Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2T10XBqS6g.exe

Overview

General Information

Sample name:2T10XBqS6g.exe
renamed because original name is a hash value
Original sample name:5266c53649caa9edea2f4ab58d58f511.bat
Analysis ID:1590600
MD5:5266c53649caa9edea2f4ab58d58f511
SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
Infos:

Detection

GuLoader
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sigma detected: Execution of Suspicious File Type Extension
Spawns drivers
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w11x64_office
  • 2T10XBqS6g.exe (PID: 1032 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
  • SystemSettingsBroker.exe (PID: 2868 cmdline: C:\Windows\System32\SystemSettingsBroker.exe -Embedding MD5: 899E65893CDEE7F9022DC9B583F94F0F)
  • rassstp.sys (PID: 4 cmdline: MD5: 6931A955F0697B3A675E3F1B1B058D96)
  • ndproxy.sys (PID: 4 cmdline: MD5: 8236B9B87FCB51A225A5B69A23C6DCBA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.3824728797.0000000003120000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\System32\drivers\rassstp.sys, NewProcessName: C:\Windows\System32\drivers\rassstp.sys, OriginalFileName: C:\Windows\System32\drivers\rassstp.sys, ParentCommandLine: , ParentImage: , ParentProcessId: -1, ProcessCommandLine: , ProcessId: 4, ProcessName: rassstp.sys
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 2T10XBqS6g.exeVirustotal: Detection: 33%Perma Link
    Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
    Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_004069DF FindFirstFileW,FindClose,2_2_004069DF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_00405D8E
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00402910 FindFirstFileW,2_2_00402910
    Source: global trafficTCP traffic: 192.168.2.25:61352 -> 1.1.1.1:53
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: 2T10XBqS6g.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_00405846
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,2_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00406DA02_2_00406DA0
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_6E1D1BFF2_2_6E1D1BFF
    Source: unknownDriver loaded: C:\Windows\System32\drivers\rassstp.sys
    Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal64.troj.evad.winEXE@2/8@0/0
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,2_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,LdrInitializeThunk,SetDlgItemTextW,2_2_00404AF2
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_004021AF LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,2_2_004021AF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\eftermodnendesJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsxB253.tmpJump to behavior
    Source: 2T10XBqS6g.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 2T10XBqS6g.exeVirustotal: Detection: 33%
    Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"
    Source: unknownProcess created: C:\Windows\System32\SystemSettingsBroker.exe C:\Windows\System32\SystemSettingsBroker.exe -Embedding
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cfgmgr32.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: systemsettings.datamodel.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: audiohandlers.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: mmdevapi.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: winmmbase.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: uvcmodel.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: audioses.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cfgmgr32.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cfgmgr32.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cfgmgr32.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: settingshandlers_display.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: deviceassociation.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: settingshandlers_accessibility.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.cloudstore.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.media.devices.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.internal.accessibility.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.internal.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: usermgrcli.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: settingshandlers_sharedexperiences_rome.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.devices.radios.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: appextension.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: mrmcorer.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.ui.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: cdp.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: languageoverlayutil.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: policymanager.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: msvcp110_win.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: settingshandlers_devices.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: wincorlib.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: bcp47mrm.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.staterepositorycore.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: deviceflows.datamodel.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: threadpoolwinrt.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: devdispitemprovider.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: devicedisplaystatusmanager.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: fundisc.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: fddevquery.dllJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeSection loaded: windows.graphics.dllJump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
    Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000002.00000002.3824728797.0000000003120000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_6E1D1BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,2_2_6E1D1BFF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_6E1D30C0 push eax; ret 2_2_6E1D30EE
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\SystemSettingsBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeRDTSC instruction interceptor: First address: 33BA302 second address: 33BA302 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FBE484EC09Fh 0x00000006 cmp ax, cx 0x00000009 test ah, ah 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d test edx, 139251E6h 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_004069DF FindFirstFileW,FindClose,2_2_004069DF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_00405D8E
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00402910 FindFirstFileW,2_2_00402910
    Source: SystemSettingsBroker.exe, 00000025.00000002.3823013903.000001C34B483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2VMware Virtual USB Mouse
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137711419.000001C34D782000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137711419.000001C34D782000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk SCSI Disk DeviceB)xM
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137655326.000001C34D73F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137655326.000001C34D73F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4NECVMWar VMware SATA CD00
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137711419.000001C34D782000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\'xM
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824259437.000001C34D73D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ..SWD\COMPUTER\MFG_VMware__Inc.&PROD_VMware20_1
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824259437.000001C34D73D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @wvid.inf,%vid.devicedesc%;Microsoft Hyper-V Virtualization Infrastructure Driverp
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824146405.000001C34D731000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Drivertion Infrastructure Driver
    Source: SystemSettingsBroker.exe, 00000025.00000002.3823013903.000001C34B483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc. VMware20,1
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824259437.000001C34D73D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @wgencounter.inf,%gencounter.devicedesc%;Microsoft Hyper-V Generation Counter
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137655326.000001C34D73F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: v@oem1.inf,%loc.vmwarebusdevicedesc%;VMware VMCI Bus Devicep
    Source: SystemSettingsBroker.exe, 00000025.00000002.3823013903.000001C34B483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware VMCI Bus Devicesdevicedesc%;VMware VMCI Bus Device
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824259437.000001C34D73D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0VMware, Inc. VMware20,1
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137711419.000001C34D782000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824146405.000001C34D731000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Microsoft Hyper-V Generation Countersc%;Microsoft Hyper-V Generation Counter|
    Source: SystemSettingsBroker.exe, 00000025.00000002.3824146405.000001C34D731000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @wgencounter.infgencounter.devicedescMicrosoft Hyper-V Generation Counterwgencounter.inf1-2702878673-795188819-444038987-2781)S:(ML;;NX;;;LW)
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137655326.000001C34D73F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: SystemSettingsBroker.exe, 00000025.00000003.3137655326.000001C34D73F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JVMware Virtual disk SCSI Disk Device
    Source: SystemSettingsBroker.exe, 00000025.00000002.3823013903.000001C34B483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SWD\COMPUTER\MFG_VMware__Inc.&PROD_VMware20_1
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_2-4393
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_2-4396
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,2_2_00403645
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_6E1D1BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,2_2_6E1D1BFF
    Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,2_2_00403645
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    LSASS Driver
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Process Injection
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    LSASS Driver
    1
    Process Injection
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    DLL Side-Loading
    1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1590600 Sample: 2T10XBqS6g.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 64 17 Multi AV Scanner detection for submitted file 2->17 19 Yara detected GuLoader 2->19 21 AI detected suspicious sample 2->21 5 2T10XBqS6g.exe 23 2->5         started        9 SystemSettingsBroker.exe 2->9         started        11 rassstp.sys 2->11         started        13 ndproxy.sys 2->13         started        process3 file4 15 C:\Users\user\AppData\Local\...\System.dll, PE32 5->15 dropped 23 Tries to detect virtualization through RDTSC time measurements 5->23 signatures5

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    2T10XBqS6g.exe33%VirustotalBrowse
    2T10XBqS6g.exe32%ReversingLabsWin32.Trojan.Guloader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dll3%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError2T10XBqS6g.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1590600
      Start date and time:2025-01-14 10:55:56 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 9s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
      Run name:Potential for more IOCs and behavior
      Number of analysed new started processes analysed:40
      Number of new started drivers analysed:2
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:2T10XBqS6g.exe
      renamed because original name is a hash value
      Original Sample Name:5266c53649caa9edea2f4ab58d58f511.bat
      Detection:MAL
      Classification:mal64.troj.evad.winEXE@2/8@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 99%
      • Number of executed functions: 47
      • Number of non-executed functions: 33
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SecurityHealthHost.exe, dllhost.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 23.51.58.94, 52.149.20.212, 40.126.31.71
      • Excluded domains from analysis (whitelisted): assets.msn.com, client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, otelrules.svc.static.microsoft, login.live.com, browser.events.data.msn.cn, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dllZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
        https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
          RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
            Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
              CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                  SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                    D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):25
                      Entropy (8bit):4.0536606896881855
                      Encrypted:false
                      SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                      MD5:08CA75DA54EB4810D18796C97F510A55
                      SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                      SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                      SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:[Bus Clock]..Gats=Galse..
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1155000
                      Entropy (8bit):3.8859756205821308
                      Encrypted:false
                      SSDEEP:6144:uGCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyCe40DX7DBII0M1S9L76R:JCTw03L9ZXI4a2QGM3HkXkCX7xS9CR
                      MD5:38A7F42F627D0CFEDB0C6AA615ED9033
                      SHA1:83D88F62301313DF7684F010059F31E6DFD98F09
                      SHA-256:5997C5EE4C46C86EE31FE005BD75537E30F9DFEBB101898813142C535902DA9C
                      SHA-512:19829ACEEFBFA48E9EB68E22FB14602556EA577F8E21A4068FFF9E6C3D56837ADC6B5F560828DB2FFF4E9B62A585F0FA8E16BD20B452FFB02BB73EE293D8F8D2
                      Malicious:false
                      Reputation:low
                      Preview:H.......,...................V...,...............H...........................................................................................................................................................................................................................................G...Y...........,...j...............................................................................................................................b...................W...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):5.805604762622714
                      Encrypted:false
                      SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                      MD5:4ADD245D4BA34B04F213409BFE504C07
                      SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                      SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                      SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 3%, Browse
                      Joe Sandbox View:
                      • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                      • Filename: , Detection: malicious, Browse
                      • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                      • Filename: Quotation.exe, Detection: malicious, Browse
                      • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                      • Filename: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):114454
                      Entropy (8bit):1.2519787240577294
                      Encrypted:false
                      SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                      MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                      SHA1:B61AEF131017C5605647983CE2D55769914BB104
                      SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                      SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                      Malicious:false
                      Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):310550
                      Entropy (8bit):1.2527719188567612
                      Encrypted:false
                      SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                      MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                      SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                      SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                      SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                      Malicious:false
                      Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):309745
                      Entropy (8bit):7.569098036898635
                      Encrypted:false
                      SSDEEP:6144:5GCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyC6:kCTw03L9ZXI4a2QGM3HkX1
                      MD5:E5DB339C9BC74BBBF87F00D895C3CE7D
                      SHA1:7E81D22286BBC4F9DE3EE19632FE4393C000A19C
                      SHA-256:85BD4C3E0830FF240D546F22B590A70A78C9D273ABEDCEC034C07794A170A319
                      SHA-512:A6ECC38DD64383B6355111D7454FDE81B103601439AB7B9C83951A4CCE182031D16BE5E1096C905335E1C970942875B8CD35BFC400AF3CF470DBFE527832576F
                      Malicious:false
                      Preview:...................................."..}}}}........&..u..44.@.......SS.........eeee.........]....................****............c..............................C.MM...........HH...................II....................{{{{......aaaa......tt...................h............a..V.............$............ee...NNN.U...Y.G........:...............................||................V.''''.....................;..W.`...GG...77.......Z.U.ll......d.iiii.WWWW................4..OO............RRRR.l..........T.................F.......................f.........i...............................22.....E........F...................;............ttt......."".......%............>>.JJJJ.~~.......................I........Q..........................S.YYY...................w..V.....|..@@.$$.<........(.'''''.....h...................WW...||.;.9999...s...&...ii..a...::::..N..........!..>....i.11.....y.....3..M..x..............oo........=...aa........0..........)...........r.........ii.............}}...........ooo...
