Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2T10XBqS6g.exe

Overview

General Information

Sample name:2T10XBqS6g.exe
(renamed file extension from bat to exe, renamed because original name is a hash value)
Original sample name:5266c53649caa9edea2f4ab58d58f511.bat
Analysis ID:1590600
MD5:5266c53649caa9edea2f4ab58d58f511
SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w7x64
  • 2T10XBqS6g.exe (PID: 3364 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.885964643.0000000002D00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 2T10XBqS6g.exeVirustotal: Detection: 33%Perma Link
    Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
    Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
    Source: 2T10XBqS6g.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00406DA00_2_00406DA0
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_695D1BFF0_2_695D1BFF
    Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal60.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,LdrInitializeThunk,SetDlgItemTextW,0_2_00404AF2
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004021AF LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,0_2_004021AF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\eftermodnendesJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsq5CC0.tmpJump to behavior
    Source: 2T10XBqS6g.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 2T10XBqS6g.exeVirustotal: Detection: 33%
    Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
    Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.885964643.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_695D1BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_695D1BFF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_695D30C0 push eax; ret 0_2_695D30EE
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_02D014E1 push ds; retf 0_2_02D014E5
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_02D044E1 push ds; retf 0_2_02D044E5
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeRDTSC instruction interceptor: First address: 2F9A302 second address: 2F9A302 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB6350B609Fh 0x00000006 cmp ax, cx 0x00000009 test ah, ah 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d test edx, 139251E6h 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4460
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4688
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_695D1BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_695D1BFF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    2T10XBqS6g.exe33%VirustotalBrowse
    2T10XBqS6g.exe32%ReversingLabsWin32.Trojan.Guloader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dll3%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError2T10XBqS6g.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1590600
      Start date and time:2025-01-14 10:40:48 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:2T10XBqS6g.exe
      (renamed file extension from bat to exe, renamed because original name is a hash value)
      Original Sample Name:5266c53649caa9edea2f4ab58d58f511.bat
      Detection:MAL
      Classification:mal60.troj.evad.winEXE@1/8@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 97%
      • Number of executed functions: 45
      • Number of non-executed functions: 35
      Cookbook Comments:
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dllZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
        https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
          RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
              CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                  SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                    D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousGuLoaderBrowse
                        UMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):25
                          Entropy (8bit):4.0536606896881855
                          Encrypted:false
                          SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                          MD5:08CA75DA54EB4810D18796C97F510A55
                          SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                          SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                          SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:[Bus Clock]..Gats=Galse..
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):1155000
                          Entropy (8bit):3.8859756205821308
                          Encrypted:false
                          SSDEEP:6144:uGCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyCe40DX7DBII0M1S9L76R:JCTw03L9ZXI4a2QGM3HkXkCX7xS9CR
                          MD5:38A7F42F627D0CFEDB0C6AA615ED9033
                          SHA1:83D88F62301313DF7684F010059F31E6DFD98F09
                          SHA-256:5997C5EE4C46C86EE31FE005BD75537E30F9DFEBB101898813142C535902DA9C
                          SHA-512:19829ACEEFBFA48E9EB68E22FB14602556EA577F8E21A4068FFF9E6C3D56837ADC6B5F560828DB2FFF4E9B62A585F0FA8E16BD20B452FFB02BB73EE293D8F8D2
                          Malicious:false
                          Reputation:low
                          Preview:H.......,...................V...,...............H...........................................................................................................................................................................................................................................G...Y...........,...j...............................................................................................................................b...................W...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):12288
                          Entropy (8bit):5.805604762622714
                          Encrypted:false
                          SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                          MD5:4ADD245D4BA34B04F213409BFE504C07
                          SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                          SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                          SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 3%, Browse
                          Joe Sandbox View:
                          • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                          • Filename: , Detection: malicious, Browse
                          • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                          • Filename: Quotation.exe, Detection: malicious, Browse
                          • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                          • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                          • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                          • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                          • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                          • Filename: UMOWA_PD.BAT.exe, Detection: malicious, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):114454
                          Entropy (8bit):1.2519787240577294
                          Encrypted:false
                          SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                          MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                          SHA1:B61AEF131017C5605647983CE2D55769914BB104
                          SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                          SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                          Malicious:false
                          Reputation:low
                          Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):310550
                          Entropy (8bit):1.2527719188567612
                          Encrypted:false
                          SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                          MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                          SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                          SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                          SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                          Malicious:false
                          Reputation:low
                          Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):309745
                          Entropy (8bit):7.569098036898635
                          Encrypted:false
                          SSDEEP:6144:5GCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyC6:kCTw03L9ZXI4a2QGM3HkX1
                          MD5:E5DB339C9BC74BBBF87F00D895C3CE7D
                          SHA1:7E81D22286BBC4F9DE3EE19632FE4393C000A19C
                          SHA-256:85BD4C3E0830FF240D546F22B590A70A78C9D273ABEDCEC034C07794A170A319
                          SHA-512:A6ECC38DD64383B6355111D7454FDE81B103601439AB7B9C83951A4CCE182031D16BE5E1096C905335E1C970942875B8CD35BFC400AF3CF470DBFE527832576F
                          Malicious:false
                          Reputation:low
                          Preview:...................................."..}}}}........&..u..44.@.......SS.........eeee.........]....................****............c..............................C.MM...........HH...................II....................{{{{......aaaa......tt...................h............a..V.............$............ee...NNN.U...Y.G........:...............................||................V.''''.....................;..W.`...GG...77.......Z.U.ll......d.iiii.WWWW................4..OO............RRRR.l..........T.................F.......................f.........i...............................22.....E........F...................;............ttt......."".......%............>>.JJJJ.~~.......................I........Q..........................S.YYY...................w..V.....|..@@.$$.<........(.'''''.....h...................WW...||.;.9999...s...&...ii..a...::::..N..........!..>....i.11.....y.....3..M..x..............oo........=...aa........0..........)...........r.........ii.............}}...........ooo...
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                          Category:dropped
                          Size (bytes):267655
                          Entropy (8bit):1.2559804952290619
                          Encrypted:false
                          SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                          MD5:F6A4342C9271CFFEF29695EEA330941E
                          SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                          SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                          SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                          Malicious:false
                          Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                          Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):133033
                          Entropy (8bit):4.593734870096358
                          Encrypted:false
                          SSDEEP:1536:sS8+1gLo/MpFTtd62wA8i0rH/SHGphackCh1Up78GsvP2Jl275nr4okWO/h:BgL6MpFberHX9JhBPBEokr
                          MD5:5571C0F9CABA24DDC31B19F2680AC58C
                          SHA1:7D80A671FCE50A911EC74C527770D6D1EC92C0FC
                          SHA-256:21B871645A5DE53B99910AC3F464A5E9C6C29715603F4975F437C2A9FF3B264A
                          SHA-512:8E33180BA9D6165C44B03B56A8224C7D0F2FBACB06102C0FD195391F2350DE648AC4CAB82D58D59D87B83519B484242061F4122082099B6595F91C090FFBEA89
                          Malicious:false
                          Preview:....>..............o.............'.............{.......TT.............b....222222.....LL.w......UU.,.....##..............||........._..........~~~~~..jj...D...MMM...............................[...j......'.................>>..ccccc............................k...........................mmm.............$$...................{.......................VV.....UUU.....33.........L.ww....LLLL...................Y........ss.*......b..........................F................n...88...l.&.....@@..........l........q.......GG.........................r.......PP..C....y......................................EE............i.......F.>...........(...........g..........{{..E........................--......................-.................;.............bb.....ssssss...WW.....WW.E..).._.....[[.NNN.........u.....X..q......IIII...qq...............xxx...pp..............x..........oo......-.................................G..............................................[.u....................OOOOO................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):7.733854525663187
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:2T10XBqS6g.exe
                          File size:578'624 bytes
                          MD5:5266c53649caa9edea2f4ab58d58f511
                          SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
                          SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
                          SHA512:3284c03bbdc622d6f4f2dfc2f77e37540e9007382e1c44cc1b98cc0aebf63c125c1560b59d429f8780a2b0d0450bd31566b946c4daa6f3c142520c25bd01e56f
                          SSDEEP:12288:UnPdMEc/A4e/wKOBwCYSUu9EEwH5IvhJGspQCZu6:EPdMEc/AN/XOBwCYSN9EEwZI6spQR6
                          TLSH:4EC4F1F6F650C267E61F0D34DA72A8F01990BC39D1D1483B43A47DADF472A62589BA0F
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                          Icon Hash:4571753721719a8d
                          Entrypoint:0x403645
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                          Instruction
                          sub esp, 000003F8h
                          push ebp
                          push esi
                          push edi
                          push 00000020h
                          pop edi
                          xor ebp, ebp
                          push 00008001h
                          mov dword ptr [esp+20h], ebp
                          mov dword ptr [esp+18h], 0040A230h
                          mov dword ptr [esp+14h], ebp
                          call dword ptr [004080A0h]
                          mov esi, dword ptr [004080A4h]
                          lea eax, dword ptr [esp+34h]
                          push eax
                          mov dword ptr [esp+4Ch], ebp
                          mov dword ptr [esp+0000014Ch], ebp
                          mov dword ptr [esp+00000150h], ebp
                          mov dword ptr [esp+38h], 0000011Ch
                          call esi
                          test eax, eax
                          jne 00007FB6350E07AAh
                          lea eax, dword ptr [esp+34h]
                          mov dword ptr [esp+34h], 00000114h
                          push eax
                          call esi
                          mov ax, word ptr [esp+48h]
                          mov ecx, dword ptr [esp+62h]
                          sub ax, 00000053h
                          add ecx, FFFFFFD0h
                          neg ax
                          sbb eax, eax
                          mov byte ptr [esp+0000014Eh], 00000004h
                          not eax
                          and eax, ecx
                          mov word ptr [esp+00000148h], ax
                          cmp dword ptr [esp+38h], 0Ah
                          jnc 00007FB6350E0778h
                          and word ptr [esp+42h], 0000h
                          mov eax, dword ptr [esp+40h]
                          movzx ecx, byte ptr [esp+3Ch]
                          mov dword ptr [00429B18h], eax
                          xor eax, eax
                          mov ah, byte ptr [esp+38h]
                          movzx eax, ax
                          or eax, ecx
                          xor ecx, ecx
                          mov ch, byte ptr [esp+00000148h]
                          movzx ecx, cx
                          shl eax, 10h
                          or eax, ecx
                          movzx ecx, byte ptr [esp+0000004Eh]
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                          RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                          RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                          RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                          RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                          RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                          RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                          RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                          RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                          RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                          RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                          RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                          RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                          RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                          RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                          RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                          RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                          DLLImport
                          ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                          SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                          ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                          USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                          KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          No network behavior found

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:04:41:45
                          Start date:14/01/2025
                          Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\2T10XBqS6g.exe"
                          Imagebase:0x400000
                          File size:578'624 bytes
                          MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.885964643.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:14.2%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:15.7%
                            Total number of Nodes:1607
                            Total number of Limit Nodes:35
