4BCB1D76FBB3A94AEB9B24D113250BB19785965B1C9F8EBD618426F8855AE67A1886BB51B2B80DEE4C7F969FD947AF1CEE42403095122BFF5333DE2012016639
                      Malicious:false
                      Reputation:low
                      Preview:.....VVV......}}}....................//.....jj.......B..................999......\\\\...T.+++.Z............++++.....dd........===.....E....OOO..6....++..RRRR..........%..............................IIII...........|................GGGG.<..\..d..................V..c........L....///....nnn.....7...........;;;.......'...........=.@..............Q..................!.........{{{{{.......F.................h.H...r..............yy.............c........}}}...................VVVVVV....................6666.....++....ii.........\..................gg...........%............U...5...O.....B...................==..........bbb.4444...yyy..$$...........[[............."...................C..............L........................iii.......**....L........7..................kkk..............................ee.7..X.....~~...,.%.WW....{.IIII....................???....bbbb........).............aaa..uuu.ff..........+..X....3...99.........................,....C.s...1..NNNNNN.....,,....5........z..U....qq.....B.....
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:ASCII text, with very long lines (65536), with no line terminators
                      Category:dropped
                      Size (bytes):461226
                      Entropy (8bit):2.6494643206930517
                      Encrypted:false
                      SSDEEP:1536:QQ5Am9szdb4p6MGKluF9aurMo7giAeTHNJDyq4HvZTAG73lLkjITTbpnEq8rbt4l:cm36nrJ8lvqmBpY05VKpTPEhsPjgf2g
                      MD5:F8459F552184AAE64D3C4F49A1E22FB3
                      SHA1:D4ECA106AF335EA7B7A12FFD97A42A7D0CA93D1E
                      SHA-256:E7737983C55481BFF4EC8F19A59BE2F78AA8F98264473CB8AA012EE7C07B0AD7
                      SHA-512:6F97BE49801E235D9E8881728117D4BD096009631F274758CEA5E8AAAAF57B4C92B501FB2C84A4D32A7831615B3310C056BFC661D00262DCF8B1A3F77B7DDD27
                      Malicious:false
                      Reputation:low
                      Preview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
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):485127
                      Entropy (8bit):1.2565961974341746
                      Encrypted:false
                      SSDEEP:768:bgBMgq+aLnwfPnz/Km1iLGyDPiU55NCk+T93YpnK77oTpvYP3knePjlW0kwNGL+q:XQ3wvosOsCpxFJrXSBmHzTu58UR
                      MD5:580D05E679E74B036B55CA8E5FF32769
                      SHA1:10175C43AB7B725FFFCF770EB2C3555E91D3BA13
                      SHA-256:B3E34975017C193D4672BEC42BC52B55F8AE1F1D5F30D56DCFD0B3A4242C3BE4
                      SHA-512:0E26F0084BED372785A5E8C8BE3A0717074AA52C2E8B5413FA9F2CB8DEED40BF8BDBF15C411EFFA432A8B96E50AE6085E8F90A97350827AFAA1BE1AB4B3E1643
                      Malicious:false
                      Preview:.................3.........................................=.....................................`.............................................................................n........................... .L.........................(,.b...e.......\...............................u.....................[.............................n........................[........................................c...........................W...........................................................*..].h.............R..............................................*............................^.....$.....w...................................................p...............................................................$.t...................................w*....................b....E.......................|.............5.......E................................................P.........d..................vl...........}..."..................................1.............................k.....7...............
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):389868
                      Entropy (8bit):1.2469892412772452
                      Encrypted:false
                      SSDEEP:768:8mGX5iY6YFC1hSNYG8n6aCKBHwcX7e3ZNrt7qNIxKpGEopKfWOO72cDEDQ+7IF5i:m5ittaAwW6q8KH13QyOgs2w
                      MD5:2A500E1219C4894E2D45C32C5A5A11FD
                      SHA1:AC9A88DE4C84E1EB8A535E1061CBC6584380D24E
                      SHA-256:C65F223375C6DFE8CE71213D5DD24F39CDE31F772D2C66521BF07B21BE45E6C1
                      SHA-512:89ED91AF91CF969FE7EC087EE107B52959582615EFB2AB72A21D6C3820E5BDDA78EE02EB39BB323FD996D85510627387616DF8917B12052A62D288D8E9448596
                      Malicious:false
                      Preview:...........................E.....................................................................<......................].....f........................_...G..........S....................................@...............j...................................................I...................|..C..........................................................d......%t..........N..................d...Q...........p....3..........................................L...........y...............................-........................................................................@.........]..3........A................................*............................................................................................@...........(............................{..4......................................k.................{.....................W.................,......+...............K....b.......................!.............................H..)..........................E..........................
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):442363
                      Entropy (8bit):1.2533707838755617
                      Encrypted:false
                      SSDEEP:1536:f6KFImN7hPg1fMcZ9pkK6m1rmkrDAji7VW9EgfrY:PyMtabPE+7ctfM
                      MD5:5465B75724C031B21C018F7D72941F72
                      SHA1:98176B27A41A35401A96D0AAC0859EEC25A4C5FE
                      SHA-256:7390780C6FB1F7B57C950A11AE287127CB6144CE9AD1C26E8C242BADB685729B
                      SHA-512:7084191B13FF854943DEE9FB6DDC1D7F89D06055FF4DA7E04DA1C359B557AC22762209B8DFE061F3AF628DF077E1D1D1009E9F9A18E3C9441AEE7FD4FDFF1688
                      Malicious:false
                      Preview:.........................................................................|......................................v..g..................................................................C...........`.......................................... ...............#.....................K..0.................\................................4.......................................y...................."........k..............9.H.................................................................."...........m............................6...................................................E..)..........[..............TZ..............Q............_...........$...... ..........................W....................................................y..................................q......!.................................... .....................o..........*........................................................................[..............9..................s....;..........................................
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):521
                      Entropy (8bit):4.284169749449499
                      Encrypted:false
                      SSDEEP:12:7+SriF8i+WUQDJBYqRIE47W0BvM71ARi9ulhji4JDQCr6K:7tuZ+d6/GEUI18jhJsCr6K
                      MD5:B089BD0CBC944DE0B1023E6CE9318BD3
                      SHA1:715FA74E243D5C3419519E7371ED1836C9BCFA4A
                      SHA-256:1E8ABB4A5E85595B0EF2FC73E9012EDDFE1BCB7363E90A2EA46F561DD3742F93
                      SHA-512:A164EB2AB02E612E9F96531006C4A71B8D6E8EA6444D86907CB15EF2C1AAB4680EAF3BB580C6A1D5B89A3F454F3E532242FC1DE2B71A9FFF56F812F6E4638885
                      Malicious:false
                      Preview:dibasic skinnebenssaarenes rembrandt unembayed timerne ependytes overtorturing.ruskindenes cellemembranen visirs daarligste bartholomeuss eslabon trflen communizations karikaturtegners forsgsstadiet hillocked..perfumers afplukker simonized jubilumsmiddags dolktids spokane milliontedel indfoertes dour..margented pomerans semicylindrical skifferolies kernerelationerne univalent,tiltrdelsesforelsning hydrion caggy stabejserne figurist vt klutzier bendy hanekamme..duilin molompi cuartino fornagl tortricoidea unhurrying.
                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                      Category:dropped
                      Size (bytes):726
                      Entropy (8bit):3.2589952341453956
                      Encrypted:false
                      SSDEEP:12:8wl0BsXowAOcIGlnEE6ReRqNE9Rw3w/g/3NJkKAd4t2YZ/elFlSJm:8SLkvgeMNyr/49HAvqy
                      MD5:E4FEBE492ACF72DF599F0FD64297A1F7
                      SHA1:C4E3BF8BBBE2664821D6D445E3DCD212316CA772
                      SHA-256:C09FE432B453D809766DA481C13D9699F119103DD19FFF0D22101A2F16641238
                      SHA-512:B5B63EDADDB117BBC4CE88891667234C8A3DFE538F2F517B563B0B3868105CD2327AF41A229DD2A1ED3314057E0033062BFBA823021F2B27FA1CB4E574EB8730
                      Malicious:false
                      Preview:L..................F........................................................;....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....l.2...........Disannex.And37..N............................................D.i.s.a.n.n.e.x...A.n.d.3.7.............\.U.s.e.r.s.\.j.o.n.e.s.\.D.i.s.a.n.n.e.x...A.n.d.3.7.#.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.t.r.a.n.c.h.e.t.\.T.r.y.k.m.a.a.l.e.r.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.543808382353923
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:dIPYIbWXs1.exe
                      File size:886'680 bytes
                      MD5:da70482b3bd657ff83625fbcf998ec60
                      SHA1:864575ce9283c21c44bad550416ff35f3d38cb0f
                      SHA256:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97
                      SHA512:b2fd7b3ed0f70fc9fcbfdebc96eaf7bff3fb108747555e1c215b824b97601d81c85a895ec43184df00e4b673ab3eeb7051c90eecb367bc18ea09e120c920f66d
                      SSDEEP:24576:jiGFaq43NvCEILxHx6CujTrld48tcv97J/QOea:jiGFu3NvXOHKddUNJ/qa
                      TLSH:25152266F640C8ABE4398F30586FD05AEBD97E5914910F6B3FADBB1EB9B1090C00F116
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L... ..`.................f...|......H3............@
                      Icon Hash:0e13672535353f1c
                      Entrypoint:0x403348
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x60FC9220 [Sat Jul 24 22:20:16 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:ced282d9b261d1462772017fe2f6972b
                      Signature Valid:false
                      Signature Issuer:CN="Whiskyernes Bawdrick ", E=Halvbrdrene@Mejslingens.Gas, L=Noyelles-sous-Lens, S=Hauts-de-France, C=FR
                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                      Error Number:-2146762487
                      Not Before, Not After
                      • 29/06/2024 09:14:31 29/06/2027 09:14:31
                      Subject Chain
                      • CN="Whiskyernes Bawdrick ", E=Halvbrdrene@Mejslingens.Gas, L=Noyelles-sous-Lens, S=Hauts-de-France, C=FR
                      Version:3
                      Thumbprint MD5:6AB90C8B225664731A8B54D6E40103F4
                      Thumbprint SHA-1:5E84FE3B8249EB518C15A7F2DB80750FA72EA947
                      Thumbprint SHA-256:8BE0554365D7BACBD9F6AA46974380476F7408D28C796D6C44B49C58233A5089
                      Serial:149E8B9BEE100D92F5680896840913AA028289AE
                      Instruction
                      sub esp, 00000184h
                      push ebx
                      push esi
                      push edi
                      xor ebx, ebx
                      push 00008001h
                      mov dword ptr [esp+18h], ebx
                      mov dword ptr [esp+10h], 0040A198h
                      mov dword ptr [esp+20h], ebx
                      mov byte ptr [esp+14h], 00000020h
                      call dword ptr [004080B8h]
                      call dword ptr [004080BCh]
                      and eax, BFFFFFFFh
                      cmp ax, 00000006h
                      mov dword ptr [0042F42Ch], eax
                      je 00007F5798EC9453h
                      push ebx
                      call 00007F5798ECC5B6h
                      cmp eax, ebx
                      je 00007F5798EC9449h
                      push 00000C00h
                      call eax
                      mov esi, 004082A0h
                      push esi
                      call 00007F5798ECC532h
                      push esi
                      call dword ptr [004080CCh]
                      lea esi, dword ptr [esi+eax+01h]
                      cmp byte ptr [esi], bl
                      jne 00007F5798EC942Dh
                      push 0000000Bh
                      call 00007F5798ECC58Ah
                      push 00000009h
                      call 00007F5798ECC583h
                      push 00000007h
                      mov dword ptr [0042F424h], eax
                      call 00007F5798ECC577h
                      cmp eax, ebx
                      je 00007F5798EC9451h
                      push 0000001Eh
                      call eax
                      test eax, eax
                      je 00007F5798EC9449h
                      or byte ptr [0042F42Fh], 00000040h
                      push ebp
                      call dword ptr [00408038h]
                      push ebx
                      call dword ptr [00408288h]
                      mov dword ptr [0042F4F8h], eax
                      push ebx
                      lea eax, dword ptr [esp+38h]
                      push 00000160h
                      push eax
                      push ebx
                      push 00429850h
                      call dword ptr [0040816Ch]
                      push 0040A188h
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x41dd0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0xd73e80x13b0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .ndata0x300000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x580000x41dd00x41e0051f103b856396aac282c5bd5a24beff1False0.6063619248102466data5.8960782160116745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x583b80x130caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998410786148207
                      RT_ICON0x6b4880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.40775464332189754
                      RT_ICON0x7bcb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4554866512507883
                      RT_ICON0x851580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.462218045112782
                      RT_ICON0x8b9400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4729667282809612
                      RT_ICON0x90dc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.46835144071799717
                      RT_ICON0x94ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5149377593360995
                      RT_ICON0x975980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5457317073170732
                      RT_ICON0x986400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6073770491803279
                      RT_ICON0x98fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                      RT_DIALOG0x994300x100dataEnglishUnited States0.5234375
                      RT_DIALOG0x995300x11cdataEnglishUnited States0.6056338028169014
                      RT_DIALOG0x996500xc4dataEnglishUnited States0.5918367346938775
                      RT_DIALOG0x997180x60dataEnglishUnited States0.7291666666666666
                      RT_GROUP_ICON0x997780x92Targa image data - Map 32 x 12490 x 1 +1EnglishUnited States0.7191780821917808
                      RT_VERSION0x998100x27cdataEnglishUnited States0.5
                      RT_MANIFEST0x99a900x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                      DLLImport
                      ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                      SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                      ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                      USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:07:01:11
                      Start date:05/12/2024
                      Path:C:\Users\user\Desktop\dIPYIbWXs1.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\dIPYIbWXs1.exe"
                      Imagebase:0x400000
                      File size:886'680 bytes
                      MD5 hash:DA70482B3BD657FF83625FBCF998EC60
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:19.8%
                        Dynamic/Decrypted Code Coverage:14%
                        Signature Coverage:16.4%
                        Total number of Nodes:1544
                        Total number of Limit Nodes:47
