Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2T10XBqS6g.exe

Overview

General Information

Sample name:2T10XBqS6g.exe
renamed because original name is a hash value
Original sample name:5266c53649caa9edea2f4ab58d58f511.bat
Analysis ID:1590600
MD5:5266c53649caa9edea2f4ab58d58f511
SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
Infos:

Detection

GuLoader
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 2T10XBqS6g.exe (PID: 7268 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4110569608.0000000003290000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 2T10XBqS6g.exeVirustotal: Detection: 33%Perma Link
    Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.1% probability
    Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Sufferers.GyrJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\utidige.GauJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Temp\nslAE0A.tmpJump to behavior
    Source: 2T10XBqS6g.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00406DA00_2_00406DA0
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_6F951BFF0_2_6F951BFF
    Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal64.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,LdrInitializeThunk,SetDlgItemTextW,0_2_00404AF2
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004021AF LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,0_2_004021AF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\eftermodnendesJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nslAE09.tmpJump to behavior
    Source: 2T10XBqS6g.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 2T10XBqS6g.exeVirustotal: Detection: 33%
    Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
    Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4110569608.0000000003290000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_6F951BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F951BFF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_6F9530C0 push eax; ret 0_2_6F9530EE
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_032914E1 push ds; retf 0_2_032914E5
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_032944E1 push ds; retf 0_2_032944E5
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeRDTSC instruction interceptor: First address: 352A302 second address: 352A302 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F4EFCE4C79Fh 0x00000006 cmp ax, cx 0x00000009 test ah, ah 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d test edx, 139251E6h 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Sufferers.GyrJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\utidige.GauJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Temp\nslAE0A.tmpJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4459
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4688
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_6F951BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F951BFF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory4
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    2T10XBqS6g.exe33%VirustotalBrowse
    2T10XBqS6g.exe32%ReversingLabsWin32.Trojan.Guloader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dll3%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError2T10XBqS6g.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1590600
      Start date and time:2025-01-14 10:48:24 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 57s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Potential for more IOCs and behavior
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:2T10XBqS6g.exe
      renamed because original name is a hash value
      Original Sample Name:5266c53649caa9edea2f4ab58d58f511.bat
      Detection:MAL
      Classification:mal64.troj.evad.winEXE@1/8@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 99%
      • Number of executed functions: 46
      • Number of non-executed functions: 33
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dllZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
        https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
          RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
              CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                  SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                    D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):25
                        Entropy (8bit):4.0536606896881855
                        Encrypted:false
                        SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                        MD5:08CA75DA54EB4810D18796C97F510A55
                        SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                        SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                        SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:[Bus Clock]..Gats=Galse..
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):12288
                        Entropy (8bit):5.805604762622714
                        Encrypted:false
                        SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                        MD5:4ADD245D4BA34B04F213409BFE504C07
                        SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                        SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                        SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 3%, Browse
                        Joe Sandbox View:
                        • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                        • Filename: , Detection: malicious, Browse
                        • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                        • Filename: Quotation.exe, Detection: malicious, Browse
                        • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                        • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                        • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                        • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1155000
                        Entropy (8bit):3.8859756205821308
                        Encrypted:false
                        SSDEEP:6144:uGCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyCe40DX7DBII0M1S9L76R:JCTw03L9ZXI4a2QGM3HkXkCX7xS9CR
                        MD5:38A7F42F627D0CFEDB0C6AA615ED9033
                        SHA1:83D88F62301313DF7684F010059F31E6DFD98F09
                        SHA-256:5997C5EE4C46C86EE31FE005BD75537E30F9DFEBB101898813142C535902DA9C
                        SHA-512:19829ACEEFBFA48E9EB68E22FB14602556EA577F8E21A4068FFF9E6C3D56837ADC6B5F560828DB2FFF4E9B62A585F0FA8E16BD20B452FFB02BB73EE293D8F8D2
                        Malicious:false
                        Reputation:low
                        Preview:H.......,...................V...,...............H...........................................................................................................................................................................................................................................G...Y...........,...j...............................................................................................................................b...................W...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):114454
                        Entropy (8bit):1.2519787240577294
                        Encrypted:false
                        SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                        MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                        SHA1:B61AEF131017C5605647983CE2D55769914BB104
                        SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                        SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                        Malicious:false
                        Reputation:low
                        Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):310550
                        Entropy (8bit):1.2527719188567612
                        Encrypted:false
                        SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                        MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                        SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                        SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                        SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                        Malicious:false
                        Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):309745
                        Entropy (8bit):7.569098036898635
                        Encrypted:false
                        SSDEEP:6144:5GCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyC6:kCTw03L9ZXI4a2QGM3HkX1
                        MD5:E5DB339C9BC74BBBF87F00D895C3CE7D
                        SHA1:7E81D22286BBC4F9DE3EE19632FE4393C000A19C
                        SHA-256:85BD4C3E0830FF240D546F22B590A70A78C9D273ABEDCEC034C07794A170A319
                        SHA-512:A6ECC38DD64383B6355111D7454FDE81B103601439AB7B9C83951A4CCE182031D16BE5E1096C905335E1C970942875B8CD35BFC400AF3CF470DBFE527832576F
                        Malicious:false
                        Preview:...................................."..}}}}........&..u..44.@.......SS.........eeee.........]....................****............c..............................C.MM...........HH...................II....................{{{{......aaaa......tt...................h............a..V.............$............ee...NNN.U...Y.G........:...............................||................V.''''.....................;..W.`...GG...77.......Z.U.ll......d.iiii.WWWW................4..OO............RRRR.l..........T.................F.......................f.........i...............................22.....E........F...................;............ttt......."".......%............>>.JJJJ.~~.......................I........Q..........................S.YYY...................w..V.....|..@@.$$.<........(.'''''.....h...................WW...||.;.9999...s...&...ii..a...::::..N..........!..>....i.11.....y.....3..M..x..............oo........=...aa........0..........)...........r.........ii.............}}...........ooo...
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                        Category:dropped
                        Size (bytes):267655
                        Entropy (8bit):1.2559804952290619
                        Encrypted:false
                        SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                        MD5:F6A4342C9271CFFEF29695EEA330941E
                        SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                        SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                        SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                        Malicious:false
                        Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                        Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):133033
                        Entropy (8bit):4.593734870096358
                        Encrypted:false
                        SSDEEP:1536:sS8+1gLo/MpFTtd62wA8i0rH/SHGphackCh1Up78GsvP2Jl275nr4okWO/h:BgL6MpFberHX9JhBPBEokr
                        MD5:5571C0F9CABA24DDC31B19F2680AC58C
                        SHA1:7D80A671FCE50A911EC74C527770D6D1EC92C0FC
                        SHA-256:21B871645A5DE53B99910AC3F464A5E9C6C29715603F4975F437C2A9FF3B264A
                        SHA-512:8E33180BA9D6165C44B03B56A8224C7D0F2FBACB06102C0FD195391F2350DE648AC4CAB82D58D59D87B83519B484242061F4122082099B6595F91C090FFBEA89
                        Malicious:false
                        Preview:....>..............o.............'.............{.......TT.............b....222222.....LL.w......UU.,.....##..............||........._..........~~~~~..jj...D...MMM...............................[...j......'.................>>..ccccc............................k...........................mmm.............$$...................{.......................VV.....UUU.....33.........L.ww....LLLL...................Y........ss.*......b..........................F................n...88...l.&.....@@..........l........q.......GG.........................r.......PP..C....y......................................EE............i.......F.>...........(...........g..........{{..E........................--......................-.................;.............bb.....ssssss...WW.....WW.E..).._.....[[.NNN.........u.....X..q......IIII...qq...............xxx...pp..............x..........oo......-.................................G..............................................[.u....................OOOOO................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.733854525663187
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:2T10XBqS6g.exe
                        File size:578'624 bytes
                        MD5:5266c53649caa9edea2f4ab58d58f511
                        SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
                        SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
                        SHA512:3284c03bbdc622d6f4f2dfc2f77e37540e9007382e1c44cc1b98cc0aebf63c125c1560b59d429f8780a2b0d0450bd31566b946c4daa6f3c142520c25bd01e56f
                        SSDEEP:12288:UnPdMEc/A4e/wKOBwCYSUu9EEwH5IvhJGspQCZu6:EPdMEc/AN/XOBwCYSN9EEwZI6spQR6
                        TLSH:4EC4F1F6F650C267E61F0D34DA72A8F01990BC39D1D1483B43A47DADF472A62589BA0F
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                        Icon Hash:4571753721719a8d
                        Entrypoint:0x403645
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                        Instruction
                        sub esp, 000003F8h
                        push ebp
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebp, ebp
                        push 00008001h
                        mov dword ptr [esp+20h], ebp
                        mov dword ptr [esp+18h], 0040A230h
                        mov dword ptr [esp+14h], ebp
                        call dword ptr [004080A0h]
                        mov esi, dword ptr [004080A4h]
                        lea eax, dword ptr [esp+34h]
                        push eax
                        mov dword ptr [esp+4Ch], ebp
                        mov dword ptr [esp+0000014Ch], ebp
                        mov dword ptr [esp+00000150h], ebp
                        mov dword ptr [esp+38h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007F4EFD2A49EAh
                        lea eax, dword ptr [esp+34h]
                        mov dword ptr [esp+34h], 00000114h
                        push eax
                        call esi
                        mov ax, word ptr [esp+48h]
                        mov ecx, dword ptr [esp+62h]
                        sub ax, 00000053h
                        add ecx, FFFFFFD0h
                        neg ax
                        sbb eax, eax
                        mov byte ptr [esp+0000014Eh], 00000004h
                        not eax
                        and eax, ecx
                        mov word ptr [esp+00000148h], ax
                        cmp dword ptr [esp+38h], 0Ah
                        jnc 00007F4EFD2A49B8h
                        and word ptr [esp+42h], 0000h
                        mov eax, dword ptr [esp+40h]
                        movzx ecx, byte ptr [esp+3Ch]
                        mov dword ptr [00429B18h], eax
                        xor eax, eax
                        mov ah, byte ptr [esp+38h]
                        movzx eax, ax
                        or eax, ecx
                        xor ecx, ecx
                        mov ch, byte ptr [esp+00000148h]
                        movzx ecx, cx
                        shl eax, 10h
                        or eax, ecx
                        movzx ecx, byte ptr [esp+0000004Eh]
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                        RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                        RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                        RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                        RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                        RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                        RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                        RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                        RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                        RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                        RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                        RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                        RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                        RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                        RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                        RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                        DLLImport
                        ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                        SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                        ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                        COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                        USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                        GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                        KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:04:49:14
                        Start date:14/01/2025
                        Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\2T10XBqS6g.exe"
                        Imagebase:0x400000
                        File size:578'624 bytes
                        MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4110569608.0000000003290000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:15.2%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:15.7%