                            execution_graph 5869 4047c0 5870 4047d8 5869->5870 5874 4048f2 5869->5874 5875 404601 23 API calls 5870->5875 5871 40495c 5872 404a26 5871->5872 5873 404966 GetDlgItem 5871->5873 5880 404668 8 API calls 5872->5880 5876 404980 5873->5876 5877 4049e7 5873->5877 5874->5871 5874->5872 5878 40492d GetDlgItem SendMessageW 5874->5878 5879 40483f 5875->5879 5876->5877 5881 4049a6 SendMessageW LoadCursorW SetCursor 5876->5881 5877->5872 5882 4049f9 5877->5882 5902 404623 EnableWindow 5878->5902 5884 404601 23 API calls 5879->5884 5891 404a21 5880->5891 5906 404a6f 5881->5906 5886 404a0f 5882->5886 5887 4049ff SendMessageW 5882->5887 5889 40484c CheckDlgButton 5884->5889 5886->5891 5892 404a15 SendMessageW 5886->5892 5887->5886 5888 404957 5903 404a4b 5888->5903 5900 404623 EnableWindow 5889->5900 5892->5891 5895 40486a GetDlgItem 5901 404636 SendMessageW 5895->5901 5897 404880 SendMessageW 5898 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5897->5898 5899 40489d GetSysColor 5897->5899 5898->5891 5899->5898 5900->5895 5901->5897 5902->5888 5904 404a59 5903->5904 5905 404a5e SendMessageW 5903->5905 5904->5905 5905->5871 5909 405ca8 ShellExecuteExW 5906->5909 5908 4049d5 LoadCursorW SetCursor 5908->5877 5909->5908 5285 402643 5286 402672 5285->5286 5287 402657 5285->5287 5289 4026a2 5286->5289 5290 402677 5286->5290 5288 402d89 22 API calls 5287->5288 5298 40265e 5288->5298 5292 402dab 22 API calls 5289->5292 5291 402dab 22 API calls 5290->5291 5294 40267e 5291->5294 5293 4026a9 lstrlenW 5292->5293 5293->5298 5302 4066a4 WideCharToMultiByte 5294->5302 5296 402692 lstrlenA 5296->5298 5297 4026ec 5298->5297 5300 406253 5 API calls 5298->5300 5301 4026d6 5298->5301 5299 406224 WriteFile 5299->5297 5300->5301 5301->5297 5301->5299 5302->5296 4414 403645 SetErrorMode GetVersionExW 4415 4036d1 4414->4415 4416 403699 GetVersionExW 4414->4416 4417 403728 4415->4417 4418 406a76 5 API calls 4415->4418 4416->4415 4419 406a06 3 API calls 4417->4419 4418->4417 4420 40373e lstrlenA 4419->4420 4420->4417 4421 40374e 4420->4421 4422 406a76 5 API calls 4421->4422 4423 403755 4422->4423 4424 406a76 5 API calls 4423->4424 4425 40375c 4424->4425 4426 406a76 5 API calls 4425->4426 4427 403768 #17 OleInitialize SHGetFileInfoW 4426->4427 4502 406682 lstrcpynW 4427->4502 4430 4037b7 GetCommandLineW 4503 406682 lstrcpynW 4430->4503 4432 4037c9 4433 405f7e CharNextW 4432->4433 4434 4037ef CharNextW 4433->4434 4444 403801 4434->4444 4435 403903 4436 403917 GetTempPathW 4435->4436 4504 403614 4436->4504 4438 40392f 4440 403933 GetWindowsDirectoryW lstrcatW 4438->4440 4441 403989 DeleteFileW 4438->4441 4439 405f7e CharNextW 4439->4444 4442 403614 12 API calls 4440->4442 4514 4030d5 GetTickCount GetModuleFileNameW 4441->4514 4445 40394f 4442->4445 4444->4435 4444->4439 4448 403905 4444->4448 4445->4441 4447 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4445->4447 4446 40399d 4454 405f7e CharNextW 4446->4454 4485 403a44 4446->4485 4493 403a54 4446->4493 4449 403614 12 API calls 4447->4449 4544 406682 lstrcpynW 4448->4544 4452 403981 4449->4452 4452->4441 4452->4493 4458 4039bc 4454->4458 4456 403ba2 4686 405ce2 4456->4686 4457 403bc6 4460 403c4a ExitProcess 4457->4460 4461 403bce GetCurrentProcess OpenProcessToken 4457->4461 4462 403a1a 4458->4462 4463 403a5d 4458->4463 4466 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4461->4466 4467 403c1a 4461->4467 4545 406059 4462->4545 4617 405c4d 4463->4617 4466->4467 4468 406a76 5 API calls 4467->4468 4471 403c21 4468->4471 4475 403c36 ExitWindowsEx 4471->4475 4477 403c43 4471->4477 4475->4460 4475->4477 4476 403a7c 4479 403a94 4476->4479 4621 406682 lstrcpynW 4476->4621 4690 40140b 4477->4690 4484 403aba wsprintfW 4479->4484 4499 403ae6 4479->4499 4481 403a39 4560 406682 lstrcpynW 4481->4560 4486 4066bf 22 API calls 4484->4486 4561 403d54 4485->4561 4486->4479 4489 403b30 SetCurrentDirectoryW 4667 406442 MoveFileExW 4489->4667 4490 403af6 GetFileAttributesW 4491 403b02 DeleteFileW 4490->4491 4490->4499 4491->4499 4677 403c62 4493->4677 4496 406442 41 API calls 4496->4499 4497 4066bf 22 API calls 4497->4499 4499->4479 4499->4484 4499->4489 4499->4490 4499->4493 4499->4496 4499->4497 4500 403bb8 CloseHandle 4499->4500 4622 405bd6 CreateDirectoryW 4499->4622 4625 405c30 CreateDirectoryW 4499->4625 4628 405d8e 4499->4628 4671 405c65 CreateProcessW 4499->4671 4674 4069df FindFirstFileW 4499->4674 4500->4493 4502->4430 4503->4432 4505 406930 5 API calls 4504->4505 4507 403620 4505->4507 4506 40362a 4506->4438 4507->4506 4693 405f51 lstrlenW CharPrevW 4507->4693 4510 405c30 2 API calls 4511 403638 4510->4511 4512 4061a1 2 API calls 4511->4512 4513 403643 4512->4513 4513->4438 4696 406172 GetFileAttributesW CreateFileW 4514->4696 4516 403118 4543 403125 4516->4543 4697 406682 lstrcpynW 4516->4697 4518 40313b 4698 405f9d lstrlenW 4518->4698 4522 40314c GetFileSize 4523 403163 4522->4523 4524 403246 4522->4524 4523->4524 4531 4032e3 4523->4531 4538 403033 37 API calls 4523->4538 4523->4543 4734 4035e7 4523->4734 4703 403033 4524->4703 4528 40328b GlobalAlloc 4529 4032a2 4528->4529 4534 4061a1 2 API calls 4529->4534 4532 403033 37 API calls 4531->4532 4532->4543 4533 40326c 4535 4035e7 ReadFile 4533->4535 4536 4032b3 CreateFileW 4534->4536 4537 403277 4535->4537 4539 4032ed 4536->4539 4536->4543 4537->4528 4537->4543 4538->4523 4718 4035fd SetFilePointer 4539->4718 4541 4032fb 4719 403376 4541->4719 4543->4446 4543->4543 4544->4436 4781 406682 lstrcpynW 4545->4781 4547 40606a 4782 405ffc CharNextW CharNextW 4547->4782 4550 403a26 4550->4493 4559 406682 lstrcpynW 4550->4559 4551 406930 5 API calls 4557 406080 4551->4557 4552 4060b1 lstrlenW 4553 4060bc 4552->4553 4552->4557 4555 405f51 3 API calls 4553->4555 4554 4069df 2 API calls 4554->4557 4556 4060c1 GetFileAttributesW 4555->4556 4556->4550 4557->4550 4557->4552 4557->4554 4558 405f9d 2 API calls 4557->4558 4558->4552 4559->4481 4560->4485 4562 406a76 5 API calls 4561->4562 4563 403d68 4562->4563 4564 403d80 4563->4564 4565 403d6e 4563->4565 4566 406550 3 API calls 4564->4566 4788 4065c9 wsprintfW 4565->4788 4567 403db0 4566->4567 4568 403dcf lstrcatW 4567->4568 4571 406550 3 API calls 4567->4571 4570 403d7e 4568->4570 4789 40402a 4570->4789 4571->4568 4574 406059 18 API calls 4575 403e01 4574->4575 4576 403e95 4575->4576 4579 406550 3 API calls 4575->4579 4577 406059 18 API calls 4576->4577 4578 403e9b 4577->4578 4580 403eab LoadImageW 4578->4580 4582 4066bf 22 API calls 4578->4582 4581 403e33 4579->4581 4583 403f51 4580->4583 4584 403ed2 RegisterClassW 4580->4584 4581->4576 4585 403e54 lstrlenW 4581->4585 4588 405f7e CharNextW 4581->4588 4582->4580 4587 40140b 2 API calls 4583->4587 4586 403f08 SystemParametersInfoW CreateWindowExW 4584->4586 4616 403f5b 4584->4616 4589 403e62 lstrcmpiW 4585->4589 4590 403e88 4585->4590 4586->4583 4591 403f57 4587->4591 4592 403e51 4588->4592 4589->4590 4593 403e72 GetFileAttributesW 4589->4593 4594 405f51 3 API calls 4590->4594 4596 40402a 23 API calls 4591->4596 4591->4616 4592->4585 4595 403e7e 4593->4595 4597 403e8e 4594->4597 4595->4590 4598 405f9d 2 API calls 4595->4598 4599 403f68 4596->4599 4797 406682 lstrcpynW 4597->4797 4598->4590 4601 403f74 ShowWindow 4599->4601 4602 403ff7 4599->4602 4604 406a06 3 API calls 4601->4604 4798 4057da OleInitialize 4602->4798 4606 403f8c 4604->4606 4605 403ffd 4608 404001 4605->4608 4609 404019 4605->4609 4607 403f9a GetClassInfoW 4606->4607 4610 406a06 3 API calls 4606->4610 4612 403fc4 DialogBoxParamW 4607->4612 4613 403fae GetClassInfoW RegisterClassW 4607->4613 4615 40140b 2 API calls 4608->4615 4608->4616 4611 40140b 2 API calls 4609->4611 4610->4607 4611->4616 4614 40140b 2 API calls 4612->4614 4613->4612 4614->4616 4615->4616 4616->4493 4618 406a76 5 API calls 4617->4618 4619 403a62 lstrlenW 4618->4619 4620 406682 lstrcpynW 4619->4620 4620->4476 4621->4479 4623 405c26 GetLastError 4622->4623 4624 405c22 4622->4624 4623->4624 4624->4499 4626 405c44 GetLastError 4625->4626 4627 405c40 4625->4627 4626->4627 4627->4499 4629 406059 18 API calls 4628->4629 4630 405dae 4629->4630 4631 405db6 DeleteFileW 4630->4631 4632 405dcd 4630->4632 4633 405f04 4631->4633 4634 405ef8 4632->4634 4816 406682 lstrcpynW 4632->4816 4633->4499 4634->4633 4639 4069df 2 API calls 4634->4639 4636 405df3 4637 405e06 4636->4637 4638 405df9 lstrcatW 4636->4638 4641 405f9d 2 API calls 4637->4641 4640 405e0c 4638->4640 4642 405f12 4639->4642 4643 405e1c lstrcatW 4640->4643 4644 405e27 lstrlenW FindFirstFileW 4640->4644 4641->4640 4642->4633 4645 405f16 4642->4645 4643->4644 4646 405eed 4644->4646 4656 405e49 4644->4656 4647 405f51 3 API calls 4645->4647 4646->4634 4648 405f1c 4647->4648 4650 405d46 5 API calls 4648->4650 4649 405ed0 FindNextFileW 4653 405ee6 FindClose 4649->4653 4649->4656 4652 405f28 4650->4652 4654 405f42 4652->4654 4655 405f2c 4652->4655 4653->4646 4658 405707 29 API calls 4654->4658 4655->4633 4659 405707 29 API calls 4655->4659 4656->4649 4660 405d8e 65 API calls 4656->4660 4662 405707 29 API calls 4656->4662 4664 405707 29 API calls 4656->4664 4666 406442 41 API calls 4656->4666 4817 406682 lstrcpynW 4656->4817 4818 405d46 4656->4818 4658->4633 4661 405f39 4659->4661 4660->4656 4663 406442 41 API calls 4661->4663 4662->4649 4665 405f40 4663->4665 4664->4656 4665->4633 4666->4656 4668 403b3f CopyFileW 4667->4668 4669 406456 4667->4669 4668->4493 4668->4499 4829 4062c8 4669->4829 4672 405ca4 4671->4672 4673 405c98 CloseHandle 4671->4673 4672->4499 4673->4672 4675 406a00 4674->4675 4676 4069f5 FindClose 4674->4676 4675->4499 4676->4675 4678 403c73 CloseHandle 4677->4678 4679 403c7d 4677->4679 4678->4679 4680 403c91 4679->4680 4681 403c87 CloseHandle 4679->4681 4863 403cbf 4680->4863 4681->4680 4684 405d8e 72 API calls 4685 403b95 OleUninitialize 4684->4685 4685->4456 4685->4457 4687 405cf7 4686->4687 4688 403bb0 ExitProcess 4687->4688 4689 405d0b MessageBoxIndirectW 4687->4689 4689->4688 4691 401389 2 API calls 4690->4691 4692 401420 4691->4692 4692->4460 4694 403632 4693->4694 4695 405f6d lstrcatW 4693->4695 4694->4510 4695->4694 4696->4516 4697->4518 4699 405fab 4698->4699 4700 405fb1 CharPrevW 4699->4700 4701 403141 4699->4701 4700->4699 4700->4701 4702 406682 lstrcpynW 4701->4702 4702->4522 4704 403044 4703->4704 4705 40305c 4703->4705 4708 403054 4704->4708 4709 40304d DestroyWindow 4704->4709 4706 403064 4705->4706 4707 40306c GetTickCount 4705->4707 4738 406ab2 4706->4738 4707->4708 4711 40307a 4707->4711 4708->4528 4708->4543 4737 4035fd SetFilePointer 4708->4737 4709->4708 4712 403082 4711->4712 4713 4030af CreateDialogParamW ShowWindow 4711->4713 4712->4708 4742 403017 4712->4742 4713->4708 4715 403090 wsprintfW 4745 405707 4715->4745 4718->4541 4720 4033a1 4719->4720 4721 403385 SetFilePointer 4719->4721 4756 40347e GetTickCount 4720->4756 4721->4720 4724 40343e 4724->4543 4727 40347e 47 API calls 4728 4033d8 4727->4728 4728->4724 4729 403444 ReadFile 4728->4729 4731 4033e7 4728->4731 4729->4724 4731->4724 4732 4061f5 ReadFile 4731->4732 4771 406224 WriteFile 4731->4771 4732->4731 4735 4061f5 ReadFile 4734->4735 4736 4035fa 4735->4736 4736->4523 4737->4533 4739 406acf PeekMessageW 4738->4739 4740 406ac5 DispatchMessageW 4739->4740 4741 406adf 4739->4741 4740->4739 4741->4708 4743 403026 4742->4743 4744 403028 MulDiv 4742->4744 4743->4744 4744->4715 4746 4030ad 4745->4746 4747 405722 4745->4747 4746->4708 4748 40573e lstrlenW 4747->4748 4749 4066bf 22 API calls 4747->4749 4750 405767 4748->4750 4751 40574c lstrlenW 4748->4751 4749->4748 4753 40577a 4750->4753 4754 40576d SetWindowTextW 4750->4754 4751->4746 4752 40575e lstrcatW 4751->4752 4752->4750 4753->4746 4755 405780 SendMessageW SendMessageW SendMessageW 4753->4755 4754->4753 4755->4746 4757 4035d6 4756->4757 4758 4034ac 4756->4758 4759 403033 37 API calls 4757->4759 4773 4035fd SetFilePointer 4758->4773 4765 4033a8 4759->4765 4761 4034b7 SetFilePointer 4767 4034dc 4761->4767 4762 4035e7 ReadFile 4762->4767 4764 403033 37 API calls 4764->4767 4765->4724 4769 4061f5 ReadFile 4765->4769 4766 406224 WriteFile 4766->4767 4767->4762 4767->4764 4767->4765 4767->4766 4768 4035b7 SetFilePointer 4767->4768 4774 406bf1 4767->4774 4768->4757 4770 4033c1 4769->4770 4770->4724 4770->4727 4772 406242 4771->4772 4772->4731 4773->4761 4775 406c16 4774->4775 4778 406c1e 4774->4778 4775->4767 4776 406ca5 GlobalFree 4777 406cae GlobalAlloc 4776->4777 4777->4775 4777->4778 4778->4775 4778->4776 4778->4777 4779 406d25 GlobalAlloc 4778->4779 4780 406d1c GlobalFree 4778->4780 4779->4775 4779->4778 4780->4779 4781->4547 4783 406019 4782->4783 4787 40602b 4782->4787 4785 406026 CharNextW 4783->4785 4783->4787 4784 40604f 4784->4550 4784->4551 4785->4784 4786 405f7e CharNextW 4786->4787 4787->4784 4787->4786 4788->4570 4790 40403e 4789->4790 4805 4065c9 wsprintfW 4790->4805 4792 4040af 4806 4040e3 4792->4806 4794 403ddf 4794->4574 4795 4040b4 4795->4794 4796 4066bf 22 API calls 4795->4796 4796->4795 4797->4576 4809 40464d 4798->4809 4800 4057fd 4804 405824 4800->4804 4812 401389 4800->4812 4801 40464d SendMessageW 4802 405836 OleUninitialize 4801->4802 4802->4605 4804->4801 4805->4792 4807 4066bf 22 API calls 4806->4807 4808 4040f1 SetWindowTextW 4807->4808 4808->4795 4810 404665 4809->4810 4811 404656 SendMessageW 4809->4811 4810->4800 4811->4810 4814 401390 4812->4814 4813 4013fe 4813->4800 4814->4813 4815 4013cb MulDiv SendMessageW 4814->4815 4815->4814 4816->4636 4817->4656 4826 40614d GetFileAttributesW 4818->4826 4821 405d61 RemoveDirectoryW 4823 405d6f 4821->4823 4822 405d69 DeleteFileW 4822->4823 4824 405d73 4823->4824 4825 405d7f SetFileAttributesW 4823->4825 4824->4656 4825->4824 4827 405d52 4826->4827 4828 40615f SetFileAttributesW 4826->4828 4827->4821 4827->4822 4827->4824 4828->4827 4830 4062f8 4829->4830 4831 40631e GetShortPathNameW 4829->4831 4856 406172 GetFileAttributesW CreateFileW 4830->4856 4833 406333 4831->4833 4834 40643d 4831->4834 4833->4834 4836 40633b wsprintfA 4833->4836 4834->4668 4835 406302 CloseHandle GetShortPathNameW 4835->4834 4837 406316 4835->4837 4838 4066bf 22 API calls 4836->4838 4837->4831 4837->4834 4839 406363 4838->4839 4857 406172 GetFileAttributesW CreateFileW 4839->4857 4841 406370 4841->4834 4842 40637f GetFileSize GlobalAlloc 4841->4842 4843 4063a1 4842->4843 4844 406436 CloseHandle 4842->4844 4845 4061f5 ReadFile 4843->4845 4844->4834 4846 4063a9 4845->4846 4846->4844 4858 4060d7 lstrlenA 4846->4858 4849 4063c0 lstrcpyA 4852 4063e2 4849->4852 4850 4063d4 4851 4060d7 4 API calls 4850->4851 4851->4852 4853 406419 SetFilePointer 4852->4853 4854 406224 WriteFile 4853->4854 4855 40642f GlobalFree 4854->4855 4855->4844 4856->4835 4857->4841 4859 406118 lstrlenA 4858->4859 4860 406120 4859->4860 4861 4060f1 lstrcmpiA 4859->4861 4860->4849 4860->4850 4861->4860 4862 40610f CharNextA 4861->4862 4862->4859 4864 403ccd 4863->4864 4865 403c96 4864->4865 4866 403cd2 FreeLibrary GlobalFree 4864->4866 4865->4684 4866->4865 4866->4866 5303 695d1058 5305 695d1074 5303->5305 5304 695d10dd 5305->5304 5307 695d1092 5305->5307 5316 695d15b6 5305->5316 5308 695d15b6 GlobalFree 5307->5308 5309 695d10a2 5308->5309 5310 695d10a9 GlobalSize 5309->5310 5311 695d10b2 5309->5311 5310->5311 5312 695d10c7 5311->5312 5313 695d10b6 GlobalAlloc 5311->5313 5315 695d10d2 GlobalFree 5312->5315 5314 695d15dd 3 API calls 5313->5314 5314->5312 5315->5304 5318 695d15bc 5316->5318 5317 695d15c2 5317->5307 5318->5317 5319 695d15ce GlobalFree 5318->5319 5319->5307 4873 4015c6 4874 402dab 22 API calls 4873->4874 4875 4015cd 4874->4875 4876 405ffc 4 API calls 4875->4876 4890 4015d6 4876->4890 4877 401636 4879 401668 4877->4879 4880 40163b 4877->4880 4878 405f7e CharNextW 4878->4890 4882 401423 29 API calls 4879->4882 4892 401423 4880->4892 4888 401660 4882->4888 4884 405c30 2 API calls 4884->4890 4886 405c4d 5 API calls 4886->4890 4887 40164f SetCurrentDirectoryW 4887->4888 4889 40161c GetFileAttributesW 4889->4890 4890->4877 4890->4878 4890->4884 4890->4886 4890->4889 4891 405bd6 2 API calls 4890->4891 4891->4890 4893 405707 29 API calls 4892->4893 4894 401431 4893->4894 4895 406682 lstrcpynW 4894->4895 4895->4887 5320 405846 5321 4059f0 5320->5321 5322 405867 GetDlgItem GetDlgItem GetDlgItem 5320->5322 5323 4059f9 GetDlgItem CreateThread CloseHandle 5321->5323 5326 405a21 5321->5326 5365 404636 SendMessageW 5322->5365 5323->5326 5325 4058d7 5331 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5325->5331 5327 405a4c 5326->5327 5328 405a71 5326->5328 5329 405a38 ShowWindow ShowWindow 5326->5329 5330 405aac 5327->5330 5333 405a60 5327->5333 5334 405a86 ShowWindow 5327->5334 5374 404668 5328->5374 5370 404636 SendMessageW 5329->5370 5330->5328 5338 405aba SendMessageW 5330->5338 5336 405930 SendMessageW SendMessageW 5331->5336 5337 40594c 5331->5337 5371 4045da 5333->5371 5341 405aa6 5334->5341 5342 405a98 5334->5342 5336->5337 5344 405951 SendMessageW 5337->5344 5345 40595f 5337->5345 5340 405a7f 5338->5340 5346 405ad3 CreatePopupMenu 5338->5346 5343 4045da SendMessageW 5341->5343 5347 405707 29 API calls 5342->5347 5343->5330 5344->5345 5366 404601 5345->5366 5348 4066bf 22 API calls 5346->5348 5347->5341 5350 405ae3 AppendMenuW 5348->5350 5352 405b00 GetWindowRect 5350->5352 5353 405b13 TrackPopupMenu 5350->5353 5351 40596f 5354 405978 ShowWindow 5351->5354 5355 4059ac GetDlgItem SendMessageW 5351->5355 5352->5353 5353->5340 5356 405b2e 5353->5356 5357 40599b 5354->5357 5358 40598e ShowWindow 5354->5358 5355->5340 5359 4059d3 SendMessageW SendMessageW 5355->5359 5360 405b4a SendMessageW 5356->5360 5369 404636 SendMessageW 5357->5369 5358->5357 5359->5340 5360->5360 5361 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5360->5361 5363 405b8c SendMessageW 5361->5363 5363->5363 5364 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5363->5364 5364->5340 5365->5325 5367 4066bf 22 API calls 5366->5367 5368 40460c SetDlgItemTextW 5367->5368 5368->5351 5369->5355 5370->5327 5372 4045e1 5371->5372 5373 4045e7 SendMessageW 5371->5373 5372->5373 5373->5328 5375 40472b 5374->5375 5376 404680 GetWindowLongW 5374->5376 5375->5340 5376->5375 5377 404695 5376->5377 5377->5375 5378 4046c2 GetSysColor 5377->5378 5379 4046c5 5377->5379 5378->5379 5380 4046d5 SetBkMode 5379->5380 5381 4046cb SetTextColor 5379->5381 5382 4046f3 5380->5382 5383 4046ed GetSysColor 5380->5383 5381->5380 5384 404704 5382->5384 5385 4046fa SetBkColor 5382->5385 5383->5382 5384->5375 5386 404717 DeleteObject 5384->5386 5387 40471e CreateBrushIndirect 5384->5387 5385->5384 5386->5387 5387->5375 4896 401c48 4897 402d89 22 API calls 4896->4897 4898 401c4f 4897->4898 4899 402d89 22 API calls 4898->4899 4900 401c5c 4899->4900 4901 401c71 4900->4901 4902 402dab 22 API calls 4900->4902 4903 402dab 22 API calls 4901->4903 4906 401c81 4901->4906 4902->4901 4903->4906 4904 401cd8 4908 402dab 22 API calls 4904->4908 4905 401c8c 4907 402d89 22 API calls 4905->4907 4906->4904 4906->4905 4909 401c91 4907->4909 4910 401cdd 4908->4910 4911 402d89 22 API calls 4909->4911 4912 402dab 22 API calls 4910->4912 4913 401c9d 4911->4913 4914 401ce6 FindWindowExW 4912->4914 4915 401cc8 SendMessageW 4913->4915 4916 401caa SendMessageTimeoutW 4913->4916 4917 401d08 4914->4917 4915->4917 4916->4917 5388 404e48 5389 404e74 5388->5389 5390 404e58 5388->5390 5392 404ea7 5389->5392 5393 404e7a SHGetPathFromIDListW 5389->5393 5399 405cc6 GetDlgItemTextW 5390->5399 5395 404e91 SendMessageW 5393->5395 5396 404e8a 5393->5396 5394 404e65 SendMessageW 5394->5389 5395->5392 5398 40140b 2 API calls 5396->5398 5398->5395 5399->5394 5910 4028c9 5911 4028cf 5910->5911 5912 4028d7 FindClose 5911->5912 5913 402c2f 5911->5913 5912->5913 5917 4016d1 5918 402dab 22 API calls 5917->5918 5919 4016d7 GetFullPathNameW 5918->5919 5920 4016f1 5919->5920 5926 401713 5919->5926 