                        execution_graph 4891 401d44 4892 402bac 17 API calls 4891->4892 4893 401d52 SetWindowLongA 4892->4893 4894 402a5a 4893->4894 3865 401ec5 3873 402bac 3865->3873 3867 401ecb 3868 402bac 17 API calls 3867->3868 3869 401ed7 3868->3869 3870 401ee3 ShowWindow 3869->3870 3871 401eee EnableWindow 3869->3871 3872 402a5a 3870->3872 3871->3872 3876 40618a 3873->3876 3875 402bc1 3875->3867 3891 406197 3876->3891 3877 4063b9 3878 4063ce 3877->3878 3909 4060f7 lstrcpynA 3877->3909 3878->3875 3880 406393 lstrlenA 3880->3891 3881 40618a 10 API calls 3881->3880 3884 4062af GetSystemDirectoryA 3884->3891 3886 4062c2 GetWindowsDirectoryA 3886->3891 3888 40618a 10 API calls 3888->3891 3889 40633c lstrcatA 3889->3891 3890 4062f6 SHGetSpecialFolderLocation 3890->3891 3892 40630e SHGetPathFromIDListA CoTaskMemFree 3890->3892 3891->3877 3891->3880 3891->3881 3891->3884 3891->3886 3891->3888 3891->3889 3891->3890 3893 405fde 3891->3893 3898 4063d2 3891->3898 3907 406055 wsprintfA 3891->3907 3908 4060f7 lstrcpynA 3891->3908 3892->3891 3910 405f7d 3893->3910 3896 406012 RegQueryValueExA RegCloseKey 3897 406041 3896->3897 3897->3891 3904 4063de 3898->3904 3899 406446 3900 40644a CharPrevA 3899->3900 3902 406465 3899->3902 3900->3899 3901 40643b CharNextA 3901->3899 3901->3904 3902->3891 3904->3899 3904->3901 3905 406429 CharNextA 3904->3905 3906 406436 CharNextA 3904->3906 3914 405aba 3904->3914 3905->3904 3906->3901 3907->3891 3908->3891 3909->3878 3911 405f8c 3910->3911 3912 405f90 3911->3912 3913 405f95 RegOpenKeyExA 3911->3913 3912->3896 3912->3897 3913->3912 3915 405ac0 3914->3915 3916 405ad3 3915->3916 3917 405ac6 CharNextA 3915->3917 3916->3904 3917->3915 3918 401746 3924 402bce 3918->3924 3922 401754 3923 405cbf 2 API calls 3922->3923 3923->3922 3925 402bda 3924->3925 3926 40618a 17 API calls 3925->3926 3927 402bfb 3926->3927 3928 40174d 3927->3928 3929 4063d2 5 API calls 3927->3929 3930 405cbf 3928->3930 3929->3928 3931 405cca GetTickCount GetTempFileNameA 3930->3931 3932 405cfb 3931->3932 3933 405cf7 3931->3933 3932->3922 3933->3931 3933->3932 4895 4045c6 4896 4045d6 4895->4896 4897 4045fc 4895->4897 4902 40417b 4896->4902 4905 4041e2 4897->4905 4900 4045e3 SetDlgItemTextA 4900->4897 4903 40618a 17 API calls 4902->4903 4904 404186 SetDlgItemTextA 4903->4904 4904->4900 4906 4042a5 4905->4906 4907 4041fa GetWindowLongA 4905->4907 4907->4906 4908 40420f 4907->4908 4908->4906 4909 40423c GetSysColor 4908->4909 4910 40423f 4908->4910 4909->4910 4911 404245 SetTextColor 4910->4911 4912 40424f SetBkMode 4910->4912 4911->4912 4913 404267 GetSysColor 4912->4913 4914 40426d 4912->4914 4913->4914 4915 404274 SetBkColor 4914->4915 4916 40427e 4914->4916 4915->4916 4916->4906 4917 404291 DeleteObject 4916->4917 4918 404298 CreateBrushIndirect 4916->4918 4917->4918 4918->4906 4919 401947 4920 402bce 17 API calls 4919->4920 4921 40194e lstrlenA 4920->4921 4922 402620 4921->4922 3961 403348 SetErrorMode GetVersion 3962 403389 3961->3962 3963 40338f 3961->3963 3964 406500 5 API calls 3962->3964 4051 406492 GetSystemDirectoryA 3963->4051 3964->3963 3966 4033a5 lstrlenA 3966->3963 3967 4033b4 3966->3967 4054 406500 GetModuleHandleA 3967->4054 3970 406500 5 API calls 3971 4033c2 3970->3971 3972 406500 5 API calls 3971->3972 3973 4033ce #17 OleInitialize SHGetFileInfoA 3972->3973 4060 4060f7 lstrcpynA 3973->4060 3976 40341a GetCommandLineA 4061 4060f7 lstrcpynA 3976->4061 3978 40342c 3979 405aba CharNextA 3978->3979 3980 403455 CharNextA 3979->3980 3988 403465 3980->3988 3981 40352f 3982 403542 GetTempPathA 3981->3982 4062 403317 3982->4062 3984 40355a 3986 4035b4 DeleteFileA 3984->3986 3987 40355e GetWindowsDirectoryA lstrcatA 3984->3987 3985 405aba CharNextA 3985->3988 4072 402ea1 GetTickCount GetModuleFileNameA 3986->4072 3989 403317 12 API calls 3987->3989 3988->3981 3988->3985 3992 403531 3988->3992 3991 40357a 3989->3991 3991->3986 3994 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3991->3994 4157 4060f7 lstrcpynA 3992->4157 3993 4035c8 4000 405aba CharNextA 3993->4000 4033 40364e 3993->4033 4046 40365e 3993->4046 3996 403317 12 API calls 3994->3996 3998 4035ac 3996->3998 3998->3986 3998->4046 4002 4035e3 4000->4002 4008 403629 4002->4008 4009 40368e 4002->4009 4003 403796 4005 403818 ExitProcess 4003->4005 4006 40379e GetCurrentProcess OpenProcessToken 4003->4006 4004 403678 4007 405813 MessageBoxIndirectA 4004->4007 4011 4037e9 4006->4011 4012 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 4006->4012 4010 403686 ExitProcess 4007->4010 4158 405b7d 4008->4158 4181 40577e 4009->4181 4016 406500 5 API calls 4011->4016 4012->4011 4028 4037f0 4016->4028 4019 4036a4 lstrcatA 4020 4036af lstrcatA lstrcmpiA 4019->4020 4023 4036cb 4020->4023 4020->4046 4021 403805 ExitWindowsEx 4021->4005 4024 403811 4021->4024 4026 4036d0 4023->4026 4027 4036d7 4023->4027 4201 40140b 4024->4201 4025 403643 4173 4060f7 lstrcpynA 4025->4173 4184 4056e4 CreateDirectoryA 4026->4184 4189 405761 CreateDirectoryA 4027->4189 4028->4021 4028->4024 4100 40390a 4033->4100 4035 4036dc SetCurrentDirectoryA 4036 4036f6 4035->4036 4037 4036eb 4035->4037 4193 4060f7 lstrcpynA 4036->4193 4192 4060f7 lstrcpynA 4037->4192 4040 40618a 17 API calls 4041 403735 DeleteFileA 4040->4041 4042 403742 CopyFileA 4041->4042 4048 403704 4041->4048 4042->4048 4043 40378a 4044 405ed6 36 API calls 4043->4044 4044->4046 4174 403830 4046->4174 4047 40618a 17 API calls 4047->4048 4048->4040 4048->4043 4048->4047 4050 403776 CloseHandle 4048->4050 4194 405ed6 MoveFileExA 4048->4194 4198 405796 CreateProcessA 4048->4198 4050->4048 4053 4064b4 wsprintfA LoadLibraryExA 4051->4053 4053->3966 4055 406526 GetProcAddress 4054->4055 4056 40651c 4054->4056 4057 4033bb 4055->4057 4058 406492 3 API calls 4056->4058 4057->3970 4059 406522 4058->4059 4059->4055 4059->4057 4060->3976 4061->3978 4063 4063d2 5 API calls 4062->4063 4064 403323 4063->4064 4065 40332d 4064->4065 4204 405a8f lstrlenA CharPrevA 4064->4204 4065->3984 4068 405761 2 API calls 4069 40333b 4068->4069 4070 405cbf 2 API calls 4069->4070 4071 403346 4070->4071 4071->3984 4207 405c90 GetFileAttributesA CreateFileA 4072->4207 4074 402ee1 4094 402ef1 4074->4094 4208 4060f7 lstrcpynA 4074->4208 4076 402f07 4209 405ad6 lstrlenA 4076->4209 4080 402f18 GetFileSize 4081 403012 4080->4081 4099 402f2f 4080->4099 4214 402e3d 4081->4214 4083 40301b 4085 40304b GlobalAlloc 4083->4085 4083->4094 4249 403300 SetFilePointer 4083->4249 4225 403300 SetFilePointer 4085->4225 4087 40307e 4091 402e3d 6 API calls 4087->4091 4089 403034 4092 4032ea ReadFile 4089->4092 4090 403066 4226 4030d8 4090->4226 4091->4094 4095 40303f 4092->4095 4094->3993 4095->4085 4095->4094 4096 402e3d 6 API calls 4096->4099 4097 403072 4097->4094 4097->4097 4098 4030af SetFilePointer 4097->4098 4098->4094 4099->4081 4099->4087 4099->4094 4099->4096 4246 4032ea 4099->4246 4101 406500 5 API calls 4100->4101 4102 40391e 4101->4102 4103 403924 4102->4103 4104 403936 4102->4104 4278 406055 wsprintfA 4103->4278 4105 405fde 3 API calls 4104->4105 4106 403961 4105->4106 4108 40397f lstrcatA 4106->4108 4110 405fde 3 API calls 4106->4110 4109 403934 4108->4109 4270 403bcf 4109->4270 4110->4108 4113 405b7d 18 API calls 4114 4039b1 4113->4114 4115 403a3a 4114->4115 4117 405fde 3 API calls 4114->4117 4116 405b7d 18 API calls 4115->4116 4118 403a40 4116->4118 4119 4039dd 4117->4119 4120 403a50 LoadImageA 4118->4120 4121 40618a 17 API calls 4118->4121 4119->4115 4125 4039f9 lstrlenA 4119->4125 4128 405aba CharNextA 4119->4128 4122 403af6 4120->4122 4123 403a77 RegisterClassA 4120->4123 4121->4120 4124 40140b 2 API calls 4122->4124 4126 403aad SystemParametersInfoA CreateWindowExA 4123->4126 4156 403b00 4123->4156 4127 403afc 4124->4127 4129 403a07 lstrcmpiA 4125->4129 4130 403a2d 4125->4130 4126->4122 4135 403bcf 18 API calls 4127->4135 4127->4156 4133 4039f7 4128->4133 4129->4130 4131 403a17 GetFileAttributesA 4129->4131 4132 405a8f 3 API calls 4130->4132 4134 403a23 4131->4134 4136 403a33 4132->4136 4133->4125 4134->4130 4137 405ad6 2 API calls 4134->4137 4138 403b0d 4135->4138 4279 4060f7 lstrcpynA 4136->4279 4137->4130 4140 403b19 ShowWindow 4138->4140 4141 403b9c 4138->4141 4143 406492 3 API calls 4140->4143 4280 4052f0 OleInitialize 4141->4280 4145 403b31 4143->4145 4144 403ba2 4146 403ba6 4144->4146 4147 403bbe 4144->4147 4148 403b3f GetClassInfoA 4145->4148 4150 406492 3 API calls 4145->4150 4153 40140b 2 API calls 4146->4153 4146->4156 4149 40140b 2 API calls 4147->4149 4151 403b53 GetClassInfoA RegisterClassA 4148->4151 4152 403b69 DialogBoxParamA 4148->4152 4149->4156 4150->4148 4151->4152 4154 40140b 2 API calls 4152->4154 4153->4156 4155 403b91 4154->4155 4155->4156 4156->4046 4157->3982 4298 4060f7 lstrcpynA 4158->4298 4160 405b8e 4299 405b28 CharNextA CharNextA 4160->4299 4163 403634 4163->4046 4172 4060f7 lstrcpynA 4163->4172 4164 4063d2 5 API calls 4170 405ba4 4164->4170 4165 405bcf lstrlenA 4166 405bda 4165->4166 4165->4170 4168 405a8f 3 API calls 4166->4168 4169 405bdf GetFileAttributesA 4168->4169 4169->4163 4170->4163 4170->4165 4171 405ad6 2 API calls 4170->4171 4305 40646b FindFirstFileA 4170->4305 4171->4165 4172->4025 4173->4033 4175 403848 4174->4175 4176 40383a CloseHandle 4174->4176 4308 403875 4175->4308 4176->4175 4182 406500 5 API calls 4181->4182 4183 403693 lstrcatA 4182->4183 4183->4019 4183->4020 4185 405735 GetLastError 4184->4185 4186 4036d5 4184->4186 4185->4186 4187 405744 SetFileSecurityA 4185->4187 4186->4035 4187->4186 4188 40575a GetLastError 4187->4188 4188->4186 4190 405771 4189->4190 4191 405775 GetLastError 4189->4191 4190->4035 4191->4190 4192->4036 4193->4048 4195 405ef7 4194->4195 4196 405eea 4194->4196 4195->4048 4365 405d66 4196->4365 4199 4057d5 4198->4199 4200 4057c9 CloseHandle 4198->4200 4199->4048 4200->4199 4202 401389 2 API calls 4201->4202 4203 401420 4202->4203 4203->4005 4205 403335 4204->4205 4206 405aa9 lstrcatA 4204->4206 4205->4068 4206->4205 4207->4074 4208->4076 4210 405ae3 4209->4210 4211 402f0d 4210->4211 4212 405ae8 CharPrevA 4210->4212 4213 4060f7 lstrcpynA 4211->4213 4212->4210 4212->4211 4213->4080 4215 402e46 4214->4215 4216 402e5e 4214->4216 4217 402e56 4215->4217 4218 402e4f DestroyWindow 4215->4218 4219 402e66 4216->4219 4220 402e6e GetTickCount 4216->4220 4217->4083 4218->4217 4250 40653c 4219->4250 4222 402e7c CreateDialogParamA ShowWindow 4220->4222 4223 402e9f 4220->4223 4222->4223 4223->4083 4225->4090 4227 4030ee 4226->4227 4228 40311c 4227->4228 4256 403300 SetFilePointer 4227->4256 4229 4032ea ReadFile 4228->4229 4231 403127 4229->4231 4232 403283 4231->4232 4233 403139 GetTickCount 4231->4233 4235 40326d 4231->4235 4234 4032c5 4232->4234 4239 403287 4232->4239 4233->4235 4242 403188 4233->4242 4236 4032ea ReadFile 4234->4236 4235->4097 4236->4235 4237 4032ea ReadFile 4237->4242 4238 4032ea ReadFile 4238->4239 4239->4235 4239->4238 4240 405d37 WriteFile 4239->4240 4240->4239 4241 4031de GetTickCount 4241->4242 4242->4235 4242->4237 4242->4241 4243 403203 MulDiv wsprintfA 4242->4243 4254 405d37 WriteFile 4242->4254 4257 40521e 4243->4257 4268 405d08 ReadFile 4246->4268 4249->4089 4251 406559 PeekMessageA 4250->4251 4252 402e6c 4251->4252 4253 40654f DispatchMessageA 4251->4253 4252->4083 4253->4251 4255 405d55 4254->4255 4255->4242 4256->4228 4258 405239 4257->4258 4267 4052dc 4257->4267 4259 405256 lstrlenA 4258->4259 4262 40618a 17 API calls 4258->4262 4260 405264 lstrlenA 4259->4260 4261 40527f 4259->4261 4263 405276 lstrcatA 4260->4263 4260->4267 4264 405292 4261->4264 4265 405285 SetWindowTextA 4261->4265 4262->4259 4263->4261 4266 405298 SendMessageA SendMessageA SendMessageA 4264->4266 4264->4267 4265->4264 4266->4267 4267->4242 4269 4032fd 4268->4269 4269->4099 4271 403be3 4270->4271 4287 406055 wsprintfA 4271->4287 4273 403c54 4288 403c88 4273->4288 4275 40398f 4275->4113 4276 403c59 4276->4275 4277 40618a 17 API calls 4276->4277 4277->4276 4278->4109 4279->4115 4291 4041c7 4280->4291 4282 405313 4286 40533a 4282->4286 4294 401389 4282->4294 4283 4041c7 SendMessageA 4284 40534c OleUninitialize 4283->4284 4284->4144 4286->4283 4287->4273 4289 40618a 17 API calls 4288->4289 4290 403c96 SetWindowTextA 4289->4290 4290->4276 4292 4041d0 SendMessageA 4291->4292 4293 4041df 4291->4293 4292->4293 4293->4282 4296 401390 4294->4296 4295 4013fe 4295->4282 4296->4295 4297 4013cb MulDiv SendMessageA 4296->4297 4297->4296 4298->4160 4300 405b43 4299->4300 4302 405b53 4299->4302 4301 405b4e CharNextA 4300->4301 4300->4302 4304 405b73 4301->4304 4303 405aba CharNextA 4302->4303 4302->4304 4303->4302 4304->4163 4304->4164 4306 406481 FindClose 4305->4306 4307 40648c 4305->4307 4306->4307 4307->4170 4309 403883 4308->4309 4310 40384d 4309->4310 4311 403888 FreeLibrary GlobalFree 4309->4311 4312 4058bf 4310->4312 4311->4310 4311->4311 4313 405b7d 18 API calls 4312->4313 4314 4058df 4313->4314 4315 4058e7 DeleteFileA 4314->4315 4316 4058fe 4314->4316 4320 403667 OleUninitialize 4315->4320 4317 405a2c 4316->4317 4352 4060f7 lstrcpynA 4316->4352 4317->4320 4325 40646b 2 API calls 4317->4325 4319 405924 4321 405937 4319->4321 4322 40592a lstrcatA 4319->4322 4320->4003 4320->4004 4324 405ad6 2 API calls 4321->4324 4323 40593d 4322->4323 4326 40594b lstrcatA 4323->4326 4328 405956 lstrlenA FindFirstFileA 4323->4328 4324->4323 4327 405a50 4325->4327 4326->4328 4327->4320 4329 405a54 4327->4329 4328->4317 4335 40597a 4328->4335 4330 405a8f 3 API calls 4329->4330 4332 405a5a 4330->4332 4331 405aba CharNextA 4331->4335 4333 405877 5 API calls 4332->4333 4334 405a66 4333->4334 4336 405a80 4334->4336 4337 405a6a 4334->4337 4335->4331 4340 405a0b FindNextFileA 4335->4340 4349 4059cc 4335->4349 4353 4060f7 lstrcpynA 4335->4353 4339 40521e 24 API calls 4336->4339 4337->4320 4341 40521e 24 API calls 4337->4341 4339->4320 4340->4335 4342 405a23 FindClose 4340->4342 4343 405a77 4341->4343 4342->4317 4344 405ed6 36 API calls 4343->4344 4347 405a7e 4344->4347 4346 4058bf 60 API calls 4346->4349 4347->4320 4348 40521e 24 API calls 4348->4340 4349->4340 4349->4346 4349->4348 4350 40521e 24 API calls 4349->4350 4351 405ed6 36 API calls 4349->4351 4354 405877 4349->4354 4350->4349 4351->4349 4352->4319 4353->4335 4362 405c6b GetFileAttributesA 4354->4362 4357 405892 RemoveDirectoryA 4360 4058a0 4357->4360 4358 40589a DeleteFileA 4358->4360 4359 4058a4 4359->4349 4360->4359 4361 4058b0 SetFileAttributesA 4360->4361 4361->4359 4363 405883 4362->4363 4364 405c7d SetFileAttributesA 4362->4364 4363->4357 4363->4358 4363->4359 4364->4363 4366 405db2 GetShortPathNameA 4365->4366 4367 405d8c 4365->4367 4369 405ed1 4366->4369 4370 405dc7 4366->4370 4392 405c90 GetFileAttributesA CreateFileA 4367->4392 4369->4195 4370->4369 4372 405dcf wsprintfA 4370->4372 4371 405d96 CloseHandle GetShortPathNameA 4371->4369 4373 405daa 4371->4373 4374 40618a 17 API calls 4372->4374 4373->4366 4373->4369 4375 405df7 4374->4375 4393 405c90 GetFileAttributesA CreateFileA 4375->4393 4377 405e04 4377->4369 4378 405e13 GetFileSize GlobalAlloc 4377->4378 4379 405e35 4378->4379 4380 405eca CloseHandle 4378->4380 4381 405d08 ReadFile 4379->4381 4380->4369 4382 405e3d 4381->4382 4382->4380 4394 405bf5 lstrlenA 4382->4394 4385 405e54 lstrcpyA 4388 405e76 4385->4388 4386 405e68 4387 405bf5 4 API calls 4386->4387 4387->4388 4389 405ead SetFilePointer 4388->4389 4390 405d37 WriteFile 4389->4390 4391 405ec3 GlobalFree 4390->4391 4391->4380 4392->4371 4393->4377 4395 405c36 lstrlenA 4394->4395 4396 405c3e 4395->4396 4397 405c0f lstrcmpiA 4395->4397 4396->4385 4396->4386 4397->4396 4398 405c2d CharNextA 4397->4398 4398->4395 4923 4038c8 4924 4038d3 4923->4924 4925 4038d7 4924->4925 4926 4038da GlobalAlloc 4924->4926 4926->4925 4930 401fcb 4931 402bce 17 API calls 4930->4931 4932 401fd2 4931->4932 4933 40646b 2 API calls 4932->4933 4934 401fd8 4933->4934 4936 401fea 4934->4936 4937 406055 wsprintfA 4934->4937 4937->4936 4938 6f951000 4941 6f95101b 4938->4941 4948 6f9514bb 4941->4948 4943 6f951020 4944 6f951027 GlobalAlloc 4943->4944 4945 6f951024 4943->4945 4944->4945 4946 6f9514e2 3 API calls 4945->4946 4947 6f951019 4946->4947 4950 6f9514c1 4948->4950 4949 6f9514c7 4949->4943 4950->4949 4951 6f9514d3 GlobalFree 4950->4951 4951->4943 4420 4014d6 4421 402bac 17 API calls 4420->4421 4422 4014dc Sleep 4421->4422 4424 402a5a 4422->4424 4437 401759 4438 402bce 17 API calls 4437->4438 4439 401760 4438->4439 4440 401786 4439->4440 4441 40177e 4439->4441 4478 4060f7 lstrcpynA 4440->4478 4477 4060f7 lstrcpynA 4441->4477 4444 401784 4448 4063d2 5 API calls 4444->4448 4445 401791 4446 405a8f 3 API calls 4445->4446 4447 401797 lstrcatA 4446->4447 4447->4444 4455 4017a3 4448->4455 4449 4017e4 4451 405c6b 2 API calls 4449->4451 4450 40646b 2 API calls 4450->4455 4451->4455 4453 4017ba CompareFileTime 4453->4455 4454 40187e 4456 40521e 24 API calls 4454->4456 4455->4449 4455->4450 4455->4453 4455->4454 4458 4060f7 lstrcpynA 4455->4458 4464 40618a 17 API calls 4455->4464 4470 405813 MessageBoxIndirectA 4455->4470 4473 401855 4455->4473 4476 405c90 GetFileAttributesA CreateFileA 4455->4476 4459 401888 4456->4459 4457 40521e 24 API calls 4474 40186a 4457->4474 4458->4455 4460 4030d8 31 API calls 4459->4460 4461 40189b 4460->4461 4462 4018af SetFileTime 4461->4462 4463 4018c1 CloseHandle 4461->4463 4462->4463 4465 4018d2 4463->4465 4463->4474 4464->4455 4466 4018d7 4465->4466 4467 4018ea 4465->4467 4468 40618a 17 API calls 4466->4468 4469 40618a 17 API calls 4467->4469 4471 4018df lstrcatA 4468->4471 4472 4018f2 4469->4472 4470->4455 4471->4472 4472->4474 4475 405813 MessageBoxIndirectA 4472->4475 4473->4457 4473->4474 4475->4474 4476->4455 4477->4444 4478->4445 4952 401959 4953 402bac 17 API calls 4952->4953 4954 401960 4953->4954 4955 402bac 17 API calls 4954->4955 4956 40196d 4955->4956 4957 402bce 17 API calls 4956->4957 4958 401984 lstrlenA 4957->4958 4960 401994 4958->4960 4959 4019d4 4960->4959 4964 4060f7 lstrcpynA 4960->4964 4962 4019c4 4962->4959 4963 4019c9 lstrlenA 4962->4963 4963->4959 4964->4962 4965 40535c 4966 405507 4965->4966 4967 40537e GetDlgItem GetDlgItem GetDlgItem 4965->4967 4969 405537 4966->4969 4970 40550f GetDlgItem CreateThread CloseHandle 4966->4970 5010 4041b0 SendMessageA 4967->5010 4972 405565 4969->4972 4973 405586 4969->4973 4974 40554d ShowWindow ShowWindow 4969->4974 4970->4969 4971 4053ee 4975 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4971->4975 4976 4055c0 4972->4976 4978 405575 4972->4978 4979 405599 ShowWindow 4972->4979 4980 4041e2 8 API calls 4973->4980 5012 4041b0 SendMessageA 4974->5012 4984 405463 4975->4984 4985 405447 SendMessageA SendMessageA 4975->4985 4976->4973 4986 4055cd SendMessageA 4976->4986 5013 404154 4978->5013 4982 4055b9 4979->4982 4983 4055ab 4979->4983 4981 405592 4980->4981 4989 404154 SendMessageA 4982->4989 4988 40521e 24 API calls 4983->4988 4990 405476 4984->4990 4991 405468 SendMessageA 4984->4991 4985->4984 4986->4981 4992 4055e6 CreatePopupMenu 4986->4992 4988->4982 4989->4976 4994 40417b 18 API calls 4990->4994 4991->4990 4993 40618a 17 API calls 4992->4993 4995 4055f6 AppendMenuA 4993->4995 4996 405486 4994->4996 4997 405614 GetWindowRect 4995->4997 4998 405627 TrackPopupMenu 4995->4998 4999 4054c3 GetDlgItem SendMessageA 4996->4999 5000 40548f ShowWindow 4996->5000 4997->4998 4998->4981 5002 405643 4998->5002 4999->4981 5001 4054ea SendMessageA SendMessageA 4999->5001 5003 4054b2 5000->5003 5004 4054a5 ShowWindow 5000->5004 5001->4981 5005 405662 SendMessageA 5002->5005 5011 4041b0 SendMessageA 5003->5011 5004->5003 5005->5005 5006 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5005->5006 5008 4056a1 SendMessageA 5006->5008 5008->5008 5009 4056c3 GlobalUnlock SetClipboardData CloseClipboard 5008->5009 5009->4981 5010->4971 5011->4999 5012->4972 5014 404161 SendMessageA 5013->5014 5015 40415b 5013->5015 5014->4973 5015->5014 5016 40275d 5017 402763 5016->5017 5018 402a5a 5017->5018 5019 40276b FindClose 5017->5019 5019->5018 5020 401a5e 5021 402bac 17 API calls 5020->5021 5022 401a67 5021->5022 5023 402bac 17 API calls 5022->5023 5024 401a0e 5023->5024 5025 40495e 5026 40498a 5025->5026 5027 40496e 5025->5027 5029 404990 SHGetPathFromIDListA 5026->5029 5030 4049bd 5026->5030 5036 4057f7 GetDlgItemTextA 5027->5036 5032 4049a0 5029->5032 5033 4049a7 SendMessageA 5029->5033 5031 40497b SendMessageA 5031->5026 5035 40140b 2 API calls 5032->5035 5033->5030 5035->5033 5036->5031 5037 4029de 5038 406500 5 API calls 5037->5038 5039 4029e5 5038->5039 5040 402bce 17 API calls 5039->5040 5041 4029ee 5040->5041 5043 402a2a 5041->5043 5047 40614a 5041->5047 5044 4029fc 5044->5043 5051 406134 5044->5051 5048 406155 5047->5048 5049 406178 IIDFromString 5048->5049 5050 406171 5048->5050 5049->5044 5050->5044 5054 406119 WideCharToMultiByte 5051->5054 5053 402a1d CoTaskMemFree 5053->5043 5054->5053 5055 4027df 5056 402bce 17 API calls 5055->5056 5058 4027ed 5056->5058 5057 402803 5060 405c6b 2 API calls 5057->5060 5058->5057 5059 402bce 17 API