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                      Category:dropped
                      Size (bytes):267655
                      Entropy (8bit):1.2559804952290619
                      Encrypted:false
                      SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                      MD5:F6A4342C9271CFFEF29695EEA330941E
                      SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                      SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                      SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                      Malicious:false
                      Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                      Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):133033
                      Entropy (8bit):4.593734870096358
                      Encrypted:false
                      SSDEEP:1536:sS8+1gLo/MpFTtd62wA8i0rH/SHGphackCh1Up78GsvP2Jl275nr4okWO/h:BgL6MpFberHX9JhBPBEokr
                      MD5:5571C0F9CABA24DDC31B19F2680AC58C
                      SHA1:7D80A671FCE50A911EC74C527770D6D1EC92C0FC
                      SHA-256:21B871645A5DE53B99910AC3F464A5E9C6C29715603F4975F437C2A9FF3B264A
                      SHA-512:8E33180BA9D6165C44B03B56A8224C7D0F2FBACB06102C0FD195391F2350DE648AC4CAB82D58D59D87B83519B484242061F4122082099B6595F91C090FFBEA89
                      Malicious:false
                      Preview:....>..............o.............'.............{.......TT.............b....222222.....LL.w......UU.,.....##..............||........._..........~~~~~..jj...D...MMM...............................[...j......'.................>>..ccccc............................k...........................mmm.............$$...................{.......................VV.....UUU.....33.........L.ww....LLLL...................Y........ss.*......b..........................F................n...88...l.&.....@@..........l........q.......GG.........................r.......PP..C....y......................................EE............i.......F.>...........(...........g..........{{..E........................--......................-.................;.............bb.....ssssss...WW.....WW.E..).._.....[[.NNN.........u.....X..q......IIII...qq...............xxx...pp..............x..........oo......-.................................G..............................................[.u....................OOOOO................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.733854525663187
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:2T10XBqS6g.exe
                      File size:578'624 bytes
                      MD5:5266c53649caa9edea2f4ab58d58f511
                      SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
                      SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
                      SHA512:3284c03bbdc622d6f4f2dfc2f77e37540e9007382e1c44cc1b98cc0aebf63c125c1560b59d429f8780a2b0d0450bd31566b946c4daa6f3c142520c25bd01e56f
                      SSDEEP:12288:UnPdMEc/A4e/wKOBwCYSUu9EEwH5IvhJGspQCZu6:EPdMEc/AN/XOBwCYSN9EEwZI6spQR6
                      TLSH:4EC4F1F6F650C267E61F0D34DA72A8F01990BC39D1D1483B43A47DADF472A62589BA0F
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                      Icon Hash:4571753721719a8d
                      Entrypoint:0x403645
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                      Instruction
                      sub esp, 000003F8h
                      push ebp
                      push esi
                      push edi
                      push 00000020h
                      pop edi
                      xor ebp, ebp
                      push 00008001h
                      mov dword ptr [esp+20h], ebp
                      mov dword ptr [esp+18h], 0040A230h
                      mov dword ptr [esp+14h], ebp
                      call dword ptr [004080A0h]
                      mov esi, dword ptr [004080A4h]
                      lea eax, dword ptr [esp+34h]
                      push eax
                      mov dword ptr [esp+4Ch], ebp
                      mov dword ptr [esp+0000014Ch], ebp
                      mov dword ptr [esp+00000150h], ebp
                      mov dword ptr [esp+38h], 0000011Ch
                      call esi
                      test eax, eax
                      jne 00007FBE48BA4F6Ah
                      lea eax, dword ptr [esp+34h]
                      mov dword ptr [esp+34h], 00000114h
                      push eax
                      call esi
                      mov ax, word ptr [esp+48h]
                      mov ecx, dword ptr [esp+62h]
                      sub ax, 00000053h
                      add ecx, FFFFFFD0h
                      neg ax
                      sbb eax, eax
                      mov byte ptr [esp+0000014Eh], 00000004h
                      not eax
                      and eax, ecx
                      mov word ptr [esp+00000148h], ax
                      cmp dword ptr [esp+38h], 0Ah
                      jnc 00007FBE48BA4F38h
                      and word ptr [esp+42h], 0000h
                      mov eax, dword ptr [esp+40h]
                      movzx ecx, byte ptr [esp+3Ch]
                      mov dword ptr [00429B18h], eax
                      xor eax, eax
                      mov ah, byte ptr [esp+38h]
                      movzx eax, ax
                      or eax, ecx
                      xor ecx, ecx
                      mov ch, byte ptr [esp+00000148h]
                      movzx ecx, cx
                      shl eax, 10h
                      or eax, ecx
                      movzx ecx, byte ptr [esp+0000004Eh]
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                      RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                      RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                      RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                      RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                      RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                      RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                      RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                      RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                      RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                      RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                      RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                      RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                      RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                      RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                      RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                      RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                      RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                      RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                      DLLImport
                      ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                      SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                      ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                      USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                      KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 14, 2025 10:56:47.635592937 CET6135253192.168.2.251.1.1.1
                      Jan 14, 2025 10:56:47.640618086 CET53613521.1.1.1192.168.2.25
                      Jan 14, 2025 10:56:47.640731096 CET6135253192.168.2.251.1.1.1
                      Jan 14, 2025 10:56:47.645850897 CET53613521.1.1.1192.168.2.25
                      Jan 14, 2025 10:56:48.107575893 CET6135253192.168.2.251.1.1.1
                      Jan 14, 2025 10:56:48.112653971 CET53613521.1.1.1192.168.2.25