5923 4069df 2 API calls 5920->5923 5920->5926 5921 401728 GetShortPathNameW 5922 402c2f 5921->5922 5924 401703 5923->5924 5924->5926 5927 406682 lstrcpynW 5924->5927 5926->5921 5926->5922 5927->5926 5400 401e53 GetDC 5401 402d89 22 API calls 5400->5401 5402 401e65 GetDeviceCaps MulDiv ReleaseDC 5401->5402 5403 402d89 22 API calls 5402->5403 5404 401e96 5403->5404 5405 4066bf 22 API calls 5404->5405 5406 401ed3 CreateFontIndirectW 5405->5406 5407 40263d 5406->5407 5942 4014d7 5943 402d89 22 API calls 5942->5943 5944 4014dd Sleep 5943->5944 5946 402c2f 5944->5946 5408 40195b 5409 402dab 22 API calls 5408->5409 5410 401962 lstrlenW 5409->5410 5411 40263d 5410->5411 5091 4020dd 5092 4021a1 5091->5092 5093 4020ef 5091->5093 5095 401423 29 API calls 5092->5095 5094 402dab 22 API calls 5093->5094 5096 4020f6 5094->5096 5101 4022fb 5095->5101 5097 402dab 22 API calls 5096->5097 5098 4020ff 5097->5098 5099 402115 LoadLibraryExW 5098->5099 5100 402107 GetModuleHandleW 5098->5100 5099->5092 5102 402126 5099->5102 5100->5099 5100->5102 5114 406ae5 5102->5114 5105 402170 5107 405707 29 API calls 5105->5107 5106 402137 5108 402156 5106->5108 5109 40213f 5106->5109 5111 402147 5107->5111 5119 695d1817 5108->5119 5110 401423 29 API calls 5109->5110 5110->5111 5111->5101 5112 402193 FreeLibrary 5111->5112 5112->5101 5161 4066a4 WideCharToMultiByte 5114->5161 5116 406b02 5117 406b09 GetProcAddress 5116->5117 5118 402131 5116->5118 5117->5118 5118->5105 5118->5106 5120 695d184a 5119->5120 5162 695d1bff 5120->5162 5122 695d1851 5123 695d1976 5122->5123 5124 695d1869 5122->5124 5125 695d1862 5122->5125 5123->5111 5196 695d2480 5124->5196 5212 695d243e 5125->5212 5130 695d18cd 5134 695d191e 5130->5134 5135 695d18d3 5130->5135 5131 695d18af 5225 695d2655 5131->5225 5132 695d187f 5137 695d1885 5132->5137 5143 695d1890 5132->5143 5133 695d1898 5144 695d188e 5133->5144 5222 695d2e23 5133->5222 5141 695d2655 10 API calls 5134->5141 5244 695d1666 5135->5244 5137->5144 5206 695d2b98 5137->5206 5147 695d190f 5141->5147 5142 695d18b5 5236 695d1654 5142->5236 5216 695d2810 5143->5216 5144->5130 5144->5131 5153 695d1965 5147->5153 5250 695d2618 5147->5250 5149 695d1896 5149->5144 5150 695d2655 10 API calls 5150->5147 5153->5123 5155 695d196f GlobalFree 5153->5155 5155->5123 5158 695d1951 5158->5153 5254 695d15dd wsprintfW 5158->5254 5159 695d194a FreeLibrary 5159->5158 5161->5116 5257 695d12bb GlobalAlloc 5162->5257 5164 695d1c26 5258 695d12bb GlobalAlloc 5164->5258 5166 695d1e6b GlobalFree GlobalFree GlobalFree 5168 695d1e88 5166->5168 5182 695d1ed2 5166->5182 5167 695d1c31 5167->5166 5169 695d1d26 GlobalAlloc 5167->5169 5172 695d21ae 5167->5172 5175 695d1d71 lstrcpyW 5167->5175 5176 695d1d8f GlobalFree 5167->5176 5179 695d1d7b lstrcpyW 5167->5179 5181 695d2126 5167->5181 5167->5182 5187 695d2067 GlobalFree 5167->5187 5188 695d1dcd 5167->5188 5191 695d12cc 2 API calls 5167->5191 5170 695d227e 5168->5170 5177 695d1e9d 5168->5177 5168->5182 5169->5167 5171 695d22a0 GetModuleHandleW 5170->5171 5170->5182 5173 695d22c6 5171->5173 5174 695d22b1 LoadLibraryW 5171->5174 5172->5182 5193 695d2216 lstrcpyW 5172->5193 5265 695d16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5173->5265 5174->5173 5174->5182 5175->5179 5176->5167 5177->5182 5261 695d12cc 5177->5261 5179->5167 5180 695d2318 5180->5182 5185 695d2325 lstrlenW 5180->5185 5264 695d12bb GlobalAlloc 5181->5264 5182->5122 5266 695d16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5185->5266 5187->5167 5188->5167 5259 695d162f GlobalSize GlobalAlloc 5188->5259 5189 695d22d8 5189->5180 5194 695d2302 GetProcAddress 5189->5194 5190 695d233f 5190->5182 5191->5167 5193->5182 5194->5180 5195 695d212f 5195->5122 5198 695d2498 5196->5198 5197 695d12cc GlobalAlloc lstrcpynW 5197->5198 5198->5197 5200 695d25c1 GlobalFree 5198->5200 5202 695d256b GlobalAlloc CLSIDFromString 5198->5202 5203 695d2540 GlobalAlloc WideCharToMultiByte 5198->5203 5205 695d258a 5198->5205 5268 695d135a 5198->5268 5200->5198 5201 695d186f 5200->5201 5201->5132 5201->5133 5201->5144 5202->5200 5203->5200 5205->5200 5272 695d27a4 5205->5272 5208 695d2baa 5206->5208 5207 695d2c4f ReadFile 5209 695d2c6d 5207->5209 5208->5207 5275 695d2b42 5209->5275 5211 695d2d39 5211->5144 5213 695d2453 5212->5213 5214 695d245e GlobalAlloc 5213->5214 5215 695d1868 5213->5215 5214->5213 5215->5124 5220 695d2840 5216->5220 5217 695d28ee 5219 695d28f4 GlobalSize 5217->5219 5221 695d28fe 5217->5221 5218 695d28db GlobalAlloc 5218->5221 5219->5221 5220->5217 5220->5218 5221->5149 5223 695d2e2e 5222->5223 5224 695d2e6e GlobalFree 5223->5224 5279 695d12bb GlobalAlloc 5225->5279 5227 695d26d8 MultiByteToWideChar 5230 695d265f 5227->5230 5228 695d270b lstrcpynW 5228->5230 5229 695d26fa StringFromGUID2 5229->5230 5230->5227 5230->5228 5230->5229 5231 695d2742 GlobalFree 5230->5231 5232 695d271e wsprintfW 5230->5232 5233 695d2777 GlobalFree 5230->5233 5234 695d1312 2 API calls 5230->5234 5280 695d1381 5230->5280 5231->5230 5232->5230 5233->5142 5234->5230 5284 695d12bb GlobalAlloc 5236->5284 5238 695d1659 5239 695d1666 2 API calls 5238->5239 5240 695d1663 5239->5240 5241 695d1312 5240->5241 5242 695d131b GlobalAlloc lstrcpynW 5241->5242 5243 695d1355 GlobalFree 5241->5243 5242->5243 5243->5147 5245 695d169f lstrcpyW 5244->5245 5246 695d1672 wsprintfW 5244->5246 5249 695d16b8 5245->5249 5246->5249 5249->5150 5251 695d2626 5250->5251 5253 695d1931 5250->5253 5252 695d2642 GlobalFree 5251->5252 5251->5253 5252->5251 5253->5158 5253->5159 5255 695d1312 2 API calls 5254->5255 5256 695d15fe 5255->5256 5256->5153 5257->5164 5258->5167 5260 695d164d 5259->5260 5260->5188 5267 695d12bb GlobalAlloc 5261->5267 5263 695d12db lstrcpynW 5263->5182 5264->5195 5265->5189 5266->5190 5267->5263 5269 695d1361 5268->5269 5270 695d12cc 2 API calls 5269->5270 5271 695d137f 5270->5271 5271->5198 5273 695d2808 5272->5273 5274 695d27b2 VirtualAlloc 5272->5274 5273->5205 5274->5273 5276 695d2b4d 5275->5276 5277 695d2b5d 5276->5277 5278 695d2b52 GetLastError 5276->5278 5277->5211 5278->5277 5279->5230 5281 695d13ac 5280->5281 5282 695d138a 5280->5282 5281->5230 5282->5281 5283 695d1390 lstrcpyW 5282->5283 5283->5281 5284->5238 5419 695d2d43 5420 695d2d5b 5419->5420 5421 695d162f 2 API calls 5420->5421 5422 695d2d76 5421->5422 5423 402b5e 5424 402bb0 5423->5424 5425 402b65 5423->5425 5427 406a76 5 API calls 5424->5427 5426 402bae 5425->5426 5428 402d89 22 API calls 5425->5428 5429 402bb7 5427->5429 5430 402b73 5428->5430 5431 402dab 22 API calls 5429->5431 5432 402d89 22 API calls 5430->5432 5433 402bc0 5431->5433 5436 402b7f 5432->5436 5433->5426 5434 402bc4 IIDFromString 5433->5434 5434->5426 5435 402bd3 5434->5435 5435->5426 5441 406682 lstrcpynW 5435->5441 5440 4065c9 wsprintfW 5436->5440 5439 402bf0 CoTaskMemFree 5439->5426 5440->5426 5441->5439 5442 402a60 5443 402d89 22 API calls 5442->5443 5444 402a66 5443->5444 5445 402aa9 5444->5445 5446 402a8d 5444->5446 5455 402933 5444->5455 5447 402ac3 5445->5447 5448 402ab3 5445->5448 5449 402a92 5446->5449 5450 402aa3 5446->5450 5452 4066bf 22 API calls 5447->5452 5451 402d89 22 API calls 5448->5451 5456 406682 lstrcpynW 5449->5456 5457 4065c9 wsprintfW 5450->5457 5451->5455 5452->5455 5456->5455 5457->5455 4323 401761 4329 402dab 4323->4329 4327 40176f 4328 4061a1 2 API calls 4327->4328 4328->4327 4330 402db7 4329->4330 4339 4066bf 4330->4339 4333 401768 4335 4061a1 4333->4335 4336 4061ae GetTickCount GetTempFileNameW 4335->4336 4337 4061e8 4336->4337 4338 4061e4 4336->4338 4337->4327 4338->4336 4338->4337 4355 4066ca 4339->4355 4340 406911 4341 402dd8 4340->4341 4379 406682 lstrcpynW 4340->4379 4341->4333 4357 406930 4341->4357 4343 4068e2 lstrlenW 4343->4355 4347 4066bf 15 API calls 4347->4343 4348 4067db GetSystemDirectoryW 4348->4355 4349 4067f1 GetWindowsDirectoryW 4349->4355 4350 406930 5 API calls 4350->4355 4351 406827 SHGetFolderPathW 4351->4355 4352 4066bf 15 API calls 4352->4355 4353 406883 lstrcatW 4353->4355 4355->4340 4355->4343 4355->4347 4355->4348 4355->4349 4355->4350 4355->4351 4355->4352 4355->4353 4356 406853 SHGetPathFromIDListW CoTaskMemFree 4355->4356 4366 406550 4355->4366 4371 406a76 GetModuleHandleA 4355->4371 4377 4065c9 wsprintfW 4355->4377 4378 406682 lstrcpynW 4355->4378 4356->4355 4363 40693d 4357->4363 4358 4069b3 4359 4069b8 CharPrevW 4358->4359 4362 4069d9 4358->4362 4359->4358 4360 4069a6 CharNextW 4360->4358 4360->4363 4362->4333 4363->4358 4363->4360 4364 406992 CharNextW 4363->4364 4365 4069a1 CharNextW 4363->4365 4387 405f7e 4363->4387 4364->4363 4365->4360 4380 4064ef 4366->4380 4369 4065b4 4369->4355 4370 406584 RegQueryValueExW RegCloseKey 4370->4369 4372 406a92 4371->4372 4373 406a9c GetProcAddress 4371->4373 4384 406a06 GetSystemDirectoryW 4372->4384 4376 406aab 4373->4376 4375 406a98 4375->4373 4375->4376 4376->4355 4377->4355 4378->4355 4379->4341 4381 4064fe 4380->4381 4382 406502 4381->4382 4383 406507 RegOpenKeyExW 4381->4383 4382->4369 4382->4370 4383->4382 4385 406a28 wsprintfW LoadLibraryExW 4384->4385 4385->4375 4388 405f84 4387->4388 4389 405f9a 4388->4389 4390 405f8b CharNextW 4388->4390 4389->4363 4390->4388 4391 695d2a7f 4392 695d2acf 4391->4392 4393 695d2a8f VirtualProtect 4391->4393 4393->4392 5458 401d62 5459 402d89 22 API calls 5458->5459 5460 401d73 SetWindowLongW 5459->5460 5461 402c2f 5460->5461 5947 4028e3 5948 4028eb 5947->5948 5949 4028ef FindNextFileW 5948->5949 5951 402901 5948->5951 5950 402948 5949->5950 5949->5951 5953 406682 lstrcpynW 5950->5953 5953->5951 5462 695d1979 5463 695d199c 5462->5463 5464 695d19d1 GlobalFree 5463->5464 5465 695d19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5463->5465 5464->5465 5466 695d1312 2 API calls 5465->5466 5467 695d1b6e GlobalFree GlobalFree 5466->5467 5468 401568 5469 402ba9 5468->5469 5472 4065c9 wsprintfW 5469->5472 5471 402bae 5472->5471 5473 695d1774 5474 695d17a3 5473->5474 5475 695d1bff 22 API calls 5474->5475 5476 695d17aa 5475->5476 5477 695d17bd 5476->5477 5478 695d17b1 5476->5478 5480 695d17e4 5477->5480 5481 695d17c7 5477->5481 5479 695d1312 2 API calls 5478->5479 5485 695d17bb 5479->5485 5483 695d180e 5480->5483 5484 695d17ea 5480->5484 5482 695d15dd 3 API calls 5481->5482 5486 695d17cc 5482->5486 5488 695d15dd 3 API calls 5483->5488 5487 695d1654 3 API calls 5484->5487 5489 695d1654 3 API calls 5486->5489 5490 695d17ef 5487->5490 5488->5485 5491 695d17d2 5489->5491 5492 695d1312 2 API calls 5490->5492 5493 695d1312 2 API calls 5491->5493 5494 695d17f5 GlobalFree 5492->5494 5495 695d17d8 GlobalFree 5493->5495 5494->5485 5496 695d1809 GlobalFree 5494->5496 5495->5485 5496->5485 5497 40196d 5498 402d89 22 API calls 5497->5498 5499 401974 5498->5499 5500 402d89 22 API calls 5499->5500 5501 401981 5500->5501 5502 402dab 22 API calls 5501->5502 5503 401998 lstrlenW 5502->5503 5505 4019a9 5503->5505 5504 4019ea 5505->5504 5509 406682 lstrcpynW 5505->5509 5507 4019da 5507->5504 5508 4019df lstrlenW 5507->5508 5508->5504 5509->5507 5510 40506e GetDlgItem GetDlgItem 5511 4050c0 7 API calls 5510->5511 5521 4052e5 5510->5521 5512 405167 DeleteObject 5511->5512 5513 40515a SendMessageW 5511->5513 5514 405170 5512->5514 5513->5512 5515 4051a7 5514->5515 5516 4066bf 22 API calls 5514->5516 5517 404601 23 API calls 5515->5517 5522 405189 SendMessageW SendMessageW 5516->5522 5523 4051bb 5517->5523 5518 405473 5519 405485 5518->5519 5520 40547d SendMessageW 5518->5520 5532 405497 ImageList_Destroy 5519->5532 5533 40549e 5519->5533 5540 4054ae 5519->5540 5520->5519 5524 4053c7 5521->5524 5545 405354 5521->5545 5564 404fbc SendMessageW 5521->5564 5522->5514 5528 404601 23 API calls 5523->5528 5524->5518 5529 405420 SendMessageW 5524->5529 5553 4052d8 5524->5553 5525 4053b9 SendMessageW 5525->5524 5526 404668 8 API calls 5531 405674 5526->5531 5543 4051cc 5528->5543 5530 405435 SendMessageW 5529->5530 5529->5553 5535 405448 5530->5535 5532->5533 5536 4054a7 GlobalFree 5533->5536 5533->5540 5534 405628 5538 40563a ShowWindow GetDlgItem ShowWindow 5534->5538 5534->5553 5546 405459 SendMessageW 5535->5546 5536->5540 5537 4052a7 GetWindowLongW SetWindowLongW 5539 4052c0 5537->5539 5538->5553 5541 4052c5 ShowWindow 5539->5541 5542 4052dd 5539->5542 5540->5534 5557 4054e9 5540->5557 5569 40503c 5540->5569 5562 404636 SendMessageW 5541->5562 5563 404636 SendMessageW 5542->5563 5543->5537 5544 40521f SendMessageW 5543->5544 5547 4052a2 5543->5547 5550 405271 SendMessageW 5543->5550 5551 40525d SendMessageW 5543->5551 5544->5543 5545->5524 5545->5525 5546->5518 5547->5537 5547->5539 5550->5543 5551->5543 5553->5526 5554 4055f3 5555 4055fe InvalidateRect 5554->5555 5558 40560a 5554->5558 5555->5558 5556 405517 SendMessageW 5561 40552d 5556->5561 5557->5556 5557->5561 5558->5534 5578 404f77 5558->5578 5560 4055a1 SendMessageW SendMessageW 5560->5561 5561->5554 5561->5560 5562->5553 5563->5521 5565 40501b SendMessageW 5564->5565 5566 404fdf GetMessagePos ScreenToClient SendMessageW 5564->5566 5567 405013 5565->5567 5566->5567 5568 405018 5566->5568 5567->5545 5568->5565 5581 406682 lstrcpynW 5569->5581 5571 40504f 5582 4065c9 wsprintfW 5571->5582 5573 405059 5574 40140b 2 API calls 5573->5574 5575 405062 5574->5575 5583 406682 lstrcpynW 5575->5583 5577 405069 5577->5557 5584 404eae 5578->5584 5580 404f8c 5580->5534 5581->5571 5582->5573 5583->5577 5585 404ec7 5584->5585 5586 4066bf 22 API calls 5585->5586 5587 404f2b 5586->5587 5588 4066bf 22 API calls 5587->5588 5589 404f36 5588->5589 5590 4066bf 22 API calls 5589->5590 5591 404f4c lstrlenW wsprintfW SetDlgItemTextW 5590->5591 5591->5580 5592 40166f 5593 402dab 22 API calls 5592->5593 5594 401675 5593->5594 5595 4069df 2 API calls 5594->5595 5596 40167b 5595->5596 5961 402af0 5962 402d89 22 API calls 5961->5962 5963 402af6 5962->5963 5964 4066bf 22 API calls 5963->5964 5965 402933 5963->5965 5964->5965 4968 4026f1 4969 402d89 22 API calls 4968->4969 4979 402700 4969->4979 4970 40283d 4971 40274a ReadFile 4971->4970 4971->4979 4972 4061f5 ReadFile 4972->4979 4973 4027e3 4973->4970 4973->4979 4982 406253 SetFilePointer 4973->4982 4974 40278a MultiByteToWideChar 4974->4979 4975 40283f 4991 4065c9 wsprintfW 4975->4991 4978 4027b0 SetFilePointer MultiByteToWideChar 4978->4979 4979->4970 4979->4971 4979->4972 4979->4973 4979->4974 4979->4975 4979->4978 4981 402850 4979->4981 4980 402871 SetFilePointer 4980->4970 4981->4970 4981->4980 4983 40626f 4982->4983 4985 406287 4982->4985 4984 4061f5 ReadFile 4983->4984 4986 40627b 4984->4986 4985->4973 4986->4985 4987 406290 SetFilePointer 4986->4987 4988 4062b8 SetFilePointer 4986->4988 4987->4988 4989 40629b 4987->4989 4988->4985 4990 406224 WriteFile 4989->4990 4990->4985 4991->4970 5597 404771 lstrlenW 5598 404790 5597->5598 5599 404792 WideCharToMultiByte 5597->5599 5598->5599 5966 404af2 5967 404b1e 5966->5967 5968 404b2f 5966->5968 6027 405cc6 GetDlgItemTextW 5967->6027 5970 404b3b GetDlgItem 5968->5970 5975 404b9a 5968->5975 5973 404b4f 5970->5973 5971 404c7e 6025 404e2d 5971->6025 6029 405cc6 GetDlgItemTextW 5971->6029 5972 404b29 5974 406930 5 API calls 5972->5974 5977 404b63 SetWindowTextW 5973->5977 5978 405ffc 4 API calls 5973->5978 5974->5968 5975->5971 5979 4066bf 22 API calls 5975->5979 5975->6025 5981 404601 23 API calls 5977->5981 5983 404b59 5978->5983 5984 404c0e SHBrowseForFolderW 5979->5984 5980 404cae 5985 406059 18 API calls 5980->5985 5986 404b7f 5981->5986 5982 404668 8 API calls 5987 404e41 5982->5987 5983->5977 5991 405f51 3 API calls 5983->5991 5984->5971 5988 404c26 CoTaskMemFree 5984->5988 5989 404cb4 5985->5989 5990 404601 23 API calls 5986->5990 5992 405f51 3 API calls 5988->5992 6030 406682 lstrcpynW 5989->6030 5993 404b8d 5990->5993 5991->5977 5994 404c33 5992->5994 6028 404636 SendMessageW 5993->6028 5997 404c6a SetDlgItemTextW 5994->5997 6002 4066bf 22 API calls 5994->6002 5997->5971 5998 404b93 6000 406a76 5 API calls 5998->6000 5999 404ccb 6001 406a76 5 API calls 5999->6001 6000->5975 6010 404cd2 6001->6010 6003 404c52 lstrcmpiW 6002->6003 6003->5997 6006 404c63 lstrcatW 6003->6006 6004 404d13 6031 406682 lstrcpynW 6004->6031 6006->5997 6007 404d1a 6008 405ffc 4 API calls 6007->6008 6009 404d20 GetDiskFreeSpaceW 6008->6009 6013 404d44 MulDiv 6009->6013 6014 404d6b 6009->6014 6010->6004 6012 405f9d 2 API calls 6010->6012 6010->6014 6012->6010 6013->6014 6015 404ddc 6014->6015 6017 404f77 25 API calls 6014->6017 6016 404dff 6015->6016 6018 40140b 2 API calls 6015->6018 6032 404623 EnableWindow 6016->6032 6019 404dc9 6017->6019 6018->6016 6021 404dde SetDlgItemTextW 6019->6021 6022 404dce 6019->6022 6021->6015 6024 404eae 25 API calls 6022->6024 6023 404e1b 6023->6025 6026 404a4b SendMessageW 6023->6026 6024->6015 6025->5982 6026->6025 6027->5972 6028->5998 6029->5980 6030->5999 6031->6007 6032->6023 4992 401774 4993 402dab 22 API calls 4992->4993 4994 40177b 4993->4994 4995 4017a3 4994->4995 4996 40179b 4994->4996 5033 406682 lstrcpynW 4995->5033 5032 406682 lstrcpynW 4996->5032 4999 4017a1 5003 406930 5 API calls 4999->5003 5000 4017ae 5001 405f51 3 API calls 5000->5001 5002 4017b4 lstrcatW 5001->5002 5002->4999 5016 4017c0 5003->5016 5004 4069df 2 API calls 5004->5016 5005 4017fc 5006 40614d 2 API calls 5005->5006 5006->5016 5008 4017d2 CompareFileTime 5008->5016 5009 401892 5010 405707 29 API calls 5009->5010 5013 40189c 5010->5013 5011 405707 29 API calls 5021 40187e 5011->5021 5012 406682 lstrcpynW 5012->5016 5014 403376 49 API calls 5013->5014 5015 4018af 5014->5015 5017 4018c3 SetFileTime 5015->5017 5019 4018d5 CloseHandle 5015->5019 5016->5004 5016->5005 5016->5008 5016->5009 5016->5012 5018 4066bf 22 API calls 5016->5018 5026 405ce2 MessageBoxIndirectW 5016->5026 5030 401869 5016->5030 5031 406172 GetFileAttributesW CreateFileW 5016->5031 5017->5019 5018->5016 5020 4018e6 5019->5020 5019->5021 5022 4018eb 5020->5022 5023 4018fe 5020->5023 5025 4066bf 22 API calls 5022->5025 5024 4066bf 22 API calls 5023->5024 5028 401906 5024->5028 5027 4018f3 lstrcatW 5025->5027 5026->5016 5027->5028 5028->5021 5029 405ce2 MessageBoxIndirectW 5028->5029 5029->5021 5030->5011 5030->5021 5031->5016 5032->4999 5033->5000 6033 695d23e9 6034 695d2453 6033->6034 6035 695d245e GlobalAlloc 6034->6035 6036 695d247d 6034->6036 6035->6034 6037 4014f5 SetForegroundWindow 6038 402c2f 6037->6038 5600 401a77 5601 402d89 22 API calls 5600->5601 5602 401a80 5601->5602 5603 402d89 22 API calls 5602->5603 5604 401a25 5603->5604 5605 401578 5606 401591 5605->5606 5607 401588 ShowWindow 5605->5607 5608 40159f ShowWindow 5606->5608 5609 402c2f 5606->5609 5607->5606 5608->5609 5084 4023f9 5085 402dab 22 API calls 5084->5085 5086 402408 5085->5086 5087 402dab 22 API calls 5086->5087 5088 402411 5087->5088 5089 402dab 22 API calls 5088->5089 5090 40241b GetPrivateProfileStringW 5089->5090 5610 40567b 5611 40568b 5610->5611 5612 40569f 5610->5612 5613 405691 5611->5613 5622 4056e8 5611->5622 5614 4056a7 IsWindowVisible 5612->5614 5619 4056be 5612->5619 5616 40464d SendMessageW 5613->5616 5617 4056b4 5614->5617 5614->5622 5615 4056ed CallWindowProcW 5620 40569b 5615->5620 5616->5620 5618 404fbc 5 API calls 5617->5618 5618->5619 5619->5615 5621 40503c 4 API calls 5619->5621 5621->5622 5622->5615 6039 401ffb 6040 402dab 22 API calls 6039->6040 6041 402002 6040->6041 6042 4069df 2 API calls 6041->6042 