calls 5058->5059 5059->5057 5061 402809 5060->5061 5083 405c90 GetFileAttributesA CreateFileA 5061->5083 5063 402816 5064 402822 GlobalAlloc 5063->5064 5065 4028bf 5063->5065 5066 4028b6 CloseHandle 5064->5066 5067 40283b 5064->5067 5068 4028c7 DeleteFileA 5065->5068 5069 4028da 5065->5069 5066->5065 5084 403300 SetFilePointer 5067->5084 5068->5069 5071 402841 5072 4032ea ReadFile 5071->5072 5073 40284a GlobalAlloc 5072->5073 5074 402894 5073->5074 5075 40285a 5073->5075 5077 405d37 WriteFile 5074->5077 5076 4030d8 31 API calls 5075->5076 5082 402867 5076->5082 5078 4028a0 GlobalFree 5077->5078 5079 4030d8 31 API calls 5078->5079 5080 4028b3 5079->5080 5080->5066 5081 40288b GlobalFree 5081->5074 5082->5081 5083->5063 5084->5071 4687 4023e0 4688 402bce 17 API calls 4687->4688 4689 4023f1 4688->4689 4690 402bce 17 API calls 4689->4690 4691 4023fa 4690->4691 4692 402bce 17 API calls 4691->4692 4693 402404 GetPrivateProfileStringA 4692->4693 5085 4028e0 5086 402bac 17 API calls 5085->5086 5087 4028e6 5086->5087 5088 402925 5087->5088 5089 40290e 5087->5089 5098 4027bf 5087->5098 5091 40293f 5088->5091 5092 40292f 5088->5092 5090 402913 5089->5090 5093 402922 5089->5093 5099 4060f7 lstrcpynA 5090->5099 5095 40618a 17 API calls 5091->5095 5094 402bac 17 API calls 5092->5094 5100 406055 wsprintfA 5093->5100 5094->5098 5095->5098 5099->5098 5100->5098 5101 6f951837 5102 6f95185a 5101->5102 5103 6f95188a GlobalFree 5102->5103 5104 6f95189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5102->5104 5103->5104 5105 6f951266 2 API calls 5104->5105 5106 6f951a1e GlobalFree GlobalFree 5105->5106 5107 401b63 5108 402bce 17 API calls 5107->5108 5109 401b6a 5108->5109 5110 402bac 17 API calls 5109->5110 5111 401b73 wsprintfA 5110->5111 5112 402a5a 5111->5112 5113 401d65 5114 401d78 GetDlgItem 5113->5114 5115 401d6b 5113->5115 5117 401d72 5114->5117 5116 402bac 17 API calls 5115->5116 5116->5117 5118 401db9 GetClientRect LoadImageA SendMessageA 5117->5118 5119 402bce 17 API calls 5117->5119 5121 401e1a 5118->5121 5123 401e26 5118->5123 5119->5118 5122 401e1f DeleteObject 5121->5122 5121->5123 5122->5123 5124 4042e6 5125 4042fc 5124->5125 5133 404408 5124->5133 5129 40417b 18 API calls 5125->5129 5126 404477 5127 404541 5126->5127 5128 404481 GetDlgItem 5126->5128 5135 4041e2 8 API calls 5127->5135 5131 404497 5128->5131 5132 4044ff 5128->5132 5130 404352 5129->5130 5134 40417b 18 API calls 5130->5134 5131->5132 5138 4044bd SendMessageA LoadCursorA SetCursor 5131->5138 5132->5127 5139 404511 5132->5139 5133->5126 5133->5127 5136 40444c GetDlgItem SendMessageA 5133->5136 5137 40435f CheckDlgButton 5134->5137 5149 40453c 5135->5149 5157 40419d EnableWindow 5136->5157 5155 40419d EnableWindow 5137->5155 5161 40458a 5138->5161 5143 404517 SendMessageA 5139->5143 5144 404528 5139->5144 5143->5144 5144->5149 5150 40452e SendMessageA 5144->5150 5145 404472 5158 404566 5145->5158 5147 40437d GetDlgItem 5156 4041b0 SendMessageA 5147->5156 5150->5149 5152 404393 SendMessageA 5153 4043b1 GetSysColor 5152->5153 5154 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5152->5154 5153->5154 5154->5149 5155->5147 5156->5152 5157->5145 5159 404574 5158->5159 5160 404579 SendMessageA 5158->5160 5159->5160 5160->5126 5164 4057d9 ShellExecuteExA 5161->5164 5163 4044f0 LoadCursorA SetCursor 5163->5132 5164->5163 5165 6f95103d 5166 6f95101b 5 API calls 5165->5166 5167 6f951056 5166->5167 4735 40166a 4736 402bce 17 API calls 4735->4736 4737 401671 4736->4737 4738 402bce 17 API calls 4737->4738 4739 40167a 4738->4739 4740 402bce 17 API calls 4739->4740 4741 401683 MoveFileA 4740->4741 4742 40168f 4741->4742 4743 401696 4741->4743 4745 401423 24 API calls 4742->4745 4744 40646b 2 API calls 4743->4744 4747 4022e2 4743->4747 4746 4016a5 4744->4746 4745->4747 4746->4747 4748 405ed6 36 API calls 4746->4748 4748->4742 4749 40216b 4750 402bce 17 API calls 4749->4750 4751 402172 4750->4751 4752 402bce 17 API calls 4751->4752 4753 40217c 4752->4753 4754 402bce 17 API calls 4753->4754 4755 402186 4754->4755 4756 402bce 17 API calls 4755->4756 4757 402193 4756->4757 4758 402bce 17 API calls 4757->4758 4759 40219d 4758->4759 4760 4021df CoCreateInstance 4759->4760 4761 402bce 17 API calls 4759->4761 4764 4021fe 4760->4764 4766 4022ac 4760->4766 4761->4760 4762 401423 24 API calls 4763 4022e2 4762->4763 4765 40228c MultiByteToWideChar 4764->4765 4764->4766 4765->4766 4766->4762 4766->4763 5168 4022eb 5169 402bce 17 API calls 5168->5169 5170 4022f1 5169->5170 5171 402bce 17 API calls 5170->5171 5172 4022fa 5171->5172 5173 402bce 17 API calls 5172->5173 5174 402303 5173->5174 5175 40646b 2 API calls 5174->5175 5176 40230c 5175->5176 5177 40231d lstrlenA lstrlenA 5176->5177 5181 402310 5176->5181 5179 40521e 24 API calls 5177->5179 5178 40521e 24 API calls 5182 402318 5178->5182 5180 402359 SHFileOperationA 5179->5180 5180->5181 5180->5182 5181->5178 5181->5182 4776 40266d 4777 402bac 17 API calls 4776->4777 4779 402677 4777->4779 4778 405d08 ReadFile 4778->4779 4779->4778 4780 4026e7 4779->4780 4781 4026f7 4779->4781 4783 4026e5 4779->4783 4785 406055 wsprintfA 4780->4785 4781->4783 4784 40270d SetFilePointer 4781->4784 4784->4783 4785->4783 5183 40236d 5184 402374 5183->5184 5187 402387 5183->5187 5185 40618a 17 API calls 5184->5185 5186 402381 5185->5186 5186->5187 5188 405813 MessageBoxIndirectA 5186->5188 5188->5187 5189 4019ed 5190 402bce 17 API calls 5189->5190 5191 4019f4 5190->5191 5192 402bce 17 API calls 5191->5192 5193 4019fd 5192->5193 5194 401a04 lstrcmpiA 5193->5194 5195 401a16 lstrcmpA 5193->5195 5196 401a0a 5194->5196 5195->5196 5197 6f951638 5198 6f951667 5197->5198 5199 6f951a98 18 API calls 5198->5199 5200 6f95166e 5199->5200 5201 6f951675 5200->5201 5202 6f951681 5200->5202 5203 6f951266 2 API calls 5201->5203 5204 6f9516a8 5202->5204 5205 6f95168b 5202->5205 5208 6f95167f 5203->5208 5206 6f9516d2 5204->5206 5207 6f9516ae 5204->5207 5209 6f9514e2 3 API calls 5205->5209 5211 6f9514e2 3 API calls 5206->5211 5210 6f951559 3 API calls 5207->5210 5212 6f951690 5209->5212 5213 6f9516b3 5210->5213 5211->5208 5214 6f951559 3 API calls 5212->5214 5215 6f951266 2 API calls 5213->5215 5216 6f951696 5214->5216 5217 6f9516b9 GlobalFree 5215->5217 5218 6f951266 2 API calls 5216->5218 5217->5208 5220 6f9516cd GlobalFree 5217->5220 5219 6f95169c GlobalFree 5218->5219 5219->5208 5220->5208 5221 40296e 5222 402bac 17 API calls 5221->5222 5223 402974 5222->5223 5224 4027bf 5223->5224 5225 4029af 5223->5225 5227 402986 5223->5227 5225->5224 5226 40618a 17 API calls 5225->5226 5226->5224 5227->5224 5229 406055 wsprintfA 5227->5229 5229->5224 4814 6f952921 4815 6f952971 4814->4815 4816 6f952931 VirtualProtect 4814->4816 4816->4815 5230 4014f4 SetForegroundWindow 5231 402a5a 5230->5231 4825 402476 4826 402bce 17 API calls 4825->4826 4827 402488 4826->4827 4828 402bce 17 API calls 4827->4828 4829 402492 4828->4829 4842 402c5e 4829->4842 4832 402a5a 4833 4024c7 4836 402bac 17 API calls 4833->4836 4838 4024d3 4833->4838 4834 402bce 17 API calls 4835 4024c0 lstrlenA 4834->4835 4835->4833 4836->4838 4837 4024f5 RegSetValueExA 4840 40250b RegCloseKey 4837->4840 4838->4837 4839 4030d8 31 API calls 4838->4839 4839->4837 4840->4832 4843 402c79 4842->4843 4846 405fab 4843->4846 4847 405fba 4846->4847 4848 4024a2 4847->4848 4849 405fc5 RegCreateKeyExA 4847->4849 4848->4832 4848->4833 4848->4834 4849->4848 5232 402777 5233 40277d 5232->5233 5234 402781 FindNextFileA 5233->5234 5237 402793 5233->5237 5235 4027d2 5234->5235 5234->5237 5238 4060f7 lstrcpynA 5235->5238 5238->5237 5239 401ef9 5240 402bce 17 API calls 5239->5240 5241 401eff 5240->5241 5242 402bce 17 API calls 5241->5242 5243 401f08 5242->5243 5244 402bce 17 API calls 5243->5244 5245 401f11 5244->5245 5246 402bce 17 API calls 5245->5246 5247 401f1a 5246->5247 5248 401423 24 API calls 5247->5248 5249 401f21 5248->5249 5256 4057d9 ShellExecuteExA 5249->5256 5251 401f5c 5252 406575 5 API calls 5251->5252 5254 4027bf 5251->5254 5253 401f76 CloseHandle 5252->5253 5253->5254 5256->5251 4850 401f7b 4851 402bce 17 API calls 4850->4851 4852 401f81 4851->4852 4853 40521e 24 API calls 4852->4853 4854 401f8b 4853->4854 4855 405796 2 API calls 4854->4855 4856 401f91 4855->4856 4859 4027bf 4856->4859 4864 401fb2 CloseHandle 4856->4864 4865 406575 WaitForSingleObject 4856->4865 4860 401fa6 4861 401fb4 4860->4861 4862 401fab 4860->4862 4861->4864 4870 406055 wsprintfA 4862->4870 4864->4859 4866 40658f 4865->4866 4867 4065a1 GetExitCodeProcess 4866->4867 4868 40653c 2 API calls 4866->4868 4867->4860 4869 406596 WaitForSingleObject 4868->4869 4869->4866 4870->4864 5257 401ffb 5258 402bce 17 API calls 5257->5258 5259 402002 5258->5259 5260 406500 5 API calls 5259->5260 5261 402011 5260->5261 5262 402029 GlobalAlloc 5261->5262 5265 402091 5261->5265 5263 40203d 5262->5263 5262->5265 5264 406500 5 API calls 5263->5264 5266 402044 5264->5266 5267 406500 5 API calls 5266->5267 5268 40204e 5267->5268 5268->5265 5272 406055 wsprintfA 5268->5272 5270 402085 5273 406055 wsprintfA 5270->5273 5272->5270 5273->5265 5274 4018fd 5275 401934 5274->5275 5276 402bce 17 API calls 5275->5276 5277 401939 5276->5277 5278 4058bf 67 API calls 5277->5278 5279 401942 5278->5279 5280 401000 5281 401037 BeginPaint GetClientRect 5280->5281 5282 40100c DefWindowProcA 5280->5282 5283 4010f3 5281->5283 5287 401179 5282->5287 5285 401073 CreateBrushIndirect FillRect DeleteObject 5283->5285 5286 4010fc 5283->5286 5285->5283 5288 401102 CreateFontIndirectA 5286->5288 5289 401167 EndPaint 5286->5289 5288->5289 5290 401112 6 API calls 5288->5290 5289->5287 5290->5289 5291 401900 5292 402bce 17 API calls 5291->5292 5293 401907 5292->5293 5294 405813 MessageBoxIndirectA 5293->5294 5295 401910 5294->5295 5296 404b80 GetDlgItem GetDlgItem 5297 404bd6 7 API calls 5296->5297 5303 404dfd 5296->5303 5298 404c72 SendMessageA 5297->5298 5299 404c7e DeleteObject 5297->5299 5298->5299 5300 404c89 5299->5300 5301 404cc0 5300->5301 5306 40618a 17 API calls 5300->5306 5304 40417b 18 API calls 5301->5304 5302 404edf 5305 404f8b 5302->5305 5308 404df0 5302->5308 5314 404f38 SendMessageA 5302->5314 5303->5302 5330 404e6c 5303->5330 5350 404ace SendMessageA 5303->5350 5307 404cd4 5304->5307 5309 404f95 SendMessageA 5305->5309 5310 404f9d 5305->5310 5311 404ca2 SendMessageA SendMessageA 5306->5311 5313 40417b 18 API calls 5307->5313 5316 4041e2 8 API calls 5308->5316 5309->5310 5318 404fb6 5310->5318 5319 404faf ImageList_Destroy 5310->5319 5326 404fc6 5310->5326 5311->5300 5331 404ce5 5313->5331 5314->5308 5321 404f4d SendMessageA 5314->5321 5315 404ed1 SendMessageA 5315->5302 5317 40518b 5316->5317 5322 404fbf GlobalFree 5318->5322 5318->5326 5319->5318 5320 40513f 5320->5308 5327 405151 ShowWindow GetDlgItem ShowWindow 5320->5327 5324 404f60 5321->5324 5322->5326 5323 404dbf GetWindowLongA SetWindowLongA 5325 404dd8 5323->5325 5335 404f71 SendMessageA 5324->5335 5328 404df5 5325->5328 5329 404ddd ShowWindow 5325->5329 5326->5320 5342 405001 5326->5342 5355 404b4e 5326->5355 5327->5308 5349 4041b0 SendMessageA 5328->5349 5348 4041b0 SendMessageA 5329->5348 5330->5302 5330->5315 5331->5323 5334 404d37 SendMessageA 5331->5334 5336 404dba 5331->5336 5337 404d75 SendMessageA 5331->5337 5338 404d89 SendMessageA 5331->5338 5334->5331 5335->5305 5336->5323 5336->5325 5337->5331 5338->5331 5340 40510b 5341 405115 InvalidateRect 5340->5341 5344 405121 5340->5344 5341->5344 5343 40502f SendMessageA 5342->5343 5346 405045 5342->5346 5343->5346 5344->5320 5364 404a89 5344->5364 5345 4050b9 SendMessageA SendMessageA 5345->5346 5346->5340 5346->5345 5348->5308 5349->5303 5351 404af1 GetMessagePos ScreenToClient SendMessageA 5350->5351 5352 404b2d SendMessageA 5350->5352 5353 404b25 5351->5353 5354 404b2a 5351->5354 5352->5353 5353->5330 5354->5352 5367 4060f7 lstrcpynA 5355->5367 5357 404b61 5368 406055 wsprintfA 5357->5368 5359 404b6b 5360 40140b 2 API calls 5359->5360 5361 404b74 5360->5361 5369 4060f7 lstrcpynA 5361->5369 5363 404b7b 5363->5342 5370 4049c4 5364->5370 5366 404a9e 5366->5320 5367->5357 5368->5359 5369->5363 5372 4049da 5370->5372 5371 40618a 17 API calls 5373 404a3e 5371->5373 5372->5371 5374 40618a 17 API calls 5373->5374 5375 404a49 5374->5375 5376 40618a 17 API calls 5375->5376 5377 404a5f lstrlenA wsprintfA SetDlgItemTextA 5376->5377 5377->5366 5378 401502 5379 40150a 5378->5379 5381 40151d 5378->5381 5380 402bac 17 API calls 5379->5380 5380->5381 5382 402604 5383 402bce 17 API calls 5382->5383 5384 40260b 5383->5384 5387 405c90 GetFileAttributesA CreateFileA 5384->5387 5386 402617 5387->5386 5388 6f9515d1 5389 6f9514bb GlobalFree 5388->5389 5392 6f9515e9 5389->5392 5390 6f95162f GlobalFree 5391 6f951604 5391->5390 5392->5390 5392->5391 5393 6f95161b VirtualFree 5392->5393 5393->5390 3934 401b87 3935 401bd8 3934->3935 3938 401b94 3934->3938 3936 401c01 GlobalAlloc 3935->3936 3940 401bdc 3935->3940 3937 40618a 17 API calls 3936->3937 3941 401c1c 3937->3941 3938->3941 3942 401bab 3938->3942 3939 40618a 17 API calls 3943 402381 3939->3943 3948 402387 3940->3948 3955 4060f7 lstrcpynA 3940->3955 3941->3939 3941->3948 3953 4060f7 lstrcpynA 3942->3953 3943->3948 3956 405813 3943->3956 3946 401bee GlobalFree 3946->3948 3947 401bba 3954 4060f7 lstrcpynA 3947->3954 3951 401bc9 3960 4060f7 lstrcpynA 3951->3960 3953->3947 3954->3951 3955->3946 3957 405828 3956->3957 3958 405874 3957->3958 3959 40583c MessageBoxIndirectA 3957->3959 3958->3948 3959->3958 3960->3948 4399 402588 4411 402c0e 4399->4411 4402 402bac 17 API calls 4403 40259b 4402->4403 4404 4025a9 4403->4404 4408 4027bf 4403->4408 4405 4025c2 RegEnumValueA 4404->4405 4406 4025b6 RegEnumKeyA 4404->4406 4407 4025de RegCloseKey 4405->4407 4409 4025d7 4405->4409 4406->4407 4407->4408 4409->4407 4412 402bce 17 API calls 4411->4412 4413 402c25 4412->4413 4414 405f7d RegOpenKeyExA 4413->4414 4415 402592 4414->4415 4415->4402 4416 401389 4418 401390 4416->4418 4417 4013fe 4418->4417 4419 4013cb MulDiv SendMessageA 4418->4419 4419->4418 5394 40460d 5395 404639 5394->5395 5396 40464a 5394->5396 5455 4057f7 GetDlgItemTextA 5395->5455 5398 404656 GetDlgItem 5396->5398 5405 4046b5 5396->5405 5400 40466a 5398->5400 5399 404644 5402 4063d2 5 API calls 5399->5402 5403 40467e SetWindowTextA 5400->5403 5408 405b28 4 API calls 5400->5408 5401 404799 5404 404943 5401->5404 5457 4057f7 GetDlgItemTextA 5401->5457 5402->5396 5409 40417b 18 API calls 5403->5409 5407 4041e2 8 API calls 5404->5407 5405->5401 5405->5404 5410 40618a 17 API calls 5405->5410 5412 404957 5407->5412 5413 404674 5408->5413 5414 40469a 5409->5414 5415 404729 SHBrowseForFolderA 5410->5415 5411 4047c9 5416 405b7d 18 API calls 5411->5416 5413->5403 5422 405a8f 3 API calls 5413->5422 5417 40417b 18 API calls 5414->5417 5415->5401 5418 404741 CoTaskMemFree 5415->5418 5419 4047cf 5416->5419 5420 4046a8 5417->5420 5421 405a8f 3 API calls 5418->5421 5458 4060f7 lstrcpynA 5419->5458 5456 4041b0 SendMessageA 5420->5456 5424 40474e 5421->5424 5422->5403 5427 404785 SetDlgItemTextA 5424->5427 5431 40618a 17 API calls 5424->5431 5426 4046ae 5429 406500 5 API calls 5426->5429 5427->5401 5428 4047e6 5430 406500 5 API calls 5428->5430 5429->5405 5438 4047ed 5430->5438 5432 40476d lstrcmpiA 5431->5432 5432->5427 5435 40477e lstrcatA 5432->5435 5433 404829 5459 4060f7 lstrcpynA 5433->5459 5435->5427 5436 404830 5437 405b28 4 API calls 5436->5437 5439 404836 GetDiskFreeSpaceA 5437->5439 5438->5433 5442 405ad6 2 API calls 5438->5442 5444 404881 5438->5444 5441 40485a MulDiv 5439->5441 5439->5444 5441->5444 5442->5438 5443 4048f2 5446 404915 5443->5446 5448 40140b 2 API calls 5443->5448 5444->5443 5445 404a89 20 API calls 5444->5445 5447 4048df 5445->5447 5460 40419d EnableWindow 5446->5460 5450 4048f4 SetDlgItemTextA 5447->5450 5451 4048e4 5447->5451 5448->5446 5450->5443 5453 4049c4 20 API calls 5451->5453 5452 404931 5452->5404 5454 404566 SendMessageA 5452->5454 5453->5443 5454->5404 5455->5399 5456->5426 5457->5411 5458->5428 5459->5436 5460->5452 5461 6f951058 5463 6f951074 5461->5463 5462 6f9510dc 5463->5462 5464 6f951091 5463->5464 5465 6f9514bb GlobalFree 5463->5465 5466 6f9514bb GlobalFree 5464->5466 5465->5464 5467 6f9510a1 5466->5467 5468 6f9510b1 5467->5468 5469 6f9510a8 GlobalSize 5467->5469 5470 6f9510b5 GlobalAlloc 5468->5470 5471 6f9510c6 5468->5471 5469->5468 5472 6f9514e2 3 API calls 5470->5472 5473 6f9510d1 GlobalFree 5471->5473 5472->5471 5473->5462 5474 6f95225a 5475 6f9522c4 5474->5475 5476 6f9522cf GlobalAlloc 5475->5476 5477 6f9522ee 5475->5477 5476->5475 5478 401490 5479 40521e 24 API calls 5478->5479 5480 401497 5479->5480 5481 405192 5482 4051a2 5481->5482 5483 4051b6 5481->5483 5485 4051a8 5482->5485 5493 4051ff 5482->5493 5484 4051be IsWindowVisible 5483->5484 5491 4051d5 5483->5491 5487 4051cb 5484->5487 5484->5493 5486 4041c7 SendMessageA 5485->5486 5489 4051b2 5486->5489 5490 404ace 5 API calls 5487->5490 5488 405204 CallWindowProcA 5488->5489 5490->5491 5491->5488 5492 404b4e 4 API calls 5491->5492 5492->5493 5493->5488 4425 402516 4426 402c0e 17 API calls 4425->4426 4427 402520 4426->4427 4428 402bce 17 API calls 4427->4428 4429 402529 4428->4429 4430 402533 RegQueryValueExA 4429->4430 4434 4027bf 4429->4434 4431 402559 RegCloseKey 4430->4431 4432 402553 4430->4432 4431->4434 4432->4431 4436 406055 wsprintfA 4432->4436 4436->4431 4479 40239c 4480 4023a4 4479->4480 4481 4023aa 4479->4481 4482 402bce 17 API calls 4480->4482 4483 4023ba 4481->4483 4484 402bce 17 API calls 4481->4484 4482->4481 4485 4023c8 4483->4485 4486 402bce 17 API calls 4483->4486 4484->4483 4487 402bce 17 API calls 4485->4487 4486->4485 4488 4023d1 WritePrivateProfileStringA 4487->4488 4489 40209d 4490 4020af 4489->4490 4491 40215d 4489->4491 4492 402bce 17 API calls 4490->4492 4493 401423 24 API calls 4491->4493 4494 4020b6 4492->4494 4499 4022e2 4493->4499 4495 402bce 17 API calls 4494->4495 4496 4020bf 4495->4496 4497 4020d4 LoadLibraryExA 4496->4497 4498 4020c7 GetModuleHandleA 4496->4498 4497->4491 4500 4020e4 GetProcAddress 4497->4500 4498->4497 4498->4500 4501 402130 4500->4501 4502 4020f3 4500->4502 4503 40521e 24 API calls 4501->4503 4504 402112 4502->4504 4505 4020fb 4502->4505 4507 402103 4503->4507 4510 6f9516db 4504->4510 4552 401423 4505->4552 4507->4499 4508 402151 FreeLibrary 4507->4508 4508->4499 4511 6f95170b 4510->4511 4555 6f951a98 4511->4555 4513 6f951712 4514 6f951834 4513->4514 4515 6f951723 4513->4515 4516 6f95172a 4513->4516 4514->4507 4606 6f9522af 4515->4606 4589 6f9522f1 4516->4589 4521 6f95174f 4524 6f951770 4521->4524 4525 6f95178e 4521->4525 4522 6f951740 4527 6f951746 4522->4527 4531 6f951751 4522->4531 4523 6f951759 4523->4521 4616 6f952cc3 4523->4616 4619 6f9524d8 4524->4619 4528 6f951794 4525->4528 4529 6f9517dc 4525->4529 4527->4521 4600 6f952a38 4527->4600 4638 6f95156b 4528->4638 4535 6f9524d8 11 API calls 4529->4535 4530 6f951776 4630 6f951559 4530->4630 4610 6f9526b2 4531->4610 4539 6f9517cd 4535->4539 4543 6f951823 4539->4543 4644 6f95249e 4539->4644 4541 6f951757 4541->4521 4542 6f9524d8 11 API calls 4542->4539 4543->4514 4547 6f95182d GlobalFree 4543->4547 