                      Jan 14, 2025 10:56:48.112729073 CET6135253192.168.2.251.1.1.1
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 14, 2025 10:56:47.634723902 CET53584751.1.1.1192.168.2.25

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:2
                      Start time:04:56:57
                      Start date:14/01/2025
                      Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\2T10XBqS6g.exe"
                      Imagebase:0x400000
                      File size:578'624 bytes
                      MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.3824728797.0000000003120000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:false

                      Target ID:37
                      Start time:04:59:49
                      Start date:14/01/2025
                      Path:C:\Windows\System32\SystemSettingsBroker.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\SystemSettingsBroker.exe -Embedding
                      Imagebase:0x7ff751e40000
                      File size:220'536 bytes
                      MD5 hash:899E65893CDEE7F9022DC9B583F94F0F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:39
                      Start time:04:59:50
                      Start date:14/01/2025
                      Path:C:\Windows\System32\drivers\rassstp.sys
                      Wow64 process (32bit):false
                      Commandline:
                      Imagebase:0x7ff77f310000
                      File size:122'880 bytes
                      MD5 hash:6931A955F0697B3A675E3F1B1B058D96
                      Has elevated privileges:
                      Has administrator privileges:
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:40
                      Start time:04:59:50
                      Start date:14/01/2025
                      Path:C:\Windows\System32\drivers\ndproxy.sys
                      Wow64 process (32bit):
                      Commandline:
                      Imagebase:
                      File size:122'880 bytes
                      MD5 hash:8236B9B87FCB51A225A5B69A23C6DCBA
                      Has elevated privileges:
                      Has administrator privileges:
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:15.9%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:16%
                        Total number of Nodes:1603
                        Total number of Limit Nodes:35
                        execution_graph 5215 4047c0 5217 4048f2 5215->5217 5219 4047d8 5215->5219 5216 40495c 5218 404a26 5216->5218 5220 404966 GetDlgItem 5216->5220 5217->5216 5217->5218 5224 40492d GetDlgItem SendMessageW 5217->5224 5258 404668 5218->5258 5246 404601 5219->5246 5222 404980 5220->5222 5223 4049e7 5220->5223 5222->5223 5231 4049a6 SendMessageW LoadCursorW SetCursor 5222->5231 5223->5218 5227 4049f9 5223->5227 5251 404623 EnableWindow 5224->5251 5225 40483f 5229 404601 22 API calls 5225->5229 5233 404a0f 5227->5233 5234 4049ff SendMessageW 5227->5234 5236 40484c CheckDlgButton 5229->5236 5230 404a21 5255 404a6f 5231->5255 5233->5230 5238 404a15 SendMessageW 5233->5238 5234->5233 5235 404957 5252 404a4b 5235->5252 5249 404623 EnableWindow 5236->5249 5238->5230 5241 40486a GetDlgItem 5250 404636 SendMessageW 5241->5250 5243 404880 SendMessageW 5244 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5243->5244 5245 40489d GetSysColor 5243->5245 5244->5230 5245->5244 5247 4066bf 21 API calls 5246->5247 5248 40460c SetDlgItemTextW 5247->5248 5248->5225 5249->5241 5250->5243 5251->5235 5253 404a59 5252->5253 5254 404a5e SendMessageW 5252->5254 5253->5254 5254->5216 5272 405ca8 ShellExecuteExW 5255->5272 5257 4049d5 LoadCursorW SetCursor 5257->5223 5259 40472b 5258->5259 5260 404680 GetWindowLongW 5258->5260 5259->5230 5260->5259 5261 404695 5260->5261 5261->5259 5262 4046c2 GetSysColor 5261->5262 5263 4046c5 5261->5263 5262->5263 5264 4046d5 SetBkMode 5263->5264 5265 4046cb SetTextColor 5263->5265 5266 4046f3 5264->5266 5267 4046ed GetSysColor 5264->5267 5265->5264 5268 404704 5266->5268 5269 4046fa SetBkColor 5266->5269 5267->5266 5268->5259 5270 404717 DeleteObject 5268->5270 5271 40471e CreateBrushIndirect 5268->5271 5269->5268 5270->5271 5271->5259 5272->5257 5273 402643 5274 402672 5273->5274 5275 402657 5273->5275 5277 4026a2 5274->5277 5278 402677 5274->5278 5276 402d89 21 API calls 5275->5276 5286 40265e 5276->5286 5280 402dab 21 API calls 5277->5280 5279 402dab 21 API calls 5278->5279 5282 40267e 5279->5282 5281 4026a9 lstrlenW 5280->5281 5281->5286 5290 4066a4 WideCharToMultiByte 5282->5290 5284 402692 lstrlenA 5284->5286 5285 4026ec 5286->5285 5288 406253 5 API calls 5286->5288 5289 4026d6 5286->5289 5287 406224 WriteFile 5287->5285 5288->5289 5289->5285 5289->5287 5290->5284 4347 403645 SetErrorMode GetVersionExW 4348 4036d1 4347->4348 4349 403699 GetVersionExW 4347->4349 4350 403728 4348->4350 4351 406a76 5 API calls 4348->4351 4349->4348 4352 406a06 3 API calls 4350->4352 4351->4350 4353 40373e lstrlenA 4352->4353 4353->4350 4354 40374e 4353->4354 4355 406a76 5 API calls 4354->4355 4356 403755 4355->4356 4357 406a76 5 API calls 4356->4357 4358 40375c 4357->4358 4359 406a76 5 API calls 4358->4359 4360 403768 #17 OleInitialize SHGetFileInfoW 4359->4360 4435 406682 lstrcpynW 4360->4435 4363 4037b7 GetCommandLineW 4436 406682 lstrcpynW 4363->4436 4365 4037c9 4366 405f7e CharNextW 4365->4366 4367 4037ef CharNextW 4366->4367 4375 403801 4367->4375 4368 403903 4369 403917 GetTempPathW 4368->4369 4437 403614 4369->4437 4371 40392f 4372 403933 GetWindowsDirectoryW lstrcatW 4371->4372 4373 403989 DeleteFileW 4371->4373 4376 403614 12 API calls 4372->4376 4447 4030d5 GetTickCount GetModuleFileNameW 4373->4447 4374 405f7e CharNextW 4374->4375 4375->4368 4375->4374 4381 403905 4375->4381 4378 40394f 4376->4378 4378->4373 4380 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4378->4380 4379 40399d 4385 405f7e CharNextW 4379->4385 4417 403a44 4379->4417 4427 403a54 4379->4427 4383 403614 12 API calls 4380->4383 4534 406682 lstrcpynW 4381->4534 4387 403981 4383->4387 4392 4039bc 4385->4392 4387->4373 4387->4427 4389 403ba2 4391 405ce2 MessageBoxIndirectW 4389->4391 4390 403bc6 4393 403c4a ExitProcess 4390->4393 4394 403bce GetCurrentProcess OpenProcessToken 4390->4394 4396 403bb0 ExitProcess 4391->4396 4399 403a1a 4392->4399 4400 403a5d 4392->4400 4397 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4394->4397 4398 403c1a 4394->4398 4397->4398 4402 406a76 5 API calls 4398->4402 4535 406059 4399->4535 4551 405c4d 4400->4551 4405 403c21 4402->4405 4408 403c36 ExitWindowsEx 4405->4408 4410 403c43 4405->4410 4408->4393 4408->4410 4409 403a7c 4412 403a94 4409->4412 4555 406682 lstrcpynW 4409->4555 4620 40140b 4410->4620 4418 403aba wsprintfW 4412->4418 4432 403ae6 4412->4432 4414 403a39 4550 406682 lstrcpynW 4414->4550 4477 403d54 4417->4477 4419 4066bf 21 API calls 4418->4419 4419->4412 4422 403b30 SetCurrentDirectoryW 4601 406442 MoveFileExW 4422->4601 4423 403af6 GetFileAttributesW 4424 403b02 DeleteFileW 4423->4424 4423->4432 4424->4432 4611 403c62 4427->4611 4429 406442 40 API calls 4429->4432 4430 4066bf 21 API calls 4430->4432 4432->4412 4432->4418 4432->4422 4432->4423 4432->4427 4432->4429 4432->4430 4433 403bb8 CloseHandle 4432->4433 4556 405bd6 CreateDirectoryW 4432->4556 4559 405c30 CreateDirectoryW 4432->4559 4562 405d8e 4432->4562 4605 405c65 CreateProcessW 4432->4605 4608 4069df FindFirstFileW 4432->4608 4433->4427 4435->4363 4436->4365 4438 406930 5 API calls 4437->4438 4440 403620 4438->4440 4439 40362a 4439->4371 4440->4439 4623 405f51 lstrlenW CharPrevW 4440->4623 4443 405c30 2 API calls 4444 403638 4443->4444 4445 4061a1 2 API calls 4444->4445 4446 403643 4445->4446 4446->4371 4626 406172 GetFileAttributesW CreateFileW 4447->4626 4449 403118 4476 403125 4449->4476 4627 406682 lstrcpynW 4449->4627 4451 40313b 4628 405f9d lstrlenW 4451->4628 4455 40314c GetFileSize 4456 403163 4455->4456 4471 403246 4455->4471 4461 4032e3 4456->4461 4469 403033 36 API calls 4456->4469 