6043 402008 6042->6043 6045 402019 6043->6045 6046 4065c9 wsprintfW 6043->6046 6046->6045 5623 401b7c 5624 402dab 22 API calls 5623->5624 5625 401b83 5624->5625 5626 402d89 22 API calls 5625->5626 5627 401b8c wsprintfW 5626->5627 5628 402c2f 5627->5628 6047 695d10e1 6053 695d1111 6047->6053 6048 695d12b0 GlobalFree 6049 695d11d7 GlobalAlloc 6049->6053 6050 695d1240 GlobalFree 6050->6053 6051 695d135a 2 API calls 6051->6053 6052 695d12ab 6052->6048 6053->6048 6053->6049 6053->6050 6053->6051 6053->6052 6054 695d1312 2 API calls 6053->6054 6055 695d129a GlobalFree 6053->6055 6056 695d116b GlobalAlloc 6053->6056 6057 695d1381 lstrcpyW 6053->6057 6054->6053 6055->6053 6056->6053 6057->6053 5629 401000 5630 401037 BeginPaint GetClientRect 5629->5630 5631 40100c DefWindowProcW 5629->5631 5633 4010f3 5630->5633 5634 401179 5631->5634 5635 401073 CreateBrushIndirect FillRect DeleteObject 5633->5635 5636 4010fc 5633->5636 5635->5633 5637 401102 CreateFontIndirectW 5636->5637 5638 401167 EndPaint 5636->5638 5637->5638 5639 401112 6 API calls 5637->5639 5638->5634 5639->5638 6058 401680 6059 402dab 22 API calls 6058->6059 6060 401687 6059->6060 6061 402dab 22 API calls 6060->6061 6062 401690 6061->6062 6063 402dab 22 API calls 6062->6063 6064 401699 MoveFileW 6063->6064 6065 4016a5 6064->6065 6066 4016ac 6064->6066 6067 401423 29 API calls 6065->6067 6068 4069df 2 API calls 6066->6068 6070 4022fb 6066->6070 6067->6070 6069 4016bb 6068->6069 6069->6070 6071 406442 41 API calls 6069->6071 6071->6065 5640 404102 5641 40411a 5640->5641 5642 40427b 5640->5642 5641->5642 5645 404126 5641->5645 5643 4042cc 5642->5643 5644 40428c GetDlgItem GetDlgItem 5642->5644 5649 404326 5643->5649 5659 401389 2 API calls 5643->5659 5648 404601 23 API calls 5644->5648 5646 404131 SetWindowPos 5645->5646 5647 404144 5645->5647 5646->5647 5651 40414d ShowWindow 5647->5651 5652 40418f 5647->5652 5653 4042b6 SetClassLongW 5648->5653 5650 40464d SendMessageW 5649->5650 5660 404276 5649->5660 5681 404338 5650->5681 5654 404239 5651->5654 5655 40416d GetWindowLongW 5651->5655 5656 404197 DestroyWindow 5652->5656 5657 4041ae 5652->5657 5658 40140b 2 API calls 5653->5658 5661 404668 8 API calls 5654->5661 5655->5654 5662 404186 ShowWindow 5655->5662 5663 40458a 5656->5663 5664 4041b3 SetWindowLongW 5657->5664 5665 4041c4 5657->5665 5658->5643 5666 4042fe 5659->5666 5661->5660 5662->5652 5663->5660 5671 4045bb ShowWindow 5663->5671 5664->5660 5665->5654 5669 4041d0 GetDlgItem 5665->5669 5666->5649 5670 404302 SendMessageW 5666->5670 5667 40140b 2 API calls 5667->5681 5668 40458c DestroyWindow EndDialog 5668->5663 5672 4041e1 SendMessageW IsWindowEnabled 5669->5672 5673 4041fe 5669->5673 5670->5660 5671->5660 5672->5660 5672->5673 5675 40420b 5673->5675 5676 404252 SendMessageW 5673->5676 5677 40421e 5673->5677 5685 404203 5673->5685 5674 4066bf 22 API calls 5674->5681 5675->5676 5675->5685 5676->5654 5679 404226 5677->5679 5680 40423b 5677->5680 5678 4045da SendMessageW 5678->5654 5682 40140b 2 API calls 5679->5682 5683 40140b 2 API calls 5680->5683 5681->5660 5681->5667 5681->5668 5681->5674 5684 404601 23 API calls 5681->5684 5686 404601 23 API calls 5681->5686 5702 4044cc DestroyWindow 5681->5702 5682->5685 5683->5685 5684->5681 5685->5654 5685->5678 5687 4043b3 GetDlgItem 5686->5687 5688 4043d0 ShowWindow EnableWindow 5687->5688 5689 4043c8 5687->5689 5711 404623 EnableWindow 5688->5711 5689->5688 5691 4043fa EnableWindow 5696 40440e 5691->5696 5692 404413 GetSystemMenu EnableMenuItem SendMessageW 5693 404443 SendMessageW 5692->5693 5692->5696 5693->5696 5695 4040e3 23 API calls 5695->5696 5696->5692 5696->5695 5712 404636 SendMessageW 5696->5712 5713 406682 lstrcpynW 5696->5713 5698 404472 lstrlenW 5699 4066bf 22 API calls 5698->5699 5700 404488 SetWindowTextW 5699->5700 5701 401389 2 API calls 5700->5701 5701->5681 5702->5663 5703 4044e6 CreateDialogParamW 5702->5703 5703->5663 5704 404519 5703->5704 5705 404601 23 API calls 5704->5705 5706 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5705->5706 5707 401389 2 API calls 5706->5707 5708 40456a 5707->5708 5708->5660 5709 404572 ShowWindow 5708->5709 5710 40464d SendMessageW 5709->5710 5710->5663 5711->5691 5712->5696 5713->5698 5714 401503 5715 401508 5714->5715 5717 401520 5714->5717 5716 402d89 22 API calls 5715->5716 5716->5717 6072 402983 6094 406172 GetFileAttributesW CreateFileW 6072->6094 6074 40298a 6075 402a40 6074->6075 6076 4029a5 GlobalAlloc 6074->6076 6077 402a28 6074->6077 6078 402a47 DeleteFileW 6075->6078 6079 402a5a 6075->6079 6076->6077 6080 4029be 6076->6080 6081 403376 49 API calls 6077->6081 6078->6079 6095 4035fd SetFilePointer 6080->6095 6083 402a35 CloseHandle 6081->6083 6083->6075 6084 4029c4 6085 4035e7 ReadFile 6084->6085 6086 4029cd GlobalAlloc 6085->6086 6087 402a11 6086->6087 6088 4029dd 6086->6088 6089 406224 WriteFile 6087->6089 6090 403376 49 API calls 6088->6090 6091 402a1d GlobalFree 6089->6091 6093 4029ea 6090->6093 6091->6077 6092 402a08 GlobalFree 6092->6087 6093->6092 6094->6074 6095->6084 5718 401a04 5719 402dab 22 API calls 5718->5719 5720 401a0b 5719->5720 5721 402dab 22 API calls 5720->5721 5722 401a14 5721->5722 5723 401a1b lstrcmpiW 5722->5723 5724 401a2d lstrcmpW 5722->5724 5725 401a21 5723->5725 5724->5725 5726 402304 5727 402dab 22 API calls 5726->5727 5728 40230a 5727->5728 5729 402dab 22 API calls 5728->5729 5730 402313 5729->5730 5731 402dab 22 API calls 5730->5731 5732 40231c 5731->5732 5733 4069df 2 API calls 5732->5733 5734 402325 5733->5734 5735 402336 lstrlenW lstrlenW 5734->5735 5736 402329 5734->5736 5738 405707 29 API calls 5735->5738 5737 405707 29 API calls 5736->5737 5740 402331 5736->5740 5737->5740 5739 402374 SHFileOperationW 5738->5739 5739->5736 5739->5740 6103 401d86 6104 401d99 GetDlgItem 6103->6104 6105 401d8c 6103->6105 6107 401d93 6104->6107 6106 402d89 22 API calls 6105->6106 6106->6107 6109 402dab 22 API calls 6107->6109 6111 401dda GetClientRect LoadImageW SendMessageW 6107->6111 6109->6111 6110 401e38 6112 401e3d DeleteObject 6110->6112 6113 401e44 6110->6113 6111->6110 6111->6113 6112->6113 6114 402388 6115 40238f 6114->6115 6118 4023a2 6114->6118 6116 4066bf 22 API calls 6115->6116 6117 40239c 6116->6117 6117->6118 6119 405ce2 MessageBoxIndirectW 6117->6119 6119->6118 4918 401389 4920 401390 4918->4920 4919 4013fe 4920->4919 4921 4013cb MulDiv SendMessageW 4920->4921 4921->4920 5741 402c0a SendMessageW 5742 402c24 InvalidateRect 5741->5742 5743 402c2f 5741->5743 5742->5743 4943 40248f 4944 402dab 22 API calls 4943->4944 4945 4024a1 4944->4945 4946 402dab 22 API calls 4945->4946 4947 4024ab 4946->4947 4960 402e3b 4947->4960 4950 402c2f 4951 4024e3 4953 4024ef 4951->4953 4956 402d89 22 API calls 4951->4956 4952 402dab 22 API calls 4955 4024d9 lstrlenW 4952->4955 4954 40250e RegSetValueExW 4953->4954 4957 403376 49 API calls 4953->4957 4958 402524 RegCloseKey 4954->4958 4955->4951 4956->4953 4957->4954 4958->4950 4961 402e56 4960->4961 4964 40651d 4961->4964 4965 40652c 4964->4965 4966 4024bb 4965->4966 4967 406537 RegCreateKeyExW 4965->4967 4966->4950 4966->4951 4966->4952 4967->4966 5744 695d170d 5745 695d15b6 GlobalFree 5744->5745 5748 695d1725 5745->5748 5746 695d176b GlobalFree 5747 695d1740 5747->5746 5748->5746 5748->5747 5749 695d1757 VirtualFree 5748->5749 5749->5746 5750 402910 5751 402dab 22 API calls 5750->5751 5752 402917 FindFirstFileW 5751->5752 5753 40292a 5752->5753 5754 40293f 5752->5754 5755 402948 5754->5755 5758 4065c9 wsprintfW 5754->5758 5759 406682 lstrcpynW 5755->5759 5758->5755 5759->5753 5760 401911 5761 401948 5760->5761 5762 402dab 22 API calls 5761->5762 5763 40194d 5762->5763 5764 405d8e 72 API calls 5763->5764 5765 401956 5764->5765 6120 401491 6121 405707 29 API calls 6120->6121 6122 401498 6121->6122 5766 403d12 5767 403d1d 5766->5767 5768 403d24 GlobalAlloc 5767->5768 5769 403d21 5767->5769 5768->5769 5770 401914 5771 402dab 22 API calls 5770->5771 5772 40191b 5771->5772 5773 405ce2 MessageBoxIndirectW 5772->5773 5774 401924 5773->5774 5034 402896 5035 40289d 5034->5035 5036 402bae 5034->5036 5037 402d89 22 API calls 5035->5037 5038 4028a4 5037->5038 5039 4028b3 SetFilePointer 5038->5039 5039->5036 5040 4028c3 5039->5040 5042 4065c9 wsprintfW 5040->5042 5042->5036 5775 401f17 5776 402dab 22 API calls 5775->5776 5777 401f1d 5776->5777 5778 402dab 22 API calls 5777->5778 5779 401f26 5778->5779 5780 402dab 22 API calls 5779->5780 5781 401f2f 5780->5781 5782 402dab 22 API calls 5781->5782 5783 401f38 5782->5783 5784 401423 29 API calls 5783->5784 5785 401f3f 5784->5785 5792 405ca8 ShellExecuteExW 5785->5792 5787 401f87 5788 406b21 5 API calls 5787->5788 5789 402933 5787->5789 5790 401fa4 CloseHandle 5788->5790 5790->5789 5792->5787 6130 402f98 6131 402fc3 6130->6131 6132 402faa SetTimer 6130->6132 6133 403011 6131->6133 6134 403017 MulDiv 6131->6134 6132->6131 6135 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 6134->6135 6135->6133 5793 401d1c 5794 402d89 22 API calls 5793->5794 5795 401d22 IsWindow 5794->5795 5796 401a25 5795->5796 5797 695d1000 5800 695d101b 5797->5800 5801 695d15b6 GlobalFree 5800->5801 5802 695d1020 5801->5802 5803 695d1024 5802->5803 5804 695d1027 GlobalAlloc 5802->5804 5805 695d15dd 3 API calls 5803->5805 5804->5803 5806 695d1019 5805->5806 6137 40149e 6138 4023a2 6137->6138 6139 4014ac PostQuitMessage 6137->6139 6139->6138 5807 695d103d 5808 695d101b 5 API calls 5807->5808 5809 695d1056 5808->5809 6140 401ba0 6141 401bf1 6140->6141 6146 401bad 6140->6146 6142 401bf6 6141->6142 6143 401c1b GlobalAlloc 6141->6143 6154 4023a2 6142->6154 6161 406682 lstrcpynW 6142->6161 6145 4066bf 22 API calls 6143->6145 6144 4066bf 22 API calls 6148 40239c 6144->6148 6149 401c36 6145->6149 6146->6149 6150 401bc4 6146->6150 6148->6154 6155 405ce2 MessageBoxIndirectW 6148->6155 6149->6144 6149->6154 6159 406682 lstrcpynW 6150->6159 6152 401c08 GlobalFree 6152->6154 6153 401bd3 6160 406682 lstrcpynW 6153->6160 6155->6154 6157 401be2 6162 406682 lstrcpynW 6157->6162 6159->6153 6160->6157 6161->6152 6162->6154 6163 406da0 6167 406c24 6163->6167 6164 40758f 6165 406ca5 GlobalFree 6166 406cae GlobalAlloc 6165->6166 6166->6164 6166->6167 6167->6164 6167->6165 6167->6166 6168 406d25 GlobalAlloc 6167->6168 6169 406d1c GlobalFree 6167->6169 6168->6164 6168->6167 6169->6168 5810 402621 5811 402dab 22 API calls 5810->5811 5812 402628 5811->5812 5815 406172 GetFileAttributesW CreateFileW 5812->5815 5814 402634 5815->5814 4394 4025a3 4406 402deb 4394->4406 4398 4025b6 4399 4025c5 4398->4399 4404 402933 4398->4404 4400 4025d2 RegEnumKeyW 4399->4400 4401 4025de RegEnumValueW 4399->4401 4402 4025fa RegCloseKey 4400->4402 4401->4402 4403 4025f3 4401->4403 4402->4404 4403->4402 4407 402dab 22 API calls 4406->4407 4408 402e02 4407->4408 4409 4064ef RegOpenKeyExW 4408->4409 4410 4025ad 4409->4410 4411 402d89 4410->4411 4412 4066bf 22 API calls 4411->4412 4413 402d9e 4412->4413 4413->4398 6170 4015a8 6171 402dab 22 API calls 6170->6171 6172 4015af SetFileAttributesW 6171->6172 6173 4015c1 6172->6173 4922 401fa9 4923 402dab 22 API calls 4922->4923 4924 401faf 4923->4924 4925 405707 29 API calls 4924->4925 4926 401fb9 4925->4926 4927 405c65 2 API calls 4926->4927 4928 401fbf 4927->4928 4929 401fe2 CloseHandle 4928->4929 4932 402933 4928->4932 4937 406b21 WaitForSingleObject 4928->4937 4929->4932 4933 401fd4 4934 401fe4 4933->4934 4935 401fd9 4933->4935 4934->4929 4942 4065c9 wsprintfW 4935->4942 4938 406b3b 4937->4938 4939 406b4d GetExitCodeProcess 4938->4939 4940 406ab2 2 API calls 4938->4940 4939->4933 4941 406b42 WaitForSingleObject 4940->4941 4941->4938 4942->4929 6174 4070a9 6176 406c24 6174->6176 6175 40758f 6176->6175 6176->6176 6177 406ca5 GlobalFree 6176->6177 6178 406cae GlobalAlloc 6176->6178 6179 406d25 GlobalAlloc 6176->6179 6180 406d1c GlobalFree 6176->6180 6177->6178 6178->6175 6178->6176 6179->6175 6179->6176 6180->6179 6181 404aab 6182 404ae1 6181->6182 6183 404abb 6181->6183 6185 404668 8 API calls 6182->6185 6184 404601 23 API calls 6183->6184 6186 404ac8 SetDlgItemTextW 6184->6186 6187 404aed 6185->6187 6186->6182 5816 40202f 5817 402dab 22 API calls 5816->5817 5818 402036 5817->5818 5819 406a76 5 API calls 5818->5819 5820 402045 5819->5820 5821 402061 GlobalAlloc 5820->5821 5823 4020d1 5820->5823 5822 402075 5821->5822 5821->5823 5824 406a76 5 API calls 5822->5824 5825 40207c 5824->5825 5826 406a76 5 API calls 5825->5826 5827 402086 5826->5827 5827->5823 5831 4065c9 wsprintfW 5827->5831 5829 4020bf 5832 4065c9 wsprintfW 5829->5832 5831->5829 5832->5823 5833 40252f 5834 402deb 22 API calls 5833->5834 5835 402539 5834->5835 5836 402dab 22 API calls 5835->5836 5837 402542 5836->5837 5838 40254d RegQueryValueExW 5837->5838 5841 402933 5837->5841 5839 402573 RegCloseKey 5838->5839 5840 40256d 5838->5840 5839->5841 5840->5839 5844 4065c9 wsprintfW 5840->5844 5844->5839 6188 4021af 6189 402dab 22 API calls 6188->6189 6190 4021b6 6189->6190 6191 402dab 22 API calls 6190->6191 6192 4021c0 6191->6192 6193 402dab 22 API calls 6192->6193 6194 4021ca 6193->6194 6195 402dab 22 API calls 6194->6195 6196 4021d4 6195->6196 6197 402dab 22 API calls 6196->6197 6198 4021de 6197->6198 6199 40221d CoCreateInstance 6198->6199 6200 402dab 22 API calls 6198->6200 6203 40223c 6199->6203 6200->6199 6201 401423 29 API calls 6202 4022fb 6201->6202 6203->6201 6203->6202 5845 401a35 5846 402dab 22 API calls 5845->5846 5847 401a3e ExpandEnvironmentStringsW 5846->5847 5848 401a52 5847->5848 5850 401a65 5847->5850 5849 401a57 lstrcmpW 5848->5849 5848->5850 5849->5850 5043 4023b7 5044 4023c5 5043->5044 5045 4023bf 5043->5045 5047 4023d3 5044->5047 5048 402dab 22 API calls 5044->5048 5046 402dab 22 API calls 5045->5046 5046->5044 5049 402dab 22 API calls 5047->5049 5052 4023e1 5047->5052 5048->5047 5049->5052 5050 402dab 22 API calls 5051 4023ea WritePrivateProfileStringW 5050->5051 5052->5050 5851 404737 lstrcpynW lstrlenW 6209 4014b8 6210 4014be 6209->6210 6211 401389 2 API calls 6210->6211 6212 4014c6 6211->6212 5053 402439 5054 402441 5053->5054 5055 40246c 5053->5055 5057 402deb 22 API calls 5054->5057 5056 402dab 22 API calls 5055->5056 5058 402473 5056->5058 5059 402448 5057->5059 5065 402e69 5058->5065 5060 402452 5059->5060 5064 402480 5059->5064 5062 402dab 22 API calls 5060->5062 5063 402459 RegDeleteValueW RegCloseKey 5062->5063 5063->5064 5066 402e76 5065->5066 5067 402e7d 5065->5067 5066->5064 5067->5066 5069 402eae 5067->5069 5070 4064ef RegOpenKeyExW 5069->5070 5071 402edc 5070->5071 5072 402f91 5071->5072 5073 402ee6 5071->5073 5072->5066 5074 402eec RegEnumValueW 5073->5074 5078 402f0f 5073->5078 5075 402f76 RegCloseKey 5074->5075 5074->5078 5075->5072 5076 402f4b RegEnumKeyW 5077 402f54 RegCloseKey 5076->5077 5076->5078 5079 406a76 5 API calls 5077->5079 5078->5075 5078->5076 5078->5077 5080 402eae 6 API calls 5078->5080 5081 402f64 5079->5081 5080->5078 5082 402f86 5081->5082 5083 402f68 RegDeleteKeyW 5081->5083 5082->5072 5083->5072 5852 40173a 5853 402dab 22 API calls 5852->5853 5854 401741 SearchPathW 5853->5854 5855 40175c 5854->5855 5856 401d3d 5857 402d89 22 API calls 5856->5857 5858 401d44 5857->5858 5859 402d89 22 API calls 5858->5859 5860 401d50 GetDlgItem 5859->5860 5861 40263d 5860->5861

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-403998 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 52 40383a-40383d 45->52 53 40383f 45->53 54 403884-403889 46->54 55 40389f-4038d9 46->55 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 60 40399d-4039a3 48->60 52->46 52->53 53->46 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 64 403b90-403ba0 call 403c62 OleUninitialize 60->64 65 4039a9-4039af 60->65 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a58 call 403d54 65->71 66->55 66->67 67->55 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 71->64 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 99 403a0c 97->99 98->97 98->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                            APIs
                            • SetErrorMode.KERNELBASE ref: 00403668
                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                            • #17.COMCTL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040377C
                            • OleInitialize.OLE32(00000000), ref: 00403783
                            • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                            • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004037B7
                            • CharNextW.USER32(00000000), ref: 004037F0
                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403928
                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403939
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403945
                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403959
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403961
                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403972
                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040397A
                            • DeleteFileW.KERNEL32(1033,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040398E
                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403A67
                              • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                            • wsprintfW.USER32 ref: 00403AC4
                            • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                            • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                              • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005), ref: 0040644C
                            • CopyFileW.KERNEL32 ref: 00403B47
                              • Part of subcall function 00405C65: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?), ref: 00405C8E
                              • Part of subcall function 00405C65: CloseHandle.KERNEL32(?), ref: 00405C9B
                              • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(7570D4C4,00425F98,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,7570D4C4,?,756F13E0,00405DAE,?,7570D4C4,756F13E0), ref: 004069EA
                              • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                            • OleUninitialize.OLE32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403B95
                            • ExitProcess.KERNEL32 ref: 00403BB2
                            • CloseHandle.KERNEL32(00000000), ref: 00403BB9
                            • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403BD5
                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                            • ExitProcess.KERNEL32 ref: 00403C5C
                              • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                            • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\2T10XBqS6g.exe$C:\Users\user\eftermodnendes\ringeagt$C:\Users\user\eftermodnendes\ringeagt$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                            • API String ID: 1813718867-1017613728