4547->4514 4549 6f95180f 4549->4543 4648 6f9514e2 wsprintfA 4549->4648 4550 6f951808 FreeLibrary 4550->4549 4553 40521e 24 API calls 4552->4553 4554 401431 4553->4554 4554->4507 4651 6f951215 GlobalAlloc 4555->4651 4557 6f951abf 4652 6f951215 GlobalAlloc 4557->4652 4559 6f951d00 GlobalFree GlobalFree GlobalFree 4560 6f951d1d 4559->4560 4571 6f951d67 4559->4571 4561 6f9520f1 4560->4561 4569 6f951d32 4560->4569 4560->4571 4563 6f952113 GetModuleHandleA 4561->4563 4561->4571 4562 6f951bbd GlobalAlloc 4581 6f951aca 4562->4581 4566 6f952124 LoadLibraryA 4563->4566 4567 6f952139 4563->4567 4564 6f951c08 lstrcpyA 4568 6f951c12 lstrcpyA 4564->4568 4565 6f951c26 GlobalFree 4565->4581 4566->4567 4566->4571 4659 6f9515c2 GetProcAddress 4567->4659 4568->4581 4569->4571 4655 6f951224 4569->4655 4571->4513 4572 6f95218a 4572->4571 4576 6f952197 lstrlenA 4572->4576 4573 6f951fb7 4658 6f951215 GlobalAlloc 4573->4658 4660 6f9515c2 GetProcAddress 4576->4660 4577 6f951ef9 GlobalFree 4577->4581 4578 6f952033 4578->4571 4586 6f95208c lstrcpyA 4578->4586 4579 6f95214b 4579->4572 4587 6f952174 GetProcAddress 4579->4587 4581->4559 4581->4562 4581->4564 4581->4565 4581->4568 4581->4571 4581->4573 4581->4577 4581->4578 4582 6f951224 2 API calls 4581->4582 4583 6f951c64 4581->4583 4582->4581 4583->4581 4653 6f951534 GlobalSize GlobalAlloc 4583->4653 4584 6f9521b0 4584->4571 4586->4571 4587->4572 4588 6f951fbf 4588->4513 4597 6f95230a 4589->4597 4590 6f951224 GlobalAlloc lstrcpynA 4590->4597 4592 6f952446 GlobalFree 4594 6f951730 4592->4594 4592->4597 4593 6f9523b8 GlobalAlloc MultiByteToWideChar 4595 6f952405 4593->4595 4596 6f9523e4 GlobalAlloc 4593->4596 4594->4521 4594->4522 4594->4523 4595->4592 4666 6f952646 4595->4666 4598 6f9523fc GlobalFree 4596->4598 4597->4590 4597->4592 4597->4593 4597->4595 4662 6f9512ad 4597->4662 4598->4592 4602 6f952a4a 4600->4602 4601 6f952aef VirtualAllocEx 4603 6f952b0d 4601->4603 4602->4601 4669 6f9529e4 4603->4669 4605 6f952bd9 4605->4521 4607 6f9522c4 4606->4607 4608 6f9522cf GlobalAlloc 4607->4608 4609 6f951729 4607->4609 4608->4607 4609->4516 4614 6f9526e2 4610->4614 4611 6f952790 4613 6f952796 GlobalSize 4611->4613 4615 6f9527a0 4611->4615 4612 6f95277d GlobalAlloc 4612->4615 4613->4615 4614->4611 4614->4612 4615->4541 4617 6f952cce 4616->4617 4618 6f952d0e GlobalFree 4617->4618 4673 6f951215 GlobalAlloc 4619->4673 4621 6f952574 StringFromGUID2 WideCharToMultiByte 4626 6f9524e4 4621->4626 4622 6f952563 lstrcpynA 4622->4626 4623 6f952598 WideCharToMultiByte 4623->4626 4624 6f9525b9 wsprintfA 4624->4626 4625 6f9525dd GlobalFree 4625->4626 4626->4621 4626->4622 4626->4623 4626->4624 4626->4625 4627 6f952617 GlobalFree 4626->4627 4628 6f951266 2 API calls 4626->4628 4674 6f9512d1 4626->4674 4627->4530 4628->4626 4678 6f951215 GlobalAlloc 4630->4678 4632 6f95155e 4633 6f95156b 2 API calls 4632->4633 4634 6f951568 4633->4634 4635 6f951266 4634->4635 4636 6f95126f GlobalAlloc lstrcpynA 4635->4636 4637 6f9512a8 GlobalFree 4635->4637 4636->4637 4637->4539 4639 6f951577 wsprintfA 4638->4639 4642 6f9515a4 lstrcpyA 4638->4642 4643 6f9515bd 4639->4643 4642->4643 4643->4542 4645 6f9517ef 4644->4645 4646 6f9524ac 4644->4646 4645->4549 4645->4550 4646->4645 4647 6f9524c5 GlobalFree 4646->4647 4647->4646 4649 6f951266 2 API calls 4648->4649 4650 6f951503 4649->4650 4650->4543 4651->4557 4652->4581 4654 6f951552 4653->4654 4654->4583 4661 6f951215 GlobalAlloc 4655->4661 4657 6f951233 lstrcpynA 4657->4571 4658->4588 4659->4579 4660->4584 4661->4657 4663 6f9512b4 4662->4663 4664 6f951224 2 API calls 4663->4664 4665 6f9512cf 4664->4665 4665->4597 4667 6f952654 VirtualAlloc 4666->4667 4668 6f9526aa 4666->4668 4667->4668 4668->4595 4670 6f9529ef 4669->4670 4671 6f9529f4 GetLastError 4670->4671 4672 6f9529ff 4670->4672 4671->4672 4672->4605 4673->4626 4675 6f9512f9 4674->4675 4676 6f9512da 4674->4676 4675->4626 4676->4675 4677 6f9512e0 lstrcpyA 4676->4677 4677->4675 4678->4632 4679 40159d 4680 402bce 17 API calls 4679->4680 4681 4015a4 SetFileAttributesA 4680->4681 4682 4015b6 4681->4682 5494 40149d 5495 4014ab PostQuitMessage 5494->5495 5496 402387 5494->5496 5495->5496 5497 401a1e 5498 402bce 17 API calls 5497->5498 5499 401a27 ExpandEnvironmentStringsA 5498->5499 5500 401a3b 5499->5500 5502 401a4e 5499->5502 5501 401a40 lstrcmpA 5500->5501 5500->5502 5501->5502 4683 40171f 4684 402bce 17 API calls 4683->4684 4685 401726 SearchPathA 4684->4685 4686 401741 4685->4686 5508 401d1f 5509 402bac 17 API calls 5508->5509 5510 401d26 5509->5510 5511 402bac 17 API calls 5510->5511 5512 401d32 GetDlgItem 5511->5512 5513 402620 5512->5513 4694 402421 4695 402453 4694->4695 4696 402428 4694->4696 4698 402bce 17 API calls 4695->4698 4697 402c0e 17 API calls 4696->4697 4699 40242f 4697->4699 4700 40245a 4698->4700 4701 402439 4699->4701 4704 402467 4699->4704 4706 402c8c 4700->4706 4703 402bce 17 API calls 4701->4703 4705 402440 RegDeleteValueA RegCloseKey 4703->4705 4705->4704 4707 402c9f 4706->4707 4708 402c98 4706->4708 4707->4708 4710 402cd0 4707->4710 4708->4704 4711 405f7d RegOpenKeyExA 4710->4711 4712 402cfe 4711->4712 4713 402db3 4712->4713 4714 402d08 4712->4714 4713->4708 4715 402d0e RegEnumValueA 4714->4715 4724 402d31 4714->4724 4716 402d98 RegCloseKey 4715->4716 4715->4724 4716->4713 4717 402d6d RegEnumKeyA 4718 402d76 RegCloseKey 4717->4718 4717->4724 4719 406500 5 API calls 4718->4719 4720 402d86 4719->4720 4722 402da8 4720->4722 4723 402d8a RegDeleteKeyA 4720->4723 4721 402cd0 6 API calls 4721->4724 4722->4713 4723->4713 4724->4716 4724->4717 4724->4718 4724->4721 4725 4027a1 4726 402bce 17 API calls 4725->4726 4727 4027a8 FindFirstFileA 4726->4727 4728 4027cb 4727->4728 4729 4027bb 4727->4729 4730 4027d2 4728->4730 4733 406055 wsprintfA 4728->4733 4734 4060f7 lstrcpynA 4730->4734 4733->4730 4734->4729 5514 402626 5515 40262b 5514->5515 5516 40263f 5514->5516 5517 402bac 17 API calls 5515->5517 5518 402bce 17 API calls 5516->5518 5519 402634 5517->5519 5520 402646 lstrlenA 5518->5520 5521 405d37 WriteFile 5519->5521 5522 402668 5519->5522 5520->5519 5521->5522 5523 403ca7 5524 403dfa 5523->5524 5525 403cbf 5523->5525 5527 403e4b 5524->5527 5528 403e0b GetDlgItem GetDlgItem 5524->5528 5525->5524 5526 403ccb 5525->5526 5529 403cd6 SetWindowPos 5526->5529 5530 403ce9 5526->5530 5532 403ea5 5527->5532 5540 401389 2 API calls 5527->5540 5531 40417b 18 API calls 5528->5531 5529->5530 5534 403d06 5530->5534 5535 403cee ShowWindow 5530->5535 5536 403e35 SetClassLongA 5531->5536 5533 4041c7 SendMessageA 5532->5533 5552 403df5 5532->5552 5550 403eb7 5533->5550 5537 403d28 5534->5537 5538 403d0e DestroyWindow 5534->5538 5535->5534 5539 40140b 2 API calls 5536->5539 5541 403d2d SetWindowLongA 5537->5541 5542 403d3e 5537->5542 5591 404104 5538->5591 5539->5527 5543 403e7d 5540->5543 5541->5552 5546 403d4a GetDlgItem 5542->5546 5562 403db5 5542->5562 5543->5532 5547 403e81 SendMessageA 5543->5547 5544 40140b 2 API calls 5544->5550 5545 404106 DestroyWindow EndDialog 5545->5591 5551 403d5d SendMessageA IsWindowEnabled 5546->5551 5554 403d7a 5546->5554 5547->5552 5548 4041e2 8 API calls 5548->5552 5549 404135 ShowWindow 5549->5552 5550->5544 5550->5545 5550->5552 5553 40618a 17 API calls 5550->5553 5559 40417b 18 API calls 5550->5559 5566 40417b 18 API calls 5550->5566 5582 404046 DestroyWindow 5550->5582 5551->5552 5551->5554 5553->5550 5555 403d87 5554->5555 5556 403dce SendMessageA 5554->5556 5557 403d9a 5554->5557 5565 403d7f 5554->5565 5555->5556 5555->5565 5556->5562 5560 403da2 5557->5560 5561 403db7 5557->5561 5558 404154 SendMessageA 5558->5562 5559->5550 5563 40140b 2 API calls 5560->5563 5564 40140b 2 API calls 5561->5564 5562->5548 5563->5565 5564->5565 5565->5558 5565->5562 5567 403f32 GetDlgItem 5566->5567 5568 403f47 5567->5568 5569 403f4f ShowWindow EnableWindow 5567->5569 5568->5569 5592 40419d EnableWindow 5569->5592 5571 403f79 EnableWindow 5576 403f8d 5571->5576 5572 403f92 GetSystemMenu EnableMenuItem SendMessageA 5573 403fc2 SendMessageA 5572->5573 5572->5576 5573->5576 5575 403c88 18 API calls 5575->5576 5576->5572 5576->5575 5593 4041b0 SendMessageA 5576->5593 5594 4060f7 lstrcpynA 5576->5594 5578 403ff1 lstrlenA 5579 40618a 17 API calls 5578->5579 5580 404002 SetWindowTextA 5579->5580 5581 401389 2 API calls 5580->5581 5581->5550 5583 404060 CreateDialogParamA 5582->5583 5582->5591 5584 404093 5583->5584 5583->5591 5585 40417b 18 API calls 5584->5585 5586 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5585->5586 5587 401389 2 API calls 5586->5587 5588 4040e4 5587->5588 5588->5552 5589 4040ec ShowWindow 5588->5589 5590 4041c7 SendMessageA 5589->5590 5590->5591 5591->5549 5591->5552 5592->5571 5593->5576 5594->5578 4767 40272b 4768 402732 4767->4768 4769 4029aa 4767->4769 4770 402bac 17 API calls 4768->4770 4771 402739 4770->4771 4772 402748 SetFilePointer 4771->4772 4772->4769 4773 402758 4772->4773 4775 406055 wsprintfA 4773->4775 4775->4769 4786 401c2e 4787 402bac 17 API calls 4786->4787 4788 401c35 4787->4788 4789 402bac 17 API calls 4788->4789 4790 401c42 4789->4790 4791 402bce 17 API calls 4790->4791 4792 401c57 4790->4792 4791->4792 4793 401c67 4792->4793 4794 402bce 17 API calls 4792->4794 4795 401c72 4793->4795 4796 401cbe 4793->4796 4794->4793 4797 402bac 17 API calls 4795->4797 4798 402bce 17 API calls 4796->4798 4799 401c77 4797->4799 4800 401cc3 4798->4800 4801 402bac 17 API calls 4799->4801 4802 402bce 17 API calls 4800->4802 4803 401c83 4801->4803 4804 401ccc FindWindowExA 4802->4804 4805 401c90 SendMessageTimeoutA 4803->4805 4806 401cae SendMessageA 4803->4806 4807 401cea 4804->4807 4805->4807 4806->4807 5595 4042b1 lstrcpynA lstrlenA 4817 401e35 GetDC 4818 402bac 17 API calls 4817->4818 4819 401e47 GetDeviceCaps MulDiv ReleaseDC 4818->4819 4820 402bac 17 API calls 4819->4820 4821 401e78 4820->4821 4822 40618a 17 API calls 4821->4822 4823 401eb5 CreateFontIndirectA 4822->4823 4824 402620 4823->4824 5596 402a35 SendMessageA 5597 402a5a 5596->5597 5598 402a4f InvalidateRect 5596->5598 5598->5597 5599 6f9510e0 5608 6f95110e 5599->5608 5600 6f9511c4 GlobalFree 5601 6f9512ad 2 API calls 5601->5608 5602 6f9511c3 5602->5600 5603 6f9511ea GlobalFree 5603->5608 5604 6f951266 2 API calls 5607 6f9511b1 GlobalFree 5604->5607 5605 6f951155 GlobalAlloc 5605->5608 5606 6f9512d1 lstrcpyA 5606->5608 5607->5608 5608->5600 5608->5601 5608->5602 5608->5603 5608->5604 5608->5605 5608->5606 5608->5607 5609 6f952be3 5610 6f952bfb 5609->5610 5611 6f951534 2 API calls 5610->5611 5612 6f952c16 5611->5612 5613 4014b7 5614 4014bd 5613->5614 5615 401389 2 API calls 5614->5615 5616 4014c5 5615->5616 5617 402dba 5618 402dc9 SetTimer 5617->5618 5620 402de2 5617->5620 5618->5620 5619 402e37 5620->5619 5621 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5620->5621 5621->5619 4871 4015bb 4872 402bce 17 API calls 4871->4872 4873 4015c2 4872->4873 4874 405b28 4 API calls 4873->4874 4888 4015ca 4874->4888 4875 401624 4877 401652 4875->4877 4878 401629 4875->4878 4876 405aba CharNextA 4876->4888 4880 401423 24 API calls 4877->4880 4879 401423 24 API calls 4878->4879 4881 401630 4879->4881 4887 40164a 4880->4887 4890 4060f7 lstrcpynA 4881->4890 4882 405761 2 API calls 4882->4888 4884 40577e 5 API calls 4884->4888 4885 40163b SetCurrentDirectoryA 4885->4887 4886 40160c GetFileAttributesA 4886->4888 4888->4875 4888->4876 4888->4882 4888->4884 4888->4886 4889 4056e4 4 API calls 4888->4889 4889->4888 4890->4885 5622 4016bb 5623 402bce 17 API calls 5622->5623 5624 4016c1 GetFullPathNameA 5623->5624 5625 4016f9 5624->5625 5626 4016d8 5624->5626 5627 402a5a 5625->5627 5628 40170d GetShortPathNameA 5625->5628 5626->5625 5629 40646b 2 API calls 5626->5629 5628->5627 5630 4016e9 5629->5630 5630->5625 5632 4060f7 lstrcpynA 5630->5632 5632->5625

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 8 403393 1->8 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 8->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 22 4033da 17->22 22->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 31 403470-403478 29->31 32 40346a-40346e 29->32 33 403542-40355c GetTempPathA call 403317 30->33 34 403480-403483 31->34 35 40347a-40347b 31->35 32->31 32->32 43 4035b4-4035ce DeleteFileA call 402ea1 33->43 44 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 33->44 37 403515-403522 call 405aba 34->37 38 403489-40348d 34->38 35->34 37->28 56 403524 37->56 41 4034a5-4034d2 38->41 42 40348f-403495 38->42 45 4034d4-4034da 41->45 46 4034e5-403513 41->46 50 403497-403499 42->50 51 40349b 42->51 59 403662-403672 call 403830 OleUninitialize 43->59 60 4035d4-4035da 43->60 44->43 58 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 44->58 52 4034e0 45->52 53 4034dc-4034de 45->53 46->37 55 403531-40353d call 4060f7 46->55 50->41 50->51 51->41 52->46 53->46 53->52 55->33 56->28 58->43 58->59 72 403796-40379c 59->72 73 403678-403688 call 405813 ExitProcess 59->73 63 403652-403659 call 40390a 60->63 64 4035dc-4035e7 call 405aba 60->64 70 40365e 63->70 76 4035e9-403612 64->76 77 40361d-403627 64->77 70->59 74 403818-403820 72->74 75 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->75 85 403822 74->85 86 403826-40382a ExitProcess 74->86 82 4037e9-4037f7 call 406500 75->82 83 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 75->83 84 403614-403616 76->84 79 403629-403636 call 405b7d 77->79 80 40368e-4036a2 call 40577e lstrcatA 77->80 79->59 94 403638-40364e call 4060f7 * 2 79->94 95 4036a4-4036aa lstrcatA 80->95 96 4036af-4036c9 lstrcatA lstrcmpiA 80->96 97 403805-40380f ExitWindowsEx 82->97 98 4037f9-403803 82->98 83->82 84->77 90 403618-40361b 84->90 85->86 90->77 90->84 94->63 95->96 96->59 100 4036cb-4036ce 96->100 97->74 101 403811-403813 call 40140b 97->101 98->97 98->101 103 4036d0-4036d5 call 4056e4 100->103 104 4036d7 call 405761 100->104 101->74 112 4036dc-4036e9 SetCurrentDirectoryA 103->112 104->112 113 4036f6-40371e call 4060f7 112->113 114 4036eb-4036f1 call 4060f7 112->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 124 40378a-403791 call 405ed6 121->124 122->121 123 403754-403774 call 405ed6 call 40618a call 405796 122->123 123->121 133 403776-40377d CloseHandle 123->133 124->59 133->121
                        APIs
                        • SetErrorMode.KERNELBASE ref: 0040336D
                        • GetVersion.KERNEL32 ref: 00403373
                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                        • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033E2
                        • OleInitialize.OLE32(00000000), ref: 004033E9
                        • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 00403405
                        • GetCommandLineA.KERNEL32(telefaxe Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 0040341A
                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\dIPYIbWXs1.exe",00000020,"C:\Users\user\Desktop\dIPYIbWXs1.exe",00000000,?,00000007,00000009,0000000B), ref: 00403456
                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 00403553
                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 00403564
                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403570
                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403584
                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040358C
                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040359D
                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004035A5
                        • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 004035B9
                          • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                          • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                          • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,74DF3410), ref: 004039FA
                          • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                          • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                          • Part of subcall function 0040390A: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                          • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                          • Part of subcall function 00403830: CloseHandle.KERNEL32(000002EC,00403667,?,?,00000007,00000009,0000000B), ref: 0040383B
                        • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403667
                        • ExitProcess.KERNEL32 ref: 00403688
                        • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004037A5
                        • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                        • ExitProcess.KERNEL32 ref: 0040382A
                          • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                        • String ID: "$"C:\Users\user\Desktop\dIPYIbWXs1.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\dIPYIbWXs1.exe$C:\Users\user\tranchet$C:\Users\user\tranchet\Trykmaalere$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`Kt$telefaxe Setup$~nsu
                        • API String ID: 3776617018-1307871048
                        • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                        • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                        • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                        • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F
                        APIs
                          • Part of subcall function 6F951215: GlobalAlloc.KERNEL32(00000040,6F951233,?,6F9512CF,-6F95404B,6F9511AB,-000000A0), ref: 6F95121D
                        • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 6F951BC4
                        • lstrcpyA.KERNEL32(00000008,?), ref: 6F951C0C
                        • lstrcpyA.KERNEL32(00000408,?), ref: 6F951C16
                        • GlobalFree.KERNEL32(00000000), ref: 6F951C29
                        • GlobalFree.KERNEL32(?), ref: 6F951D09
                        • GlobalFree.KERNEL32(?), ref: 6F951D0E
                        • GlobalFree.KERNEL32(?), ref: 6F951D13
                        • GlobalFree.KERNEL32(00000000), ref: 6F951EFA
                        • lstrcpyA.KERNEL32(?,?), ref: 6F952098
                        • GetModuleHandleA.KERNEL32(00000008), ref: 6F952114
                        • LoadLibraryA.KERNEL32(00000008), ref: 6F952125
                        • GetProcAddress.KERNEL32(?,?), ref: 6F95217E
                        • lstrlenA.KERNEL32(00000408), ref: 6F952198
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                        • String ID:
                        • API String ID: 245916457-0
                        • Opcode ID: 218e7118312ebd593a1e67fdaf6241739d73e2f92277f982ba2b664460c368c2
                        • Instruction ID: 6378cb76800743df4c0dfed617deeb649eb490a485a8ae5797904e73c3f75afd
                        • Opcode Fuzzy Hash: 218e7118312ebd593a1e67fdaf6241739d73e2f92277f982ba2b664460c368c2