                          Total number of Nodes:1607
                          Total number of Limit Nodes:33
                          execution_graph 5817 4047c0 5818 4047d8 5817->5818 5822 4048f2 5817->5822 5823 404601 22 API calls 5818->5823 5819 40495c 5820 404a26 5819->5820 5821 404966 GetDlgItem 5819->5821 5828 404668 8 API calls 5820->5828 5824 404980 5821->5824 5825 4049e7 5821->5825 5822->5819 5822->5820 5826 40492d GetDlgItem SendMessageW 5822->5826 5827 40483f 5823->5827 5824->5825 5832 4049a6 SendMessageW LoadCursorW SetCursor 5824->5832 5825->5820 5833 4049f9 5825->5833 5850 404623 EnableWindow 5826->5850 5830 404601 22 API calls 5827->5830 5831 404a21 5828->5831 5837 40484c CheckDlgButton 5830->5837 5854 404a6f 5832->5854 5834 404a0f 5833->5834 5835 4049ff SendMessageW 5833->5835 5834->5831 5839 404a15 SendMessageW 5834->5839 5835->5834 5836 404957 5851 404a4b 5836->5851 5848 404623 EnableWindow 5837->5848 5839->5831 5843 40486a GetDlgItem 5849 404636 SendMessageW 5843->5849 5845 404880 SendMessageW 5846 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5845->5846 5847 40489d GetSysColor 5845->5847 5846->5831 5847->5846 5848->5843 5849->5845 5850->5836 5852 404a59 5851->5852 5853 404a5e SendMessageW 5851->5853 5852->5853 5853->5819 5857 405ca8 ShellExecuteExW 5854->5857 5856 4049d5 LoadCursorW SetCursor 5856->5825 5857->5856 5288 402643 5289 402672 5288->5289 5290 402657 5288->5290 5292 4026a2 5289->5292 5293 402677 5289->5293 5291 402d89 21 API calls 5290->5291 5301 40265e 5291->5301 5295 402dab 21 API calls 5292->5295 5294 402dab 21 API calls 5293->5294 5297 40267e 5294->5297 5296 4026a9 lstrlenW 5295->5296 5296->5301 5305 4066a4 WideCharToMultiByte 5297->5305 5299 402692 lstrlenA 5299->5301 5300 4026ec 5301->5300 5303 406253 5 API calls 5301->5303 5304 4026d6 5301->5304 5302 406224 WriteFile 5302->5300 5303->5304 5304->5300 5304->5302 5305->5299 4413 403645 SetErrorMode GetVersionExW 4414 4036d1 4413->4414 4415 403699 GetVersionExW 4413->4415 4416 403728 4414->4416 4417 406a76 5 API calls 4414->4417 4415->4414 4418 406a06 3 API calls 4416->4418 4417->4416 4419 40373e lstrlenA 4418->4419 4419->4416 4420 40374e 4419->4420 4421 406a76 5 API calls 4420->4421 4422 403755 4421->4422 4423 406a76 5 API calls 4422->4423 4424 40375c 4423->4424 4425 406a76 5 API calls 4424->4425 4426 403768 #17 OleInitialize SHGetFileInfoW 4425->4426 4501 406682 lstrcpynW 4426->4501 4429 4037b7 GetCommandLineW 4502 406682 lstrcpynW 4429->4502 4431 4037c9 4432 405f7e CharNextW 4431->4432 4433 4037ef CharNextW 4432->4433 4443 403801 4433->4443 4434 403903 4435 403917 GetTempPathW 4434->4435 4503 403614 4435->4503 4437 40392f 4438 403933 GetWindowsDirectoryW lstrcatW 4437->4438 4439 403989 DeleteFileW 4437->4439 4441 403614 12 API calls 4438->4441 4513 4030d5 GetTickCount GetModuleFileNameW 4439->4513 4440 405f7e CharNextW 4440->4443 4444 40394f 4441->4444 4443->4434 4443->4440 4447 403905 4443->4447 4444->4439 4446 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4444->4446 4445 40399d 4453 405f7e CharNextW 4445->4453 4457 403a54 4445->4457 4485 403a44 4445->4485 4448 403614 12 API calls 4446->4448 4600 406682 lstrcpynW 4447->4600 4451 403981 4448->4451 4451->4439 4451->4457 4470 4039bc 4453->4470 4455 403ba2 4686 405ce2 4455->4686 4456 403bc6 4459 403c4a ExitProcess 4456->4459 4460 403bce GetCurrentProcess OpenProcessToken 4456->4460 4677 403c62 4457->4677 4465 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4460->4465 4466 403c1a 4460->4466 4461 403a1a 4601 406059 4461->4601 4462 403a5d 4617 405c4d 4462->4617 4465->4466 4467 406a76 5 API calls 4466->4467 4472 403c21 4467->4472 4470->4461 4470->4462 4475 403c36 ExitWindowsEx 4472->4475 4477 403c43 4472->4477 4475->4459 4475->4477 4476 403a7c 4479 403a94 4476->4479 4621 406682 lstrcpynW 4476->4621 4690 40140b 4477->4690 4484 403aba wsprintfW 4479->4484 4498 403ae6 4479->4498 4481 403a39 4616 406682 lstrcpynW 4481->4616 4486 4066bf 21 API calls 4484->4486 4543 403d54 4485->4543 4486->4479 4489 403b30 SetCurrentDirectoryW 4667 406442 MoveFileExW 4489->4667 4490 403af6 GetFileAttributesW 4491 403b02 DeleteFileW 4490->4491 4490->4498 4491->4498 4495 406442 40 API calls 4495->4498 4496 4066bf 21 API calls 4496->4498 4498->4457 4498->4479 4498->4484 4498->4489 4498->4490 4498->4495 4498->4496 4499 403bb8 CloseHandle 4498->4499 4622 405bd6 CreateDirectoryW 4498->4622 4625 405c30 CreateDirectoryW 4498->4625 4628 405d8e 4498->4628 4671 405c65 CreateProcessW 4498->4671 4674 4069df FindFirstFileW 4498->4674 4499->4457 4501->4429 4502->4431 4504 406930 5 API calls 4503->4504 4505 403620 4504->4505 4506 40362a 4505->4506 4693 405f51 lstrlenW CharPrevW 4505->4693 4506->4437 4509 405c30 2 API calls 4510 403638 4509->4510 4511 4061a1 2 API calls 4510->4511 4512 403643 4511->4512 4512->4437 4696 406172 GetFileAttributesW CreateFileW 4513->4696 4515 403118 4542 403125 4515->4542 4697 406682 lstrcpynW 4515->4697 4517 40313b 4698 405f9d lstrlenW 4517->4698 4521 40314c GetFileSize 4522 403246 4521->4522 4541 403163 4521->4541 4703 403033 4522->4703 4526 40328b GlobalAlloc 4528 4032a2 4526->4528 4527 4032e3 4530 403033 36 API calls 4527->4530 4532 4061a1 2 API calls 4528->4532 4530->4542 4531 40326c 4533 4035e7 ReadFile 4531->4533 4536 4032b3 CreateFileW 4532->4536 4535 403277 4533->4535 4534 403033 36 API calls 4534->4541 4535->4526 4535->4542 4537 4032ed 4536->4537 4536->4542 4718 4035fd SetFilePointer 4537->4718 4539 4032fb 4719 403376 4539->4719 4541->4522 4541->4527 4541->4534 4541->4542 4734 4035e7 4541->4734 4542->4445 4544 406a76 5 API calls 4543->4544 4545 403d68 4544->4545 4546 403d80 4545->4546 4547 403d6e 4545->4547 4548 406550 3 API calls 4546->4548 4789 4065c9 wsprintfW 4547->4789 4549 403db0 4548->4549 4551 403dcf lstrcatW 4549->4551 4553 406550 3 API calls 4549->4553 4552 403d7e 4551->4552 4781 40402a 4552->4781 4553->4551 4556 406059 18 API calls 4557 403e01 4556->4557 4558 403e95 4557->4558 4560 406550 3 API calls 4557->4560 4559 406059 18 API calls 4558->4559 4561 403e9b 4559->4561 4567 403e33 4560->4567 4562 403eab LoadImageW 4561->4562 4563 4066bf 21 API calls 4561->4563 4564 403f51 4562->4564 4565 403ed2 RegisterClassW 4562->4565 4563->4562 4569 40140b 2 API calls 4564->4569 4568 403f08 SystemParametersInfoW CreateWindowExW 4565->4568 4598 403f5b 4565->4598 4566 403e54 lstrlenW 4572 403e62 lstrcmpiW 4566->4572 4573 403e88 4566->4573 4567->4558 4567->4566 4571 405f7e CharNextW 4567->4571 4568->4564 4570 403f57 4569->4570 4577 40402a 22 API calls 4570->4577 4570->4598 4575 403e51 4571->4575 4572->4573 4576 403e72 GetFileAttributesW 4572->4576 4574 405f51 3 API calls 4573->4574 4578 403e8e 4574->4578 4575->4566 4579 403e7e 4576->4579 4581 403f68 4577->4581 4790 406682 lstrcpynW 4578->4790 4579->4573 4580 405f9d 2 API calls 4579->4580 4580->4573 4583 403f74 ShowWindow 4581->4583 4584 403ff7 4581->4584 4586 406a06 3 API calls 4583->4586 4791 4057da OleInitialize 4584->4791 4588 403f8c 4586->4588 4587 403ffd 4589 404001 4587->4589 4590 404019 4587->4590 4591 403f9a GetClassInfoW 4588->4591 4593 406a06 3 API calls 4588->4593 4596 40140b 2 API calls 4589->4596 4589->4598 4592 40140b 2 API calls 4590->4592 4594 403fc4 DialogBoxParamW 4591->4594 4595 403fae GetClassInfoW RegisterClassW 4591->4595 4592->4598 4593->4591 4597 40140b 2 API calls 4594->4597 4595->4594 4596->4598 4599 403fec 4597->4599 4598->4457 4599->4598 4600->4435 4809 406682 lstrcpynW 4601->4809 4603 40606a 4810 405ffc CharNextW CharNextW 4603->4810 4606 403a26 4606->4457 4615 406682 lstrcpynW 4606->4615 4607 406930 5 API calls 4613 406080 4607->4613 4608 4060b1 lstrlenW 4609 4060bc 4608->4609 4608->4613 4611 405f51 3 API calls 4609->4611 4610 4069df 2 API calls 4610->4613 4612 4060c1 GetFileAttributesW 4611->4612 4612->4606 4613->4606 4613->4608 4613->4610 4614 405f9d 2 API calls 4613->4614 4614->4608 4615->4481 4616->4485 4618 406a76 5 API calls 4617->4618 4619 403a62 lstrlenW 4618->4619 4620 406682 lstrcpynW 4619->4620 4620->4476 4621->4479 4623 405c22 4622->4623 4624 405c26 GetLastError 4622->4624 4623->4498 4624->4623 4626 405c40 4625->4626 4627 405c44 GetLastError 4625->4627 4626->4498 4627->4626 4629 406059 18 API calls 4628->4629 4630 405dae 4629->4630 4631 405db6 DeleteFileW 4630->4631 4633 405dcd 4630->4633 4632 405f04 4631->4632 4632->4498 4634 405ef8 4633->4634 4816 406682 lstrcpynW 4633->4816 4634->4632 4640 4069df 2 API calls 4634->4640 4636 405df3 4637 405e06 4636->4637 4638 405df9 lstrcatW 4636->4638 4639 405f9d 2 API calls 4637->4639 4641 405e0c 4638->4641 4639->4641 4643 405f12 4640->4643 4642 405e1c lstrcatW 4641->4642 4644 405e27 lstrlenW FindFirstFileW 4641->4644 4642->4644 4643->4632 4645 405f16 4643->4645 4646 405eed 4644->4646 4665 405e49 4644->4665 4647 405f51 3 API calls 4645->4647 4646->4634 4648 405f1c 4647->4648 4650 405d46 5 API calls 4648->4650 4649 405ed0 FindNextFileW 4653 405ee6 FindClose 4649->4653 4649->4665 4652 405f28 4650->4652 4654 405f42 4652->4654 4655 405f2c 4652->4655 4653->4646 4657 405707 28 API calls 4654->4657 4655->4632 4658 405707 28 API calls 4655->4658 4657->4632 4660 405f39 4658->4660 4659 405d8e 64 API calls 4659->4665 4662 406442 40 API calls 4660->4662 4661 405707 28 API calls 4661->4649 4663 405f40 4662->4663 4663->4632 4664 405707 28 API calls 4664->4665 4665->4649 4665->4659 4665->4661 4665->4664 4666 406442 40 API calls 4665->4666 4817 406682 lstrcpynW 4665->4817 4818 405d46 4665->4818 4666->4665 4668 403b3f CopyFileW 4667->4668 4669 406456 4667->4669 4668->4457 4668->4498 4829 4062c8 4669->4829 4672 405ca4 4671->4672 4673 405c98 CloseHandle 4671->4673 4672->4498 4673->4672 4675 406a00 4674->4675 4676 4069f5 FindClose 4674->4676 4675->4498 4676->4675 4678 403c73 CloseHandle 4677->4678 4679 403c7d 4677->4679 4678->4679 4680 403c91 4679->4680 4681 403c87 CloseHandle 4679->4681 4863 403cbf 4680->4863 4681->4680 4684 405d8e 71 API calls 4685 403b95 OleUninitialize 4684->4685 4685->4455 4685->4456 4687 405cf7 4686->4687 4688 403bb0 ExitProcess 4687->4688 4689 405d0b MessageBoxIndirectW 4687->4689 4689->4688 4691 401389 2 API calls 4690->4691 4692 401420 4691->4692 4692->4459 4694 403632 4693->4694 4695 405f6d lstrcatW 4693->4695 4694->4509 4695->4694 4696->4515 4697->4517 4699 405fab 4698->4699 4700 405fb1 CharPrevW 4699->4700 4701 403141 4699->4701 4700->4699 4700->4701 4702 406682 lstrcpynW 4701->4702 4702->4521 4704 403044 4703->4704 4705 40305c 4703->4705 4706 403054 4704->4706 4707 40304d DestroyWindow 4704->4707 4708 403064 4705->4708 4709 40306c GetTickCount 4705->4709 4706->4526 4706->4542 4737 4035fd SetFilePointer 4706->4737 4707->4706 4738 406ab2 4708->4738 4709->4706 4710 40307a 4709->4710 4712 403082 4710->4712 4713 4030af CreateDialogParamW ShowWindow 4710->4713 4712->4706 4742 403017 4712->4742 4713->4706 4715 403090 wsprintfW 4745 405707 4715->4745 4718->4539 4720 4033a1 4719->4720 4721 403385 SetFilePointer 4719->4721 4756 40347e GetTickCount 4720->4756 4721->4720 4724 40343e 4724->4542 4727 40347e 46 API calls 4728 4033d8 4727->4728 4728->4724 4729 403444 ReadFile 4728->4729 4731 4033e7 4728->4731 4729->4724 4731->4724 4732 4061f5 ReadFile 4731->4732 4771 406224 WriteFile 4731->4771 4732->4731 4735 4061f5 ReadFile 4734->4735 4736 4035fa 4735->4736 4736->4541 4737->4531 4739 406acf PeekMessageW 4738->4739 4740 406ac5 DispatchMessageW 4739->4740 4741 406adf 4739->4741 4740->4739 4741->4706 4743 403026 4742->4743 4744 403028 MulDiv 4742->4744 4743->4744 4744->4715 4746 405722 4745->4746 4747 4030ad 4745->4747 4748 40573e lstrlenW 4746->4748 4749 4066bf 21 API calls 4746->4749 4747->4706 4750 405767 4748->4750 4751 40574c lstrlenW 4748->4751 4749->4748 4753 40577a 4750->4753 4754 40576d SetWindowTextW 4750->4754 4751->4747 4752 40575e lstrcatW 4751->4752 4752->4750 4753->4747 4755 405780 SendMessageW SendMessageW SendMessageW 4753->4755 4754->4753 4755->4747 4757 4035d6 4756->4757 4758 4034ac 4756->4758 4759 403033 36 API calls 4757->4759 4773 4035fd SetFilePointer 4758->4773 4765 4033a8 4759->4765 4761 4034b7 SetFilePointer 4767 4034dc 4761->4767 4762 4035e7 ReadFile 4762->4767 4764 403033 36 API calls 4764->4767 4765->4724 4769 4061f5 ReadFile 4765->4769 4766 406224 WriteFile 4766->4767 4767->4762 4767->4764 4767->4765 4767->4766 4768 4035b7 SetFilePointer 4767->4768 4774 406bf1 4767->4774 4768->4757 4770 4033c1 4769->4770 4770->4724 4770->4727 4772 406242 4771->4772 4772->4731 4773->4761 4775 406c16 4774->4775 4776 406c1e 4774->4776 4775->4767 4776->4775 4777 406ca5 GlobalFree 4776->4777 4778 406cae GlobalAlloc 4776->4778 4779 406d25 GlobalAlloc 4776->4779 4780 406d1c GlobalFree 4776->4780 4777->4778 4778->4775 4778->4776 4779->4775 4779->4776 4780->4779 4782 40403e 4781->4782 4798 4065c9 wsprintfW 4782->4798 4784 4040af 4799 4040e3 4784->4799 4786 403ddf 4786->4556 4787 4040b4 4787->4786 4788 4066bf 21 API calls 4787->4788 4788->4787 4789->4552 4790->4558 4802 40464d 4791->4802 4793 405824 4794 40464d SendMessageW 4793->4794 4795 405836 OleUninitialize 4794->4795 4795->4587 4796 4057fd 4796->4793 4805 401389 4796->4805 4798->4784 4800 4066bf 21 API calls 4799->4800 4801 4040f1 SetWindowTextW 4800->4801 4801->4787 4803 404665 4802->4803 4804 404656 SendMessageW 4802->4804 4803->4796 4804->4803 4807 401390 4805->4807 4806 4013fe 4806->4796 4807->4806 4808 4013cb MulDiv SendMessageW 4807->4808 4808->4807 4809->4603 4811 406019 4810->4811 4812 40602b 4810->4812 4811->4812 4813 406026 CharNextW 4811->4813 4814 405f7e CharNextW 4812->4814 4815 40604f 4812->4815 4813->4815 4814->4812 4815->4606 4815->4607 4816->4636 4817->4665 4826 40614d GetFileAttributesW 4818->4826 4820 405d73 4820->4665 4822 405d61 RemoveDirectoryW 4824 405d6f 4822->4824 4823 405d69 DeleteFileW 4823->4824 4824->4820 4825 405d7f SetFileAttributesW 4824->4825 4825->4820 4827 405d52 4826->4827 4828 40615f SetFileAttributesW 4826->4828 4827->4820 4827->4822 4827->4823 4828->4827 4830 4062f8 4829->4830 4831 40631e GetShortPathNameW 4829->4831 4856 406172 GetFileAttributesW CreateFileW 4830->4856 4833 406333 4831->4833 4834 40643d 4831->4834 4833->4834 4836 40633b wsprintfA 4833->4836 4834->4668 4835 406302 CloseHandle GetShortPathNameW 4835->4834 4837 406316 4835->4837 4838 4066bf 21 API calls 4836->4838 4837->4831 4837->4834 4839 406363 4838->4839 4857 406172 GetFileAttributesW CreateFileW 4839->4857 4841 406370 4841->4834 4842 40637f GetFileSize GlobalAlloc 4841->4842 4843 4063a1 4842->4843 4844 406436 CloseHandle 4842->4844 4845 4061f5 ReadFile 4843->4845 4844->4834 4846 4063a9 4845->4846 4846->4844 4858 4060d7 lstrlenA 4846->4858 4849 4063c0 lstrcpyA 4852 4063e2 4849->4852 4850 4063d4 4851 4060d7 4 API calls 4850->4851 4851->4852 4853 406419 SetFilePointer 4852->4853 4854 406224 WriteFile 4853->4854 4855 40642f GlobalFree 4854->4855 4855->4844 4856->4835 4857->4841 4859 406118 lstrlenA 4858->4859 4860 4060f1 lstrcmpiA 4859->4860 4862 406120 4859->4862 4861 40610f CharNextA 4860->4861 4860->4862 4861->4859 4862->4849 4862->4850 4864 403ccd 4863->4864 4865 403c96 4864->4865 4866 403cd2 FreeLibrary GlobalFree 4864->4866 4865->4684 4866->4865 4866->4866 4873 4015c6 4874 402dab 21 API calls 4873->4874 4875 4015cd 4874->4875 4876 405ffc 4 API calls 4875->4876 4890 4015d6 4876->4890 4877 401636 4879 401668 4877->4879 4880 40163b 4877->4880 4878 405f7e CharNextW 4878->4890 4882 401423 28 API calls 4879->4882 4892 401423 4880->4892 4888 401660 4882->4888 4884 405c30 2 API calls 4884->4890 4886 405c4d 5 API calls 4886->4890 4887 40164f SetCurrentDirectoryW 4887->4888 4889 40161c GetFileAttributesW 4889->4890 4890->4877 4890->4878 4890->4884 4890->4886 4890->4889 4891 405bd6 2 API calls 4890->4891 4891->4890 4893 405707 28 API calls 4892->4893 4894 401431 4893->4894 4895 406682 lstrcpynW 4894->4895 4895->4887 5306 405846 5307 4059f0 5306->5307 5308 405867 GetDlgItem GetDlgItem GetDlgItem 5306->5308 5310 405a21 5307->5310 5311 4059f9 GetDlgItem CreateThread CloseHandle 5307->5311 5351 404636 SendMessageW 5308->5351 5313 405a4c 5310->5313 5314 405a71 5310->5314 5315 405a38 ShowWindow ShowWindow 5310->5315 5311->5310 5312 4058d7 5317 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5312->5317 5316 405aac 5313->5316 5319 405a60 5313->5319 5320 405a86 ShowWindow 5313->5320 5360 404668 5314->5360 5356 404636 SendMessageW 5315->5356 5316->5314 5326 405aba SendMessageW 5316->5326 5324 405930 SendMessageW SendMessageW 5317->5324 5325 40594c 5317->5325 5357 4045da 5319->5357 5322 405aa6 5320->5322 5323 405a98 5320->5323 5330 4045da SendMessageW 5322->5330 5329 405707 28 API calls 5323->5329 5324->5325 5331 405951 SendMessageW 5325->5331 5332 40595f 5325->5332 5328 405a7f 5326->5328 5333 405ad3 CreatePopupMenu 5326->5333 5329->5322 5330->5316 5331->5332 5352 404601 5332->5352 5334 4066bf 21 API calls 5333->5334 5336 405ae3 AppendMenuW 5334->5336 5338 405b00 GetWindowRect 5336->5338 5339 405b13 TrackPopupMenu 5336->5339 5337 40596f 5340 405978 ShowWindow 5337->5340 5341 4059ac GetDlgItem SendMessageW 5337->5341 5338->5339 5339->5328 5343 405b2e 5339->5343 5344 40599b 5340->5344 5345 40598e ShowWindow 5340->5345 5341->5328 5342 4059d3 SendMessageW SendMessageW 5341->5342 5342->5328 5346 405b4a SendMessageW 5343->5346 5355 404636 SendMessageW 5344->5355 5345->5344 5346->5346 5347 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5346->5347 5349 405b8c SendMessageW 5347->5349 5349->5349 5350 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5349->5350 5350->5328 5351->5312 5353 4066bf 21 API calls 5352->5353 5354 40460c SetDlgItemTextW 5353->5354 5354->5337 5355->5341 5356->5313 5358 4045e1 5357->5358 5359 4045e7 SendMessageW 5357->5359 5358->5359 5359->5314 5361 404680 GetWindowLongW 5360->5361 5362 40472b 5360->5362 5361->5362 5363 404695 5361->5363 5362->5328 5363->5362 5364 4046c2 GetSysColor 5363->5364 5365 4046c5 5363->5365 5364->5365 5366 4046d5 SetBkMode 5365->5366 5367 4046cb SetTextColor 5365->5367 5368 4046f3 5366->5368 5369 4046ed GetSysColor 5366->5369 5367->5366 5370 404704 5368->5370 5371 4046fa SetBkColor 5368->5371 5369->5368 5370->5362 5372 404717 DeleteObject 5370->5372 5373 40471e CreateBrushIndirect 5370->5373 5371->5370 5372->5373 5373->5362 4896 401c48 4897 402d89 21 API calls 4896->4897 4898 401c4f 4897->4898 4899 402d89 21 API calls 4898->4899 4900 401c5c 4899->4900 4901 401c71 4900->4901 