4456->4471 4456->4476 4664 4035e7 4456->4664 4460 40328b GlobalAlloc 4462 4032a2 4460->4462 4465 403033 36 API calls 4461->4465 4467 4061a1 2 API calls 4462->4467 4464 40326c 4466 4035e7 ReadFile 4464->4466 4465->4476 4468 403277 4466->4468 4470 4032b3 CreateFileW 4467->4470 4468->4460 4468->4476 4469->4456 4472 4032ed 4470->4472 4470->4476 4633 403033 4471->4633 4648 4035fd SetFilePointer 4472->4648 4474 4032fb 4649 403376 4474->4649 4476->4379 4478 406a76 5 API calls 4477->4478 4479 403d68 4478->4479 4480 403d80 4479->4480 4481 403d6e 4479->4481 4482 406550 3 API calls 4480->4482 4719 4065c9 wsprintfW 4481->4719 4483 403db0 4482->4483 4485 403dcf lstrcatW 4483->4485 4487 406550 3 API calls 4483->4487 4486 403d7e 4485->4486 4711 40402a 4486->4711 4487->4485 4490 406059 18 API calls 4491 403e01 4490->4491 4492 403e95 4491->4492 4494 406550 3 API calls 4491->4494 4493 406059 18 API calls 4492->4493 4495 403e9b 4493->4495 4497 403e33 4494->4497 4496 403eab LoadImageW 4495->4496 4498 4066bf 21 API calls 4495->4498 4499 403f51 4496->4499 4500 403ed2 RegisterClassW 4496->4500 4497->4492 4501 403e54 lstrlenW 4497->4501 4504 405f7e CharNextW 4497->4504 4498->4496 4503 40140b 2 API calls 4499->4503 4502 403f08 SystemParametersInfoW CreateWindowExW 4500->4502 4532 403f5b 4500->4532 4505 403e62 lstrcmpiW 4501->4505 4506 403e88 4501->4506 4502->4499 4507 403f57 4503->4507 4509 403e51 4504->4509 4505->4506 4510 403e72 GetFileAttributesW 4505->4510 4508 405f51 3 API calls 4506->4508 4511 40402a 22 API calls 4507->4511 4507->4532 4512 403e8e 4508->4512 4509->4501 4513 403e7e 4510->4513 4515 403f68 4511->4515 4720 406682 lstrcpynW 4512->4720 4513->4506 4514 405f9d 2 API calls 4513->4514 4514->4506 4517 403f74 ShowWindow 4515->4517 4518 403ff7 4515->4518 4520 406a06 3 API calls 4517->4520 4721 4057da OleInitialize 4518->4721 4522 403f8c 4520->4522 4521 403ffd 4523 404001 4521->4523 4524 404019 4521->4524 4525 403f9a GetClassInfoW 4522->4525 4527 406a06 3 API calls 4522->4527 4530 40140b 2 API calls 4523->4530 4523->4532 4526 40140b 2 API calls 4524->4526 4528 403fc4 DialogBoxParamW 4525->4528 4529 403fae GetClassInfoW RegisterClassW 4525->4529 4526->4532 4527->4525 4531 40140b 2 API calls 4528->4531 4529->4528 4530->4532 4533 403fec 4531->4533 4532->4427 4533->4532 4534->4369 4739 406682 lstrcpynW 4535->4739 4537 40606a 4740 405ffc CharNextW CharNextW 4537->4740 4540 403a26 4540->4427 4549 406682 lstrcpynW 4540->4549 4541 406930 5 API calls 4547 406080 4541->4547 4542 4060b1 lstrlenW 4543 4060bc 4542->4543 4542->4547 4545 405f51 3 API calls 4543->4545 4544 4069df 2 API calls 4544->4547 4546 4060c1 GetFileAttributesW 4545->4546 4546->4540 4547->4540 4547->4542 4547->4544 4548 405f9d 2 API calls 4547->4548 4548->4542 4549->4414 4550->4417 4552 406a76 5 API calls 4551->4552 4553 403a62 lstrlenW 4552->4553 4554 406682 lstrcpynW 4553->4554 4554->4409 4555->4412 4557 405c26 GetLastError 4556->4557 4558 405c22 4556->4558 4557->4558 4558->4432 4560 405c40 4559->4560 4561 405c44 GetLastError 4559->4561 4560->4432 4561->4560 4563 406059 18 API calls 4562->4563 4564 405dae 4563->4564 4565 405db6 DeleteFileW 4564->4565 4566 405dcd 4564->4566 4567 405f04 4565->4567 4568 405ef8 4566->4568 4746 406682 lstrcpynW 4566->4746 4567->4432 4568->4567 4575 4069df 2 API calls 4568->4575 4570 405df3 4571 405e06 4570->4571 4572 405df9 lstrcatW 4570->4572 4574 405f9d 2 API calls 4571->4574 4573 405e0c 4572->4573 4576 405e1c lstrcatW 4573->4576 4578 405e27 lstrlenW FindFirstFileW 4573->4578 4574->4573 4577 405f12 4575->4577 4576->4578 4577->4567 4579 405f16 4577->4579 4581 405e49 4578->4581 4582 405eed 4578->4582 4580 405f51 3 API calls 4579->4580 4583 405f1c 4580->4583 4584 405ed0 FindNextFileW 4581->4584 4594 405d8e 64 API calls 4581->4594 4596 405707 28 API calls 4581->4596 4599 405707 28 API calls 4581->4599 4600 406442 40 API calls 4581->4600 4747 406682 lstrcpynW 4581->4747 4748 405d46 4581->4748 4582->4568 4585 405d46 5 API calls 4583->4585 4584->4581 4588 405ee6 FindClose 4584->4588 4587 405f28 4585->4587 4589 405f42 4587->4589 4590 405f2c 4587->4590 4588->4582 4592 405707 28 API calls 4589->4592 4590->4567 4593 405707 28 API calls 4590->4593 4592->4567 4595 405f39 4593->4595 4594->4581 4597 406442 40 API calls 4595->4597 4596->4584 4598 405f40 4597->4598 4598->4567 4599->4581 4600->4581 4602 403b3f CopyFileW 4601->4602 4603 406456 4601->4603 4602->4427 4602->4432 4759 4062c8 4603->4759 4606 405ca4 4605->4606 4607 405c98 CloseHandle 4605->4607 4606->4432 4607->4606 4609 406a00 4608->4609 4610 4069f5 FindClose 4608->4610 4609->4432 4610->4609 4612 403c73 CloseHandle 4611->4612 4613 403c7d 4611->4613 4612->4613 4614 403c91 4613->4614 4615 403c87 CloseHandle 4613->4615 4793 403cbf 4614->4793 4615->4614 4618 405d8e 71 API calls 4619 403b95 OleUninitialize 4618->4619 4619->4389 4619->4390 4621 401389 2 API calls 4620->4621 4622 401420 4621->4622 4622->4393 4624 403632 4623->4624 4625 405f6d lstrcatW 4623->4625 4624->4443 4625->4624 4626->4449 4627->4451 4629 405fab 4628->4629 4630 405fb1 CharPrevW 4629->4630 4631 403141 4629->4631 4630->4629 4630->4631 4632 406682 lstrcpynW 4631->4632 4632->4455 4634 403044 4633->4634 4635 40305c 4633->4635 4636 40304d DestroyWindow 4634->4636 4641 403054 4634->4641 4637 403064 4635->4637 4638 40306c GetTickCount 4635->4638 4636->4641 4668 406ab2 4637->4668 4640 40307a 4638->4640 4638->4641 4642 403082 4640->4642 4643 4030af CreateDialogParamW ShowWindow 4640->4643 4641->4460 4641->4476 4667 4035fd SetFilePointer 4641->4667 4642->4641 4672 403017 4642->4672 4643->4641 4645 403090 wsprintfW 4675 405707 4645->4675 4648->4474 4650 4033a1 4649->4650 4651 403385 SetFilePointer 4649->4651 4686 40347e GetTickCount 4650->4686 4651->4650 4654 40343e 4654->4476 4657 40347e 46 API calls 4658 4033d8 4657->4658 4658->4654 4659 403444 ReadFile 4658->4659 4661 4033e7 4658->4661 4659->4654 4661->4654 4662 4061f5 ReadFile 4661->4662 4701 406224 WriteFile 4661->4701 4662->4661 4665 4061f5 ReadFile 4664->4665 4666 4035fa 4665->4666 4666->4456 4667->4464 4669 406acf PeekMessageW 4668->4669 4670 406ac5 DispatchMessageW 4669->4670 4671 406adf 4669->4671 4670->4669 4671->4641 4673 403026 4672->4673 4674 403028 MulDiv 4672->4674 4673->4674 4674->4645 4676 405722 4675->4676 4685 4030ad 4675->4685 4677 40573e lstrlenW 4676->4677 4678 4066bf 21 API calls 4676->4678 4679 405767 4677->4679 4680 40574c lstrlenW 4677->4680 4678->4677 4682 40577a 4679->4682 4683 40576d SetWindowTextW 4679->4683 4681 40575e lstrcatW 4680->4681 4680->4685 4681->4679 4684 405780 SendMessageW SendMessageW SendMessageW 4682->4684 4682->4685 4683->4682 4684->4685 4685->4641 4687 4035d6 4686->4687 4688 4034ac 4686->4688 4689 403033 36 API calls 4687->4689 4703 4035fd SetFilePointer 4688->4703 4695 4033a8 4689->4695 4691 4034b7 SetFilePointer 4697 4034dc 4691->4697 4692 4035e7 ReadFile 4692->4697 4694 403033 36 API calls 4694->4697 4695->4654 4699 4061f5 ReadFile 4695->4699 4696 406224 WriteFile 4696->4697 4697->4692 4697->4694 4697->4695 4697->4696 4698 4035b7 SetFilePointer 4697->4698 4704 406bf1 4697->4704 4698->4687 4700 4033c1 4699->4700 4700->4654 4700->4657 4702 406242 4701->4702 4702->4661 4703->4691 4705 406c16 4704->4705 4706 406c1e 4704->4706 4705->4697 4706->4705 4707 406ca5 GlobalFree 4706->4707 4708 406cae GlobalAlloc 4706->4708 4709 406d25 GlobalAlloc 4706->4709 4710 406d1c GlobalFree 4706->4710 4707->4708 4708->4705 4708->4706 4709->4705 4709->4706 4710->4709 4712 40403e 4711->4712 4728 4065c9 wsprintfW 4712->4728 4714 4040af 4729 4040e3 4714->4729 4716 403ddf 4716->4490 4717 4040b4 4717->4716 4718 4066bf 21 API calls 4717->4718 4718->4717 4719->4486 4720->4492 4732 40464d 4721->4732 4723 4057fd 4727 405824 4723->4727 4735 401389 4723->4735 4724 40464d SendMessageW 4725 405836 OleUninitialize 4724->4725 4725->4521 4727->4724 4728->4714 4730 4066bf 21 API calls 4729->4730 4731 4040f1 SetWindowTextW 4730->4731 4731->4717 4733 404665 4732->4733 4734 404656 SendMessageW 4732->4734 4733->4723 4734->4733 4737 401390 4735->4737 