                            • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                            • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                            • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                            • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 282 405d8e-405db4 call 406059 285 405db6-405dc8 DeleteFileW 282->285 286 405dcd-405dd4 282->286 287 405f4a-405f4e 285->287 288 405dd6-405dd8 286->288 289 405de7-405df7 call 406682 286->289 290 405ef8-405efd 288->290 291 405dde-405de1 288->291 295 405e06-405e07 call 405f9d 289->295 296 405df9-405e04 lstrcatW 289->296 290->287 294 405eff-405f02 290->294 291->289 291->290 297 405f04-405f0a 294->297 298 405f0c-405f14 call 4069df 294->298 300 405e0c-405e10 295->300 296->300 297->287 298->287 306 405f16-405f2a call 405f51 call 405d46 298->306 303 405e12-405e1a 300->303 304 405e1c-405e22 lstrcatW 300->304 303->304 305 405e27-405e43 lstrlenW FindFirstFileW 303->305 304->305 307 405e49-405e51 305->307 308 405eed-405ef1 305->308 322 405f42-405f45 call 405707 306->322 323 405f2c-405f2f 306->323 310 405e71-405e85 call 406682 307->310 311 405e53-405e5b 307->311 308->290 313 405ef3 308->313 324 405e87-405e8f 310->324 325 405e9c-405ea7 call 405d46 310->325 314 405ed0-405ee0 FindNextFileW 311->314 315 405e5d-405e65 311->315 313->290 314->307 321 405ee6-405ee7 FindClose 314->321 315->310 318 405e67-405e6f 315->318 318->310 318->314 321->308 322->287 323->297 326 405f31-405f40 call 405707 call 406442 323->326 324->314 327 405e91-405e9a call 405d8e 324->327 333 405ec8-405ecb call 405707 325->333 334 405ea9-405eac 325->334 326->287 327->314 333->314 337 405ec0-405ec6 334->337 338 405eae-405ebe call 405707 call 406442 334->338 337->314 338->314
                            APIs
                            • DeleteFileW.KERNELBASE(?,?,7570D4C4,756F13E0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DB7
                            • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,7570D4C4,756F13E0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DFF
                            • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,7570D4C4,756F13E0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E22
                            • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,7570D4C4,756F13E0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E28
                            • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,7570D4C4,756F13E0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E38
                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                            • FindClose.KERNEL32(00000000), ref: 00405EE7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$POB$\*.*
                            • API String ID: 2035342205-546337890
                            • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                            • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                            • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                            • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 603 406da0-406da5 604 406e16-406e34 603->604 605 406da7-406dd6 603->605 608 40740c-407421 604->608 606 406dd8-406ddb 605->606 607 406ddd-406de1 605->607 609 406ded-406df0 606->609 610 406de3-406de7 607->610 611 406de9 607->611 612 407423-407439 608->612 613 40743b-407451 608->613 614 406df2-406dfb 609->614 615 406e0e-406e11 609->615 610->609 611->609 616 407454-40745b 612->616 613->616 617 406e00-406e0c 614->617 618 406dfd 614->618 621 406fe3-407001 615->621 619 407482-40748e 616->619 620 40745d-407461 616->620 624 406e76-406ea4 617->624 618->617 630 406c24-406c2d 619->630 625 407610-40761a 620->625 626 407467-40747f 620->626 622 407003-407017 621->622 623 407019-40702b 621->623 629 40702e-407038 622->629 623->629 631 406ec0-406eda 624->631 632 406ea6-406ebe 624->632 628 407626-407639 625->628 626->619 634 40763e-407642 628->634 635 40703a 629->635 636 406fdb-406fe1 629->636 637 406c33 630->637 638 40763b 630->638 633 406edd-406ee7 631->633 632->633 640 406eed 633->640 641 406e5e-406e64 633->641 642 406fb6-406fba 635->642 643 40714b-407158 635->643 636->621 639 406f7f-406f89 636->639 644 406c3a-406c3e 637->644 645 406d7a-406d9b 637->645 646 406cdf-406ce3 637->646 647 406d4f-406d53 637->647 638->634 652 4075ce-4075d8 639->652 653 406f8f-406fb1 639->653 663 406e43-406e5b 640->663 664 4075aa-4075b4 640->664 654 406f17-406f1d 641->654 655 406e6a-406e70 641->655 658 406fc0-406fd8 642->658 659 4075c2-4075cc 642->659 643->630 644->628 651 406c44-406c51 644->651 645->608 649 406ce9-406d02 646->649 650 40758f-407599 646->650 656 406d59-406d6d 647->656 657 40759e-4075a8 647->657 662 406d05-406d09 649->662 650->628 651->638 665 406c57-406c9d 651->665 652->628 653->643 660 406f7b 654->660 661 406f1f-406f3d 654->661 655->624 655->660 666 406d70-406d78 656->666 657->628 658->636 659->628 660->639 667 406f55-406f67 661->667 668 406f3f-406f53 661->668 662->646 669 406d0b-406d11 662->669 663->641 664->628 670 406cc5-406cc7 665->670 671 406c9f-406ca3 665->671 666->645 666->647 674 406f6a-406f74 667->674 668->674 675 406d13-406d1a 669->675 676 406d3b-406d4d 669->676 672 406cd5-406cdd 670->672 673 406cc9-406cd3 670->673 677 406ca5-406ca8 GlobalFree 671->677 678 406cae-406cbc GlobalAlloc 671->678 672->662 673->672 673->673 674->654 680 406f76 674->680 681 406d25-406d35 GlobalAlloc 675->681 682 406d1c-406d1f GlobalFree 675->682 676->666 677->678 678->638 679 406cc2 678->679 679->670 684 4075b6-4075c0 680->684 685 406efc-406f14 680->685 681->638 681->676 682->681 684->628 685->654
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                            • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                            • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                            • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 722 4069df-4069f3 FindFirstFileW 723 406a00 722->723 724 4069f5-4069fe FindClose 722->724 725 406a02-406a03 723->725 724->725
                            APIs
                            • FindFirstFileW.KERNELBASE(7570D4C4,00425F98,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,7570D4C4,?,756F13E0,00405DAE,?,7570D4C4,756F13E0), ref: 004069EA
                            • FindClose.KERNEL32(00000000), ref: 004069F6
                            Strings
                            • C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp, xrefs: 004069DF
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp
                            • API String ID: 2295610775-458454213
                            • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                            • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                            • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                            • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 151 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 154 403125-40312a 151->154 155 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 151->155 156 40336f-403373 154->156 163 403163 155->163 164 403248-403256 call 403033 155->164 166 403168-40317f 163->166 170 403327-40332c 164->170 171 40325c-40325f 164->171 168 403181 166->168 169 403183-40318c call 4035e7 166->169 168->169 178 403192-403199 169->178 179 4032e3-4032eb call 403033 169->179 170->156 173 403261-403279 call 4035fd call 4035e7 171->173 174 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 171->174 173->170 202 40327f-403285 173->202 200 4032d9-4032de 174->200 201 4032ed-40331d call 4035fd call 403376 174->201 183 403215-403219 178->183 184 40319b-4031af call 40612d 178->184 179->170 189 403223-403229 183->189 190 40321b-403222 call 403033 183->190 184->189 198 4031b1-4031b8 184->198 191 403238-403240 189->191 192 40322b-403235 call 406b63 189->192 190->189 191->166 199 403246 191->199 192->191 198->189 205 4031ba-4031c1 198->205 199->164 200->156 212 403322-403325 201->212 202->170 202->174 205->189 207 4031c3-4031ca 205->207 207->189 209 4031cc-4031d3 207->209 209->189 211 4031d5-4031f5 209->211 211->170 213 4031fb-4031ff 211->213 212->170 214 40332e-40333f 212->214 215 403201-403205 213->215 216 403207-40320f 213->216 217 403341 214->217 218 403347-40334c 214->218 215->199 215->216 216->189 220 403211-403213 216->220 217->218 219 40334d-403353 218->219 219->219 221 403355-40336d call 40612d 219->221 220->189 221->156
                            APIs
                            • GetTickCount.KERNEL32(7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 004030E9
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\2T10XBqS6g.exe,00000400), ref: 00403105
                              • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                              • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 0040314E
                            • GlobalAlloc.KERNELBASE(?,00008001), ref: 00403290
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\2T10XBqS6g.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                            • API String ID: 2803837635-3187282405
                            • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                            • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                            • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                            • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 224 4066bf-4066c8 225 4066ca-4066d9 224->225 226 4066db-4066f5 224->226 225->226 227 406905-40690b 226->227 228 4066fb-406707 226->228 230 406911-40691e 227->230 231 406719-406726 227->231 228->227 229 40670d-406714 228->229 229->227 233 406920-406925 call 406682 230->233 234 40692a-40692d 230->234 231->230 232 40672c-406735 231->232 235 4068f2 232->235 236 40673b-40677e 232->236 233->234 238 406900-406903 235->238 239 4068f4-4068fe 235->239 240 406784-406790 236->240 241 406896-40689a 236->241 238->227 239->227 244 406792 240->244 245 40679a-40679c 240->245 242 40689c-4068a3 241->242 243 4068ce-4068d2 241->243 246 4068b3-4068bf call 406682 242->246 247 4068a5-4068b1 call 4065c9 242->247 250 4068e2-4068f0 lstrlenW 243->250 251 4068d4-4068dd call 4066bf 243->251 244->245 248 4067d6-4067d9 245->248 249 40679e-4067c4 call 406550 245->249 262 4068c4-4068ca 246->262 247->262 256 4067db-4067e7 GetSystemDirectoryW 248->256 257 4067ec-4067ef 248->257 266 4067ca-4067d1 call 4066bf 249->266 267 40687e-406881 249->267 250->227 251->250 258 406879-40687c 256->258 259 406801-406805 257->259 260 4067f1-4067fd GetWindowsDirectoryW 257->260 258->267 268 40688e-406894 call 406930 258->268 259->258 264 406807-406825 259->264 260->259 262->250 265 4068cc 262->265 270 406827-406837 SHGetFolderPathW 264->270 271 406839-406851 call 406a76 264->271 265->268 266->258 267->268 273 406883-406889 lstrcatW 267->273 268->250 270->271 275 406873-406877 270->275 280 406853-406866 SHGetPathFromIDListW CoTaskMemFree 271->280 281 406868-406871 271->281 273->268 275->258 280->275 280->281 281->264 281->275
                            APIs
                            • GetSystemDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067E1
                            • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                            • SHGetFolderPathW.SHELL32(00000000,00000000,00000000,Call), ref: 00406833
                            • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                            • CoTaskMemFree.OLE32(00000000), ref: 0040685E
                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                            • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: DirectoryPath$FolderFreeFromListSystemTaskWindowslstrcatlstrlen
                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                            • API String ID: 2237929815-3319343437
                            • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                            • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                            • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                            • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 346 401774-401799 call 402dab call 405fc8 351 4017a3-4017b5 call 406682 call 405f51 lstrcatW 346->351 352 40179b-4017a1 call 406682 346->352 358 4017ba-4017bb call 406930 351->358 352->358 361 4017c0-4017c4 358->361 362 4017c6-4017d0 call 4069df 361->362 363 4017f7-4017fa 361->363 370 4017e2-4017f4 362->370 371 4017d2-4017e0 CompareFileTime 362->371 365 401802-40181e call 406172 363->365 366 4017fc-4017fd call 40614d 363->366 373 401820-401823 365->373 374 401892-4018bb call 405707 call 403376 365->374 366->365 370->363 371->370 375 401874-40187e call 405707 373->375 376 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 373->376 388 4018c3-4018cf SetFileTime 374->388 389 4018bd-4018c1 374->389 386 401887-40188d 375->386 376->361 410 401869-40186a 376->410 390 402c38 386->390 392 4018d5-4018e0 CloseHandle 388->392 389->388 389->392 393 402c3a-402c3e 390->393 395 4018e6-4018e9 392->395 396 402c2f-402c32 392->396 398 4018eb-4018fc call 4066bf lstrcatW 395->398 399 4018fe-401901 call 4066bf 395->399 396->390 403 401906-40239d 398->403 399->403 408 4023a2-4023a7 403->408 409 40239d call 405ce2 403->409 408->393 409->408 410->386 411 40186c-40186d 410->411 411->375
                            APIs
                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt,?,?,00000031), ref: 004017B5
                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt,?,?,00000031), ref: 004017DA
                              • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD), ref: 00405774
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp$C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dll$C:\Users\user\eftermodnendes\ringeagt$Call
                            • API String ID: 1941528284-2497700387
                            • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                            • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                            • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                            • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 412 4026f1-40270a call 402d89 415 402710-402717 412->415 416 402c2f-402c32 412->416 417 402719 415->417 418 40271c-40271f 415->418 419 402c38-402c3e 416->419 417->418 421 402883-40288b 418->421 422 402725-402734 call 4065e2 418->422 421->416 422->421 425 40273a 422->425 426 402740-402744 425->426 427 4027d9-4027dc 426->427 428 40274a-402765 ReadFile 426->428 430 4027f4-402804 call 4061f5 427->430 431 4027de-4027e1 427->431 428->421 429 40276b-402770 428->429 429->421 433 402776-402784 429->433 430->421 440 402806 430->440 431->430 434 4027e3-4027ee call 406253 431->434 436 40278a-40279c MultiByteToWideChar 433->436 437 40283f-40284b call 4065c9 433->437 434->421 434->430 436->440 441 40279e-4027a1 436->441 437->419 443 402809-40280c 440->443 444 4027a3-4027ae 441->444 443->437 446 40280e-402813 443->446 444->443 447 4027b0-4027d5 SetFilePointer MultiByteToWideChar 444->447 448 402850-402854 446->448 449 402815-40281a 446->449 447->444 450 4027d7 447->450 452 402871-40287d SetFilePointer 448->452 453 402856-40285a 448->453 449->448 451 40281c-40282f 449->451 450->440 451->421 456 402831-402837 451->456 452->421 454 402862-40286f 453->454 455 40285c-402860 453->455 454->421 455->452 455->454 456->426 457 40283d 456->457 457->421
                            APIs
                            • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 00402798
                            • SetFilePointer.KERNELBASE(?,?,?,00000001,?,?,?,?,?,00000001), ref: 004027BB
                            • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 004027D1
                              • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406269
                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: File$Pointer$ByteCharMultiWide$Read
                            • String ID: 9
                            • API String ID: 163830602-2366072709
                            • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                            • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                            • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                            • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 458 406a06-406a26 GetSystemDirectoryW 459 406a28 458->459 460 406a2a-406a2c 458->460 459->460 461 406a3d-406a3f 460->461 462 406a2e-406a37 460->462 464 406a40-406a73 wsprintfW LoadLibraryExW 461->464 462->461 463 406a39-406a3b 462->463 463->464
                            APIs
                            • GetSystemDirectoryW.KERNEL32(?,00000104,UXTHEME), ref: 00406A1D
                            • wsprintfW.USER32 ref: 00406A58
                            • LoadLibraryExW.KERNELBASE(?,00000000,?), ref: 00406A6C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%S.dll$UXTHEME
                            • API String ID: 2200240437-1106614640
                            • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                            • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                            • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                            • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 465 402eae-402ed7 call 4064ef 467 402edc-402ee0 465->467 468 402f91-402f95 467->468 469 402ee6-402eea 467->469 470 402eec-402f0d RegEnumValueW 469->470 471 402f0f-402f22 469->471 470->471 472 402f76-402f84 RegCloseKey 470->472 473 402f4b-402f52 RegEnumKeyW 471->473 472->468 474 402f24-402f26 473->474 475 402f54-402f66 RegCloseKey call 406a76 473->475 474->472 476 402f28-402f3c call 402eae 474->476 481 402f86-402f8c 475->481 482 402f68-402f74 RegDeleteKeyW 475->482 476->475 483 402f3e-402f4a 476->483 481->468 482->468 483->473
                            APIs
                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00402F02
                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                            • RegCloseKey.ADVAPI32(?), ref: 00402F57
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                            • RegCloseKey.ADVAPI32(?), ref: 00402F79
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CloseEnum$DeleteValue
                            • String ID:
                            • API String ID: 1354259210-0