4902 402dab 21 API calls 4900->4902 4903 401c81 4901->4903 4904 402dab 21 API calls 4901->4904 4902->4901 4905 401cd8 4903->4905 4906 401c8c 4903->4906 4904->4903 4908 402dab 21 API calls 4905->4908 4907 402d89 21 API calls 4906->4907 4909 401c91 4907->4909 4910 401cdd 4908->4910 4911 402d89 21 API calls 4909->4911 4912 402dab 21 API calls 4910->4912 4913 401c9d 4911->4913 4914 401ce6 FindWindowExW 4912->4914 4915 401cc8 SendMessageW 4913->4915 4916 401caa SendMessageTimeoutW 4913->4916 4917 401d08 4914->4917 4915->4917 4916->4917 5374 404e48 5375 404e74 5374->5375 5376 404e58 5374->5376 5378 404ea7 5375->5378 5379 404e7a SHGetPathFromIDListW 5375->5379 5385 405cc6 GetDlgItemTextW 5376->5385 5381 404e91 SendMessageW 5379->5381 5382 404e8a 5379->5382 5380 404e65 SendMessageW 5380->5375 5381->5378 5383 40140b 2 API calls 5382->5383 5383->5381 5385->5380 5858 4028c9 5859 4028cf 5858->5859 5860 4028d7 FindClose 5859->5860 5861 402c2f 5859->5861 5860->5861 5865 4016d1 5866 402dab 21 API calls 5865->5866 5867 4016d7 GetFullPathNameW 5866->5867 5868 4016f1 5867->5868 5869 401713 5867->5869 5868->5869 5872 4069df 2 API calls 5868->5872 5870 401728 GetShortPathNameW 5869->5870 5871 402c2f 5869->5871 5870->5871 5873 401703 5872->5873 5873->5869 5875 406682 lstrcpynW 5873->5875 5875->5869 5386 401e53 GetDC 5387 402d89 21 API calls 5386->5387 5388 401e65 GetDeviceCaps MulDiv ReleaseDC 5387->5388 5389 402d89 21 API calls 5388->5389 5390 401e96 5389->5390 5391 4066bf 21 API calls 5390->5391 5392 401ed3 CreateFontIndirectW 5391->5392 5393 40263d 5392->5393 5876 6f951000 5879 6f95101b 5876->5879 5886 6f9515b6 5879->5886 5881 6f951020 5882 6f951024 5881->5882 5883 6f951027 GlobalAlloc 5881->5883 5884 6f9515dd 3 API calls 5882->5884 5883->5882 5885 6f951019 5884->5885 5888 6f9515bc 5886->5888 5887 6f9515c2 5887->5881 5888->5887 5889 6f9515ce GlobalFree 5888->5889 5889->5881 5890 4071d5 5892 406c24 5890->5892 5891 40758f 5892->5891 5892->5892 5893 406ca5 GlobalFree 5892->5893 5894 406cae GlobalAlloc 5892->5894 5895 406d25 GlobalAlloc 5892->5895 5896 406d1c GlobalFree 5892->5896 5893->5894 5894->5891 5894->5892 5895->5891 5895->5892 5896->5895 5904 4014d7 5905 402d89 21 API calls 5904->5905 5906 4014dd Sleep 5905->5906 5908 402c2f 5906->5908 5909 6f95170d 5910 6f9515b6 GlobalFree 5909->5910 5911 6f951725 5910->5911 5912 6f95176b GlobalFree 5911->5912 5913 6f951740 5911->5913 5914 6f951757 VirtualFree 5911->5914 5913->5912 5914->5912 5394 40195b 5395 402dab 21 API calls 5394->5395 5396 401962 lstrlenW 5395->5396 5397 40263d 5396->5397 5094 4020dd 5095 4021a1 5094->5095 5096 4020ef 5094->5096 5098 401423 28 API calls 5095->5098 5097 402dab 21 API calls 5096->5097 5099 4020f6 5097->5099 5104 4022fb 5098->5104 5100 402dab 21 API calls 5099->5100 5101 4020ff 5100->5101 5102 402115 LoadLibraryExW 5101->5102 5103 402107 GetModuleHandleW 5101->5103 5102->5095 5105 402126 5102->5105 5103->5102 5103->5105 5117 406ae5 5105->5117 5108 402170 5110 405707 28 API calls 5108->5110 5109 402137 5111 402156 5109->5111 5112 40213f 5109->5112 5114 402147 5110->5114 5122 6f951817 5111->5122 5113 401423 28 API calls 5112->5113 5113->5114 5114->5104 5115 402193 FreeLibrary 5114->5115 5115->5104 5164 4066a4 WideCharToMultiByte 5117->5164 5119 406b02 5120 406b09 GetProcAddress 5119->5120 5121 402131 5119->5121 5120->5121 5121->5108 5121->5109 5123 6f95184a 5122->5123 5165 6f951bff 5123->5165 5125 6f951976 5125->5114 5126 6f951851 5126->5125 5127 6f951862 5126->5127 5128 6f951869 5126->5128 5215 6f95243e 5127->5215 5199 6f952480 5128->5199 5133 6f9518cd 5139 6f9518d3 5133->5139 5140 6f95191e 5133->5140 5134 6f9518af 5228 6f952655 5134->5228 5135 6f95187f 5138 6f951885 5135->5138 5144 6f951890 5135->5144 5136 6f951898 5150 6f95188e 5136->5150 5225 6f952e23 5136->5225 5138->5150 5209 6f952b98 5138->5209 5247 6f951666 5139->5247 5142 6f952655 10 API calls 5140->5142 5148 6f95190f 5142->5148 5143 6f9518b5 5239 6f951654 5143->5239 5219 6f952810 5144->5219 5155 6f951965 5148->5155 5253 6f952618 5148->5253 5150->5133 5150->5134 5152 6f952655 10 API calls 5152->5148 5154 6f951896 5154->5150 5155->5125 5157 6f95196f GlobalFree 5155->5157 5157->5125 5161 6f951951 5161->5155 5257 6f9515dd wsprintfW 5161->5257 5162 6f95194a FreeLibrary 5162->5161 5164->5119 5260 6f9512bb GlobalAlloc 5165->5260 5167 6f951c26 5261 6f9512bb GlobalAlloc 5167->5261 5169 6f951e6b GlobalFree GlobalFree GlobalFree 5170 6f951e88 5169->5170 5191 6f951ed2 5169->5191 5172 6f951e9d 5170->5172 5173 6f95227e 5170->5173 5170->5191 5171 6f951d26 GlobalAlloc 5189 6f951c31 5171->5189 5172->5191 5264 6f9512cc 5172->5264 5174 6f9522a0 GetModuleHandleW 5173->5174 5173->5191 5177 6f9522c6 5174->5177 5178 6f9522b1 LoadLibraryW 5174->5178 5175 6f951d71 lstrcpyW 5180 6f951d7b lstrcpyW 5175->5180 5176 6f951d8f GlobalFree 5176->5189 5268 6f9516bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5177->5268 5178->5177 5178->5191 5180->5189 5181 6f952318 5185 6f952325 lstrlenW 5181->5185 5181->5191 5182 6f952126 5267 6f9512bb GlobalAlloc 5182->5267 5184 6f9521ae 5184->5191 5196 6f952216 lstrcpyW 5184->5196 5269 6f9516bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5185->5269 5187 6f9522d8 5187->5181 5197 6f952302 GetProcAddress 5187->5197 5189->5169 5189->5171 5189->5175 5189->5176 5189->5180 5189->5182 5189->5184 5190 6f952067 GlobalFree 5189->5190 5189->5191 5192 6f951dcd 5189->5192 5194 6f9512cc 2 API calls 5189->5194 5190->5189 5191->5126 5192->5189 5262 6f95162f GlobalSize GlobalAlloc 5192->5262 5193 6f95233f 5193->5191 5194->5189 5196->5191 5197->5181 5198 6f95212f 5198->5126 5200 6f952498 5199->5200 5201 6f9512cc GlobalAlloc lstrcpynW 5200->5201 5203 6f9525c1 GlobalFree 5200->5203 5204 6f952540 GlobalAlloc WideCharToMultiByte 5200->5204 5205 6f95256b GlobalAlloc 5200->5205 5207 6f952582 5200->5207 5271 6f95135a 5200->5271 5201->5200 5203->5200 5206 6f95186f 5203->5206 5204->5203 5205->5207 5206->5135 5206->5136 5206->5150 5207->5203 5275 6f9527a4 5207->5275 5211 6f952baa 5209->5211 5210 6f952c4f CloseHandle 5214 6f952c6d 5210->5214 5211->5210 5213 6f952d39 5213->5150 5278 6f952b42 5214->5278 5216 6f952453 5215->5216 5217 6f95245e GlobalAlloc 5216->5217 5218 6f951868 5216->5218 5217->5216 5218->5128 5223 6f952840 5219->5223 5220 6f9528ee 5222 6f9528f4 GlobalSize 5220->5222 5224 6f9528fe 5220->5224 5221 6f9528db GlobalAlloc 5221->5224 5222->5224 5223->5220 5223->5221 5224->5154 5226 6f952e2e 5225->5226 5227 6f952e6e GlobalFree 5226->5227 5282 6f9512bb GlobalAlloc 5228->5282 5230 6f9526d8 MultiByteToWideChar 5237 6f95265f 5230->5237 5231 6f95270b lstrcpynW 5231->5237 5232 6f9526fa StringFromGUID2 5232->5237 5233 6f95271e wsprintfW 5233->5237 5234 6f952742 GlobalFree 5234->5237 5235 6f952777 GlobalFree 5235->5143 5236 6f951312 2 API calls 5236->5237 5237->5230 5237->5231 5237->5232 5237->5233 5237->5234 5237->5235 5237->5236 5283 6f951381 5237->5283 5287 6f9512bb GlobalAlloc 5239->5287 5241 6f951659 5242 6f951666 2 API calls 5241->5242 5243 6f951663 5242->5243 5244 6f951312 5243->5244 5245 6f951355 GlobalFree 5244->5245 5246 6f95131b GlobalAlloc lstrcpynW 5244->5246 5245->5148 5246->5245 5248 6f951672 wsprintfW 5247->5248 5249 6f95169f lstrcpyW 5247->5249 5252 6f9516b8 5248->5252 5249->5252 5252->5152 5254 6f951931 5253->5254 5255 6f952626 5253->5255 5254->5161 5254->5162 5255->5254 5256 6f952642 GlobalFree 5255->5256 5256->5255 5258 6f951312 2 API calls 5257->5258 5259 6f9515fe 5258->5259 5259->5155 5260->5167 5261->5189 5263 6f95164d 5262->5263 5263->5192 5270 6f9512bb GlobalAlloc 5264->5270 5266 6f9512db lstrcpynW 5266->5191 5267->5198 5268->5187 5269->5193 5270->5266 5272 6f951361 5271->5272 5273 6f9512cc 2 API calls 5272->5273 5274 6f95137f 5273->5274 5274->5200 5276 6f9527b2 VirtualAlloc 5275->5276 5277 6f952808 5275->5277 5276->5277 5277->5207 5279 6f952b4d 5278->5279 5280 6f952b52 GetLastError 5279->5280 5281 6f952b5d 5279->5281 5280->5281 5281->5213 5282->5237 5284 6f9513ac 5283->5284 5285 6f95138a 5283->5285 5284->5237 5285->5284 5286 6f951390 lstrcpyW 5285->5286 5286->5284 5287->5241 5405 402b5e 5406 402bb0 5405->5406 5407 402b65 5405->5407 5408 406a76 5 API calls 5406->5408 5410 402d89 21 API calls 5407->5410 5411 402bae 5407->5411 5409 402bb7 5408->5409 5412 402dab 21 API calls 5409->5412 5413 402b73 5410->5413 5414 402bc0 5412->5414 5415 402d89 21 API calls 5413->5415 5414->5411 5416 402bc4 IIDFromString 5414->5416 5418 402b7f 5415->5418 5416->5411 5417 402bd3 5416->5417 5417->5411 5423 406682 lstrcpynW 5417->5423 5422 4065c9 wsprintfW 5418->5422 5420 402bf0 CoTaskMemFree 5420->5411 5422->5411 5423->5420 5424 402a60 5425 402d89 21 API calls 5424->5425 5426 402a66 5425->5426 5427 402aa9 5426->5427 5428 402a8d 5426->5428 5437 402933 5426->5437 5429 402ac3 5427->5429 5430 402ab3 5427->5430 5433 402a92 5428->5433 5434 402aa3 5428->5434 5432 4066bf 21 API calls 5429->5432 5431 402d89 21 API calls 5430->5431 5431->5437 5432->5437 5438 406682 lstrcpynW 5433->5438 5439 4065c9 wsprintfW 5434->5439 5438->5437 5439->5437 4326 401761 4332 402dab 4326->4332 4330 40176f 4331 4061a1 2 API calls 4330->4331 4331->4330 4333 402db7 4332->4333 4342 4066bf 4333->4342 4336 401768 4338 4061a1 4336->4338 4339 4061ae GetTickCount GetTempFileNameW 4338->4339 4340 4061e8 4339->4340 4341 4061e4 4339->4341 4340->4330 4341->4339 4341->4340 4357 4066ca 4342->4357 4343 406911 4344 402dd8 4343->4344 4381 406682 lstrcpynW 4343->4381 4344->4336 4359 406930 4344->4359 4346 4068e2 lstrlenW 4346->4357 4350 4067db GetSystemDirectoryW 4350->4357 4351 4066bf 15 API calls 4351->4346 4352 4067f1 GetWindowsDirectoryW 4352->4357 4353 4066bf 15 API calls 4353->4357 4354 406883 lstrcatW 4354->4357 4355 406930 5 API calls 4355->4357 4357->4343 4357->4346 4357->4350 4357->4351 4357->4352 4357->4353 4357->4354 4357->4355 4358 406853 SHGetPathFromIDListW CoTaskMemFree 4357->4358 4368 406550 4357->4368 4373 406a76 GetModuleHandleA 4357->4373 4379 4065c9 wsprintfW 4357->4379 4380 406682 lstrcpynW 4357->4380 4358->4357 4365 40693d 4359->4365 4360 4069b3 4361 4069b8 CharPrevW 4360->4361 4363 4069d9 4360->4363 4361->4360 4362 4069a6 CharNextW 4362->4360 4362->4365 4363->4336 4365->4360 4365->4362 4366 406992 CharNextW 4365->4366 4367 4069a1 CharNextW 4365->4367 4389 405f7e 4365->4389 4366->4365 4367->4362 4382 4064ef 4368->4382 4371 406584 RegQueryValueExW RegCloseKey 4372 4065b4 4371->4372 4372->4357 4374 406a92 4373->4374 4375 406a9c GetProcAddress 4373->4375 4386 406a06 GetSystemDirectoryW 4374->4386 4377 406aab 4375->4377 4377->4357 4378 406a98 4378->4375 4378->4377 4379->4357 4380->4357 4381->4344 4383 4064fe 4382->4383 4384 406502 4383->4384 4385 406507 RegOpenKeyExW 4383->4385 4384->4371 4384->4372 4385->4384 4387 406a28 wsprintfW LoadLibraryExW 4386->4387 4387->4378 4390 405f84 4389->4390 4391 405f9a 4390->4391 4392 405f8b CharNextW 4390->4392 4391->4365 4392->4390 5440 401d62 5441 402d89 21 API calls 5440->5441 5442 401d73 SetWindowLongW 5441->5442 5443 402c2f 5442->5443 5915 4028e3 5916 4028eb 5915->5916 5917 4028ef FindNextFileW 5916->5917 5919 402901 5916->5919 5918 402948 5917->5918 5917->5919 5921 406682 lstrcpynW 5918->5921 5921->5919 5444 401568 5445 402ba9 5444->5445 5448 4065c9 wsprintfW 5445->5448 5447 402bae 5448->5447 5922 6f95103d 5923 6f95101b 5 API calls 5922->5923 5924 6f951056 5923->5924 5449 40196d 5450 402d89 21 API calls 5449->5450 5451 401974 5450->5451 5452 402d89 21 API calls 5451->5452 5453 401981 5452->5453 5454 402dab 21 API calls 5453->5454 5455 401998 lstrlenW 5454->5455 5457 4019a9 5455->5457 5456 4019ea 5457->5456 5461 406682 lstrcpynW 5457->5461 5459 4019da 5459->5456 5460 4019df lstrlenW 5459->5460 5460->5456 5461->5459 5462 40506e GetDlgItem GetDlgItem 5463 4050c0 7 API calls 5462->5463 5473 4052e5 5462->5473 5464 405167 DeleteObject 5463->5464 5465 40515a SendMessageW 5463->5465 5466 405170 5464->5466 5465->5464 5467 4051a7 5466->5467 5468 4066bf 21 API calls 5466->5468 5469 404601 22 API calls 5467->5469 5474 405189 SendMessageW SendMessageW 5468->5474 5475 4051bb 5469->5475 5470 405473 5472 40547d SendMessageW 5470->5472 5478 405485 5470->5478 5471 4053c7 5471->5470 5481 405420 SendMessageW 5471->5481 5505 4052d8 5471->5505 5472->5478 5473->5471 5494 405354 5473->5494 5516 404fbc SendMessageW 5473->5516 5474->5466 5480 404601 22 API calls 5475->5480 5476 4053b9 SendMessageW 5476->5471 5477 404668 8 API calls 5482 405674 5477->5482 5483 405497 ImageList_Destroy 5478->5483 5484 40549e 5478->5484 5496 4054ae 5478->5496 5495 4051cc 5480->5495 5486 405435 SendMessageW 5481->5486 5481->5505 5483->5484 5487 4054a7 GlobalFree 5484->5487 5484->5496 5485 405628 5490 40563a ShowWindow GetDlgItem ShowWindow 5485->5490 5485->5505 5489 405448 5486->5489 5487->5496 5488 4052a7 GetWindowLongW SetWindowLongW 5491 4052c0 5488->5491 5497 405459 SendMessageW 5489->5497 5490->5505 5492 4052c5 ShowWindow 5491->5492 5493 4052dd 5491->5493 5514 404636 SendMessageW 5492->5514 5515 404636 SendMessageW 5493->5515 5494->5471 5494->5476 5495->5488 5498 4052a2 5495->5498 5501 40521f SendMessageW 5495->5501 5502 405271 SendMessageW 5495->5502 5503 40525d SendMessageW 5495->5503 5496->5485 5509 4054e9 5496->5509 5521 40503c 5496->5521 5497->5470 5498->5488 5498->5491 5501->5495 5502->5495 5503->5495 5505->5477 5506 4055f3 5507 4055fe InvalidateRect 5506->5507 5510 40560a 5506->5510 5507->5510 5508 405517 SendMessageW 5512 40552d 5508->5512 5509->5508 5509->5512 5510->5485 5530 404f77 5510->5530 5511 4055a1 SendMessageW SendMessageW 5511->5512 5512->5506 5512->5511 5514->5505 5515->5473 5517 40501b SendMessageW 5516->5517 5518 404fdf GetMessagePos ScreenToClient SendMessageW 5516->5518 5519 405013 5517->5519 5518->5519 5520 405018 5518->5520 5519->5494 5520->5517 5533 406682 lstrcpynW 5521->5533 5523 40504f 5534 4065c9 wsprintfW 5523->5534 5525 405059 5526 40140b 2 API calls 5525->5526 5527 405062 5526->5527 5535 406682 lstrcpynW 5527->5535 5529 405069 5529->5509 5536 404eae 5530->5536 5532 404f8c 5532->5485 5533->5523 5534->5525 5535->5529 5537 404ec7 5536->5537 5538 4066bf 21 API calls 5537->5538 5539 404f2b 5538->5539 5540 4066bf 21 API calls 5539->5540 5541 404f36 5540->5541 5542 4066bf 21 API calls 5541->5542 5543 404f4c lstrlenW wsprintfW SetDlgItemTextW 5542->5543 5543->5532 5544 40166f 5545 402dab 21 API calls 5544->5545 5546 401675 5545->5546 5547 4069df 2 API calls 5546->5547 5548 40167b 5547->5548 5932 402af0 5933 402d89 21 API calls 5932->5933 5934 402af6 5933->5934 5935 4066bf 21 API calls 5934->5935 5936 402933 5934->5936 5935->5936 4971 4026f1 4972 402d89 21 API calls 4971->4972 4975 402700 4972->4975 4973 40283d 4974 40274a ReadFile 4974->4973 4974->4975 4975->4973 4975->4974 4976 4027e3 4975->4976 4977 4061f5 ReadFile 4975->4977 4979 40278a MultiByteToWideChar 4975->4979 4980 40283f 4975->4980 4982 4027b0 SetFilePointer MultiByteToWideChar 4975->4982 4983 402850 4975->4983 4976->4973 4976->4975 4985 406253 SetFilePointer 4976->4985 4977->4975 4979->4975 4994 4065c9 wsprintfW 4980->4994 4982->4975 4983->4973 4984 402871 SetFilePointer 4983->4984 4984->4973 4986 40626f 4985->4986 4993 406287 4985->4993 4987 4061f5 ReadFile 4986->4987 4988 40627b 4987->4988 4989 406290 SetFilePointer 4988->4989 4990 4062b8 SetFilePointer 4988->4990 4988->4993 4989->4990 4991 40629b 4989->4991 4990->4993 4992 406224 WriteFile 4991->4992 4992->4993 4993->4976 4994->4973 5549 404771 lstrlenW 5550 404790 5549->5550 5551 404792 WideCharToMultiByte 5549->5551 5550->5551 5937 404af2 5938 404b1e 5937->5938 5939 404b2f 5937->5939 5998 405cc6 GetDlgItemTextW 5938->5998 5940 404b3b GetDlgItem 5939->5940 5943 404b9a 5939->5943 5942 404b4f 5940->5942 5947 404b63 SetWindowTextW 5942->5947 5950 405ffc 4 API calls 5942->5950 5944 404c7e 5943->5944 5952 4066bf 21 API calls 5943->5952 5996 404e2d 5943->5996 5944->5996 6000 405cc6 GetDlgItemTextW 5944->6000 5945 404b29 5946 406930 5 API calls 5945->5946 5946->5939 5951 404601 22 API calls 5947->5951 5949 404668 8 API calls 5954 404e41 5949->5954 5955 404b59 5950->5955 5956 404b7f 5951->5956 5957 404c0e SHBrowseForFolderW 5952->5957 5953 404cae 5958 406059 18 API calls 5953->5958 5955->5947 5962 405f51 3 API calls 5955->5962 5959 404601 22 API calls 5956->5959 5957->5944 5960 404c26 CoTaskMemFree 5957->5960 5961 404cb4 5958->5961 5963 404b8d 5959->5963 5964 405f51 3 API calls 5960->5964 6001 406682 lstrcpynW 5961->6001 5962->5947 5999 404636 SendMessageW 5963->5999 5972 404c33 5964->5972 5967 404b93 5971 406a76 5 API calls 5967->5971 5968 404c6a SetDlgItemTextW 5968->5944 5969 404ccb 5970 406a76 5 API calls 5969->5970 5979 404cd2 5970->5979 5971->5943 5972->5968 5973 4066bf 21 API calls 5972->5973 5974 404c52 lstrcmpiW 5973->5974 5974->5968 5976 404c63 lstrcatW 5974->5976 5975 404d13 6002 406682 lstrcpynW 5975->6002 5976->5968 5978 404d1a 5980 405ffc 4 API calls 5978->5980 5979->5975 5984 405f9d 2 API calls 5979->5984 5985 404d6b 5979->5985 5981 404d20 GetDiskFreeSpaceW 5980->5981 5983 404d44 MulDiv 5981->5983 5981->5985 5983->5985 5984->5979 5986 404ddc 5985->5986 5988 404f77 24 API calls 5985->5988 5987 404dff 5986->5987 5989 40140b 2 API calls 5986->5989 6003 404623 EnableWindow 5987->6003 5990 404dc9 5988->5990 5989->5987 5991 404dde SetDlgItemTextW 5990->5991 5992 404dce 5990->5992 5991->5986 5994 404eae 24 API calls 5992->5994 5994->5986 5995 404e1b 5995->5996 5997 404a4b SendMessageW 5995->5997 5996->5949 5997->5996 5998->5945 5999->5967 6000->5953 6001->5969 6002->5978 6003->5995 4995 401774 4996 402dab 21 API calls 4995->4996 4997 40177b 4996->4997 4998 4017a3 4997->4998 4999 40179b 4997->4999 5036 406682 lstrcpynW 4998->5036 5035 406682 lstrcpynW 4999->5035 5002 4017ae 5003 405f51 3 API calls 5002->5003 5005 4017b4 lstrcatW 5003->5005 5004 4017a1 5006 406930 5 API calls 5004->5006 5005->5004 5024 4017c0 5006->5024 5007 4069df 2 API calls 5007->5024 5008 4017fc 5010 40614d 2 API calls 5008->5010 5010->5024 5011 4017d2 CompareFileTime 5011->5024 5012 401892 5014 405707 28 API calls 5012->5014 5013 401869 5015 405707 28 API calls 5013->5015 5023 40187e 5013->5023 5017 40189c 5014->5017 5015->5023 5016 406682 lstrcpynW 5016->5024 5018 403376 48 API calls 5017->5018 5019 4018af 5018->5019 5020 4018c3 SetFileTime 5019->5020 5022 4018d5 CloseHandle 5019->5022 5020->5022 5021 4066bf 21 API calls 5021->5024 