                        • Instruction Fuzzy Hash: F82279B194460A9ADB21CFB8C9807EEBBF8BB06314F20462AD1A5A61C0D775E5E5CF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 558 4058bf-4058e5 call 405b7d 561 4058e7-4058f9 DeleteFileA 558->561 562 4058fe-405905 558->562 563 405a88-405a8c 561->563 564 405907-405909 562->564 565 405918-405928 call 4060f7 562->565 566 405a36-405a3b 564->566 567 40590f-405912 564->567 573 405937-405938 call 405ad6 565->573 574 40592a-405935 lstrcatA 565->574 566->563 569 405a3d-405a40 566->569 567->565 567->566 571 405a42-405a48 569->571 572 405a4a-405a52 call 40646b 569->572 571->563 572->563 582 405a54-405a68 call 405a8f call 405877 572->582 575 40593d-405940 573->575 574->575 578 405942-405949 575->578 579 40594b-405951 lstrcatA 575->579 578->579 581 405956-405974 lstrlenA FindFirstFileA 578->581 579->581 583 40597a-405991 call 405aba 581->583 584 405a2c-405a30 581->584 594 405a80-405a83 call 40521e 582->594 595 405a6a-405a6d 582->595 592 405993-405997 583->592 593 40599c-40599f 583->593 584->566 586 405a32 584->586 586->566 592->593 596 405999 592->596 597 4059a1-4059a6 593->597 598 4059b2-4059c0 call 4060f7 593->598 594->563 595->571 600 405a6f-405a7e call 40521e call 405ed6 595->600 596->593 602 4059a8-4059aa 597->602 603 405a0b-405a1d FindNextFileA 597->603 608 4059c2-4059ca 598->608 609 4059d7-4059e2 call 405877 598->609 600->563 602->598 607 4059ac-4059b0 602->607 603->583 606 405a23-405a26 FindClose 603->606 606->584 607->598 607->603 608->603 611 4059cc-4059d5 call 4058bf 608->611 618 405a03-405a06 call 40521e 609->618 619 4059e4-4059e7 609->619 611->603 618->603 621 4059e9-4059f9 call 40521e call 405ed6 619->621 622 4059fb-405a01 619->622 621->603 622->603
                        APIs
                        • DeleteFileA.KERNELBASE(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058E8
                        • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405930
                        • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405951
                        • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405957
                        • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405968
                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A15
                        • FindClose.KERNEL32(00000000), ref: 00405A26
                        Strings
                        • "C:\Users\user\Desktop\dIPYIbWXs1.exe", xrefs: 004058BF
                        • \*.*, xrefs: 0040592A
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004058CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                        • API String ID: 2035342205-58457572
                        • Opcode ID: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                        • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                        • Opcode Fuzzy Hash: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                        • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                        APIs
                        • CoCreateInstance.OLE32(00408524,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                        Strings
                        • C:\Users\user\tranchet\Trykmaalere, xrefs: 00402230
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: ByteCharCreateInstanceMultiWide
                        • String ID: C:\Users\user\tranchet\Trykmaalere
                        • API String ID: 123533781-1398828102
                        • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                        • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                        • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                        • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                        APIs
                        • FindFirstFileA.KERNELBASE(74DF3410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00406476
                        • FindClose.KERNELBASE(00000000), ref: 00406482
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                        • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                        • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                        • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                        APIs
                        • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 004027B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FileFindFirst
                        • String ID:
                        • API String ID: 1974802433-0
                        • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                        • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                        • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                        • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 134 40390a-403922 call 406500 137 403924-403934 call 406055 134->137 138 403936-403967 call 405fde 134->138 145 40398a-4039b3 call 403bcf call 405b7d 137->145 143 403969-40397a call 405fde 138->143 144 40397f-403985 lstrcatA 138->144 143->144 144->145 152 4039b9-4039be 145->152 153 403a3a-403a42 call 405b7d 145->153 152->153 154 4039c0-4039e4 call 405fde 152->154 159 403a50-403a75 LoadImageA 153->159 160 403a44-403a4b call 40618a 153->160 154->153 161 4039e6-4039e8 154->161 163 403af6-403afe call 40140b 159->163 164 403a77-403aa7 RegisterClassA 159->164 160->159 166 4039f9-403a05 lstrlenA 161->166 167 4039ea-4039f7 call 405aba 161->167 176 403b00-403b03 163->176 177 403b08-403b13 call 403bcf 163->177 168 403bc5 164->168 169 403aad-403af1 SystemParametersInfoA CreateWindowExA 164->169 173 403a07-403a15 lstrcmpiA 166->173 174 403a2d-403a35 call 405a8f call 4060f7 166->174 167->166 172 403bc7-403bce 168->172 169->163 173->174 175 403a17-403a21 GetFileAttributesA 173->175 174->153 180 403a23-403a25 175->180 181 403a27-403a28 call 405ad6 175->181 176->172 187 403b19-403b33 ShowWindow call 406492 177->187 188 403b9c-403ba4 call 4052f0 177->188 180->174 180->181 181->174 195 403b35-403b3a call 406492 187->195 196 403b3f-403b51 GetClassInfoA 187->196 193 403ba6-403bac 188->193 194 403bbe-403bc0 call 40140b 188->194 193->176 197 403bb2-403bb9 call 40140b 193->197 194->168 195->196 200 403b53-403b63 GetClassInfoA RegisterClassA 196->200 201 403b69-403b9a DialogBoxParamA call 40140b call 40385a 196->201 197->176 200->201 201->172
                        APIs
                          • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                          • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                        • lstrcatA.KERNEL32(1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\dIPYIbWXs1.exe",00000000), ref: 00403985
                        • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,74DF3410), ref: 004039FA
                        • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                        • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                        • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                          • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                        • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AB6
                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                        • ShowWindow.USER32(00000005,00000000), ref: 00403B21
                        • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                        • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                        • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                        • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\tranchet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                        • API String ID: 1975747703-3750255490
                        • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                        • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                        • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                        • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 208 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 211 402ef1-402ef6 208->211 212 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 208->212 213 4030d1-4030d5 211->213 220 403014-403022 call 402e3d 212->220 221 402f2f 212->221 228 403024-403027 220->228 229 403077-40307c 220->229 222 402f34-402f4b 221->222 224 402f4d 222->224 225 402f4f-402f58 call 4032ea 222->225 224->225 234 40307e-403086 call 402e3d 225->234 235 402f5e-402f65 225->235 230 403029-403041 call 403300 call 4032ea 228->230 231 40304b-403075 GlobalAlloc call 403300 call 4030d8 228->231 229->213 230->229 254 403043-403049 230->254 231->229 259 403088-403099 231->259 234->229 238 402fe1-402fe5 235->238 239 402f67-402f7b call 405c4b 235->239 243 402fe7-402fee call 402e3d 238->243 244 402fef-402ff5 238->244 239->244 257 402f7d-402f84 239->257 243->244 250 403004-40300c 244->250 251 402ff7-403001 call 4065b7 244->251 250->222 258 403012 250->258 251->250 254->229 254->231 257->244 263 402f86-402f8d 257->263 258->220 260 4030a1-4030a6 259->260 261 40309b 259->261 264 4030a7-4030ad 260->264 261->260 263->244 265 402f8f-402f96 263->265 264->264 266 4030af-4030ca SetFilePointer call 405c4b 264->266 265->244 267 402f98-402f9f 265->267 270 4030cf 266->270 267->244 269 402fa1-402fc1 267->269 269->229 271 402fc7-402fcb 269->271 270->213 272 402fd3-402fdb 271->272 273 402fcd-402fd1 271->273 272->244 274 402fdd-402fdf 272->274 273->258 273->272 274->244
                        APIs
                        • GetTickCount.KERNEL32 ref: 00402EB2
                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\dIPYIbWXs1.exe,00000400), ref: 00402ECE
                          • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405C94
                          • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                        • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\dIPYIbWXs1.exe,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00402F1A
                        • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$@TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\dIPYIbWXs1.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft$q
                        • API String ID: 2803837635-167387646
                        • Opcode ID: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                        • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                        • Opcode Fuzzy Hash: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                        • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 496 40618a-406195 497 406197-4061a6 496->497 498 4061a8-4061be 496->498 497->498 499 4061c4-4061cf 498->499 500 4063af-4063b3 498->500 499->500 501 4061d5-4061dc 499->501 502 4061e1-4061eb 500->502 503 4063b9-4063c3 500->503 501->500 502->503 504 4061f1-4061f8 502->504 505 4063c5-4063c9 call 4060f7 503->505 506 4063ce-4063cf 503->506 507 4063a2 504->507 508 4061fe-406232 504->508 505->506 510 4063a4-4063aa 507->510 511 4063ac-4063ae 507->511 512 406238-406242 508->512 513 40634f-406352 508->513 510->500 511->500 514 406244-406248 512->514 515 40625c 512->515 516 406382-406385 513->516 517 406354-406357 513->517 514->515 520 40624a-40624e 514->520 523 406263-40626a 515->523 518 406393-4063a0 lstrlenA 516->518 519 406387-40638e call 40618a 516->519 521 406367-406373 call 4060f7 517->521 522 406359-406365 call 406055 517->522 518->500 519->518 520->515 525 406250-406254 520->525 534 406378-40637e 521->534 522->534 527 40626c-40626e 523->527 528 40626f-406271 523->528 525->515 530 406256-40625a 525->530 527->528 532 406273-40628e call 405fde 528->532 533 4062aa-4062ad 528->533 530->523 539 406293-406296 532->539 535 4062bd-4062c0 533->535 536 4062af-4062bb GetSystemDirectoryA 533->536 534->518 538 406380 534->538 542 4062c2-4062d0 GetWindowsDirectoryA 535->542 543 40632d-40632f 535->543 541 406331-406334 536->541 540 406347-40634d call 4063d2 538->540 544 406336-40633a 539->544 545 40629c-4062a5 call 40618a 539->545 540->518 541->540 541->544 542->543 543->541 546 4062d2-4062dc 543->546 544->540 549 40633c-406342 lstrcatA 544->549 545->541 551 4062f6-40630c SHGetSpecialFolderLocation 546->551 552 4062de-4062e1 546->552 549->540 555 40632a 551->555 556 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 551->556 552->551 554 4062e3-4062ea 552->554 557 4062f2-4062f4 554->557 555->543 556->541 556->555 557->541 557->551
                        APIs
                        • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                        • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0042A070,00000000,00405256,0042A070,00000000), ref: 004062C8
                        • SHGetSpecialFolderLocation.SHELL32(00405256,74DF23A0,?,0042A070,00000000,00405256,0042A070,00000000), ref: 00406304
                        • SHGetPathFromIDListA.SHELL32(74DF23A0,Call), ref: 00406312
                        • CoTaskMemFree.OLE32(74DF23A0), ref: 0040631E
                        • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                        • lstrlenA.KERNEL32(Call,?,0042A070,00000000,00405256,0042A070,00000000,00000000,00424248,74DF23A0), ref: 00406394
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                        • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                        • API String ID: 717251189-1230650788
                        • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                        • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                        • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                        • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 627 401759-40177c call 402bce call 405afc 632 401786-401798 call 4060f7 call 405a8f lstrcatA 627->632 633 40177e-401784 call 4060f7 627->633 638 40179d-4017a3 call 4063d2 632->638 633->638 643 4017a8-4017ac 638->643 644 4017ae-4017b8 call 40646b 643->644 645 4017df-4017e2 643->645 652 4017ca-4017dc 644->652 653 4017ba-4017c8 CompareFileTime 644->653 646 4017e4-4017e5 call 405c6b 645->646 647 4017ea-401806 call 405c90 645->647 646->647 655 401808-40180b 647->655 656 40187e-4018a7 call 40521e call 4030d8 647->656 652->645 653->652 657 401860-40186a call 40521e 655->657 658 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 655->658 668 4018a9-4018ad 656->668 669 4018af-4018bb SetFileTime 656->669 670 401873-401879 657->670 658->643 690 401855-401856 658->690 668->669 672 4018c1-4018cc CloseHandle 668->672 669->672 673 402a63 670->673 675 4018d2-4018d5 672->675 676 402a5a-402a5d 672->676 677 402a65-402a69 673->677 680 4018d7-4018e8 call 40618a lstrcatA 675->680 681 4018ea-4018ed call 40618a 675->681 676->673 687 4018f2-402382 680->687 681->687 691 402387-40238c 687->691 692 402382 call 405813 687->692 690->670 693 401858-401859 690->693 691->677 692->691 693->657
                        APIs
                        • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 00401798
                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 004017C2
                          • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,telefaxe Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                          • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                          • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                        • String ID: C:\Users\user\AppData\Local\Temp\nsv88CE.tmp$C:\Users\user\AppData\Local\Temp\nsv88CE.tmp\System.dll$C:\Users\user\tranchet\Trykmaalere$Call
                        • API String ID: 1941528284-912445501
                        • Opcode ID: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                        • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                        • Opcode Fuzzy Hash: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                        • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 694 4030d8-4030ec 695 4030f5-4030fe 694->695 696 4030ee 694->696 697 403100 695->697 698 403107-40310c 695->698 696->695 697->698 699 40311c-403129 call 4032ea 698->699 700 40310e-403117 call 403300 698->700 704 4032d8 699->704 705 40312f-403133 699->705 700->699 706 4032da-4032db 704->706 707 403283-403285 705->707 708 403139-403182 GetTickCount 705->708 711 4032e3-4032e7 706->711 709 4032c5-4032c8 707->709 710 403287-40328a 707->710 712 4032e0 708->712 713 403188-403190 708->713 717 4032ca 709->717 718 4032cd-4032d6 call 4032ea 709->718 710->712 714 40328c 710->714 712->711 715 403192 713->715 716 403195-4031a3 call 4032ea 713->716 720 40328f-403295 714->720 715->716 716->704 728 4031a9-4031b2 716->728 717->718 718->704 726 4032dd 718->726 723 403297 720->723 724 403299-4032a7 call 4032ea 720->724 723->724 724->704 731 4032a9-4032b5 call 405d37 724->731 726->712 730 4031b8-4031d8 call 406625 728->730 736 40327b-40327d 730->736 737 4031de-4031f1 GetTickCount 730->737 738 4032b7-4032c1 731->738 739 40327f-403281 731->739 736->706 740 4031f3-4031fb 737->740 741 403236-403238 737->741 738->720 744 4032c3 738->744 739->706 745 403203-403233 MulDiv wsprintfA call 40521e 740->745 746 4031fd-403201 740->746 742 40323a-40323e 741->742 743 40326f-403273 741->743 748 403240-403247 call 405d37 742->748 749 403255-403260 742->749 743->713 750 403279 743->750 744->712 745->741 746->741 746->745 754 40324c-40324e 748->754 753 403263-403267 749->753 750->712 753->730 755 40326d 753->755 754->739 756 403250-403253 754->756 755->712 756->753
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CountTick$wsprintf
                        • String ID: ... %d%%$HBB
                        • API String ID: 551687249-372310663
                        • Opcode ID: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                        • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                        • Opcode Fuzzy Hash: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                        • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                        Control-flow Graph

                        APIs
                        • GetDC.USER32(?), ref: 00401E38
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                        • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                        • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CapsCreateDeviceFontIndirectRelease
                        • String ID: Calibri
                        • API String ID: 3808545654-1409258342
                        • Opcode ID: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                        • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                        • Opcode Fuzzy Hash: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                        • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 770 4056e4-40572f CreateDirectoryA 771 405731-405733 770->771 772 405735-405742 GetLastError 770->772 773 40575c-40575e 771->773 772->773 774 405744-405758 SetFileSecurityA 772->774 774->771 775 40575a GetLastError 774->775 775->773