                            • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                            • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                            • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                            • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 484 695d1817-695d1856 call 695d1bff 488 695d185c-695d1860 484->488 489 695d1976-695d1978 484->489 490 695d1869-695d1876 call 695d2480 488->490 491 695d1862-695d1868 call 695d243e 488->491 496 695d1878-695d187d 490->496 497 695d18a6-695d18ad 490->497 491->490 500 695d187f-695d1880 496->500 501 695d1898-695d189b 496->501 498 695d18cd-695d18d1 497->498 499 695d18af-695d18cb call 695d2655 call 695d1654 call 695d1312 GlobalFree 497->499 502 695d191e-695d1924 call 695d2655 498->502 503 695d18d3-695d191c call 695d1666 call 695d2655 498->503 524 695d1925-695d1929 499->524 506 695d1888-695d1889 call 695d2b98 500->506 507 695d1882-695d1883 500->507 501->497 504 695d189d-695d189e call 695d2e23 501->504 502->524 503->524 518 695d18a3 504->518 515 695d188e 506->515 513 695d1885-695d1886 507->513 514 695d1890-695d1896 call 695d2810 507->514 513->497 513->506 523 695d18a5 514->523 515->518 518->523 523->497 528 695d192b-695d1939 call 695d2618 524->528 529 695d1966-695d196d 524->529 534 695d193b-695d193e 528->534 535 695d1951-695d1958 528->535 529->489 531 695d196f-695d1970 GlobalFree 529->531 531->489 534->535 536 695d1940-695d1948 534->536 535->529 537 695d195a-695d1965 call 695d15dd 535->537 536->535 538 695d194a-695d194b FreeLibrary 536->538 537->529 538->535
                            APIs
                              • Part of subcall function 695D1BFF: GlobalFree.KERNEL32(?), ref: 695D1E74
                              • Part of subcall function 695D1BFF: GlobalFree.KERNEL32(?), ref: 695D1E79
                              • Part of subcall function 695D1BFF: GlobalFree.KERNEL32(?), ref: 695D1E7E
                            • GlobalFree.KERNEL32(00000000), ref: 695D18C5
                            • FreeLibrary.KERNEL32(?), ref: 695D194B
                            • GlobalFree.KERNEL32(00000000), ref: 695D1970
                              • Part of subcall function 695D243E: GlobalAlloc.KERNEL32(?,?), ref: 695D246F
                              • Part of subcall function 695D2810: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,695D1896,00000000), ref: 695D28E0
                              • Part of subcall function 695D1666: wsprintfW.USER32 ref: 695D1694
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc$Librarywsprintf
                            • String ID:
                            • API String ID: 3962662361-3916222277
                            • Opcode ID: f4b903bfdccb996fb914cb46bbcd8326addfe31a158c66cc5cb6aa7aa557eb68
                            • Instruction ID: 63a8dfcc59291a21541d4b88a7971230bea42331d0c9f44f0930fa6c36c6ae4e
                            • Opcode Fuzzy Hash: f4b903bfdccb996fb914cb46bbcd8326addfe31a158c66cc5cb6aa7aa557eb68
                            • Instruction Fuzzy Hash: 3741B3759003459BDF08DF7CD888B9537A8BF06358F049469E915EE08ADB74C58DC7AC

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 541 401c48-401c68 call 402d89 * 2 546 401c74-401c78 541->546 547 401c6a-401c71 call 402dab 541->547 549 401c84-401c8a 546->549 550 401c7a-401c81 call 402dab 546->550 547->546 552 401cd8-401d02 call 402dab * 2 FindWindowExW 549->552 553 401c8c-401ca8 call 402d89 * 2 549->553 550->549 566 401d08 552->566 564 401cc8-401cd6 SendMessageW 553->564 565 401caa-401cc6 SendMessageTimeoutW 553->565 564->566 567 401d0b-401d0e 565->567 566->567 568 401d14 567->568 569 402c2f-402c3e 567->569 568->569
                            APIs
                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                            • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                            • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                            • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 572 40248f-4024b6 call 402dab * 2 call 402e3b 578 4024bb-4024c0 572->578 579 4024c6-4024d0 578->579 580 402c2f-402c3e 578->580 581 4024d2-4024df call 402dab lstrlenW 579->581 582 4024e3-4024e6 579->582 581->582 586 4024e8-4024f9 call 402d89 582->586 587 4024fa-4024fd 582->587 586->587 588 40250e-402522 RegSetValueExW 587->588 589 4024ff-402509 call 403376 587->589 593 402524 588->593 594 402527-402608 RegCloseKey 588->594 589->588 593->594 594->580
                            APIs
                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,00000023,00000011,00000002), ref: 004024DA
                            • RegSetValueExW.ADVAPI32 ref: 0040251A
                            • RegCloseKey.ADVAPI32(?), ref: 00402602
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CloseValuelstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp
                            • API String ID: 2655323295-458454213
                            • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                            • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                            • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                            • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 597 4061a1-4061ad 598 4061ae-4061e2 GetTickCount GetTempFileNameW 597->598 599 4061f1-4061f3 598->599 600 4061e4-4061e6 598->600 601 4061eb-4061ee 599->601 600->598 602 4061e8 600->602 602->601
                            APIs
                            • GetTickCount.KERNEL32(7570D4C4,C:\Users\user\AppData\Local\Temp\,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?), ref: 004061BF
                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-4262883142
                            • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                            • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                            • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                            • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 686 4015c6-4015da call 402dab call 405ffc 691 401636-401639 686->691 692 4015dc-4015ef call 405f7e 686->692 694 401668-4022fb call 401423 691->694 695 40163b-40165a call 401423 call 406682 SetCurrentDirectoryW 691->695 700 4015f1-4015f4 692->700 701 401609-40160c call 405c30 692->701 708 402c2f-402c3e 694->708 695->708 714 401660-401663 695->714 700->701 705 4015f6-4015fd call 405c4d 700->705 707 401611-401613 701->707 705->701 719 4015ff-401602 call 405bd6 705->719 711 401615-40161a 707->711 712 40162c-401634 707->712 717 401629 711->717 718 40161c-401627 GetFileAttributesW 711->718 712->691 712->692 714->708 717->712 718->712 718->717 721 401607 719->721 721->707
                            APIs
                              • Part of subcall function 00405FFC: CharNextW.USER32(?), ref: 0040600A
                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                            • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 0040161F
                              • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\eftermodnendes\ringeagt,?,00000000,?), ref: 00401652
                            Strings
                            • C:\Users\user\eftermodnendes\ringeagt, xrefs: 00401645
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                            • String ID: C:\Users\user\eftermodnendes\ringeagt
                            • API String ID: 1892508949-3136511402
                            • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                            • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                            • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                            • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                            • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                            • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                            • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                            • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                            • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                            • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                            • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                            • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                            • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                            • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                            • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                            • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                            • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                            • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                            • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                            • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                            • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                            • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                            • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                            • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                            • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                            APIs
                            • GetTickCount.KERNEL32(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 00403492
                              • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                            • SetFilePointer.KERNEL32(00119FB8,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FilePointer$CountTick
                            • String ID:
                            • API String ID: 1092082344-0
                            • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                            • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                            • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                            • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000,00000001,?), ref: 00402108
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD), ref: 00405774
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                            • LoadLibraryExW.KERNELBASE(00000000,?,?,00000001,?), ref: 00402119
                            • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,00000001,?), ref: 00402196
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                            • String ID:
                            • API String ID: 334405425-0
                            • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                            • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                            • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                            • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D
                            APIs
                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                            • RegCloseKey.ADVAPI32(?), ref: 00402602
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Enum$CloseValue
                            • String ID:
                            • API String ID: 397863658-0
                            • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                            • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                            • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                            • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                            APIs
                            • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                            • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                            • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                            • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                            APIs
                            • MulDiv.KERNEL32 ref: 004013E4
                            • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                            • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                            • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                            • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                            APIs
                            • RegDeleteValueW.ADVAPI32 ref: 0040245B
                            • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CloseDeleteValue
                            • String ID:
                            • API String ID: 2831762973-0
                            • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                            • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                            • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                            • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                            APIs
                            • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                            • GetLastError.KERNEL32 ref: 00405C26
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                            • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                            • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                            • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                            APIs
                            • CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?), ref: 00405C8E
                            • CloseHandle.KERNEL32(?), ref: 00405C9B
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID:
                            • API String ID: 3712363035-0
                            • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                            • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                            • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                            • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                            APIs
                            • GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00406AA3
                              • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104,UXTHEME), ref: 00406A1D
                              • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                              • Part of subcall function 00406A06: LoadLibraryExW.KERNELBASE(?,00000000,?), ref: 00406A6C
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                            • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                            • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                            • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                            APIs
                            • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                            • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                            • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                            • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                            APIs
                            • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                            • GetLastError.KERNEL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405C44
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                            • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                            • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                            • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                            APIs
                            • ReadFile.KERNELBASE(00000000), ref: 695D2C57
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 236d80862a558cfc5a0f78b3f39a2fca35d4d13eb6544fc3d573a3598faf4a16
                            • Instruction ID: 7bc405a69b80f9adf51d3768b932033be5ed7ad75659b357e47e276a97306e5f
                            • Opcode Fuzzy Hash: 236d80862a558cfc5a0f78b3f39a2fca35d4d13eb6544fc3d573a3598faf4a16
                            • Instruction Fuzzy Hash: 0141AC75904244EFEF11DFACD981B4937B4EB86318F21C82AE904C6218D778988F8BDD
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                              • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FilePointerwsprintf
                            • String ID:
                            • API String ID: 327478801-0
                            • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                            • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                            • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                            • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                            APIs
                            • WritePrivateProfileStringW.KERNEL32 ref: 004023EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: PrivateProfileStringWrite
                            • String ID:
                            • API String ID: 390214022-0
                            • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                            • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                            • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                            • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                            APIs
                            • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00406546
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                            • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                            • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                            • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                            APIs
                            • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000), ref: 00406238
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                            • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                            • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                            • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                            APIs
                            • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000), ref: 00406209
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                            • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                            • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                            • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                            APIs
                            • VirtualProtect.KERNELBASE(695D505C,?,?,695D504C), ref: 695D2A9D
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: 3ff184efbdb27ef098e3c468f744087f06e8176ad2342b98c1fd55f38ade84bb
                            • Instruction ID: ba47ee6bdc4716738235b3a9354e75df70ce55096f6d4b200379a183338f8993
                            • Opcode Fuzzy Hash: 3ff184efbdb27ef098e3c468f744087f06e8176ad2342b98c1fd55f38ade84bb
                            • Instruction Fuzzy Hash: DBF04EB09442C0DEDB51CF2984447093BE0F75B315B56856AE288D6289E374444EDBDD
                            APIs
                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: PrivateProfileString
                            • String ID:
                            • API String ID: 1096422788-0