5022->5023 5025 4018e6 5022->5025 5024->5007 5024->5008 5024->5011 5024->5012 5024->5013 5024->5016 5024->5021 5032 405ce2 MessageBoxIndirectW 5024->5032 5034 406172 GetFileAttributesW CreateFileW 5024->5034 5026 4018eb 5025->5026 5027 4018fe 5025->5027 5028 4066bf 21 API calls 5026->5028 5029 4066bf 21 API calls 5027->5029 5030 4018f3 lstrcatW 5028->5030 5031 401906 5029->5031 5030->5031 5031->5023 5033 405ce2 MessageBoxIndirectW 5031->5033 5032->5024 5033->5023 5034->5024 5035->5004 5036->5002 6004 4014f5 SetForegroundWindow 6005 402c2f 6004->6005 5552 401a77 5553 402d89 21 API calls 5552->5553 5554 401a80 5553->5554 5555 402d89 21 API calls 5554->5555 5556 401a25 5555->5556 5557 401578 5558 401591 5557->5558 5559 401588 ShowWindow 5557->5559 5560 402c2f 5558->5560 5561 40159f ShowWindow 5558->5561 5559->5558 5561->5560 5087 4023f9 5088 402dab 21 API calls 5087->5088 5089 402408 5088->5089 5090 402dab 21 API calls 5089->5090 5091 402411 5090->5091 5092 402dab 21 API calls 5091->5092 5093 40241b GetPrivateProfileStringW 5092->5093 5562 40567b 5563 40568b 5562->5563 5564 40569f 5562->5564 5565 405691 5563->5565 5574 4056e8 5563->5574 5566 4056a7 IsWindowVisible 5564->5566 5567 4056be 5564->5567 5569 40464d SendMessageW 5565->5569 5570 4056b4 5566->5570 5566->5574 5568 4056ed CallWindowProcW 5567->5568 5573 40503c 4 API calls 5567->5573 5571 40569b 5568->5571 5569->5571 5572 404fbc 5 API calls 5570->5572 5572->5567 5573->5574 5574->5568 6006 401ffb 6007 402dab 21 API calls 6006->6007 6008 402002 6007->6008 6009 4069df 2 API calls 6008->6009 6010 402008 6009->6010 6012 402019 6010->6012 6013 4065c9 wsprintfW 6010->6013 6013->6012 5575 401b7c 5576 402dab 21 API calls 5575->5576 5577 401b83 5576->5577 5578 402d89 21 API calls 5577->5578 5579 401b8c wsprintfW 5578->5579 5580 402c2f 5579->5580 5581 401000 5582 401037 BeginPaint GetClientRect 5581->5582 5583 40100c DefWindowProcW 5581->5583 5585 4010f3 5582->5585 5586 401179 5583->5586 5587 401073 CreateBrushIndirect FillRect DeleteObject 5585->5587 5588 4010fc 5585->5588 5587->5585 5589 401102 CreateFontIndirectW 5588->5589 5590 401167 EndPaint 5588->5590 5589->5590 5591 401112 6 API calls 5589->5591 5590->5586 5591->5590 6014 401680 6015 402dab 21 API calls 6014->6015 6016 401687 6015->6016 6017 402dab 21 API calls 6016->6017 6018 401690 6017->6018 6019 402dab 21 API calls 6018->6019 6020 401699 MoveFileW 6019->6020 6021 4016a5 6020->6021 6022 4016ac 6020->6022 6023 401423 28 API calls 6021->6023 6024 4069df 2 API calls 6022->6024 6026 4022fb 6022->6026 6023->6026 6025 4016bb 6024->6025 6025->6026 6027 406442 40 API calls 6025->6027 6027->6021 5592 404102 5593 40411a 5592->5593 5594 40427b 5592->5594 5593->5594 5595 404126 5593->5595 5596 4042cc 5594->5596 5597 40428c GetDlgItem GetDlgItem 5594->5597 5598 404131 SetWindowPos 5595->5598 5599 404144 5595->5599 5601 404326 5596->5601 5606 401389 2 API calls 5596->5606 5600 404601 22 API calls 5597->5600 5598->5599 5603 40414d ShowWindow 5599->5603 5604 40418f 5599->5604 5605 4042b6 SetClassLongW 5600->5605 5602 40464d SendMessageW 5601->5602 5607 404276 5601->5607 5634 404338 5602->5634 5608 404239 5603->5608 5609 40416d GetWindowLongW 5603->5609 5610 404197 DestroyWindow 5604->5610 5611 4041ae 5604->5611 5612 40140b 2 API calls 5605->5612 5613 4042fe 5606->5613 5614 404668 8 API calls 5608->5614 5609->5608 5615 404186 ShowWindow 5609->5615 5616 40458a 5610->5616 5617 4041b3 SetWindowLongW 5611->5617 5618 4041c4 5611->5618 5612->5596 5613->5601 5619 404302 SendMessageW 5613->5619 5614->5607 5615->5604 5616->5607 5625 4045bb ShowWindow 5616->5625 5617->5607 5618->5608 5622 4041d0 GetDlgItem 5618->5622 5619->5607 5620 40140b 2 API calls 5620->5634 5621 40458c DestroyWindow EndDialog 5621->5616 5623 4041e1 SendMessageW IsWindowEnabled 5622->5623 5624 4041fe 5622->5624 5623->5607 5623->5624 5627 40420b 5624->5627 5628 404252 SendMessageW 5624->5628 5629 40421e 5624->5629 5637 404203 5624->5637 5625->5607 5626 4066bf 21 API calls 5626->5634 5627->5628 5627->5637 5628->5608 5632 404226 5629->5632 5633 40423b 5629->5633 5630 4045da SendMessageW 5630->5608 5631 404601 22 API calls 5631->5634 5636 40140b 2 API calls 5632->5636 5635 40140b 2 API calls 5633->5635 5634->5607 5634->5620 5634->5621 5634->5626 5634->5631 5638 404601 22 API calls 5634->5638 5654 4044cc DestroyWindow 5634->5654 5635->5637 5636->5637 5637->5608 5637->5630 5639 4043b3 GetDlgItem 5638->5639 5640 4043d0 ShowWindow EnableWindow 5639->5640 5641 4043c8 5639->5641 5663 404623 EnableWindow 5640->5663 5641->5640 5643 4043fa EnableWindow 5648 40440e 5643->5648 5644 404413 GetSystemMenu EnableMenuItem SendMessageW 5645 404443 SendMessageW 5644->5645 5644->5648 5645->5648 5647 4040e3 22 API calls 5647->5648 5648->5644 5648->5647 5664 404636 SendMessageW 5648->5664 5665 406682 lstrcpynW 5648->5665 5650 404472 lstrlenW 5651 4066bf 21 API calls 5650->5651 5652 404488 SetWindowTextW 5651->5652 5653 401389 2 API calls 5652->5653 5653->5634 5654->5616 5655 4044e6 CreateDialogParamW 5654->5655 5655->5616 5656 404519 5655->5656 5657 404601 22 API calls 5656->5657 5658 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5657->5658 5659 401389 2 API calls 5658->5659 5660 40456a 5659->5660 5660->5607 5661 404572 ShowWindow 5660->5661 5662 40464d SendMessageW 5661->5662 5662->5616 5663->5643 5664->5648 5665->5650 5666 401503 5667 401508 5666->5667 5669 401520 5666->5669 5668 402d89 21 API calls 5667->5668 5668->5669 6028 402983 6050 406172 GetFileAttributesW CreateFileW 6028->6050 6030 40298a 6031 402a40 6030->6031 6034 4029a5 GlobalAlloc 6030->6034 6035 402a28 6030->6035 6032 402a47 DeleteFileW 6031->6032 6033 402a5a 6031->6033 6032->6033 6034->6035 6036 4029be 6034->6036 6037 403376 48 API calls 6035->6037 6051 4035fd SetFilePointer 6036->6051 6039 402a35 CloseHandle 6037->6039 6039->6031 6040 4029c4 6041 4035e7 ReadFile 6040->6041 6042 4029cd GlobalAlloc 6041->6042 6043 402a11 6042->6043 6044 4029dd 6042->6044 6046 406224 WriteFile 6043->6046 6045 403376 48 API calls 6044->6045 6049 4029ea 6045->6049 6047 402a1d GlobalFree 6046->6047 6047->6035 6048 402a08 GlobalFree 6048->6043 6049->6048 6050->6030 6051->6040 5670 401a04 5671 402dab 21 API calls 5670->5671 5672 401a0b 5671->5672 5673 402dab 21 API calls 5672->5673 5674 401a14 5673->5674 5675 401a1b lstrcmpiW 5674->5675 5676 401a2d lstrcmpW 5674->5676 5677 401a21 5675->5677 5676->5677 5678 402304 5679 402dab 21 API calls 5678->5679 5680 40230a 5679->5680 5681 402dab 21 API calls 5680->5681 5682 402313 5681->5682 5683 402dab 21 API calls 5682->5683 5684 40231c 5683->5684 5685 4069df 2 API calls 5684->5685 5686 402325 5685->5686 5687 402336 lstrlenW lstrlenW 5686->5687 5688 402329 5686->5688 5689 405707 28 API calls 5687->5689 5690 405707 28 API calls 5688->5690 5692 402331 5688->5692 5691 402374 SHFileOperationW 5689->5691 5690->5692 5691->5688 5691->5692 6059 401d86 6060 401d99 GetDlgItem 6059->6060 6061 401d8c 6059->6061 6063 401d93 6060->6063 6062 402d89 21 API calls 6061->6062 6062->6063 6064 401dda GetClientRect LoadImageW SendMessageW 6063->6064 6065 402dab 21 API calls 6063->6065 6067 401e38 6064->6067 6069 401e44 6064->6069 6065->6064 6068 401e3d DeleteObject 6067->6068 6067->6069 6068->6069 6070 402388 6071 40238f 6070->6071 6074 4023a2 6070->6074 6072 4066bf 21 API calls 6071->6072 6073 40239c 6072->6073 6073->6074 6075 405ce2 MessageBoxIndirectW 6073->6075 6075->6074 4918 401389 4920 401390 4918->4920 4919 4013fe 4920->4919 4921 4013cb MulDiv SendMessageW 4920->4921 4921->4920 5693 402c0a SendMessageW 5694 402c24 InvalidateRect 5693->5694 5695 402c2f 5693->5695 5694->5695 6076 6f951058 6078 6f951074 6076->6078 6077 6f9510dd 6078->6077 6079 6f9515b6 GlobalFree 6078->6079 6080 6f951092 6078->6080 6079->6080 6081 6f9515b6 GlobalFree 6080->6081 6082 6f9510a2 6081->6082 6083 6f9510b2 6082->6083 6084 6f9510a9 GlobalSize 6082->6084 6085 6f9510b6 GlobalAlloc 6083->6085 6086 6f9510c7 6083->6086 6084->6083 6087 6f9515dd 3 API calls 6085->6087 6088 6f9510d2 GlobalFree 6086->6088 6087->6086 6088->6077 4946 40248f 4947 402dab 21 API calls 4946->4947 4948 4024a1 4947->4948 4949 402dab 21 API calls 4948->4949 4950 4024ab 4949->4950 4963 402e3b 4950->4963 4953 402c2f 4954 4024e3 4956 4024ef 4954->4956 4958 402d89 21 API calls 4954->4958 4955 402dab 21 API calls 4957 4024d9 lstrlenW 4955->4957 4959 40250e RegSetValueExW 4956->4959 4960 403376 48 API calls 4956->4960 4957->4954 4958->4956 4961 402524 RegCloseKey 4959->4961 4960->4959 4961->4953 4964 402e56 4963->4964 4967 40651d 4964->4967 4968 40652c 4967->4968 4969 4024bb 4968->4969 4970 406537 RegCreateKeyExW 4968->4970 4969->4953 4969->4954 4969->4955 4970->4969 5696 402910 5697 402dab 21 API calls 5696->5697 5698 402917 FindFirstFileW 5697->5698 5699 40293f 5698->5699 5703 40292a 5698->5703 5700 402948 5699->5700 5704 4065c9 wsprintfW 5699->5704 5705 406682 lstrcpynW 5700->5705 5704->5700 5705->5703 5706 401911 5707 401948 5706->5707 5708 402dab 21 API calls 5707->5708 5709 40194d 5708->5709 5710 405d8e 71 API calls 5709->5710 5711 401956 5710->5711 6089 401491 6090 405707 28 API calls 6089->6090 6091 401498 6090->6091 5712 403d12 5713 403d1d 5712->5713 5714 403d24 GlobalAlloc 5713->5714 5715 403d21 5713->5715 5714->5715 5716 401914 5717 402dab 21 API calls 5716->5717 5718 40191b 5717->5718 5719 405ce2 MessageBoxIndirectW 5718->5719 5720 401924 5719->5720 5037 402896 5038 40289d 5037->5038 5040 402bae 5037->5040 5039 402d89 21 API calls 5038->5039 5041 4028a4 5039->5041 5042 4028b3 SetFilePointer 5041->5042 5042->5040 5043 4028c3 5042->5043 5045 4065c9 wsprintfW 5043->5045 5045->5040 6099 6f952d43 6100 6f952d5b 6099->6100 6101 6f95162f 2 API calls 6100->6101 6102 6f952d76 6101->6102 5721 401f17 5722 402dab 21 API calls 5721->5722 5723 401f1d 5722->5723 5724 402dab 21 API calls 5723->5724 5725 401f26 5724->5725 5726 402dab 21 API calls 5725->5726 5727 401f2f 5726->5727 5728 402dab 21 API calls 5727->5728 5729 401f38 5728->5729 5730 401423 28 API calls 5729->5730 5731 401f3f 5730->5731 5738 405ca8 ShellExecuteExW 5731->5738 5733 401f87 5734 402933 5733->5734 5735 406b21 5 API calls 5733->5735 5736 401fa4 CloseHandle 5735->5736 5736->5734 5738->5733 6103 402f98 6104 402fc3 6103->6104 6105 402faa SetTimer 6103->6105 6106 403011 6104->6106 6107 403017 MulDiv 6104->6107 6105->6104 6109 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 6107->6109 6109->6106 5739 401d1c 5740 402d89 21 API calls 5739->5740 5741 401d22 IsWindow 5740->5741 5742 401a25 5741->5742 6110 40149e 6111 4023a2 6110->6111 6112 4014ac PostQuitMessage 6110->6112 6112->6111 6113 401ba0 6114 401bf1 6113->6114 6115 401bad 6113->6115 6116 401bf6 6114->6116 6117 401c1b GlobalAlloc 6114->6117 6120 401bc4 6115->6120 6123 401c36 6115->6123 6127 4023a2 6116->6127 6134 406682 lstrcpynW 6116->6134 6119 4066bf 21 API calls 6117->6119 6118 4066bf 21 API calls 6121 40239c 6118->6121 6119->6123 6132 406682 lstrcpynW 6120->6132 6121->6127 6128 405ce2 MessageBoxIndirectW 6121->6128 6123->6118 6123->6127 6125 401c08 GlobalFree 6125->6127 6126 401bd3 6133 406682 lstrcpynW 6126->6133 6128->6127 6130 401be2 6135 406682 lstrcpynW 6130->6135 6132->6126 6133->6130 6134->6125 6135->6127 6136 406da0 6138 406c24 6136->6138 6137 40758f 6138->6137 6139 406ca5 GlobalFree 6138->6139 6140 406cae GlobalAlloc 6138->6140 6141 406d25 GlobalAlloc 6138->6141 6142 406d1c GlobalFree 6138->6142 6139->6140 6140->6137 6140->6138 6141->6137 6141->6138 6142->6141 5743 402621 5744 402dab 21 API calls 5743->5744 5745 402628 5744->5745 5748 406172 GetFileAttributesW CreateFileW 5745->5748 5747 402634 5748->5747 6143 6f951774 6144 6f9517a3 6143->6144 6145 6f951bff 22 API calls 6144->6145 6146 6f9517aa 6145->6146 6147 6f9517b1 6146->6147 6148 6f9517bd 6146->6148 6149 6f951312 2 API calls 6147->6149 6150 6f9517e4 6148->6150 6151 6f9517c7 6148->6151 6154 6f9517bb 6149->6154 6152 6f95180e 6150->6152 6153 6f9517ea 6150->6153 6155 6f9515dd 3 API calls 6151->6155 6158 6f9515dd 3 API calls 6152->6158 6157 6f951654 3 API calls 6153->6157 6156 6f9517cc 6155->6156 6159 6f951654 3 API calls 6156->6159 6160 6f9517ef 6157->6160 6158->6154 6161 6f9517d2 6159->6161 6162 6f951312 2 API calls 6160->6162 6163 6f951312 2 API calls 6161->6163 6164 6f9517f5 GlobalFree 6162->6164 6165 6f9517d8 GlobalFree 6163->6165 6164->6154 6166 6f951809 GlobalFree 6164->6166 6165->6154 6166->6154 4393 4025a3 4405 402deb 4393->4405 4397 4025b6 4398 4025c5 4397->4398 4403 402933 4397->4403 4399 4025d2 RegEnumKeyW 4398->4399 4400 4025de RegEnumValueW 4398->4400 4401 4025fa RegCloseKey 4399->4401 4400->4401 4402 4025f3 4400->4402 4401->4403 4402->4401 4406 402dab 21 API calls 4405->4406 4407 402e02 4406->4407 4408 4064ef RegOpenKeyExW 4407->4408 4409 4025ad 4408->4409 4410 402d89 4409->4410 4411 4066bf 21 API calls 4410->4411 4412 402d9e 4411->4412 4412->4397 6167 4015a8 6168 402dab 21 API calls 6167->6168 6169 4015af SetFileAttributesW 6168->6169 6170 4015c1 6169->6170 4922 401fa9 4923 402dab 21 API calls 4922->4923 4924 401faf 4923->4924 4925 405707 28 API calls 4924->4925 4926 401fb9 4925->4926 4927 405c65 2 API calls 4926->4927 4928 401fbf 4927->4928 4929 401fe2 CloseHandle 4928->4929 4932 402933 4928->4932 4937 406b21 WaitForSingleObject 4928->4937 4929->4932 4933 401fd4 4934 401fe4 4933->4934 4935 401fd9 4933->4935 4934->4929 4942 4065c9 wsprintfW 4935->4942 4938 406b3b 4937->4938 4939 406b4d GetExitCodeProcess 4938->4939 4940 406ab2 2 API calls 4938->4940 4939->4933 4941 406b42 WaitForSingleObject 4940->4941 4941->4938 4942->4929 4943 6f952a7f 4944 6f952acf 4943->4944 4945 6f952a8f VirtualProtect 4943->4945 4945->4944 6178 404aab 6179 404ae1 6178->6179 6180 404abb 6178->6180 6182 404668 8 API calls 6179->6182 6181 404601 22 API calls 6180->6181 6183 404ac8 SetDlgItemTextW 6181->6183 6184 404aed 6182->6184 6183->6179 6185 6f951979 6187 6f95199c 6185->6187 6186 6f9519e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 6189 6f951312 2 API calls 6186->6189 6187->6186 6188 6f9519d1 GlobalFree 6187->6188 6188->6186 6190 6f951b6e GlobalFree GlobalFree 6189->6190 5749 40202f 5750 402dab 21 API calls 5749->5750 5751 402036 5750->5751 5752 406a76 5 API calls 5751->5752 5753 402045 5752->5753 5754 402061 GlobalAlloc 5753->5754 5756 4020d1 5753->5756 5755 402075 5754->5755 5754->5756 5757 406a76 5 API calls 5755->5757 5758 40207c 5757->5758 5759 406a76 5 API calls 5758->5759 5760 402086 5759->5760 5760->5756 5764 4065c9 wsprintfW 5760->5764 5762 4020bf 5765 4065c9 wsprintfW 5762->5765 5764->5762 5765->5756 5766 40252f 5767 402deb 21 API calls 5766->5767 5768 402539 5767->5768 5769 402dab 21 API calls 5768->5769 5770 402542 5769->5770 5771 40254d RegQueryValueExW 5770->5771 5774 402933 5770->5774 5772 402573 RegCloseKey 5771->5772 5773 40256d 5771->5773 5772->5774 5773->5772 5777 4065c9 wsprintfW 5773->5777 5777->5772 6191 4021af 6192 402dab 21 API calls 6191->6192 6193 4021b6 6192->6193 6194 402dab 21 API calls 6193->6194 6195 4021c0 6194->6195 6196 402dab 21 API calls 6195->6196 6197 4021ca 6196->6197 6198 402dab 21 API calls 6197->6198 6199 4021d4 6198->6199 6200 402dab 21 API calls 6199->6200 6201 4021de 6200->6201 6202 40221d CoCreateInstance 6201->6202 6203 402dab 21 API calls 6201->6203 6206 40223c 6202->6206 6203->6202 6204 401423 28 API calls 6205 4022fb 6204->6205 6206->6204 6206->6205 5778 6f9510e1 5779 6f951111 5778->5779 5780 6f9512b0 GlobalFree 5779->5780 5781 6f9511d7 GlobalAlloc 5779->5781 5782 6f951240 GlobalFree 5779->5782 5783 6f95135a 2 API calls 5779->5783 5784 6f9512ab 5779->5784 5785 6f951312 2 API calls 5779->5785 5786 6f95129a GlobalFree 5779->5786 5787 6f95116b GlobalAlloc 5779->5787 5788 6f951381 lstrcpyW 5779->5788 5781->5779 5782->5779 5783->5779 5784->5780 5785->5779 5786->5779 5787->5779 5788->5779 5789 401a35 5790 402dab 21 API calls 5789->5790 5791 401a3e ExpandEnvironmentStringsW 5790->5791 5792 401a52 5791->5792 5793 401a65 5791->5793 5792->5793 5794 401a57 lstrcmpW 5792->5794 5794->5793 5046 4023b7 5047 4023c5 5046->5047 5048 4023bf 5046->5048 5050 4023d3 5047->5050 5051 402dab 21 API calls 5047->5051 5049 402dab 21 API calls 5048->5049 5049->5047 5052 4023e1 5050->5052 5053 402dab 21 API calls 5050->5053 5051->5050 5054 402dab 21 API calls 5052->5054 5053->5052 5055 4023ea WritePrivateProfileStringW 5054->5055 5795 404737 lstrcpynW lstrlenW 6212 4014b8 6213 4014be 6212->6213 6214 401389 2 API calls 6213->6214 6215 4014c6 6214->6215 5056 402439 5057 402441 5056->5057 5058 40246c 5056->5058 5059 402deb 21 API calls 5057->5059 5060 402dab 21 API calls 5058->5060 5062 402448 5059->5062 5061 402473 5060->5061 5068 402e69 5061->5068 5064 402452 5062->5064 5067 402480 5062->5067 5065 402dab 21 API calls 5064->5065 5066 402459 RegDeleteValueW RegCloseKey 5065->5066 5066->5067 5069 402e76 5068->5069 5070 402e7d 5068->5070 5069->5067 5070->5069 5072 402eae 5070->5072 5073 4064ef RegOpenKeyExW 5072->5073 5074 402edc 5073->5074 5075 402f91 5074->5075 5076 402ee6 5074->5076 5075->5069 5077 402eec RegEnumValueW 5076->5077 5081 402f0f 5076->5081 5078 402f76 RegCloseKey 5077->5078 5077->5081 5078->5075 5079 402f4b RegEnumKeyW 5080 402f54 RegCloseKey 5079->5080 5079->5081 5082 406a76 5 API calls 5080->5082 5081->5078 5081->5079 5081->5080 5083 402eae 6 API calls 5081->5083 5084 402f64 5082->5084 5083->5081 5085 402f86 5084->5085 5086 402f68 RegDeleteKeyW 5084->5086 5085->5075 5086->5075 5796 40173a 5797 402dab 21 API calls 5796->5797 5798 401741 SearchPathW 5797->5798 5799 40175c 5798->5799 5800 6f9523e9 5801 6f952453 5800->5801 5802 6f95245e GlobalAlloc 5801->5802 5803 6f95247d 5801->5803 5802->5801 5804 401d3d 5805 402d89 21 API calls 5804->5805 5806 401d44 5805->5806 5807 402d89 21 API calls 5806->5807 5808 401d50 GetDlgItem 5807->5808 5809 40263d 5808->5809