4736 4013fe 4736->4723 4737->4736 4738 4013cb MulDiv SendMessageW 4737->4738 4738->4737 4739->4537 4741 406019 4740->4741 4742 40602b 4740->4742 4741->4742 4743 406026 CharNextW 4741->4743 4744 405f7e CharNextW 4742->4744 4745 40604f 4742->4745 4743->4745 4744->4742 4745->4540 4745->4541 4746->4570 4747->4581 4756 40614d GetFileAttributesW 4748->4756 4751 405d61 RemoveDirectoryW 4753 405d6f 4751->4753 4752 405d69 DeleteFileW 4752->4753 4754 405d73 4753->4754 4755 405d7f SetFileAttributesW 4753->4755 4754->4581 4755->4754 4757 405d52 4756->4757 4758 40615f SetFileAttributesW 4756->4758 4757->4751 4757->4752 4757->4754 4758->4757 4760 4062f8 4759->4760 4761 40631e GetShortPathNameW 4759->4761 4786 406172 GetFileAttributesW CreateFileW 4760->4786 4763 406333 4761->4763 4764 40643d 4761->4764 4763->4764 4765 40633b wsprintfA 4763->4765 4764->4602 4767 4066bf 21 API calls 4765->4767 4766 406302 CloseHandle GetShortPathNameW 4766->4764 4768 406316 4766->4768 4769 406363 4767->4769 4768->4761 4768->4764 4787 406172 GetFileAttributesW CreateFileW 4769->4787 4771 406370 4771->4764 4772 40637f GetFileSize GlobalAlloc 4771->4772 4773 4063a1 4772->4773 4774 406436 CloseHandle 4772->4774 4775 4061f5 ReadFile 4773->4775 4774->4764 4776 4063a9 4775->4776 4776->4774 4788 4060d7 lstrlenA 4776->4788 4779 4063c0 lstrcpyA 4782 4063e2 4779->4782 4780 4063d4 4781 4060d7 4 API calls 4780->4781 4781->4782 4783 406419 SetFilePointer 4782->4783 4784 406224 WriteFile 4783->4784 4785 40642f GlobalFree 4784->4785 4785->4774 4786->4766 4787->4771 4789 406118 lstrlenA 4788->4789 4790 406120 4789->4790 4791 4060f1 lstrcmpiA 4789->4791 4790->4779 4790->4780 4791->4790 4792 40610f CharNextA 4791->4792 4792->4789 4794 403ccd 4793->4794 4795 403c96 4794->4795 4796 403cd2 FreeLibrary GlobalFree 4794->4796 4795->4618 4796->4795 4796->4796 4803 4015c6 4804 402dab 21 API calls 4803->4804 4805 4015cd 4804->4805 4806 405ffc 4 API calls 4805->4806 4818 4015d6 4806->4818 4807 401636 4809 401668 4807->4809 4810 40163b 4807->4810 4808 405f7e CharNextW 4808->4818 4812 401423 28 API calls 4809->4812 4822 401423 4810->4822 4819 401660 4812->4819 4814 405c30 2 API calls 4814->4818 4816 405c4d 5 API calls 4816->4818 4817 40164f SetCurrentDirectoryW 4817->4819 4818->4807 4818->4808 4818->4814 4818->4816 4820 40161c GetFileAttributesW 4818->4820 4821 405bd6 2 API calls 4818->4821 4820->4818 4821->4818 4823 405707 28 API calls 4822->4823 4824 401431 4823->4824 4825 406682 lstrcpynW 4824->4825 4825->4817 5291 405846 5292 4059f0 5291->5292 5293 405867 GetDlgItem GetDlgItem GetDlgItem 5291->5293 5295 405a21 5292->5295 5296 4059f9 GetDlgItem CreateThread CloseHandle 5292->5296 5336 404636 SendMessageW 5293->5336 5297 405a4c 5295->5297 5299 405a71 5295->5299 5300 405a38 ShowWindow ShowWindow 5295->5300 5296->5295 5301 405aac 5297->5301 5304 405a60 5297->5304 5305 405a86 ShowWindow 5297->5305 5298 4058d7 5302 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5298->5302 5306 404668 8 API calls 5299->5306 5338 404636 SendMessageW 5300->5338 5301->5299 5309 405aba SendMessageW 5301->5309 5307 405930 SendMessageW SendMessageW 5302->5307 5308 40594c 5302->5308 5339 4045da 5304->5339 5312 405aa6 5305->5312 5313 405a98 5305->5313 5311 405a7f 5306->5311 5307->5308 5314 405951 SendMessageW 5308->5314 5315 40595f 5308->5315 5309->5311 5316 405ad3 CreatePopupMenu 5309->5316 5318 4045da SendMessageW 5312->5318 5317 405707 28 API calls 5313->5317 5314->5315 5320 404601 22 API calls 5315->5320 5319 4066bf 21 API calls 5316->5319 5317->5312 5318->5301 5321 405ae3 AppendMenuW 5319->5321 5322 40596f 5320->5322 5323 405b00 GetWindowRect 5321->5323 5324 405b13 TrackPopupMenu 5321->5324 5325 405978 ShowWindow 5322->5325 5326 4059ac GetDlgItem SendMessageW 5322->5326 5323->5324 5324->5311 5327 405b2e 5324->5327 5328 40599b 5325->5328 5329 40598e ShowWindow 5325->5329 5326->5311 5330 4059d3 SendMessageW SendMessageW 5326->5330 5331 405b4a SendMessageW 5327->5331 5337 404636 SendMessageW 5328->5337 5329->5328 5330->5311 5331->5331 5332 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5331->5332 5334 405b8c SendMessageW 5332->5334 5334->5334 5335 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5334->5335 5335->5311 5336->5298 5337->5326 5338->5297 5340 4045e1 5339->5340 5341 4045e7 SendMessageW 5339->5341 5340->5341 5341->5299 4826 401c48 4827 402d89 21 API calls 4826->4827 4828 401c4f 4827->4828 4829 402d89 21 API calls 4828->4829 4831 401c5c 4829->4831 4830 401c71 4833 401c81 4830->4833 4834 402dab 21 API calls 4830->4834 4831->4830 4832 402dab 21 API calls 4831->4832 4832->4830 4835 401cd8 4833->4835 4836 401c8c 4833->4836 4834->4833 4837 402dab 21 API calls 4835->4837 4838 402d89 21 API calls 4836->4838 4839 401cdd 4837->4839 4840 401c91 4838->4840 4841 402dab 21 API calls 4839->4841 4842 402d89 21 API calls 4840->4842 4843 401ce6 FindWindowExW 4841->4843 4844 401c9d 4842->4844 4847 401d08 4843->4847 4845 401cc8 SendMessageW 4844->4845 4846 401caa SendMessageTimeoutW 4844->4846 4845->4847 4846->4847 5342 404e48 5343 404e74 5342->5343 5344 404e58 5342->5344 5345 404ea7 5343->5345 5346 404e7a SHGetPathFromIDListW 5343->5346 5353 405cc6 GetDlgItemTextW 5344->5353 5349 404e91 SendMessageW 5346->5349 5350 404e8a 5346->5350 5348 404e65 SendMessageW 5348->5343 5349->5345 5351 40140b 2 API calls 5350->5351 5351->5349 5353->5348 5354 4028c9 5355 4028cf 5354->5355 5356 4028d7 FindClose 5355->5356 5357 402c2f 5355->5357 5356->5357 5361 6e1d170d 5367 6e1d15b6 5361->5367 5363 6e1d176b GlobalFree 5364 6e1d1725 5364->5363 5365 6e1d1740 5364->5365 5366 6e1d1757 VirtualFree 5364->5366 5365->5363 5366->5363 5369 6e1d15bc 5367->5369 5368 6e1d15c2 5368->5364 5369->5368 5370 6e1d15ce GlobalFree 5369->5370 5370->5364 5371 4016d1 5372 402dab 21 API calls 5371->5372 5373 4016d7 GetFullPathNameW 5372->5373 5374 401713 5373->5374 5375 4016f1 5373->5375 5376 401728 GetShortPathNameW 5374->5376 5377 402c2f 5374->5377 5375->5374 5378 4069df 2 API calls 5375->5378 5376->5377 5379 401703 5378->5379 5379->5374 5381 406682 lstrcpynW 5379->5381 5381->5374 5382 401e53 GetDC 5383 402d89 21 API calls 5382->5383 5384 401e65 GetDeviceCaps MulDiv ReleaseDC 5383->5384 5385 402d89 21 API calls 5384->5385 5386 401e96 5385->5386 5387 4066bf 21 API calls 5386->5387 5388 401ed3 CreateFontIndirectW 5387->5388 5389 40263d 5388->5389 5404 4014d7 5405 402d89 21 API calls 5404->5405 5406 4014dd Sleep 5405->5406 5408 402c2f 5406->5408 5409 40195b 5410 402dab 21 API calls 5409->5410 5411 401962 lstrlenW 5410->5411 5412 40263d 5411->5412 5021 4020dd 5022 4020ef 5021->5022 5031 4021a1 5021->5031 5023 402dab 21 API calls 5022->5023 5025 4020f6 5023->5025 5024 401423 28 API calls 5030 4022fb 5024->5030 5026 402dab 21 API calls 5025->5026 5027 4020ff 5026->5027 5028 402115 LoadLibraryExW 5027->5028 5029 402107 GetModuleHandleW 5027->5029 5028->5031 5032 402126 5028->5032 5029->5028 5029->5032 5031->5024 5044 406ae5 5032->5044 5035 402170 5039 405707 28 API calls 5035->5039 5036 402137 5037 402156 5036->5037 5038 40213f 5036->5038 5049 6e1d1817 5037->5049 5040 401423 28 API calls 5038->5040 5041 402147 5039->5041 5040->5041 5041->5030 5042 402193 FreeLibrary 5041->5042 5042->5030 5091 4066a4 WideCharToMultiByte 5044->5091 5046 406b02 5047 406b09 GetProcAddress 5046->5047 5048 402131 5046->5048 5047->5048 5048->5035 5048->5036 5050 6e1d184a 5049->5050 5092 6e1d1bff 5050->5092 5052 6e1d1851 5053 6e1d1976 5052->5053 5054 6e1d1869 5052->5054 5055 6e1d1862 5052->5055 5053->5041 5126 6e1d2480 5054->5126 5142 6e1d243e 5055->5142 5060 6e1d18cd 5065 6e1d191e 5060->5065 5066 6e1d18d3 5060->5066 5061 6e1d18af 5155 6e1d2655 5061->5155 5062 6e1d187f 5070 6e1d1885 5062->5070 5071 6e1d1890 5062->5071 5063 6e1d1898 5075 6e1d188e 5063->5075 5152 6e1d2e23 5063->5152 5068 6e1d2655 10 API calls 5065->5068 5174 6e1d1666 5066->5174 5076 6e1d190f 5068->5076 5069 6e1d18b5 5166 6e1d1654 5069->5166 5070->5075 5136 6e1d2b98 5070->5136 5146 6e1d2810 5071->5146 5075->5060 5075->5061 5082 6e1d1965 5076->5082 5180 