                        APIs
                        • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                        • GetLastError.KERNEL32 ref: 0040573B
                        • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                        • GetLastError.KERNEL32 ref: 0040575A
                        Strings
                        • C:\Users\user\Desktop, xrefs: 004056E4
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040570A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                        • API String ID: 3449924974-2028306314
                        • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                        • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                        • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                        • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 776 406492-4064b2 GetSystemDirectoryA 777 4064b4 776->777 778 4064b6-4064b8 776->778 777->778 779 4064c8-4064ca 778->779 780 4064ba-4064c2 778->780 781 4064cb-4064fd wsprintfA LoadLibraryExA 779->781 780->779 782 4064c4-4064c6 780->782 782->781
                        APIs
                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                        • wsprintfA.USER32 ref: 004064E2
                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: DirectoryLibraryLoadSystemwsprintf
                        • String ID: %s%s.dll$UXTHEME$\
                        • API String ID: 2200240437-4240819195
                        • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                        • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                        • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                        • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 783 405cbf-405cc9 784 405cca-405cf5 GetTickCount GetTempFileNameA 783->784 785 405d04-405d06 784->785 786 405cf7-405cf9 784->786 788 405cfe-405d01 785->788 786->784 787 405cfb 786->787 787->788
                        APIs
                        • GetTickCount.KERNEL32 ref: 00405CD3
                        • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CED
                        Strings
                        • nsa, xrefs: 00405CCA
                        • "C:\Users\user\Desktop\dIPYIbWXs1.exe", xrefs: 00405CBF
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CountFileNameTempTick
                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                        • API String ID: 1716503409-1753224044
                        • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                        • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                        • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                        • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 789 402cd0-402cf9 call 405f7d 791 402cfe-402d02 789->791 792 402db3-402db7 791->792 793 402d08-402d0c 791->793 794 402d31-402d44 793->794 795 402d0e-402d2f RegEnumValueA 793->795 797 402d6d-402d74 RegEnumKeyA 794->797 795->794 796 402d98-402da6 RegCloseKey 795->796 796->792 798 402d46-402d48 797->798 799 402d76-402d88 RegCloseKey call 406500 797->799 798->796 801 402d4a-402d5e call 402cd0 798->801 804 402da8-402dae 799->804 805 402d8a-402d96 RegDeleteKeyA 799->805 801->799 807 402d60-402d6c 801->807 804->792 805->792 807->797
                        APIs
                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CloseEnum$DeleteValue
                        • String ID:
                        • API String ID: 1354259210-0
                        • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                        • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                        • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                        • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 808 6f9516db-6f951717 call 6f951a98 812 6f951834-6f951836 808->812 813 6f95171d-6f951721 808->813 814 6f951723-6f951729 call 6f9522af 813->814 815 6f95172a-6f951737 call 6f9522f1 813->815 814->815 820 6f951767-6f95176e 815->820 821 6f951739-6f95173e 815->821 824 6f951770-6f95178c call 6f9524d8 call 6f951559 call 6f951266 GlobalFree 820->824 825 6f95178e-6f951792 820->825 822 6f951740-6f951741 821->822 823 6f951759-6f95175c 821->823 827 6f951743-6f951744 822->827 828 6f951749-6f95174a call 6f952a38 822->828 823->820 831 6f95175e-6f95175f call 6f952cc3 823->831 849 6f9517e3-6f9517e7 824->849 829 6f951794-6f9517da call 6f95156b call 6f9524d8 825->829 830 6f9517dc-6f9517e2 call 6f9524d8 825->830 833 6f951746-6f951747 827->833 834 6f951751-6f951757 call 6f9526b2 827->834 840 6f95174f 828->840 829->849 830->849 843 6f951764 831->843 833->820 833->828 848 6f951766 834->848 840->843 843->848 848->820 850 6f951824-6f95182b 849->850 851 6f9517e9-6f9517f7 call 6f95249e 849->851 850->812 856 6f95182d-6f95182e GlobalFree 850->856 858 6f95180f-6f951816 851->858 859 6f9517f9-6f9517fc 851->859 856->812 858->850 861 6f951818-6f951823 call 6f9514e2 858->861 859->858 860 6f9517fe-6f951806 859->860 860->858 862 6f951808-6f951809 FreeLibrary 860->862 861->850 862->858
                        APIs
                          • Part of subcall function 6F951A98: GlobalFree.KERNEL32(?), ref: 6F951D09
                          • Part of subcall function 6F951A98: GlobalFree.KERNEL32(?), ref: 6F951D0E
                          • Part of subcall function 6F951A98: GlobalFree.KERNEL32(?), ref: 6F951D13
                        • GlobalFree.KERNEL32(00000000), ref: 6F951786
                        • FreeLibrary.KERNEL32(?), ref: 6F951809
                        • GlobalFree.KERNEL32(00000000), ref: 6F95182E
                          • Part of subcall function 6F9522AF: GlobalAlloc.KERNEL32(00000040,?), ref: 6F9522E0
                          • Part of subcall function 6F9526B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6F951757,00000000), ref: 6F952782
                          • Part of subcall function 6F95156B: wsprintfA.USER32 ref: 6F951599
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc$Librarywsprintf
                        • String ID:
                        • API String ID: 3962662361-3916222277
                        • Opcode ID: 4f698d30dc8b52145972f7212ec4c65a64f8acb8876e8b5cbc97645d27840027
                        • Instruction ID: 39eac254a0bd4132afc943364ddae79b44c6d95bdbd41e405a87a606d3805a4b
                        • Opcode Fuzzy Hash: 4f698d30dc8b52145972f7212ec4c65a64f8acb8876e8b5cbc97645d27840027
                        • Instruction Fuzzy Hash: BF418A711043089ADB04EF789984BDA37ACBF17328F148566E9159E1C3DB74E5F9CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 865 401c2e-401c4e call 402bac * 2 870 401c50-401c57 call 402bce 865->870 871 401c5a-401c5e 865->871 870->871 873 401c60-401c67 call 402bce 871->873 874 401c6a-401c70 871->874 873->874 876 401c72-401c8e call 402bac * 2 874->876 877 401cbe-401ce4 call 402bce * 2 FindWindowExA 874->877 888 401c90-401cac SendMessageTimeoutA 876->888 889 401cae-401cbc SendMessageA 876->889 890 401cea 877->890 891 401ced-401cf0 888->891 889->890 890->891 892 401cf6 891->892 893 402a5a-402a69 891->893 892->893
                        APIs
                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$Timeout
                        • String ID: !
                        • API String ID: 1777923405-2657877971
                        • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                        • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                        • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                        • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 896 402476-4024a7 call 402bce * 2 call 402c5e 903 402a5a-402a69 896->903 904 4024ad-4024b7 896->904 905 4024c7-4024ca 904->905 906 4024b9-4024c6 call 402bce lstrlenA 904->906 909 4024e1-4024e4 905->909 910 4024cc-4024e0 call 402bac 905->910 906->905 914 4024f5-402509 RegSetValueExA 909->914 915 4024e6-4024f0 call 4030d8 909->915 910->909 918 40250b 914->918 919 40250e-4025eb RegCloseKey 914->919 915->914 918->919 919->903
                        APIs
                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsv88CE.tmp,00000023,00000011,00000002), ref: 004024C1
                        • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsv88CE.tmp,00000000,00000011,00000002), ref: 00402501
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsv88CE.tmp,00000000,00000011,00000002), ref: 004025E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CloseValuelstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nsv88CE.tmp
                        • API String ID: 2655323295-261357991
                        • Opcode ID: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                        • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                        • Opcode Fuzzy Hash: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                        • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                        APIs
                        • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020C8
                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                          • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                          • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                        • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020D8
                        • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402152
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                        • String ID:
                        • API String ID: 2987980305-0
                        • Opcode ID: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                        • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                        • Opcode Fuzzy Hash: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                        • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E
                        APIs
                          • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                          • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,000000F0), ref: 0040163C
                        Strings
                        • C:\Users\user\tranchet\Trykmaalere, xrefs: 00401631
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                        • String ID: C:\Users\user\tranchet\Trykmaalere
                        • API String ID: 1892508949-1398828102
                        • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                        • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                        • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                        • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                        APIs
                        • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,0042A070,?,?,?,00000002,Call,?,00406293,80000002), ref: 00406024
                        • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0042A070), ref: 0040602F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CloseQueryValue
                        • String ID: Call
                        • API String ID: 3356406503-1824292864
                        • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                        • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                        • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                        • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                        APIs
                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                        • CloseHandle.KERNEL32(?), ref: 004057CC
                        Strings
                        • Error launching installer, xrefs: 004057A9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcess
                        • String ID: Error launching installer
                        • API String ID: 3712363035-66219284
                        • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                        • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                        • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                        • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                        APIs
                        • GlobalFree.KERNEL32(00000000), ref: 00401BF6
                        • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401C08
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$AllocFree
                        • String ID: Call
                        • API String ID: 3394109436-1824292864
                        • Opcode ID: 4f6e99611feb600a1a309dae17313cb646ed486db5988612a5590cb9f56acaba
                        • Instruction ID: e4cc8bcb7752a4f6b3811e2611bd1e0fa57f8e281b648bd21e3e74c9503b19de
                        • Opcode Fuzzy Hash: 4f6e99611feb600a1a309dae17313cb646ed486db5988612a5590cb9f56acaba
                        • Instruction Fuzzy Hash: 74219673644101EBDB20EB65DE88E5E73E8EB44318711413BF602B72D1DB78D8529B5D
                        APIs
                        • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                        • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsv88CE.tmp,00000000,00000011,00000002), ref: 004025E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Enum$CloseValue
                        • String ID:
                        • API String ID: 397863658-0
                        • Opcode ID: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                        • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                        • Opcode Fuzzy Hash: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                        • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                        APIs
                        • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsv88CE.tmp,00000000,00000011,00000002), ref: 004025E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CloseQueryValue
                        • String ID:
                        • API String ID: 3356406503-0
                        • Opcode ID: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                        • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                        • Opcode Fuzzy Hash: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                        • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                        APIs
                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                        • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                        • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                        • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                        APIs
                        • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                        • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CloseDeleteValue
                        • String ID:
                        • API String ID: 2831762973-0
                        • Opcode ID: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                        • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                        • Opcode Fuzzy Hash: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                        • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                        APIs
                        • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                        • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Window$EnableShow
                        • String ID:
                        • API String ID: 1136574915-0
                        • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                        • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                        • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                        • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                        APIs
                        • GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                        • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                          • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                          • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                          • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                        • String ID:
                        • API String ID: 2547128583-0
                        • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                        • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                        • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                        • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                        APIs
                        • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405C94
                        • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: File$AttributesCreate
                        • String ID:
                        • API String ID: 415043291-0
                        • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                        • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                        • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                        • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                        APIs
                        • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405767
                        • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405775
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID:
                        • API String ID: 1375471231-0
                        • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                        • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                        • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                        • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                        APIs
                        • VirtualAllocEx.KERNELBASE(00000000), ref: 6F952AF7
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 002876f845ee85e171de3231112531a2eac83d5ac21581f9397e923e9bce414f
                        • Instruction ID: 371aae56a7d36be1d84189f634d142d7800d3bb0b05dea5d4a794beb0e35f240
                        • Opcode Fuzzy Hash: 002876f845ee85e171de3231112531a2eac83d5ac21581f9397e923e9bce414f
                        • Instruction Fuzzy Hash: 3D412C72508704DFEF60DFA8D9A0B593778FB56328F204426E504D62C1D734E5B58FA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: wsprintf
                        • String ID:
                        • API String ID: 2111968516-0
                        • Opcode ID: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                        • Instruction ID: 7f5a5d1368c13d317d2e99ee4d98356b480ceadea176dd08c5889da6900fd1c4
                        • Opcode Fuzzy Hash: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                        • Instruction Fuzzy Hash: 7E21B730D04299FADF328BA885886AEBB749F11314F1440BFE491B73D1C2BD8A85DB19
                        APIs
                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                        • Instruction ID: c16fe538d576f0a812f108a5c598968f2bbae53de2c44bc87e09c6d73b5458c5
                        • Opcode Fuzzy Hash: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                        • Instruction Fuzzy Hash: EEF01D3160852496DB20ABA54E49E5F3264DB42769B24033BF422B21D1EABC8542956E
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402749
                          • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FilePointerwsprintf
                        • String ID:
                        • API String ID: 327478801-0
                        • Opcode ID: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                        • Instruction ID: d2cb0ca5e863be2ef59b536234997f243a65a7806d73518010ac019a9530af38
                        • Opcode Fuzzy Hash: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                        • Instruction Fuzzy Hash: 7EE09271B00114EED711FBA4AE49DBF77B8EB40315B10403BF102F10C1CABC49128A2E
                        APIs
                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: PrivateProfileStringWrite
                        • String ID:
                        • API String ID: 390214022-0
                        • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                        • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                        • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                        • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                        APIs
                        • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: PathSearch
                        • String ID:
                        • API String ID: 2203818243-0
                        • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                        • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                        • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                        • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                        APIs
                        • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                        • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                        • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                        • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                        APIs
                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,00000004,00000000,00000000,00000000), ref: 00405D1C
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                        • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                        • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                        • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                        APIs
                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,00000004,00000000), ref: 00405D4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FileWrite
                        • String ID:
                        • API String ID: 3934441357-0
                        • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                        • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                        • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                        • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                        APIs
                        • VirtualProtect.KERNELBASE(6F95404C,00000004,00000040,6F95403C), ref: 6F95293F
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: c205d47e673efbdd05db3b10042fdb96e8f65c97aac00ac318f4fa4ced38b37e
                        • Instruction ID: 55ccef2797b939555da6e4242ff945f3658e1b3c99f8de081dd62cff60f382a7
                        • Opcode Fuzzy Hash: c205d47e673efbdd05db3b10042fdb96e8f65c97aac00ac318f4fa4ced38b37e
                        • Instruction Fuzzy Hash: 32F01FB150CB80DEEBE0CF7C8465A163AF0B75A275B21456AE258E6281E374907C9F51
                        APIs
                        • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402413
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: PrivateProfileString
                        • String ID:
                        • API String ID: 1096422788-0
                        • Opcode ID: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                        • Instruction ID: ec2b9ed2aa8753cc56e49b6d1f5b0ead50a941972cde74363bc07da0fbfd84e4
                        • Opcode Fuzzy Hash: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                        • Instruction Fuzzy Hash: 40E04630904208BAEB006FA08E09EAD3A79EF01710F20003AF9617B0D1E6B89482D72E
                        APIs
                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0042A070,?,?,0040600B,0042A070,?,?,?,00000002,Call), ref: 00405FA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                        • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                        • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                        • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                        APIs
                        • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                        • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                        • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                        • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                        • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                        • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                        • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                        APIs
                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                          • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                          • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                          • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                          • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                          • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406586
                          • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                          • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                        • String ID:
                        • API String ID: 2972824698-0
                        • Opcode ID: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                        • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                        • Opcode Fuzzy Hash: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                        • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                        APIs
                        • Sleep.KERNELBASE(00000000), ref: 004014E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                        • Instruction ID: c67a8691079fc4563931701ff3f7f14ff0a893aaeadd9329411c5994133067d8
                        • Opcode Fuzzy Hash: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                        • Instruction Fuzzy Hash: 0CD05E73B10100DBD720EBB8BAC485F77B8EB503253308837E402E2091E579C8424628
                        APIs
                        • GetDlgItem.USER32(?,00000403), ref: 004053BB
                        • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                        • GetClientRect.USER32(?,?), ref: 00405407
                        • GetSystemMetrics.USER32(00000002), ref: 0040540E
                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405496
                        • ShowWindow.USER32(?,00000008), ref: 004054AA
                        • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                        • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                          • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                        • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                        • CreateThread.KERNEL32(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                        • CloseHandle.KERNEL32(00000000), ref: 00405531
                        • ShowWindow.USER32(00000000), ref: 00405554
                        • ShowWindow.USER32(?,00000008), ref: 0040555B
                        • ShowWindow.USER32(00000008), ref: 004055A1
                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                        • CreatePopupMenu.USER32 ref: 004055E6
                        • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055FB
                        • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                        • OpenClipboard.USER32(00000000), ref: 00405680
                        • EmptyClipboard.USER32 ref: 00405686
                        • GlobalAlloc.KERNEL32(00000042,?), ref: 0040568F
                        • GlobalLock.KERNEL32(00000000), ref: 00405699
                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                        • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                        • SetClipboardData.USER32(00000001,00000000), ref: 004056D1
                        • CloseClipboard.USER32 ref: 004056D7
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                        • String ID:
                        • API String ID: 590372296-0
                        • Opcode ID: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                        • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                        • Opcode Fuzzy Hash: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                        • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                        APIs
                        • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                        • SetWindowTextA.USER32(00000000,?), ref: 00404686
                        • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                        • CoTaskMemFree.OLE32(00000000), ref: 00404742
                        • lstrcmpiA.KERNEL32(Call,0042A890), ref: 00404774
                        • lstrcatA.KERNEL32(?,Call), ref: 00404780
                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                          • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                          • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                          • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                          • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                          • Part of subcall function 004063D2: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                        • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,00000001,00429860,?,?,000003FB,?), ref: 00404850
                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                          • Part of subcall function 004049C4: lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                          • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                          • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                        • String ID: A$C:\Users\user\tranchet$Call
                        • API String ID: 2624150263-3194087895
                        • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                        • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                        • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                        • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                        • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                        • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                        • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                        • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                        • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                        • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                        APIs
                        • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                        • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BF3
                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C0A
                        • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C36
                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404C60
                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C7C
                        • DeleteObject.GDI32(00000110), ref: 00404C81
                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D82
                          • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,00000001,00403FE0), ref: 004041BE
                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                        • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                        • ShowWindow.USER32(?,00000005), ref: 00404DE2
                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F7B
                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                        • ImageList_Destroy.COMCTL32(?), ref: 00404FB0
                        • GlobalFree.KERNEL32(?), ref: 00404FC0
                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                        • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0040511B
                        • ShowWindow.USER32(?,00000000), ref: 00405169
                        • GetDlgItem.USER32(?,000003FE), ref: 00405174
                        • ShowWindow.USER32(00000000), ref: 0040517B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                        • String ID: $M$N
                        • API String ID: 2564846305-813528018
                        • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                        • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                        • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                        • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                        APIs
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE3
                        • ShowWindow.USER32(?), ref: 00403D00
                        • DestroyWindow.USER32 ref: 00403D14
                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                        • GetDlgItem.USER32(?,?), ref: 00403D51
                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                        • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                        • GetDlgItem.USER32(?,00000001), ref: 00403E1A
                        • GetDlgItem.USER32(?,00000002), ref: 00403E24
                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                        • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E8F
                        • GetDlgItem.USER32(?,00000003), ref: 00403F35
                        • ShowWindow.USER32(00000000,?), ref: 00403F56
                        • EnableWindow.USER32(?,?), ref: 00403F68
                        • EnableWindow.USER32(?,?), ref: 00403F83
                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F99
                        • EnableMenuItem.USER32(00000000), ref: 00403FA0
                        • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB8
                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FCB
                        • lstrlenA.KERNEL32(0042A890,?,0042A890,00000000), ref: 00403FF5
                        • SetWindowTextA.USER32(?,0042A890), ref: 00404004
                        • ShowWindow.USER32(?,0000000A), ref: 00404138
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                        • String ID:
                        • API String ID: 184305955-0
                        • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                        • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                        • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                        • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D
                        APIs
                        • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404371
                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404385
                        • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043A3
                        • GetSysColor.USER32(?), ref: 004043B4
                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                        • lstrlenA.KERNEL32(?), ref: 004043D5
                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                        • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                        • SendMessageA.USER32(00000000), ref: 0040445E
                        • GetDlgItem.USER32(?,000003E8), ref: 00404489
                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                        • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                        • SetCursor.USER32(00000000), ref: 004044E1
                        • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                        • SetCursor.USER32(00000000), ref: 004044FA
                        • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404526
                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040453A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                        • String ID: Call$N
                        • API String ID: 3103080414-3438112850
                        • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                        • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                        • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                        • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                        APIs
                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                        • BeginPaint.USER32(?,?), ref: 00401047
                        • GetClientRect.USER32(?,?), ref: 0040105B
                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                        • DeleteObject.GDI32(?), ref: 004010ED
                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                        • SelectObject.GDI32(00000000,?), ref: 00401140