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 44 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->44 45 403989-4039a3 DeleteFileW call 4030d5 37->45 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 60 4038f5-4038f6 41->60 47 403831-403838 42->47 48 403849-403882 42->48 44->45 64 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 44->64 66 403b90-403ba0 call 403c62 OleUninitialize 45->66 67 4039a9-4039af 45->67 52 40383a-40383d 47->52 53 40383f 47->53 54 403884-403889 48->54 55 40389f-4038d9 48->55 52->48 52->53 53->48 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 65 403905-403912 call 406682 58->65 60->32 62 403895-403898 61->62 63 40389a 61->63 62->55 62->63 63->55 64->45 64->66 65->37 77 403ba2-403bb2 call 405ce2 ExitProcess 66->77 78 403bc6-403bcc 66->78 70 4039b5-4039c0 call 405f7e 67->70 71 403a48-403a4f call 403d54 67->71 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->66 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->66 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 100 403a0c 97->100 98->97 98->100 100->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->66 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->66 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                          APIs
                          • SetErrorMode.KERNELBASE ref: 00403668
                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                          • #17.COMCTL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040377C
                          • OleInitialize.OLE32(00000000), ref: 00403783
                          • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                          • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004037B7
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",?,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,0000000A,?), ref: 004037F0
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403928
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403939
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403945
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403959
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403961
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403972
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040397A
                          • DeleteFileW.KERNELBASE(1033,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040398E
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403A67
                            • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                          • wsprintfW.USER32 ref: 00403AC4
                          • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                          • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                            • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\2T10XBqS6g.exe,0042C800,?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                            • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                            • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                            • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(74DF3420,00425F98,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004069EA
                            • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                          • OleUninitialize.OLE32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403B95
                          • ExitProcess.KERNEL32 ref: 00403BB2
                          • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                          • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403BD5
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                          • ExitProcess.KERNEL32 ref: 00403C5C
                            • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                          • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\2T10XBqS6g.exe$C:\Users\user\eftermodnendes\ringeagt$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                          • API String ID: 1813718867-1388424770
                          • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                          • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                          • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                          • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 362 405f4a-405f4e 360->362 363 405dd6-405dd8 361->363 364 405de7-405df7 call 406682 361->364 365 405ef8-405efd 363->365 366 405dde-405de1 363->366 372 405e06-405e07 call 405f9d 364->372 373 405df9-405e04 lstrcatW 364->373 365->362 368 405eff-405f02 365->368 366->364 366->365 370 405f04-405f0a 368->370 371 405f0c-405f14 call 4069df 368->371 370->362 371->362 381 405f16-405f2a call 405f51 call 405d46 371->381 376 405e0c-405e10 372->376 373->376 377 405e12-405e1a 376->377 378 405e1c-405e22 lstrcatW 376->378 377->378 380 405e27-405e43 lstrlenW FindFirstFileW 377->380 378->380 382 405e49-405e51 380->382 383 405eed-405ef1 380->383 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 385 405e71-405e85 call 406682 382->385 386 405e53-405e5b 382->386 383->365 388 405ef3 383->388 399 405e87-405e8f 385->399 400 405e9c-405ea7 call 405d46 385->400 389 405ed0-405ee0 FindNextFileW 386->389 390 405e5d-405e65 386->390 388->365 389->382 396 405ee6-405ee7 FindClose 389->396 390->385 393 405e67-405e6f 390->393 393->385 393->389 396->383 397->362 398->370 403 405f31-405f40 call 405707 call 406442 398->403 399->389 404 405e91-405e9a call 405d8e 399->404 408 405ec8-405ecb call 405707 400->408 409 405ea9-405eac 400->409 403->362 404->389 408->389 412 405ec0-405ec6 409->412 413 405eae-405ebe call 405707 call 406442 409->413 412->389 413->389
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DB7
                          • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DFF
                          • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E22
                          • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E28
                          • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E38
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                          • FindClose.KERNEL32(00000000), ref: 00405EE7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$POB$\*.*
                          • API String ID: 2035342205-929496218
                          • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                          • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                          • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                          • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 678 406da0-406da5 679 406e16-406e34 678->679 680 406da7-406dd6 678->680 683 40740c-407421 679->683 681 406dd8-406ddb 680->681 682 406ddd-406de1 680->682 684 406ded-406df0 681->684 685 406de3-406de7 682->685 686 406de9 682->686 687 407423-407439 683->687 688 40743b-407451 683->688 690 406df2-406dfb 684->690 691 406e0e-406e11 684->691 685->684 686->684 689 407454-40745b 687->689 688->689 692 407482-40748e 689->692 693 40745d-407461 689->693 694 406e00-406e0c 690->694 695 406dfd 690->695 696 406fe3-407001 691->696 707 406c24-406c2d 692->707 699 407610-40761a 693->699 700 407467-40747f 693->700 702 406e76-406ea4 694->702 695->694 697 407003-407017 696->697 698 407019-40702b 696->698 705 40702e-407038 697->705 698->705 706 407626-407639 699->706 700->692 703 406ec0-406eda 702->703 704 406ea6-406ebe 702->704 708 406edd-406ee7 703->708 704->708 710 40703a 705->710 711 406fdb-406fe1 705->711 709 40763e-407642 706->709 712 406c33 707->712 713 40763b 707->713 715 406eed 708->715 716 406e5e-406e64 708->716 717 406fb6-406fba 710->717 718 40714b-407158 710->718 711->696 714 406f7f-406f89 711->714 719 406c3a-406c3e 712->719 720 406d7a-406d9b 712->720 721 406cdf-406ce3 712->721 722 406d4f-406d53 712->722 713->709 723 4075ce-4075d8 714->723 724 406f8f-406fb1 714->724 739 406e43-406e5b 715->739 740 4075aa-4075b4 715->740 725 406f17-406f1d 716->725 726 406e6a-406e70 716->726 727 406fc0-406fd8 717->727 728 4075c2-4075cc 717->728 718->707 719->706 732 406c44-406c51 719->732 720->683 730 406ce9-406d02 721->730 731 40758f-407599 721->731 733 406d59-406d6d 722->733 734 40759e-4075a8 722->734 723->706 724->718 735 406f7b 725->735 737 406f1f-406f3d 725->737 726->702 726->735 727->711 728->706 736 406d05-406d09 730->736 731->706 732->713 738 406c57-406c9d 732->738 741 406d70-406d78 733->741 734->706 735->714 736->721 742 406d0b-406d11 736->742 743 406f55-406f67 737->743 744 406f3f-406f53 737->744 745 406cc5-406cc7 738->745 746 406c9f-406ca3 738->746 739->716 740->706 741->720 741->722 749 406d13-406d1a 742->749 750 406d3b-406d4d 742->750 751 406f6a-406f74 743->751 744->751 747 406cd5-406cdd 745->747 748 406cc9-406cd3 745->748 752 406ca5-406ca8 GlobalFree 746->752 753 406cae-406cbc GlobalAlloc 746->753 747->736 748->747 748->748 755 406d25-406d35 GlobalAlloc 749->755 756 406d1c-406d1f GlobalFree 749->756 750->741 751->725 757 406f76 751->757 752->753 753->713 754 406cc2 753->754 754->745 755->713 755->750 756->755 759 4075b6-4075c0 757->759 760 406efc-406f14 757->760 759->706 760->725
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                          • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                          • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                          • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 761 4069df-4069f3 FindFirstFileW 762 406a00 761->762 763 4069f5-4069fe FindClose 761->763 764 406a02-406a03 762->764 763->764
                          APIs
                          • FindFirstFileW.KERNELBASE(74DF3420,00425F98,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004069EA
                          • FindClose.KERNEL32(00000000), ref: 004069F6
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsbAF05.tmp, xrefs: 004069DF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp
                          • API String ID: 2295610775-2241113271
                          • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                          • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                          • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                          • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 160 403db9-403dca call 406550 154->160 161 403dcf-403dd5 lstrcatW 154->161 164 403dda-403e03 call 40402a call 406059 155->164 160->161 161->164 169 403e95-403e9d call 406059 164->169 170 403e09-403e0e 164->170 176 403eab-403ed0 LoadImageW 169->176 177 403e9f-403ea6 call 4066bf 169->177 170->169 171 403e14-403e3c call 406550 170->171 171->169 178 403e3e-403e42 171->178 180 403f51-403f59 call 40140b 176->180 181 403ed2-403f02 RegisterClassW 176->181 177->176 182 403e54-403e60 lstrlenW 178->182 183 403e44-403e51 call 405f7e 178->183 192 403f63-403f6e call 40402a 180->192 193 403f5b-403f5e 180->193 184 404020 181->184 185 403f08-403f4c SystemParametersInfoW CreateWindowExW 181->185 190 403e62-403e70 lstrcmpiW 182->190 191 403e88-403e90 call 405f51 call 406682 182->191 183->182 189 404022-404029 184->189 185->180 190->191 196 403e72-403e7c GetFileAttributesW 190->196 191->169 204 403f74-403f8e ShowWindow call 406a06 192->204 205 403ff7-403fff call 4057da 192->205 193->189 199 403e82-403e83 call 405f9d 196->199 200 403e7e-403e80 196->200 199->191 200->191 200->199 212 403f90-403f95 call 406a06 204->212 213 403f9a-403fac GetClassInfoW 204->213 210 404001-404007 205->210 211 404019-40401b call 40140b 205->211 210->193 214 40400d-404014 call 40140b 210->214 211->184 212->213 217 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 213->217 218 403fae-403fbe GetClassInfoW RegisterClassW 213->218 214->193 217->189 218->217
                          APIs
                            • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                            • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                          • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",00008001), ref: 00403DD5
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,74DF3420), ref: 00403E55
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                          • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                            • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                          • RegisterClassW.USER32(00428A00), ref: 00403EF9
                          • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403F11
                          • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                          • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                          • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                          • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                          • RegisterClassW.USER32(00428A00), ref: 00403FBE
                          • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-2625727361
                          • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                          • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                          • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                          • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 230 40336f-403373 228->230 237 403163 229->237 238 403248-403256 call 403033 229->238 240 403168-40317f 237->240 244 403327-40332c 238->244 245 40325c-40325f 238->245 242 403181 240->242 243 403183-40318c call 4035e7 240->243 242->243 250 403192-403199 243->250 251 4032e3-4032eb call 403033 243->251 244->230 248 403261-403279 call 4035fd call 4035e7 245->248 249 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 245->249 248->244 272 40327f-403285 248->272 276 4032d9-4032de 249->276 277 4032ed-40331d call 4035fd call 403376 249->277 254 403215-403219 250->254 255 40319b-4031af call 40612d 250->255 251->244 262 403223-403229 254->262 263 40321b-403222 call 403033 254->263 255->262 274 4031b1-4031b8 255->274 267 403238-403240 262->267 268 40322b-403235 call 406b63 262->268 263->262 267->240 275 403246 267->275 268->267 272->244 272->249 274->262 279 4031ba-4031c1 274->279 275->238 276->230 286 403322-403325 277->286 279->262 281 4031c3-4031ca 279->281 281->262 283 4031cc-4031d3 281->283 283->262 285 4031d5-4031f5 283->285 285->244 288 4031fb-4031ff 285->288 286->244 287 40332e-40333f 286->287 289 403341 287->289 290 403347-40334c 287->290 291 403201-403205 288->291 292 403207-40320f 288->292 289->290 293 40334d-403353 290->293 291->275 291->292 292->262 294 403211-403213 292->294 293->293 295 403355-40336d call 40612d 293->295 294->262 295->230
                          APIs
                          • GetTickCount.KERNEL32 ref: 004030E9
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\2T10XBqS6g.exe,00000400), ref: 00403105
                            • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                            • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                          • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 0040314E
                          • GlobalAlloc.KERNELBASE(?,00008001), ref: 00403290
                          Strings
                          • C:\Users\user\Desktop\2T10XBqS6g.exe, xrefs: 004030EF, 004030FE, 00403112, 0040312F
                          • "C:\Users\user\Desktop\2T10XBqS6g.exe", xrefs: 004030DE
                          • Inst, xrefs: 004031BA
                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403327
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D9
                          • soft, xrefs: 004031C3
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DF, 004032A8
                          • Error launching installer, xrefs: 00403125
                          • Null, xrefs: 004031CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\2T10XBqS6g.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-2061807057
                          • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                          • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                          • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                          • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 303 406911-40691e 301->303 304 406719-406726 301->304 302->301 305 40670d-406714 302->305 306 406920-406925 call 406682 303->306 307 40692a-40692d 303->307 304->303 308 40672c-406735 304->308 305->301 306->307 309 4068f2 308->309 310 40673b-40677e 308->310 314 406900-406903 309->314 315 4068f4-4068fe 309->315 312 406784-406790 310->312 313 406896-40689a 310->313 316 406792 312->316 317 40679a-40679c 312->317 318 40689c-4068a3 313->318 319 4068ce-4068d2 313->319 314->301 315->301 316->317 322 4067d6-4067d9 317->322 323 40679e-4067c4 call 406550 317->323 320 4068b3-4068bf call 406682 318->320 321 4068a5-4068b1 call 4065c9 318->321 324 4068e2-4068f0 lstrlenW 319->324 325 4068d4-4068dd call 4066bf 319->325 334 4068c4-4068ca 320->334 321->334 329 4067db-4067e7 GetSystemDirectoryW 322->329 330 4067ec-4067ef 322->330 338 4067ca-4067d1 call 4066bf 323->338 339 40687e-406881 323->339 324->301 325->324 335 406879-40687c 329->335 336 406801-406805 330->336 337 4067f1-4067fd GetWindowsDirectoryW 330->337 334->324 340 4068cc 334->340 335->339 341 40688e-406894 call 406930 335->341 336->335 342 406807-406825 336->342 337->336 338->335 339->341 346 406883-406889 lstrcatW 339->346 340->341 341->324 343 406827-40682d 342->343 344 406839-406851 call 406a76 342->344 351 406835-406837 343->351 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 344->355 356 406868-406871 344->356 346->341 351->344 353 406873-406877 351->353 353->335 355->353 355->356 356->342 356->353
                          APIs
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                          • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                          • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                          • API String ID: 4024019347-3319343437