6e1d2618 5076->5180 5079 6e1d2655 10 API calls 5079->5076 5081 6e1d1896 5081->5075 5082->5053 5084 6e1d196f GlobalFree 5082->5084 5084->5053 5088 6e1d1951 5088->5082 5184 6e1d15dd wsprintfW 5088->5184 5089 6e1d194a FreeLibrary 5089->5088 5091->5046 5187 6e1d12bb GlobalAlloc 5092->5187 5094 6e1d1c26 5188 6e1d12bb GlobalAlloc 5094->5188 5096 6e1d1e6b GlobalFree GlobalFree GlobalFree 5097 6e1d1e88 5096->5097 5116 6e1d1ed2 5096->5116 5099 6e1d227e 5097->5099 5105 6e1d1e9d 5097->5105 5097->5116 5098 6e1d1d26 GlobalAlloc 5119 6e1d1c31 5098->5119 5100 6e1d22a0 GetModuleHandleW 5099->5100 5099->5116 5103 6e1d22c6 5100->5103 5104 6e1d22b1 LoadLibraryW 5100->5104 5101 6e1d1d71 lstrcpyW 5107 6e1d1d7b lstrcpyW 5101->5107 5102 6e1d1d8f GlobalFree 5102->5119 5195 6e1d16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5103->5195 5104->5103 5104->5116 5105->5116 5191 6e1d12cc 5105->5191 5107->5119 5108 6e1d2318 5110 6e1d2325 lstrlenW 5108->5110 5108->5116 5109 6e1d2126 5194 6e1d12bb GlobalAlloc 5109->5194 5196 6e1d16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5110->5196 5114 6e1d2067 GlobalFree 5114->5119 5115 6e1d21ae 5115->5116 5123 6e1d2216 lstrcpyW 5115->5123 5116->5052 5117 6e1d22d8 5117->5108 5125 6e1d2302 GetProcAddress 5117->5125 5118 6e1d233f 5118->5116 5119->5096 5119->5098 5119->5101 5119->5102 5119->5107 5119->5109 5119->5114 5119->5115 5119->5116 5120 6e1d12cc 2 API calls 5119->5120 5121 6e1d1dcd 5119->5121 5120->5119 5121->5119 5189 6e1d162f GlobalSize GlobalAlloc 5121->5189 5123->5116 5124 6e1d212f 5124->5052 5125->5108 5133 6e1d2498 5126->5133 5127 6e1d12cc GlobalAlloc lstrcpynW 5127->5133 5129 6e1d25c1 GlobalFree 5130 6e1d186f 5129->5130 5129->5133 5130->5062 5130->5063 5130->5075 5131 6e1d256b GlobalAlloc CLSIDFromString 5131->5129 5132 6e1d2540 GlobalAlloc WideCharToMultiByte 5132->5129 5133->5127 5133->5129 5133->5131 5133->5132 5135 6e1d258a 5133->5135 5198 6e1d135a 5133->5198 5135->5129 5202 6e1d27a4 5135->5202 5138 6e1d2baa 5136->5138 5137 6e1d2c4f EnumWindows 5141 6e1d2c6d 5137->5141 5138->5137 5140 6e1d2d39 5140->5075 5205 6e1d2b42 5141->5205 5143 6e1d2453 5142->5143 5144 6e1d245e GlobalAlloc 5143->5144 5145 6e1d1868 5143->5145 5144->5143 5145->5054 5150 6e1d2840 5146->5150 5147 6e1d28ee 5149 6e1d28f4 GlobalSize 5147->5149 5151 6e1d28fe 5147->5151 5148 6e1d28db GlobalAlloc 5148->5151 5149->5151 5150->5147 5150->5148 5151->5081 5154 6e1d2e2e 5152->5154 5153 6e1d2e6e GlobalFree 5154->5153 5209 6e1d12bb GlobalAlloc 5155->5209 5157 6e1d26d8 MultiByteToWideChar 5162 6e1d265f 5157->5162 5158 6e1d270b lstrcpynW 5158->5162 5159 6e1d26fa StringFromGUID2 5159->5162 5160 6e1d2742 GlobalFree 5160->5162 5161 6e1d271e wsprintfW 5161->5162 5162->5157 5162->5158 5162->5159 5162->5160 5162->5161 5163 6e1d2777 GlobalFree 5162->5163 5164 6e1d1312 2 API calls 5162->5164 5210 6e1d1381 5162->5210 5163->5069 5164->5162 5214 6e1d12bb GlobalAlloc 5166->5214 5168 6e1d1659 5169 6e1d1666 2 API calls 5168->5169 5170 6e1d1663 5169->5170 5171 6e1d1312 5170->5171 5172 6e1d131b GlobalAlloc lstrcpynW 5171->5172 5173 6e1d1355 GlobalFree 5171->5173 5172->5173 5173->5076 5175 6e1d1672 wsprintfW 5174->5175 5178 6e1d169f lstrcpyW 5174->5178 5179 6e1d16b8 5175->5179 5178->5179 5179->5079 5181 6e1d1931 5180->5181 5182 6e1d2626 5180->5182 5181->5088 5181->5089 5182->5181 5183 6e1d2642 GlobalFree 5182->5183 5183->5182 5185 6e1d1312 2 API calls 5184->5185 5186 6e1d15fe 5185->5186 5186->5082 5187->5094 5188->5119 5190 6e1d164d 5189->5190 5190->5121 5197 6e1d12bb GlobalAlloc 5191->5197 5193 6e1d12db lstrcpynW 5193->5116 5194->5124 5195->5117 5196->5118 5197->5193 5199 6e1d1361 5198->5199 5200 6e1d12cc 2 API calls 5199->5200 5201 6e1d137f 5200->5201 5201->5133 5203 6e1d2808 5202->5203 5204 6e1d27b2 VirtualAlloc 5202->5204 5203->5135 5204->5203 5206 6e1d2b4d 5205->5206 5207 6e1d2b5d 5206->5207 5208 6e1d2b52 GetLastError 5206->5208 5207->5140 5208->5207 5209->5162 5211 6e1d13ac 5210->5211 5212 6e1d138a 5210->5212 5211->5162 5212->5211 5213 6e1d1390 lstrcpyW 5212->5213 5213->5211 5214->5168 5413 6e1d1000 5416 6e1d101b 5413->5416 5417 6e1d15b6 GlobalFree 5416->5417 5418 6e1d1020 5417->5418 5419 6e1d1024 5418->5419 5420 6e1d1027 GlobalAlloc 5418->5420 5421 6e1d15dd 3 API calls 5419->5421 5420->5419 5422 6e1d1019 5421->5422 5430 402b5e 5431 402bb0 5430->5431 5432 402b65 5430->5432 5433 406a76 5 API calls 5431->5433 5435 402d89 21 API calls 5432->5435 5436 402bae 5432->5436 5434 402bb7 5433->5434 5437 402dab 21 API calls 5434->5437 5438 402b73 5435->5438 5439 402bc0 5437->5439 5440 402d89 21 API calls 5438->5440 5439->5436 5441 402bc4 IIDFromString 5439->5441 5443 402b7f 5440->5443 5441->5436 5442 402bd3 5441->5442 5442->5436 5448 406682 lstrcpynW 5442->5448 5447 4065c9 wsprintfW 5443->5447 5446 402bf0 CoTaskMemFree 5446->5436 5447->5436 5448->5446 5449 6e1d103d 5450 6e1d101b 5 API calls 5449->5450 5451 6e1d1056 5450->5451 5452 402a60 5453 402d89 21 API calls 5452->5453 5454 402a66 5453->5454 5455 402aa9 5454->5455 5456 402a8d 5454->5456 5461 402933 5454->5461 5459 402ac3 5455->5459 5460 402ab3 5455->5460 5457 402a92 5456->5457 5458 402aa3 5456->5458 5466 406682 lstrcpynW 5457->5466 5467 4065c9 wsprintfW 5458->5467 5463 4066bf 21 API calls 5459->5463 5462 402d89 21 API calls 5460->5462 5462->5461 5463->5461 5466->5461 5467->5461 4308 401761 4314 402dab 4308->4314 4312 40176f 4313 4061a1 2 API calls 4312->4313 4313->4312 4315 402db7 4314->4315 4316 4066bf 21 API calls 4315->4316 4318 402dd8 4316->4318 4317 401768 4320 4061a1 4317->4320 4318->4317 4319 406930 5 API calls 4318->4319 4319->4317 4321 4061ae GetTickCount GetTempFileNameW 4320->4321 4322 4061e8 4321->4322 4323 4061e4 4321->4323 4322->4312 4323->4321 4323->4322 5468 401d62 5469 402d89 21 API calls 5468->5469 5470 401d73 SetWindowLongW 5469->5470 5471 402c2f 5470->5471 5472 4028e3 5473 4028eb 5472->5473 5474 4028ef FindNextFileW 5473->5474 5476 402901 5473->5476 5475 402948 5474->5475 5474->5476 5478 406682 lstrcpynW 5475->5478 5478->5476 5479 401568 5480 402ba9 5479->5480 5483 4065c9 wsprintfW 5480->5483 5482 402bae 5483->5482 5491 40196d 5492 402d89 21 API calls 5491->5492 5493 401974 5492->5493 5494 402d89 21 API calls 5493->5494 5495 401981 5494->5495 5496 402dab 21 API calls 5495->5496 5497 401998 lstrlenW 5496->5497 5499 4019a9 5497->5499 5498 4019ea 5499->5498 5503 406682 lstrcpynW 5499->5503 5501 4019da 5501->5498 5502 4019df lstrlenW 5501->5502 5502->5498 5503->5501 5504 40506e GetDlgItem GetDlgItem 5505 4050c0 7 API calls 5504->5505 5516 4052e5 5504->5516 5506 405167 DeleteObject 5505->5506 5507 40515a SendMessageW 5505->5507 5508 405170 5506->5508 5507->5506 5510 4051a7 5508->5510 5511 4066bf 21 API calls 5508->5511 5509 4053c7 5513 405473 5509->5513 5519 405420 SendMessageW 5509->5519 5547 4052d8 5509->5547 5512 404601 22 API calls 5510->5512 5517 405189 SendMessageW SendMessageW 5511->5517 5518 4051bb 5512->5518 5514 405485 5513->5514 5515 40547d SendMessageW 5513->5515 5522 4054ae 5514->5522 5528 405497 ImageList_Destroy 5514->5528 5529 40549e 5514->5529 5515->5514 5516->5509 5538 405354 5516->5538 5558 404fbc SendMessageW 5516->5558 5517->5508 5524 404601 22 API calls 5518->5524 5526 405435 SendMessageW 5519->5526 5519->5547 5520 4053b9 SendMessageW 5520->5509 5521 404668 8 API calls 5527 405674 5521->5527 5525 405628 5522->5525 5551 4054e9 5522->5551 5563 40503c 5522->5563 5532 4051cc 5524->5532 5534 40563a ShowWindow GetDlgItem ShowWindow 5525->5534 5525->5547 5533 405448 5526->5533 5528->5529 5529->5522 5531 4054a7 GlobalFree 5529->5531 5530 4052a7 GetWindowLongW SetWindowLongW 5535 4052c0 5530->5535 5531->5522 5532->5530 5539 40521f SendMessageW 5532->5539 5541 4052a2 5532->5541 5544 405271 SendMessageW 5532->5544 5545 40525d SendMessageW 5532->5545 5540 405459 SendMessageW 5533->5540 5534->5547 5536 4052c5 ShowWindow 5535->5536 5537 4052dd 5535->5537 5556 404636 SendMessageW 5536->5556 5557 404636 SendMessageW 5537->5557 5538->5509 5538->5520 5539->5532 5540->5513 5541->5530 5541->5535 5544->5532 5545->5532 5547->5521 5548 