                            • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                            • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                            • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                            • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                            • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                            • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                            • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                            APIs
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD), ref: 00405774
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                              • Part of subcall function 00405C65: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?), ref: 00405C8E
                              • Part of subcall function 00405C65: CloseHandle.KERNEL32(?), ref: 00405C9B
                            • CloseHandle.KERNEL32(?), ref: 00401FF0
                              • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,?), ref: 00406B32
                              • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                              • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                            • String ID:
                            • API String ID: 2972824698-0
                            • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                            • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                            • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                            • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                            APIs
                            • GlobalAlloc.KERNELBASE(?,?,695D12DB,?,695D137F,00000019,695D11CA,-000000A0), ref: 695D12C5
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: AllocGlobal
                            • String ID:
                            • API String ID: 3761449716-0
                            • Opcode ID: 091311af1f3ea5ebac9e1d485871b8c35d0d21ab399ffe69d0557352ecee4a44
                            • Instruction ID: a7375d94855d53ddbb54c48243b70bbf125cda4377ceab6d3d8e2b4e9562f706
                            • Opcode Fuzzy Hash: 091311af1f3ea5ebac9e1d485871b8c35d0d21ab399ffe69d0557352ecee4a44
                            • Instruction Fuzzy Hash: 5AB012706000409FEF00DF14DC0AF343354F702300F054000B600C6080D120480C85AC
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 004058A4
                            • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                            • GetClientRect.USER32(?,?,?), ref: 004058F0
                            • GetSystemMetrics.USER32(00000002), ref: 004058F7
                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                            • ShowWindow.USER32(00000000,?), ref: 0040597F
                            • ShowWindow.USER32(?,?), ref: 00405993
                            • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                            • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                              • Part of subcall function 00404636: SendMessageW.USER32(?,?,00000001,00404461), ref: 00404644
                            • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                            • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                            • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                            • ShowWindow.USER32(00000000), ref: 00405A3F
                            • ShowWindow.USER32(?,?), ref: 00405A44
                            • ShowWindow.USER32(?), ref: 00405A8E
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                            • CreatePopupMenu.USER32 ref: 00405AD3
                            • AppendMenuW.USER32 ref: 00405AE7
                            • GetWindowRect.USER32(?,?), ref: 00405B07
                            • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405B20
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                            • OpenClipboard.USER32(00000000), ref: 00405B68
                            • EmptyClipboard.USER32 ref: 00405B6E
                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                            • GlobalLock.KERNEL32(00000000), ref: 00405B84
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                            • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                            • CloseClipboard.USER32 ref: 00405BC9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID: H/B${
                            • API String ID: 590372296-332483393
                            • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                            • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                            • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                            • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                            • SetWindowTextW.USER32(00000000,?,?), ref: 00404B6B
                            • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                            • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                            • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                            • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                            • SetDlgItemTextW.USER32(?,000003FB,?,?), ref: 00404C77
                              • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE,000003FB,?), ref: 00405CD9
                              • Part of subcall function 00406930: CharNextW.USER32(?), ref: 00406993
                              • Part of subcall function 00406930: CharNextW.USER32(?), ref: 004069A2
                              • Part of subcall function 00406930: CharNextW.USER32(?), ref: 004069A7
                              • Part of subcall function 00406930: CharPrevW.USER32(?,?), ref: 004069BA
                            • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D3A
                            • MulDiv.KERNEL32 ref: 00404D55
                              • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                              • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                              • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                            • API String ID: 2624150263-3990111104
                            • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                            • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                            • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                            • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                            APIs
                              • Part of subcall function 695D12BB: GlobalAlloc.KERNELBASE(?,?,695D12DB,?,695D137F,00000019,695D11CA,-000000A0), ref: 695D12C5
                            • GlobalAlloc.KERNEL32(?,00001CA4), ref: 695D1D2D
                            • lstrcpyW.KERNEL32(00000008,?), ref: 695D1D75
                            • lstrcpyW.KERNEL32(00000808,?), ref: 695D1D7F
                            • GlobalFree.KERNEL32(00000000), ref: 695D1D92
                            • GlobalFree.KERNEL32(?), ref: 695D1E74
                            • GlobalFree.KERNEL32(?), ref: 695D1E79
                            • GlobalFree.KERNEL32(?), ref: 695D1E7E
                            • GlobalFree.KERNEL32(00000000), ref: 695D2068
                            • lstrcpyW.KERNEL32(?,?), ref: 695D2222
                            • GetModuleHandleW.KERNEL32(00000008), ref: 695D22A1
                            • LoadLibraryW.KERNEL32(00000008), ref: 695D22B2
                            • GetProcAddress.KERNEL32(?,?), ref: 695D230C
                            • lstrlenW.KERNEL32(00000808), ref: 695D2326
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                            • String ID:
                            • API String ID: 245916457-0
                            • Opcode ID: db6b813ac48ca0927005c20ba6b9991d88857adb4492175e823b244c6e01f82c
                            • Instruction ID: d6fe84b4432616b761dd336ec878ffdd5586ee1e5103c32f9329be611255fd5f
                            • Opcode Fuzzy Hash: db6b813ac48ca0927005c20ba6b9991d88857adb4492175e823b244c6e01f82c
                            • Instruction Fuzzy Hash: 81229E71D44206DEDB18DFACC5806EEBBB0FF06355F11892ED1A5E7280D770998ACB58
                            APIs
                            • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?), ref: 0040222E
                            Strings
                            • C:\Users\user\eftermodnendes\ringeagt, xrefs: 0040226E
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CreateInstance
                            • String ID: C:\Users\user\eftermodnendes\ringeagt
                            • API String ID: 542301482-3136511402
                            • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                            • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                            • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                            • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                            • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                            • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                            • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00405086
                            • GetDlgItem.USER32(?,00000408), ref: 00405091
                            • GlobalAlloc.KERNEL32(?,?), ref: 004050DB
                            • LoadImageW.USER32 ref: 004050F2
                            • SetWindowLongW.USER32(?,?,0040567B), ref: 0040510B
                            • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 0040511F
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                            • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                            • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00405165
                            • DeleteObject.GDI32(00000000), ref: 00405168
                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                              • Part of subcall function 00404636: SendMessageW.USER32(?,?,00000001,00404461), ref: 00404644
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                            • GetWindowLongW.USER32(?,?), ref: 004052AC
                            • SetWindowLongW.USER32(?,?,00000000), ref: 004052BA
                            • ShowWindow.USER32(?,00000005), ref: 004052CA
                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 0040543F
                            • SendMessageW.USER32(?,00000420,00000000,?), ref: 00405463
                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                            • ImageList_Destroy.COMCTL32(?), ref: 00405498
                            • GlobalFree.KERNEL32(?), ref: 004054A8
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                            • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00405604
                            • ShowWindow.USER32(?,00000000), ref: 00405652
                            • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                            • ShowWindow.USER32(00000000), ref: 00405664
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 2564846305-813528018
                            • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                            • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                            • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                            • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                            • ShowWindow.USER32(?), ref: 0040415E
                            • GetWindowLongW.USER32(?,?), ref: 00404170
                            • ShowWindow.USER32(?,?), ref: 00404189
                            • DestroyWindow.USER32 ref: 0040419D
                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                            • GetDlgItem.USER32(?,?), ref: 004041D5
                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                            • IsWindowEnabled.USER32(00000000), ref: 004041F0
                            • GetDlgItem.USER32(?,00000001), ref: 0040429B
                            • GetDlgItem.USER32(?,00000002), ref: 004042A5
                            • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404310
                            • GetDlgItem.USER32(?,00000003), ref: 004043B6
                            • ShowWindow.USER32(00000000,?), ref: 004043D7
                            • EnableWindow.USER32(?,?), ref: 004043E9
                            • EnableWindow.USER32(?,?), ref: 00404404
                            • GetSystemMenu.USER32 ref: 0040441A
                            • EnableMenuItem.USER32 ref: 00404421
                            • SendMessageW.USER32(?,?,00000000,00000001), ref: 00404439
                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                            • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                            • SetWindowTextW.USER32(?,00422F48,00000000,00422F48,?,00422F48,00000000), ref: 0040448A
                            • ShowWindow.USER32(?,0000000A), ref: 004045BE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID: H/B
                            • API String ID: 1860320154-184950203
                            • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                            • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                            • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                            • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                            APIs
                              • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                              • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00406AA3
                            • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,7570D4C4,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",00008001), ref: 00403DD5
                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,7570D4C4), ref: 00403E55
                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                            • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                            • LoadImageW.USER32 ref: 00403EBC
                              • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                            • RegisterClassW.USER32(00428A00), ref: 00403EF9
                            • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403F11
                            • CreateWindowExW.USER32 ref: 00403F46
                            • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                            • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                            • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                            • RegisterClassW.USER32(00428A00), ref: 00403FBE
                            • DialogBoxParamW.USER32 ref: 00403FDD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                            • API String ID: 1975747703-219743493
                            • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                            • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                            • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                            • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D
                            APIs
                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040485E
                            • GetDlgItem.USER32(?,000003E8), ref: 00404872
                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040488F
                            • GetSysColor.USER32(?), ref: 004048A0
                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                            • lstrlenW.KERNEL32(?), ref: 004048C1
                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                            • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                            • SendMessageW.USER32(00000000), ref: 00404943
                            • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                            • LoadCursorW.USER32 ref: 004049BF
                            • SetCursor.USER32(00000000), ref: 004049C2
                            • LoadCursorW.USER32 ref: 004049DB
                            • SetCursor.USER32(00000000), ref: 004049DE
                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A0D
                            • SendMessageW.USER32(?,00000000,00000000), ref: 00404A1F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: 7G@$Call$N
                            • API String ID: 3103080414-3155595626
                            • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                            • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                            • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                            • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                            APIs
                            • CloseHandle.KERNEL32(00000000), ref: 00406303
                            • GetShortPathNameW.KERNEL32(?,004265E8,00000400,?,?,00406463,?,?), ref: 0040630C
                              • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                              • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                            • GetShortPathNameW.KERNEL32(?,00426DE8,00000400,?,00000000,?,?,00406463,?,?), ref: 00406329
                            • wsprintfA.USER32 ref: 00406347
                            • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,?,00426DE8,?,?,?,?,?), ref: 00406382
                            • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00406391
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                            • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                            • GlobalFree.KERNEL32(00000000), ref: 00406430
                            • CloseHandle.KERNEL32(00000000), ref: 00406437
                              • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                              • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %ls=%ls$[Rename]$eB$mB$mB
                            • API String ID: 2171350718-2529913679
                            • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                            • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                            • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                            • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                            APIs