                          • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                          • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                          • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                          • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 433 4017ba-4017bb call 406930 426->433 427->433 436 4017c0-4017c4 433->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 446 4017e2-4017f4 437->446 447 4017d2-4017e0 CompareFileTime 437->447 440 401802-40181e call 406172 438->440 441 4017fc-4017fd call 40614d 438->441 448 401820-401823 440->448 449 401892-4018bb call 405707 call 403376 440->449 441->440 446->438 447->446 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 463 4018c3-4018cf SetFileTime 449->463 464 4018bd-4018c1 449->464 461 401887-40188d 450->461 451->436 485 401869-40186a 451->485 465 402c38 461->465 467 4018d5-4018e0 CloseHandle 463->467 464->463 464->467 468 402c3a-402c3e 465->468 470 4018e6-4018e9 467->470 471 402c2f-402c32 467->471 473 4018eb-4018fc call 4066bf lstrcatW 470->473 474 4018fe-401901 call 4066bf 470->474 471->465 479 401906-40239d 473->479 474->479 483 4023a2-4023a7 479->483 484 40239d call 405ce2 479->484 483->468 484->483 485->461 486 40186c-40186d 485->486 486->450
                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000,Call,00435000,?,?,00000031), ref: 004017B5
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,00435000,?,?,00000031), ref: 004017DA
                            • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                            • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                            • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                            • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp$C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dll$Call
                          • API String ID: 1941528284-3618420953
                          • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                          • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                          • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                          • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 516 402806 504->516 505->504 507 4027e3-4027ee call 406253 505->507 506->496 509 402776-402784 506->509 507->496 507->504 512 40278a-40279c MultiByteToWideChar 509->512 513 40283f-40284b call 4065c9 509->513 512->516 517 40279e-4027a1 512->517 513->494 519 402809-40280c 516->519 520 4027a3-4027ae 517->520 519->513 521 40280e-402813 519->521 520->519 522 4027b0-4027d5 SetFilePointer MultiByteToWideChar 520->522 524 402850-402854 521->524 525 402815-40281a 521->525 522->520 523 4027d7 522->523 523->516 526 402871-40287d SetFilePointer 524->526 527 402856-40285a 524->527 525->524 528 40281c-40282f 525->528 526->496 529 402862-40286f 527->529 530 40285c-402860 527->530 528->496 531 402831-402837 528->531 529->496 530->526 530->529 531->501 532 40283d 531->532 532->496
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00402798
                          • SetFilePointer.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 004027BB
                          • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004027D1
                            • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406269
                          • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040287D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                          • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                          • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                          • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                          • wsprintfW.USER32 ref: 00406A58
                          • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406A6C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME
                          • API String ID: 2200240437-1106614640
                          • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                          • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                          • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                          • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 551 402f28-402f3c call 402eae 549->551 556 402f86-402f8c 550->556 557 402f68-402f74 RegDeleteKeyW 550->557 551->550 558 402f3e-402f4a 551->558 556->543 557->543 558->548
                          APIs
                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseEnum$DeleteValue
                          • String ID:
                          • API String ID: 1354259210-0
                          • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                          • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                          • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                          • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 559 6f951817-6f951856 call 6f951bff 563 6f951976-6f951978 559->563 564 6f95185c-6f951860 559->564 565 6f951862-6f951868 call 6f95243e 564->565 566 6f951869-6f951876 call 6f952480 564->566 565->566 571 6f9518a6-6f9518ad 566->571 572 6f951878-6f95187d 566->572 573 6f9518cd-6f9518d1 571->573 574 6f9518af-6f9518cb call 6f952655 call 6f951654 call 6f951312 GlobalFree 571->574 575 6f95187f-6f951880 572->575 576 6f951898-6f95189b 572->576 581 6f9518d3-6f95191c call 6f951666 call 6f952655 573->581 582 6f95191e-6f951924 call 6f952655 573->582 598 6f951925-6f951929 574->598 579 6f951882-6f951883 575->579 580 6f951888-6f951889 call 6f952b98 575->580 576->571 577 6f95189d-6f95189e call 6f952e23 576->577 591 6f9518a3 577->591 586 6f951885-6f951886 579->586 587 6f951890-6f951896 call 6f952810 579->587 594 6f95188e 580->594 581->598 582->598 586->571 586->580 597 6f9518a5 587->597 591->597 594->591 597->571 602 6f951966-6f95196d 598->602 603 6f95192b-6f951939 call 6f952618 598->603 602->563 605 6f95196f-6f951970 GlobalFree 602->605 609 6f951951-6f951958 603->609 610 6f95193b-6f95193e 603->610 605->563 609->602 612 6f95195a-6f951965 call 6f9515dd 609->612 610->609 611 6f951940-6f951948 610->611 611->609 613 6f95194a-6f95194b FreeLibrary 611->613 612->602 613->609
                          APIs
                            • Part of subcall function 6F951BFF: GlobalFree.KERNEL32(?), ref: 6F951E74
                            • Part of subcall function 6F951BFF: GlobalFree.KERNEL32(?), ref: 6F951E79
                            • Part of subcall function 6F951BFF: GlobalFree.KERNEL32(?), ref: 6F951E7E
                          • GlobalFree.KERNEL32(00000000), ref: 6F9518C5
                          • FreeLibrary.KERNEL32(?), ref: 6F95194B
                          • GlobalFree.KERNEL32(00000000), ref: 6F951970
                            • Part of subcall function 6F95243E: GlobalAlloc.KERNEL32(?,?), ref: 6F95246F
                            • Part of subcall function 6F952810: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,6F951896,00000000), ref: 6F9528E0
                            • Part of subcall function 6F951666: wsprintfW.USER32 ref: 6F951694
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarywsprintf
                          • String ID:
                          • API String ID: 3962662361-3916222277
                          • Opcode ID: 2d603677b7faf98f0c166d8f67e8ddd0e27947d8387a01ec6d7ca9d3dfd106fa
                          • Instruction ID: f1bc40d8e6a9c98be62b0425c4ee0de7d4627680e58f2f17960be4a52e23e213
                          • Opcode Fuzzy Hash: 2d603677b7faf98f0c166d8f67e8ddd0e27947d8387a01ec6d7ca9d3dfd106fa
                          • Instruction Fuzzy Hash: C1418E719043419BEB24DF74E888BD537ACAF17368F044466EA199E0C6DB74E1F8CA60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 624 401c84-401c8a 621->624 625 401c7a-401c81 call 402dab 621->625 622->621 628 401cd8-401d02 call 402dab * 2 FindWindowExW 624->628 629 401c8c-401ca8 call 402d89 * 2 624->629 625->624 641 401d08 628->641 639 401cc8-401cd6 SendMessageW 629->639 640 401caa-401cc6 SendMessageTimeoutW 629->640 639->641 642 401d0b-401d0e 640->642 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                          • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                          • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                          • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 647 40248f-4024b6 call 402dab * 2 call 402e3b 653 4024bb-4024c0 647->653 654 4024c6-4024d0 653->654 655 402c2f-402c3e 653->655 656 4024d2-4024df call 402dab lstrlenW 654->656 657 4024e3-4024e6 654->657 656->657 661 4024e8-4024f9 call 402d89 657->661 662 4024fa-4024fd 657->662 661->662 665 40250e-402522 RegSetValueExW 662->665 666 4024ff-402509 call 403376 662->666 669 402524 665->669 670 402527-402608 RegCloseKey 665->670 666->665 669->670 670->655
                          APIs
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000023,00000011,00000002), ref: 004024DA
                          • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,00000011,00000002), ref: 0040251A
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,00000011,00000002), ref: 00402602
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp
                          • API String ID: 2655323295-2241113271
                          • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                          • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                          • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                          • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 672 4061a1-4061ad 673 4061ae-4061e2 GetTickCount GetTempFileNameW 672->673 674 4061f1-4061f3 673->674 675 4061e4-4061e6 673->675 677 4061eb-4061ee 674->677 675->673 676 4061e8 675->676 676->677
                          APIs
                          • GetTickCount.KERNEL32 ref: 004061BF
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-678247507
                          • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                          • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                          • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                          • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                          • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                          • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                          • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                          • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                          • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                          • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                          • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                          • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                          • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                          • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                          • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                          • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                          • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                          • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                          • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                          • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                          • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                          • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                          • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                          • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                          • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                          APIs
                          • GetTickCount.KERNEL32 ref: 00403492
                            • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                          • SetFilePointer.KERNELBASE(00119FB8,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FilePointer$CountTick
                          • String ID:
                          • API String ID: 1092082344-0
                          • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                          • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                          • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                          • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,?,?), ref: 00402108
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                            • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                            • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                            • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                          • LoadLibraryExW.KERNEL32(00000000,?,?,?,?), ref: 00402119
                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,?,?), ref: 00402196
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                          • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                          • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                          • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D
                          APIs
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,00000011,00000002), ref: 00402602
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                          • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                          • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                          • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                          APIs
                          • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                          • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                          • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                          • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                          APIs
                            • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                            • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                            • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 0040161F
                            • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                          • SetCurrentDirectoryW.KERNELBASE(?,00435000,?,00000000,?), ref: 00401652
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID:
                          • API String ID: 1892508949-0
                          • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                          • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                          • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                          • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                          • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                          • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                          • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                          APIs
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                          • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                          • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                          • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                          APIs
                          • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                          • GetLastError.KERNEL32 ref: 00405C26
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                          • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                          • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                          • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                          APIs
                          • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                          • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID:
                          • API String ID: 3712363035-0
                          • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                          • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                          • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                          • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                            • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                            • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                            • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406A6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                          • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                          • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                          • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                          • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                          • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                          • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                          • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                          • GetLastError.KERNEL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405C44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                          • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                          • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                          • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                            • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                          • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                          • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                          • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                          APIs
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                          • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                          • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                          • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                          • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                          • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                          • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                          APIs