4055f3 5549 4055fe InvalidateRect 5548->5549 5552 40560a 5548->5552 5549->5552 5550 405517 SendMessageW 5555 40552d 5550->5555 5551->5550 5551->5555 5552->5525 5572 404f77 5552->5572 5554 4055a1 SendMessageW SendMessageW 5554->5555 5555->5548 5555->5554 5556->5547 5557->5516 5559 40501b SendMessageW 5558->5559 5560 404fdf GetMessagePos ScreenToClient SendMessageW 5558->5560 5561 405013 5559->5561 5560->5561 5562 405018 5560->5562 5561->5538 5562->5559 5575 406682 lstrcpynW 5563->5575 5565 40504f 5576 4065c9 wsprintfW 5565->5576 5567 405059 5568 40140b 2 API calls 5567->5568 5569 405062 5568->5569 5577 406682 lstrcpynW 5569->5577 5571 405069 5571->5551 5578 404eae 5572->5578 5574 404f8c 5574->5525 5575->5565 5576->5567 5577->5571 5579 404ec7 5578->5579 5580 4066bf 21 API calls 5579->5580 5581 404f2b 5580->5581 5582 4066bf 21 API calls 5581->5582 5583 404f36 5582->5583 5584 4066bf 21 API calls 5583->5584 5585 404f4c lstrlenW wsprintfW SetDlgItemTextW 5584->5585 5585->5574 5586 40166f 5587 402dab 21 API calls 5586->5587 5588 401675 5587->5588 5589 4069df 2 API calls 5588->5589 5590 40167b 5589->5590 5591 402af0 5592 402d89 21 API calls 5591->5592 5593 402af6 5592->5593 5594 4066bf 21 API calls 5593->5594 5595 402933 5593->5595 5594->5595 4898 4026f1 4899 402d89 21 API calls 4898->4899 4908 402700 4899->4908 4900 40283d 4901 40274a ReadFile 4901->4900 4901->4908 4902 4027e3 4902->4900 4902->4908 4912 406253 SetFilePointer 4902->4912 4903 4061f5 ReadFile 4903->4908 4905 40278a MultiByteToWideChar 4905->4908 4906 40283f 4921 4065c9 wsprintfW 4906->4921 4908->4900 4908->4901 4908->4902 4908->4903 4908->4905 4908->4906 4909 4027b0 SetFilePointer MultiByteToWideChar 4908->4909 4910 402850 4908->4910 4909->4908 4910->4900 4911 402871 SetFilePointer 4910->4911 4911->4900 4913 40626f 4912->4913 4916 406287 4912->4916 4914 4061f5 ReadFile 4913->4914 4915 40627b 4914->4915 4915->4916 4917 406290 SetFilePointer 4915->4917 4918 4062b8 SetFilePointer 4915->4918 4916->4902 4917->4918 4919 40629b 4917->4919 4918->4916 4920 406224 WriteFile 4919->4920 4920->4916 4921->4900 5596 404771 lstrlenW 5597 404790 5596->5597 5598 404792 WideCharToMultiByte 5596->5598 5597->5598 5599 404af2 5600 404b1e 5599->5600 5601 404b2f 5599->5601 5660 405cc6 GetDlgItemTextW 5600->5660 5602 404b3b GetDlgItem 5601->5602 5609 404b9a 5601->5609 5604 404b4f 5602->5604 5608 404b63 SetWindowTextW 5604->5608 5612 405ffc 4 API calls 5604->5612 5605 404c7e 5658 404e2d 5605->5658 5662 405cc6 GetDlgItemTextW 5605->5662 5606 404b29 5607 406930 5 API calls 5606->5607 5607->5601 5613 404601 22 API calls 5608->5613 5609->5605 5614 4066bf 21 API calls 5609->5614 5609->5658 5611 404668 8 API calls 5616 404e41 5611->5616 5617 404b59 5612->5617 5618 404b7f 5613->5618 5619 404c0e SHBrowseForFolderW 5614->5619 5615 404cae 5620 406059 18 API calls 5615->5620 5617->5608 5624 405f51 3 API calls 5617->5624 5621 404601 22 API calls 5618->5621 5619->5605 5622 404c26 CoTaskMemFree 5619->5622 5623 404cb4 5620->5623 5625 404b8d 5621->5625 5626 405f51 3 API calls 5622->5626 5663 406682 lstrcpynW 5623->5663 5624->5608 5661 404636 SendMessageW 5625->5661 5628 404c33 5626->5628 5632 404c6a SetDlgItemTextW 5628->5632 5635 4066bf 21 API calls 5628->5635 5630 404ccb 5634 406a76 5 API calls 5630->5634 5631 404b93 5633 406a76 5 API calls 5631->5633 5632->5605 5633->5609 5646 404cd2 5634->5646 5636 404c52 lstrcmpiW 5635->5636 5636->5632 5638 404c63 lstrcatW 5636->5638 5637 404d13 5664 406682 lstrcpynW 5637->5664 5638->5632 5640 404d1a 5641 405ffc 4 API calls 5640->5641 5642 404d20 GetDiskFreeSpaceW 5641->5642 5644 404d44 MulDiv 5642->5644 5647 404d6b 5642->5647 5644->5647 5645 405f9d 2 API calls 5645->5646 5646->5637 5646->5645 5646->5647 5648 404ddc 5647->5648 5650 404f77 24 API calls 5647->5650 5649 404dff 5648->5649 5652 40140b 2 API calls 5648->5652 5665 404623 EnableWindow 5649->5665 5651 404dc9 5650->5651 5653 404dde SetDlgItemTextW 5651->5653 5654 404dce 5651->5654 5652->5649 5653->5648 5656 404eae 24 API calls 5654->5656 5656->5648 5657 404e1b 5657->5658 5659 404a4b SendMessageW 5657->5659 5658->5611 5659->5658 5660->5606 5661->5631 5662->5615 5663->5630 5664->5640 5665->5657 4922 401774 4923 402dab 21 API calls 4922->4923 4924 40177b 4923->4924 4925 4017a3 4924->4925 4926 40179b 4924->4926 4963 406682 lstrcpynW 4925->4963 4962 406682 lstrcpynW 4926->4962 4929 4017a1 4933 406930 5 API calls 4929->4933 4930 4017ae 4931 405f51 3 API calls 4930->4931 4932 4017b4 lstrcatW 4931->4932 4932->4929 4950 4017c0 4933->4950 4934 4017fc 4936 40614d 2 API calls 4934->4936 4935 4069df 2 API calls 4935->4950 4936->4950 4938 4017d2 CompareFileTime 4938->4950 4939 401892 4940 405707 28 API calls 4939->4940 4943 40189c 4940->4943 4941 405707 28 API calls 4949 40187e 4941->4949 4942 406682 lstrcpynW 4942->4950 4944 403376 48 API calls 4943->4944 4945 4018af 4944->4945 4946 4018c3 SetFileTime 4945->4946 4947 4018d5 CloseHandle 4945->4947 4946->4947 4947->4949 4951 4018e6 4947->4951 4948 4066bf 21 API calls 4948->4950 4950->4934 4950->4935 4950->4938 4950->4939 4950->4942 4950->4948 4956 405ce2 MessageBoxIndirectW 4950->4956 4960 401869 4950->4960 4961 406172 GetFileAttributesW CreateFileW 4950->4961 4952 4018eb 4951->4952 4953 4018fe 4951->4953 4954 4066bf 21 API calls 4952->4954 4955 4066bf 21 API calls 4953->4955 4957 4018f3 lstrcatW 4954->4957 4958 401906 4955->4958 4956->4950 4957->4958 4958->4949 4959 405ce2 MessageBoxIndirectW 4958->4959 4959->4949 4960->4941 4960->4949 4961->4950 4962->4929 4963->4930 5666 4014f5 SetForegroundWindow 5667 402c2f 5666->5667 5668 401a77 5669 402d89 21 API calls 5668->5669 5670 401a80 5669->5670 5671 402d89 21 API calls 5670->5671 5672 401a25 5671->5672 5673 401578 5674 401591 5673->5674 5675 401588 ShowWindow 5673->5675 5676 402c2f 5674->5676 5677 40159f ShowWindow 5674->5677 5675->5674 5677->5676 5014 4023f9 5015 402dab 21 API calls 5014->5015 5016 402408 5015->5016 5017 402dab 21 API calls 5016->5017 5018 402411 5017->5018 5019 402dab 21 API calls 5018->5019 5020 40241b GetPrivateProfileStringW 5019->5020 5678 40567b 5679 40568b 5678->5679 5680 40569f 5678->5680 5681 405691 5679->5681 5682 4056e8 5679->5682 5683 4056a7 IsWindowVisible 5680->5683 5689 4056be 5680->5689 5685 40464d SendMessageW 5681->5685 5684 4056ed CallWindowProcW 5682->5684 5683->5682 5686 4056b4 5683->5686 5687 40569b 5684->5687 5685->5687 5688 404fbc 5 API calls 5686->5688 5688->5689 5689->5684 5690 40503c 4 API calls 5689->5690 5690->5682 5691 401ffb 5692 402dab 21 API calls 5691->5692 5693 402002 5692->5693 5694 4069df 2 API calls 5693->5694 5695 402008 5694->5695 5697 402019 5695->5697 5698 4065c9 wsprintfW 5695->5698 5698->5697 5699 401b7c 5700 402dab 21 API calls 5699->5700 5701 401b83 5700->5701 5702 402d89 21 API calls 5701->5702 5703 401b8c wsprintfW 5702->5703 5704 402c2f 5703->5704 5705 401000 5706 401037 BeginPaint GetClientRect 5705->5706 5707 40100c DefWindowProcW 5705->5707 5708 4010f3 5706->5708 5710 401179 5707->5710 5711 401073 CreateBrushIndirect FillRect DeleteObject 5708->5711 5712 4010fc 5708->5712 5711->5708 5713 401102 CreateFontIndirectW 5712->5713 5714 401167 EndPaint 5712->5714 5713->5714 5715 401112 6 API calls 5713->5715 5714->5710 5715->5714 5716 401680 5717 402dab 21 API calls 5716->5717 5718 401687 5717->5718 5719 402dab 21 API calls 5718->5719 5720 401690 5719->5720 5721 402dab 21 API calls 5720->5721 5722 401699 MoveFileW 5721->5722 5723 4016ac 5722->5723 5729 4016a5 5722->5729 5725 4069df 2 API calls 5723->5725 5727 4022fb 5723->5727 5724 401423 28 API calls 5724->5727 5726 4016bb 5725->5726 5726->5727 5728 406442 40 API calls 5726->5728 5728->5729 5729->5724 5730 404102 5731 40411a 5730->5731 5732 40427b 5730->5732 5731->5732 5733 404126 5731->5733 5734 4042cc 5732->5734 5735 40428c GetDlgItem GetDlgItem 5732->5735 5736 404131 SetWindowPos 5733->5736 5737 404144 5733->5737 5739 404326 5734->5739 5750 401389 2 API calls 5734->5750 5738 404601 22 API calls 5735->5738 5736->5737 5741 40414d ShowWindow 5737->5741 5742 