                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32 ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                            • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                            • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                            • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                            APIs
                            Strings
                            • "C:\Users\user\Desktop\2T10XBqS6g.exe", xrefs: 00406974
                            • *?|<>/":, xrefs: 00406982
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-3692916972
                            • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                            • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                            • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                            • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                            APIs
                            • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                            • GetSysColor.USER32(00000000,?), ref: 004046C3
                            • SetTextColor.GDI32(?,00000000), ref: 004046CF
                            • SetBkMode.GDI32(?,?), ref: 004046DB
                            • GetSysColor.USER32(?), ref: 004046EE
                            • SetBkColor.GDI32(?,?), ref: 004046FE
                            • DeleteObject.GDI32(?), ref: 00404718
                            • CreateBrushIndirect.GDI32(?), ref: 00404722
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                            • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                            • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                            • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                            APIs
                            • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                            • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                            • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                            • SetWindowTextW.USER32(00421F28,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD), ref: 00405774
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                            • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                            • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                            • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                            APIs
                            • DestroyWindow.USER32 ref: 0040304E
                            • GetTickCount.KERNEL32(00000000), ref: 0040306C
                            • wsprintfW.USER32 ref: 0040309A
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD), ref: 00405774
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                            • CreateDialogParamW.USER32 ref: 004030BE
                            • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                              • Part of subcall function 00403017: MulDiv.KERNEL32 ref: 0040302C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                            • String ID: ... %d%%
                            • API String ID: 722711167-2449383134
                            • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                            • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                            • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                            • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                            APIs
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                            • GetMessagePos.USER32 ref: 00404FDF
                            • ScreenToClient.USER32(?,?), ref: 00404FF9
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                            • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                            • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                            • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                            • wsprintfW.USER32 ref: 00402FEA
                            • SetWindowTextW.USER32(?,?), ref: 00402FFA
                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                            • API String ID: 1451636040-1158693248
                            • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                            • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                            • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                            • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                            APIs
                              • Part of subcall function 695D12BB: GlobalAlloc.KERNELBASE(?,?,695D12DB,?,695D137F,00000019,695D11CA,-000000A0), ref: 695D12C5
                            • GlobalFree.KERNEL32(?), ref: 695D2743
                            • GlobalFree.KERNEL32(00000000), ref: 695D2778
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: ae6d4fe566cf46621e996d854b19927c448bd359dad3c6663c5b04c7255b0090
                            • Instruction ID: e2a10911489051488fe31ab8743e9b898e606e360a84831336e182243502b46c
                            • Opcode Fuzzy Hash: ae6d4fe566cf46621e996d854b19927c448bd359dad3c6663c5b04c7255b0090
                            • Instruction Fuzzy Hash: CE319C71608141EFCB25CF6CD984C2A77B6FF873457168529F101D72A0D731684EDBAA
                            APIs
                              • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                              • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406198
                            • GlobalAlloc.KERNEL32(?,?), ref: 004029B6
                              • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                            • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004029D2
                            • GlobalFree.KERNEL32(?), ref: 00402A0B
                            • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                              • Part of subcall function 00403376: SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                            • CloseHandle.KERNEL32(?), ref: 00402A3A
                            • DeleteFileW.KERNEL32(?), ref: 00402A4D
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                            • String ID:
                            • API String ID: 488507980-0
                            • Opcode ID: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                            • Instruction ID: ba218adf5694e25fd77313e1ccbbfbab35a2a379656f90145ff8969d650460ca
                            • Opcode Fuzzy Hash: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                            • Instruction Fuzzy Hash: 8E218B71D00118BFCF21AFA4DD8989EBFB9EF08360B14422AF555762E1CB7949419F68
                            APIs
                            • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                            • wsprintfW.USER32 ref: 00404F58
                            • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s$H/B
                            • API String ID: 3540041739-2222257793
                            • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                            • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                            • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                            • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: FreeGlobal
                            • String ID:
                            • API String ID: 2979337801-0
                            • Opcode ID: 1017b74bc5cbb64eb4236fc3c282077d80f19e6c6cd4c26ffa06502fa7d3af5b
                            • Instruction ID: 7d3c7992d5d9afd49dbca9a865d11b45af39d69cfc9106215b724a2505964369
                            • Opcode Fuzzy Hash: 1017b74bc5cbb64eb4236fc3c282077d80f19e6c6cd4c26ffa06502fa7d3af5b
                            • Instruction Fuzzy Hash: C951AF36D04118AEBB0CDFACC5405AEBBB5FB86358F02855AD404E7250E771AE8D879D
                            APIs
                            • GlobalFree.KERNEL32(00000000), ref: 695D25C2
                              • Part of subcall function 695D12CC: lstrcpynW.KERNEL32(00000000,?,695D137F,00000019,695D11CA,-000000A0), ref: 695D12DC
                            • GlobalAlloc.KERNEL32(?), ref: 695D2548
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 695D2563
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                            • String ID:
                            • API String ID: 4216380887-0
                            • Opcode ID: c669a412f42b5886ca2c17e99650e51d42441113dcecd1a50731740eca5c315a
                            • Instruction ID: f238d4cc14b43020bfbe9eb19dd3db989ba3d3ccdb9720c753d708243e4405ac
                            • Opcode Fuzzy Hash: c669a412f42b5886ca2c17e99650e51d42441113dcecd1a50731740eca5c315a
                            • Instruction Fuzzy Hash: 8441BFB5009345DFD714DF2CE844E2677B8FB86354F01891DE84ACB684EB30A94ECBA9
                            APIs
                            • GetDlgItem.USER32(?,?), ref: 00401D9F
                            • GetClientRect.USER32(?,?), ref: 00401DEA
                            • LoadImageW.USER32 ref: 00401E1A
                            • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                            • DeleteObject.GDI32(00000000), ref: 00401E3E
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                            • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                            • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                            • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                            APIs
                            • GetDC.USER32(?), ref: 00401E56
                            • GetDeviceCaps.GDI32(00000000,0000005A,?), ref: 00401E70
                            • MulDiv.KERNEL32 ref: 00401E78
                            • ReleaseDC.USER32(?,00000000), ref: 00401E89
                            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID:
                            • API String ID: 3808545654-0
                            • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                            • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                            • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                            • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                            APIs
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,695D22D8,?,00000808), ref: 695D16D5
                            • GlobalAlloc.KERNEL32(?,00000000,?,00000000,695D22D8,?,00000808), ref: 695D16DC
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,695D22D8,?,00000808), ref: 695D16F0
                            • GetProcAddress.KERNEL32(695D22D8,00000000,?,00000000,695D22D8,?,00000808), ref: 695D16F7
                            • GlobalFree.KERNEL32(00000000), ref: 695D1700
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                            • String ID:
                            • API String ID: 1148316912-0
                            • Opcode ID: ce8311d2e35bebfa614fb43882adc39898610ee057152a2937c2a4d225442db8
                            • Instruction ID: 3f6c5eb497fdf94e9fd87c8883c6891f8b25dc8ddd01de165ae35130e522db52
                            • Opcode Fuzzy Hash: ce8311d2e35bebfa614fb43882adc39898610ee057152a2937c2a4d225442db8
                            • Instruction Fuzzy Hash: 87F01C722061787BDA205BA69C4CCBBBE9CEF8B2F5B120215F628E21D096614C05D7F5
                            APIs
                            Strings
                            • C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp, xrefs: 00405FFD
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CharNext
                            • String ID: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp
                            • API String ID: 3213498283-458454213
                            • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                            • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                            • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                            • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                            APIs
                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F57
                            • CharPrevW.USER32(?,00000000), ref: 00405F61
                            • lstrcatW.KERNEL32(?,0040A014,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405F73
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-4017390910
                            • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                            • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                            • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                            • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.886270666.00000000695D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 695D0000, based on PE: true
                            • Associated: 00000000.00000002.886261951.00000000695D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886277899.00000000695D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.886284267.00000000695D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_695d0000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: 5dc83f3e9fd736c6fcded96564c5e36926cec62d71559025df646b6759fb7563
                            • Instruction ID: 972bf0589f4a6a5a2d3d2c9e604f3f4b2dacc889d024d9e0bff4887d67259603
                            • Opcode Fuzzy Hash: 5dc83f3e9fd736c6fcded96564c5e36926cec62d71559025df646b6759fb7563
                            • Instruction Fuzzy Hash: E2519EB5900202DFDB08CFADD949A2677E8FB4B719B028519F904DB250E735E94DCB9C
                            APIs
                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dll), ref: 0040269A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp$C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp\System.dll
                            • API String ID: 1659193697-2993036897
                            • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                            • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                            • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                            • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                            APIs
                            • CloseHandle.KERNEL32(00000184), ref: 00403C74
                            • CloseHandle.KERNEL32(00000188), ref: 00403C88
                            Strings
                            • C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp, xrefs: 00403C98
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp
                            • API String ID: 2962429428-1156241172
                            • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                            • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                            • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                            • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                            APIs
                              • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                              • Part of subcall function 00405FFC: CharNextW.USER32(?), ref: 0040600A
                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,7570D4C4,?,756F13E0,00405DAE,?,7570D4C4,756F13E0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 004060B2
                            • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp,7570D4C4,?,756F13E0,00405DAE,?,7570D4C4,756F13E0), ref: 004060C2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsl5DDB.tmp
                            • API String ID: 3248276644-458454213
                            • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                            • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                            • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                            • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                            APIs
                            • IsWindowVisible.USER32(?), ref: 004056AA
                            • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                              • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                            • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                            • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                            • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                            APIs
                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800), ref: 00406596
                            • RegCloseKey.ADVAPI32(?), ref: 004065A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: Call
                            • API String ID: 3356406503-1824292864
                            • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                            • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                            • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                            • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                            APIs
                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00405FA3
                            • CharPrevW.USER32(80000000,00000000), ref: 00405FB3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-66916594
                            • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                            • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                            • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                            • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                            • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                            • CharNextA.USER32(00000000), ref: 00406110
                            • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                            Memory Dump Source
                            • Source File: 00000000.00000002.885796917.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.885792965.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885800981.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885804968.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.885824564.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                            • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                            • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                            • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99