                          • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040DAE4,0040CEF0,0040357E,0040CEF0,0040DAE4,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                          • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                          • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                          • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                          APIs
                          • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                          • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                          • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                          • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                          APIs
                          • VirtualProtect.KERNELBASE(6F95505C,?,?,6F95504C), ref: 6F952A9D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: aefcaf4626e4d228b71b24da9c1b294afa98854bfcbf4e998983499f006df4e2
                          • Instruction ID: 222df829fa2509e19be2c3a5ae3a78d3600b5fea2355233479cf29c6a42108a7
                          • Opcode Fuzzy Hash: aefcaf4626e4d228b71b24da9c1b294afa98854bfcbf4e998983499f006df4e2
                          • Instruction Fuzzy Hash: 62F022B0549B80DEEB90CF3C844471A3BE4B75A339B55456AE24CD6282E374947CDF91
                          APIs
                          • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                          • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                          • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                          • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                          • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                          • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                          • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                          • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                          • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                          • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                          APIs
                          • CloseHandle.KERNELBASE(00000000), ref: 6F952C57
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: e6867810800dafb1d36b8aad139901808c4de987499878374c4a3415ec5ebec7
                          • Instruction ID: 679227cc1b50f57349186b9cc595625e4f1892dca2116c917a436d4f636ea7c4
                          • Opcode Fuzzy Hash: e6867810800dafb1d36b8aad139901808c4de987499878374c4a3415ec5ebec7
                          • Instruction Fuzzy Hash: EF4181B1508704DFEF10DFB8D985B593778EB56368F208465E4088A1C2D738E4B9CF91
                          APIs
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                            • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                            • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                            • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                            • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                            • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                          • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                            • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,?), ref: 00406B32
                            • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                            • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                          • String ID:
                          • API String ID: 2972824698-0
                          • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                          • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                          • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                          • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                          APIs
                          • GlobalAlloc.KERNELBASE(?,?,6F9512DB,?,6F95137F,00000019,6F9511CA,-000000A0), ref: 6F9512C5
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 269975ab828f8ad783b29989ca66d3ffcbc6146c65fb6f2c356f7289323b7ef9
                          • Instruction ID: 29f6427f95fb7907d200561d91dafb5730c0a5eeb98c94f3714f60c3461d6a64
                          • Opcode Fuzzy Hash: 269975ab828f8ad783b29989ca66d3ffcbc6146c65fb6f2c356f7289323b7ef9
                          • Instruction Fuzzy Hash: 79B002716445009FFF409B7CED5AF353654F741725F544050B609D5141D56458388D65
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 004058A4
                          • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                          • GetClientRect.USER32(?,?), ref: 004058F0
                          • GetSystemMetrics.USER32(00000002), ref: 004058F7
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                          • ShowWindow.USER32(?,?), ref: 00405993
                          • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                          • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                            • Part of subcall function 00404636: SendMessageW.USER32(?,?,?,00404461), ref: 00404644
                          • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                          • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                          • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                          • ShowWindow.USER32(00000000), ref: 00405A3F
                          • ShowWindow.USER32(?,?), ref: 00405A44
                          • ShowWindow.USER32(?), ref: 00405A8E
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                          • CreatePopupMenu.USER32 ref: 00405AD3
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                          • GetWindowRect.USER32(?,?), ref: 00405B07
                          • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405B20
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                          • OpenClipboard.USER32(00000000), ref: 00405B68
                          • EmptyClipboard.USER32 ref: 00405B6E
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                          • GlobalLock.KERNEL32(00000000), ref: 00405B84
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                          • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                          • CloseClipboard.USER32 ref: 00405BC9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: H/B${
                          • API String ID: 590372296-332483393
                          • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                          • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                          • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                          • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                          • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                          • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                          • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                          • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                          • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                            • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                            • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00406993
                            • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004069A2
                            • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\2T10XBqS6g.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069A7
                            • Part of subcall function 00406930: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069BA
                          • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D3A
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                            • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                            • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                            • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                          • API String ID: 2624150263-772280193
                          • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                          • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                          • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                          • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                          APIs
                            • Part of subcall function 6F9512BB: GlobalAlloc.KERNELBASE(?,?,6F9512DB,?,6F95137F,00000019,6F9511CA,-000000A0), ref: 6F9512C5
                          • GlobalAlloc.KERNEL32(?,00001CA4), ref: 6F951D2D
                          • lstrcpyW.KERNEL32(00000008,?), ref: 6F951D75
                          • lstrcpyW.KERNEL32(00000808,?), ref: 6F951D7F
                          • GlobalFree.KERNEL32(00000000), ref: 6F951D92
                          • GlobalFree.KERNEL32(?), ref: 6F951E74
                          • GlobalFree.KERNEL32(?), ref: 6F951E79
                          • GlobalFree.KERNEL32(?), ref: 6F951E7E
                          • GlobalFree.KERNEL32(00000000), ref: 6F952068
                          • lstrcpyW.KERNEL32(?,?), ref: 6F952222
                          • GetModuleHandleW.KERNEL32(00000008), ref: 6F9522A1
                          • LoadLibraryW.KERNEL32(00000008), ref: 6F9522B2
                          • GetProcAddress.KERNEL32(?,?), ref: 6F95230C
                          • lstrlenW.KERNEL32(00000808), ref: 6F952326
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                          • String ID:
                          • API String ID: 245916457-0
                          • Opcode ID: 9a8ab02a41b772adc74af0a8b9aba5a45e68dbcdb3aad89f3c0d02bd56d6dd15
                          • Instruction ID: 1f368538a7fbd1183819abe5507f5e298af6685b7d4510b94ec9fdf37b4a6aa2
                          • Opcode Fuzzy Hash: 9a8ab02a41b772adc74af0a8b9aba5a45e68dbcdb3aad89f3c0d02bd56d6dd15
                          • Instruction Fuzzy Hash: 72228A71D0460ADADB24CFB8C9806EEB7B8FF06315F20462AD565E62C0E774E6E5CB50
                          APIs
                          • CoCreateInstance.OLE32(004084DC,?,?,004084CC,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040222E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID:
                          • API String ID: 542301482-0
                          • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                          • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                          • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                          • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                          • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                          • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                          • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00405086
                          • GetDlgItem.USER32(?,00000408), ref: 00405091
                          • GlobalAlloc.KERNEL32(?,?), ref: 004050DB
                          • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                          • SetWindowLongW.USER32(?,?,0040567B), ref: 0040510B
                          • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 0040511F
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                          • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00405165
                          • DeleteObject.GDI32(00000000), ref: 00405168
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                            • Part of subcall function 00404636: SendMessageW.USER32(?,?,?,00404461), ref: 00404644
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                          • GetWindowLongW.USER32(?,?), ref: 004052AC
                          • SetWindowLongW.USER32(?,?,00000000), ref: 004052BA
                          • ShowWindow.USER32(?,00000005), ref: 004052CA
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 0040543F
                          • SendMessageW.USER32(?,00000420,00000000,?), ref: 00405463
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                          • ImageList_Destroy.COMCTL32(?), ref: 00405498
                          • GlobalFree.KERNEL32(?), ref: 004054A8
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                          • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                          • InvalidateRect.USER32(?,00000000,?), ref: 00405604
                          • ShowWindow.USER32(?,00000000), ref: 00405652
                          • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                          • ShowWindow.USER32(00000000), ref: 00405664
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 2564846305-813528018
                          • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                          • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                          • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                          • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                          • ShowWindow.USER32(?), ref: 0040415E
                          • GetWindowLongW.USER32(?,?), ref: 00404170
                          • ShowWindow.USER32(?,?), ref: 00404189
                          • DestroyWindow.USER32 ref: 0040419D
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                          • GetDlgItem.USER32(?,?), ref: 004041D5
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                          • IsWindowEnabled.USER32(00000000), ref: 004041F0
                          • GetDlgItem.USER32(?,?), ref: 0040429B
                          • GetDlgItem.USER32(?,00000002), ref: 004042A5
                          • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                          • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404310
                          • GetDlgItem.USER32(?,00000003), ref: 004043B6
                          • ShowWindow.USER32(00000000,?), ref: 004043D7
                          • EnableWindow.USER32(?,?), ref: 004043E9
                          • EnableWindow.USER32(?,?), ref: 00404404
                          • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040441A
                          • EnableMenuItem.USER32(00000000), ref: 00404421
                          • SendMessageW.USER32(?,?,00000000,?), ref: 00404439
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                          • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                          • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                          • ShowWindow.USER32(?,0000000A), ref: 004045BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                          • String ID: H/B
                          • API String ID: 1860320154-184950203
                          • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                          • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                          • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                          • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040485E
                          • GetDlgItem.USER32(?,000003E8), ref: 00404872
                          • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040488F
                          • GetSysColor.USER32(?), ref: 004048A0
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                          • lstrlenW.KERNEL32(?), ref: 004048C1
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                          • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                          • SendMessageW.USER32(00000000), ref: 00404943
                          • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                          • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                          • SetCursor.USER32(00000000), ref: 004049C2
                          • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                          • SetCursor.USER32(00000000), ref: 004049DE
                          • SendMessageW.USER32(00000111,?,00000000), ref: 00404A0D
                          • SendMessageW.USER32(?,00000000,00000000), ref: 00404A1F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                          • String ID: 7G@$Call$N
                          • API String ID: 3103080414-3155595626
                          • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                          • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                          • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                          • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406463,?,?), ref: 00406303
                          • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                            • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                            • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                          • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                          • wsprintfA.USER32 ref: 00406347
                          • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,?,00426DE8,?,?,?,?,?), ref: 00406382
                          • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00406391
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                          • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                          • GlobalFree.KERNEL32(00000000), ref: 00406430