                        • DrawTextA.USER32(00000000,telefaxe Setup,000000FF,00000010,00000820), ref: 00401156
                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                        • DeleteObject.GDI32(?), ref: 00401165
                        • EndPaint.USER32(?,?), ref: 0040116E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                        • String ID: F$telefaxe Setup
                        • API String ID: 941294808-1805730558
                        • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                        • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                        • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                        • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                        APIs
                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                        • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                          • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                          • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                        • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                        • wsprintfA.USER32 ref: 00405DDB
                        • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,00000004,0042CA20,?,?,?,?,?), ref: 00405E16
                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E25
                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                        • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                        • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                          • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405C94
                          • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405CB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                        • String ID: %s=%s$[Rename]
                        • API String ID: 2171350718-1727408572
                        • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                        • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                        • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                        • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                        APIs
                        • GlobalFree.KERNEL32(00000000), ref: 6F952447
                          • Part of subcall function 6F951224: lstrcpynA.KERNEL32(00000000,?,6F9512CF,-6F95404B,6F9511AB,-000000A0), ref: 6F951234
                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6F9523C2
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6F9523D7
                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6F9523E8
                        • CLSIDFromString.OLE32(00000000,00000000), ref: 6F9523F6
                        • GlobalFree.KERNEL32(00000000), ref: 6F9523FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                        • String ID: @Hmu
                        • API String ID: 3730416702-887474944
                        • Opcode ID: 9948a79587f96d39e8c0ec9c5b7d16d90c5cb08df9cc50bf7922c6791d591f96
                        • Instruction ID: ad5e78b7a1584599af3b4687e84752917a05efa9c8c924f88f499c864b664693
                        • Opcode Fuzzy Hash: 9948a79587f96d39e8c0ec9c5b7d16d90c5cb08df9cc50bf7922c6791d591f96
                        • Instruction Fuzzy Hash: B8417AB1508701EFE720CF789984B6AB7E8FB82721F10496AE555CA1D1D730E578CFA1
                        APIs
                        • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                        • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                        • CharNextA.USER32(?,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                        • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                        Strings
                        • *?|<>/":, xrefs: 0040641A
                        • "C:\Users\user\Desktop\dIPYIbWXs1.exe", xrefs: 0040640E
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004063D3
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Char$Next$Prev
                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                        • API String ID: 589700163-1701526867
                        • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                        • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                        • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                        • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                        APIs
                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DD5
                        • MulDiv.KERNEL32(000D71E2,00000064,000D8798), ref: 00402E00
                        • wsprintfA.USER32 ref: 00402E10
                        • SetWindowTextA.USER32(?,?), ref: 00402E20
                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Text$ItemTimerWindowwsprintf
                        • String ID: verifying installer: %d%%$q
                        • API String ID: 1451636040-1501980237
                        • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                        • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                        • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                        • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                        APIs
                        • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                        • GetSysColor.USER32(00000000), ref: 0040423D
                        • SetTextColor.GDI32(?,00000000), ref: 00404249
                        • SetBkMode.GDI32(?,?), ref: 00404255
                        • GetSysColor.USER32(?), ref: 00404268
                        • SetBkColor.GDI32(?,?), ref: 00404278
                        • DeleteObject.GDI32(?), ref: 00404292
                        • CreateBrushIndirect.GDI32(?), ref: 0040429C
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                        • String ID:
                        • API String ID: 2320649405-0
                        • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                        • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                        • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                        • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                        APIs
                          • Part of subcall function 6F951215: GlobalAlloc.KERNEL32(00000040,6F951233,?,6F9512CF,-6F95404B,6F9511AB,-000000A0), ref: 6F95121D
                        • GlobalFree.KERNEL32(?), ref: 6F9525DE
                        • GlobalFree.KERNEL32(00000000), ref: 6F952618
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc
                        • String ID:
                        • API String ID: 1780285237-0
                        • Opcode ID: 9ddd6711b8a0c1023e11019e95aa9005ce75920e4a14c383403123ef80c10ee5
                        • Instruction ID: 7532f147c5341a18661ffa0e0fdf8a37ea3ab2e5227498a317b8e1511382dc02
                        • Opcode Fuzzy Hash: 9ddd6711b8a0c1023e11019e95aa9005ce75920e4a14c383403123ef80c10ee5
                        • Instruction Fuzzy Hash: FF41BD72508200EFEB15CF78CC98C2A77BAEB86324B104569F50197180DB32E93ACF61
                        APIs
                        • lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                        • lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                        • lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                        • SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                        • String ID:
                        • API String ID: 2531174081-0
                        • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                        • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                        • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                        • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98
                        APIs
                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE9
                        • GetMessagePos.USER32 ref: 00404AF1
                        • ScreenToClient.USER32(?,?), ref: 00404B0B
                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Message$Send$ClientScreen
                        • String ID: f
                        • API String ID: 41195575-1993550816
                        • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                        • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                        • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                        • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                        • GlobalFree.KERNEL32(?), ref: 0040288E
                        • GlobalFree.KERNEL32(00000000), ref: 004028A1
                        • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                        • String ID:
                        • API String ID: 2667972263-0
                        • Opcode ID: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                        • Instruction ID: 50ad9526884773a844389ca9465edd1da2989015e588fa45899e7f45ead5980e
                        • Opcode Fuzzy Hash: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                        • Instruction Fuzzy Hash: 78216D72800128BBDF217FA5CE49D9E7A79EF09364F24423EF550762D1CA794D418FA8
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: FreeGlobal
                        • String ID:
                        • API String ID: 2979337801-0
                        • Opcode ID: 9f4dc4761cd2e10f8686f55e16525eb1430be424a52be6a0d22d298f56bb3fae
                        • Instruction ID: 0dbb70b12748827e0df72278222ce70227b70d89a824732517d324b7ddcd7a88
                        • Opcode Fuzzy Hash: 9f4dc4761cd2e10f8686f55e16525eb1430be424a52be6a0d22d298f56bb3fae
                        • Instruction Fuzzy Hash: 8B51E032D04258AADB62CFF8D9509AEBBB9AF43359F14025BD508A71E1C331E9F18761
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 00401D7E
                        • GetClientRect.USER32(?,?), ref: 00401DCC
                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                        • DeleteObject.GDI32(00000000), ref: 00401E20
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                        • String ID:
                        • API String ID: 1849352358-0
                        • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                        • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                        • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                        • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                        APIs
                        • lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                        • wsprintfA.USER32 ref: 00404A6A
                        • SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: ItemTextlstrlenwsprintf
                        • String ID: %u.%u%s%s
                        • API String ID: 3540041739-3551169577
                        • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                        • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                        • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                        • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                        APIs
                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A95
                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A9E
                        • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405AAF
                        Strings
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A8F
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CharPrevlstrcatlstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\
                        • API String ID: 2659869361-3081826266
                        • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                        • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                        • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                        • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                        APIs
                        • DestroyWindow.USER32(00000000,00000000,0040301B,00000001), ref: 00402E50
                        • GetTickCount.KERNEL32 ref: 00402E6E
                        • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                        • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                        • String ID:
                        • API String ID: 2102729457-0
                        • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                        • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                        • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                        • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                        APIs
                          • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,telefaxe Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                          • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                        • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405BD0
                        • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00405BE0
                        Strings
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B7D
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\
                        • API String ID: 3248276644-3081826266
                        • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                        • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                        • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                        • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                        APIs
                        • IsWindowVisible.USER32(?), ref: 004051C1
                        • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                          • Part of subcall function 004041C7: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041D9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Window$CallMessageProcSendVisible
                        • String ID:
                        • API String ID: 3748168415-3916222277
                        • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                        • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                        • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                        • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                        APIs
                        • FreeLibrary.KERNEL32(?,74DF3410,00000000,C:\Users\user\AppData\Local\Temp\,0040384D,00403667,?,?,00000007,00000009,0000000B), ref: 0040388F
                        • GlobalFree.KERNEL32(00749CD0), ref: 00403896
                        Strings
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403875
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Free$GlobalLibrary
                        • String ID: C:\Users\user\AppData\Local\Temp\
                        • API String ID: 1100898210-3081826266
                        • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                        • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                        • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                        • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                        APIs
                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\dIPYIbWXs1.exe,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405ADC
                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\dIPYIbWXs1.exe,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405AEA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: CharPrevlstrlen
                        • String ID: C:\Users\user\Desktop
                        • API String ID: 2709904686-224404859
                        • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                        • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                        • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                        • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6F95115B
                        • GlobalFree.KERNEL32(00000000), ref: 6F9511B4
                        • GlobalFree.KERNEL32(?), ref: 6F9511C7
                        • GlobalFree.KERNEL32(?), ref: 6F9511F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3600050843.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                        • Associated: 00000000.00000002.3600032576.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600066020.000000006F953000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000000.00000002.3600081673.000000006F955000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6f950000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc
                        • String ID:
                        • API String ID: 1780285237-0
                        • Opcode ID: 9257c2a51f6a2c90710dca35d617e2ed5e2bc939e0096ec4b9b0aec68e6df44b
                        • Instruction ID: e3004dc554660fe6c4bbe37d902100c99e53cc57dd9e73d61763b6264e50123b
                        • Opcode Fuzzy Hash: 9257c2a51f6a2c90710dca35d617e2ed5e2bc939e0096ec4b9b0aec68e6df44b
                        • Instruction Fuzzy Hash: 7531BEB1408644AFEF60CF78D958A667FF8FB07260B240196E855D62D0D734E8B5CF20
                        APIs
                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                        • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                        • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                        Memory Dump Source
                        • Source File: 00000000.00000002.3594653720.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3594637870.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594670912.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594687003.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3594791675.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                        Similarity
                        • API ID: lstrlen$CharNextlstrcmpi
                        • String ID:
                        • API String ID: 190613189-0
                        • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                        • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                        • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                        • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8