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                            • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                            • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]$eB$mB$mB
                          • API String ID: 2171350718-2529913679
                          • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                          • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                          • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                          • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,?), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                          • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                          • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                          • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00406993
                          • CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004069A2
                          • CharNextW.USER32(?,"C:\Users\user\Desktop\2T10XBqS6g.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069A7
                          • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069BA
                          Strings
                          • "C:\Users\user\Desktop\2T10XBqS6g.exe", xrefs: 00406974
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                          • *?|<>/":, xrefs: 00406982
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-1778716880
                          • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                          • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                          • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                          • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                          • GetSysColor.USER32(00000000), ref: 004046C3
                          • SetTextColor.GDI32(?,00000000), ref: 004046CF
                          • SetBkMode.GDI32(?,?), ref: 004046DB
                          • GetSysColor.USER32(?), ref: 004046EE
                          • SetBkColor.GDI32(?,?), ref: 004046FE
                          • DeleteObject.GDI32(?), ref: 00404718
                          • CreateBrushIndirect.GDI32(?), ref: 00404722
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                          • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                          • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                          • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 6F9525C2
                            • Part of subcall function 6F9512CC: lstrcpynW.KERNEL32(00000000,?,6F95137F,00000019,6F9511CA,-000000A0), ref: 6F9512DC
                          • GlobalAlloc.KERNEL32(?), ref: 6F952548
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F952563
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID: @Hmu
                          • API String ID: 4216380887-887474944
                          • Opcode ID: 9ec911011d04d297534b6bb0aa72d9a918562f79d76eb32c4d864278538b580c
                          • Instruction ID: ca5e35fad6984550f2131d48c6839aef38d2c0754ed85e98e934fecdcf4f2b4c
                          • Opcode Fuzzy Hash: 9ec911011d04d297534b6bb0aa72d9a918562f79d76eb32c4d864278538b580c
                          • Instruction Fuzzy Hash: 8941BEB0008705EFEB24DF38E850A6677B8FB96324F104A1EE44A861C2E731E5B5CF61
                          APIs
                          • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                          • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                          • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                          • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID:
                          • API String ID: 2531174081-0
                          • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                          • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                          • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                          • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                          • GetTickCount.KERNEL32 ref: 0040306C
                          • wsprintfW.USER32 ref: 0040309A
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                            • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                            • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                            • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                            • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                            • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                          • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                          • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                            • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,?,00000BF4), ref: 0040302C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                          • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                          • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                          • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                          • GetMessagePos.USER32 ref: 00404FDF
                          • ScreenToClient.USER32(?,?), ref: 00404FF9
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                          • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                          • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                          • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                          APIs
                          • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                          • wsprintfW.USER32 ref: 00402FEA
                          • SetWindowTextW.USER32(?,?), ref: 00402FFA
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                          • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                          • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                          • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                          APIs
                            • Part of subcall function 6F9512BB: GlobalAlloc.KERNELBASE(?,?,6F9512DB,?,6F95137F,00000019,6F9511CA,-000000A0), ref: 6F9512C5
                          • GlobalFree.KERNEL32(?), ref: 6F952743
                          • GlobalFree.KERNEL32(00000000), ref: 6F952778
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 5d4cf12b1b93195b78ff3346e1efc49a5c7c4384053a5030a5513d85afd9a0fa
                          • Instruction ID: 1716407da6871b380ce57cb86bbfd3b88dc2cadc12d11fd5da9a91f5dbf44489
                          • Opcode Fuzzy Hash: 5d4cf12b1b93195b78ff3346e1efc49a5c7c4384053a5030a5513d85afd9a0fa
                          • Instruction Fuzzy Hash: 5331BC31609601EFDB25CF78D994C2A77BAFB873247244629F100932A0C731F8799FA1
                          APIs
                            • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                            • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                          • GlobalAlloc.KERNEL32(?,?), ref: 004029B6
                            • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                          • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004029D2
                          • GlobalFree.KERNEL32(?), ref: 00402A0B
                          • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                            • Part of subcall function 00403376: SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                          • CloseHandle.KERNEL32(?,?,?), ref: 00402A3A
                          • DeleteFileW.KERNEL32(?), ref: 00402A4D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                          • String ID:
                          • API String ID: 488507980-0
                          • Opcode ID: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                          • Instruction ID: ba218adf5694e25fd77313e1ccbbfbab35a2a379656f90145ff8969d650460ca
                          • Opcode Fuzzy Hash: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                          • Instruction Fuzzy Hash: 8E218B71D00118BFCF21AFA4DD8989EBFB9EF08360B14422AF555762E1CB7949419F68
                          APIs
                          • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                          • wsprintfW.USER32 ref: 00404F58
                          • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$H/B
                          • API String ID: 3540041739-2222257793
                          • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                          • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                          • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                          • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: a56104b4b437795e5839ebff2bc860969941715894525480535144f98aafeb0f
                          • Instruction ID: 4caf77e9ac55212a85b1ccef986dcfca7a7f631bb3f01493855e7aecf9240b00
                          • Opcode Fuzzy Hash: a56104b4b437795e5839ebff2bc860969941715894525480535144f98aafeb0f
                          • Instruction Fuzzy Hash: FA51C032D04218AA8B11DFF895409AEBBB9EB43314F02925BD414A72D8F771FAF58791
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D9F
                          • GetClientRect.USER32(?,?), ref: 00401DEA
                          • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                          • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                          • DeleteObject.GDI32(00000000), ref: 00401E3E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                          • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                          • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                          • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                          APIs
                          • GetDC.USER32(?), ref: 00401E56
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                          • ReleaseDC.USER32(?,00000000), ref: 00401E89
                          • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID:
                          • API String ID: 3808545654-0
                          • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                          • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                          • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                          • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6F9522D8,?,00000808), ref: 6F9516D5
                          • GlobalAlloc.KERNEL32(?,00000000,?,00000000,6F9522D8,?,00000808), ref: 6F9516DC
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6F9522D8,?,00000808), ref: 6F9516F0
                          • GetProcAddress.KERNEL32(6F9522D8,00000000), ref: 6F9516F7
                          • GlobalFree.KERNEL32(00000000), ref: 6F951700
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 311f38b1763b7ec9742577518d403eeb50f5c125160272282c6101161c546521
                          • Instruction ID: f8e68ef3ed11c3b06d5819710cbd2e0d7ac599606af6dcb6266155eb6cc4f385
                          • Opcode Fuzzy Hash: 311f38b1763b7ec9742577518d403eeb50f5c125160272282c6101161c546521
                          • Instruction Fuzzy Hash: 9FF0127210A5387BDB6016BA9C4CC9B7E9CEF8B2F5B110215F6189119085614C35DFF1
                          APIs
                          • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                          • CharNextW.USER32(00000000), ref: 0040600F
                          • CharNextW.USER32(00000000), ref: 00406027
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsbAF05.tmp, xrefs: 00405FFD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp
                          • API String ID: 3213498283-2241113271
                          • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                          • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                          • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                          • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F57
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F61
                          • lstrcatW.KERNEL32(?,0040A014,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405F73
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3081826266
                          • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                          • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                          • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                          • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4111367164.000000006F951000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F950000, based on PE: true
                          • Associated: 00000000.00000002.4111350594.000000006F950000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111386123.000000006F954000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4111404388.000000006F956000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6f950000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 920368ba1c5d0bf3d2b25d97aa18736a9e0b06a00e71052da3eaa136c16f6c70
                          • Instruction ID: a3d0bacac4eef916bf4c7876f7fec148cb22f6dbeb451bda2dac2e24645fffd0
                          • Opcode Fuzzy Hash: 920368ba1c5d0bf3d2b25d97aa18736a9e0b06a00e71052da3eaa136c16f6c70
                          • Instruction Fuzzy Hash: 21517BB5904701DFEB10CF78D844A6677A8FB0B328B40415AE908DB2A2E774E9B4CF90
                          APIs
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dll), ref: 0040269A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp$C:\Users\user\AppData\Local\Temp\nsbAF05.tmp\System.dll
                          • API String ID: 1659193697-3574398053
                          • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                          • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                          • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                          • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                          APIs
                          • CloseHandle.KERNEL32(000002D0,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403C74
                          • CloseHandle.KERNEL32(000002F4,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403C88
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsbAF05.tmp, xrefs: 00403C98
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsbAF05.tmp
                          • API String ID: 2962429428-3160207424
                          • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                          • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                          • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                          • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                          APIs
                            • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                            • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                            • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                            • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 004060B2
                          • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,C:\Users\user\AppData\Local\Temp\nsbAF05.tmp,74DF3420,?,74DF2EE0,00405DAE,?,74DF3420,74DF2EE0), ref: 004060C2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsbAF05.tmp
                          • API String ID: 3248276644-2241113271
                          • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                          • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                          • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                          • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                          APIs
                          • IsWindowVisible.USER32(?), ref: 004056AA
                          • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                            • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                          • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                          • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                          • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                          APIs
                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                          • RegCloseKey.ADVAPI32(?), ref: 004065A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: Call
                          • API String ID: 3356406503-1824292864
                          • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                          • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                          • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                          • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                          • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                          • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                          Memory Dump Source
                          • Source File: 00000000.00000002.4109721495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4109675400.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109751449.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109782701.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4109967991.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                          • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                          • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                          • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99