40418f 5737->5742 5743 4042b6 SetClassLongW 5738->5743 5740 40464d SendMessageW 5739->5740 5744 404276 5739->5744 5772 404338 5740->5772 5745 404239 5741->5745 5746 40416d GetWindowLongW 5741->5746 5747 404197 DestroyWindow 5742->5747 5748 4041ae 5742->5748 5749 40140b 2 API calls 5743->5749 5751 404668 8 API calls 5745->5751 5746->5745 5752 404186 ShowWindow 5746->5752 5753 40458a 5747->5753 5754 4041b3 SetWindowLongW 5748->5754 5755 4041c4 5748->5755 5749->5734 5756 4042fe 5750->5756 5751->5744 5752->5742 5753->5744 5761 4045bb ShowWindow 5753->5761 5754->5744 5755->5745 5759 4041d0 GetDlgItem 5755->5759 5756->5739 5760 404302 SendMessageW 5756->5760 5757 40140b 2 API calls 5757->5772 5758 40458c DestroyWindow EndDialog 5758->5753 5762 4041e1 SendMessageW IsWindowEnabled 5759->5762 5763 4041fe 5759->5763 5760->5744 5761->5744 5762->5744 5762->5763 5765 40420b 5763->5765 5766 404252 SendMessageW 5763->5766 5767 40421e 5763->5767 5775 404203 5763->5775 5764 4066bf 21 API calls 5764->5772 5765->5766 5765->5775 5766->5745 5770 404226 5767->5770 5771 40423b 5767->5771 5768 4045da SendMessageW 5768->5745 5769 404601 22 API calls 5769->5772 5773 40140b 2 API calls 5770->5773 5774 40140b 2 API calls 5771->5774 5772->5744 5772->5757 5772->5758 5772->5764 5772->5769 5776 404601 22 API calls 5772->5776 5792 4044cc DestroyWindow 5772->5792 5773->5775 5774->5775 5775->5745 5775->5768 5777 4043b3 GetDlgItem 5776->5777 5778 4043d0 ShowWindow EnableWindow 5777->5778 5779 4043c8 5777->5779 5801 404623 EnableWindow 5778->5801 5779->5778 5781 4043fa EnableWindow 5786 40440e 5781->5786 5782 404413 GetSystemMenu EnableMenuItem SendMessageW 5783 404443 SendMessageW 5782->5783 5782->5786 5783->5786 5785 4040e3 22 API calls 5785->5786 5786->5782 5786->5785 5802 404636 SendMessageW 5786->5802 5803 406682 lstrcpynW 5786->5803 5788 404472 lstrlenW 5789 4066bf 21 API calls 5788->5789 5790 404488 SetWindowTextW 5789->5790 5791 401389 2 API calls 5790->5791 5791->5772 5792->5753 5793 4044e6 CreateDialogParamW 5792->5793 5793->5753 5794 404519 5793->5794 5795 404601 22 API calls 5794->5795 5796 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5795->5796 5797 401389 2 API calls 5796->5797 5798 40456a 5797->5798 5798->5744 5799 404572 ShowWindow 5798->5799 5800 40464d SendMessageW 5799->5800 5800->5753 5801->5781 5802->5786 5803->5788 5804 401503 5805 401508 5804->5805 5807 401520 5804->5807 5806 402d89 21 API calls 5805->5806 5806->5807 5808 402983 5830 406172 GetFileAttributesW CreateFileW 5808->5830 5810 40298a 5811 402a40 5810->5811 5812 4029a5 GlobalAlloc 5810->5812 5813 402a28 5810->5813 5814 402a47 DeleteFileW 5811->5814 5815 402a5a 5811->5815 5812->5813 5816 4029be 5812->5816 5817 403376 48 API calls 5813->5817 5814->5815 5831 4035fd SetFilePointer 5816->5831 5819 402a35 CloseHandle 5817->5819 5819->5811 5820 4029c4 5821 4035e7 ReadFile 5820->5821 5822 4029cd GlobalAlloc 5821->5822 5823 402a11 5822->5823 5824 4029dd 5822->5824 5825 406224 WriteFile 5823->5825 5826 403376 48 API calls 5824->5826 5827 402a1d GlobalFree 5825->5827 5829 4029ea 5826->5829 5827->5813 5828 402a08 GlobalFree 5828->5823 5829->5828 5830->5810 5831->5820 5832 401a04 5833 402dab 21 API calls 5832->5833 5834 401a0b 5833->5834 5835 402dab 21 API calls 5834->5835 5836 401a14 5835->5836 5837 401a1b lstrcmpiW 5836->5837 5838 401a2d lstrcmpW 5836->5838 5839 401a21 5837->5839 5838->5839 5840 402304 5841 402dab 21 API calls 5840->5841 5842 40230a 5841->5842 5843 402dab 21 API calls 5842->5843 5844 402313 5843->5844 5845 402dab 21 API calls 5844->5845 5846 40231c 5845->5846 5847 4069df 2 API calls 5846->5847 5848 402325 5847->5848 5849 402336 lstrlenW lstrlenW 5848->5849 5850 402329 5848->5850 5852 405707 28 API calls 5849->5852 5851 405707 28 API calls 5850->5851 5853 402331 5850->5853 5851->5853 5854 402374 SHFileOperationW 5852->5854 5854->5850 5854->5853 5862 6e1d1058 5865 6e1d1074 5862->5865 5863 6e1d10dd 5864 6e1d1092 5867 6e1d15b6 GlobalFree 5864->5867 5865->5863 5865->5864 5866 6e1d15b6 GlobalFree 5865->5866 5866->5864 5868 6e1d10a2 5867->5868 5869 6e1d10a9 GlobalSize 5868->5869 5870 6e1d10b2 5868->5870 5869->5870 5871 6e1d10c7 5870->5871 5872 6e1d10b6 GlobalAlloc 5870->5872 5874 6e1d10d2 GlobalFree 5871->5874 5873 6e1d15dd 3 API calls 5872->5873 5873->5871 5874->5863 5875 401d86 5876 401d99 GetDlgItem 5875->5876 5877 401d8c 5875->5877 5879 401d93 5876->5879 5878 402d89 21 API calls 5877->5878 5878->5879 5880 401dda GetClientRect LoadImageW SendMessageW 5879->5880 5881 402dab 21 API calls 5879->5881 5883 401e38 5880->5883 5885 401e44 5880->5885 5881->5880 5884 401e3d DeleteObject 5883->5884 5883->5885 5884->5885 5886 402388 5887 40238f 5886->5887 5890 4023a2 5886->5890 5888 4066bf 21 API calls 5887->5888 5889 40239c 5888->5889 5889->5890 5891 405ce2 MessageBoxIndirectW 5889->5891 5891->5890 4848 401389 4850 401390 4848->4850 4849 4013fe 4850->4849 4851 4013cb MulDiv SendMessageW 4850->4851 4851->4850 5892 402c0a SendMessageW 5893 402c24 InvalidateRect 5892->5893 5894 402c2f 5892->5894 5893->5894 4873 40248f 4874 402dab 21 API calls 4873->4874 4875 4024a1 4874->4875 4876 402dab 21 API calls 4875->4876 4877 4024ab 4876->4877 4890 402e3b 4877->4890 4880 402c2f 4881 4024e3 4884 402d89 21 API calls 4881->4884 4886 4024ef 4881->4886 4882 402dab 21 API calls 4883 4024d9 lstrlenW 4882->4883 4883->4881 4884->4886 4885 40250e RegSetValueExW 4888 402524 RegCloseKey 4885->4888 4886->4885 4887 403376 48 API calls 4886->4887 4887->4885 4888->4880 4891 402e56 4890->4891 4894 40651d 4891->4894 4895 40652c 4894->4895 4896 4024bb 4895->4896 4897 406537 RegCreateKeyExW 4895->4897 4896->4880 4896->4881 4896->4882 4897->4896 5895 402910 5896 402dab 21 API calls 5895->5896 5897 402917 FindFirstFileW 5896->5897 5898 40292a 5897->5898 5899 40293f 5897->5899 5900 402948 5899->5900 5903 4065c9 wsprintfW 5899->5903 5904 406682 lstrcpynW 5900->5904 5903->5900 5904->5898 5905 401911 5906 401948 5905->5906 5907 402dab 21 API calls 5906->5907 5908 40194d 5907->5908 5909 405d8e 71 API calls 5908->5909 5910 401956 5909->5910 5911 401491 5912 405707 28 API calls 5911->5912 5913 401498 5912->5913 5914 403d12 5915 403d1d 5914->5915 5916 403d21 5915->5916 5917 403d24 GlobalAlloc 5915->5917 5917->5916 5925 401914 5926 402dab 21 API calls 5925->5926 5927 40191b 5926->5927 5928 405ce2 MessageBoxIndirectW 5927->5928 5929 401924 5928->5929 4964 402896 4965 40289d 4964->4965 4967 402bae 4964->4967 4966 402d89 21 API calls 4965->4966 4968 4028a4 4966->4968 4969 4028b3 SetFilePointer 4968->4969 4969->4967 4970 4028c3 4969->4970 4972 4065c9 wsprintfW 4970->4972 4972->4967 5930 401f17 5931 402dab 21 API calls 5930->5931 5932 401f1d 5931->5932 5933 402dab 21 API calls 5932->5933 5934 401f26 5933->5934 5935 402dab 21 API calls 5934->5935 5936 401f2f 5935->5936 5937 402dab 21 API calls 5936->5937 5938 401f38 5937->5938 5939 401423 28 API calls 5938->5939 5940 401f3f 5939->5940 5947 405ca8 ShellExecuteExW 5940->5947 5942 401f87 5943 402933 5942->5943 5944 406b21 5 API calls 5942->5944 5945 401fa4 CloseHandle 5944->5945 5945->5943 5947->5942 5948 402f98 5949 402fc3 5948->5949 5950 402faa SetTimer 5948->5950 5951 403011 5949->5951 5952 403017 MulDiv 5949->5952 5950->5949 5953 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 5952->5953 5953->5951 5955 401d1c 5956 402d89 21 API calls 5955->5956 5957 401d22 IsWindow 5956->5957 5958 401a25 5957->5958 5959 6e1d2d43 5960 6e1d2d5b 5959->5960 5961 6e1d162f 2 API calls 5960->5961 5962 6e1d2d76 5961->5962 5963 40149e 5964 4023a2 5963->5964 5965 4014ac PostQuitMessage 5963->5965 5965->5964 4230 401ba0 4231 401bf1 4230->4231 4232 401bad 4230->4232 4234 401bf6 4231->4234 4235 401c1b GlobalAlloc 4231->4235 4233 401c36 4232->4233 4238 401bc4 4232->4238 4237 4066bf 21 API calls 4233->4237 4243 4023a2 4233->4243 4234->4243 4268 406682 lstrcpynW 4234->4268 4249 4066bf 4235->4249 4239 40239c 4237->4239 4266 406682 lstrcpynW 4238->4266 4239->4243 4269 405ce2 4239->4269 4242 401c08 GlobalFree 4242->4243 4244 401bd3 4267 406682 lstrcpynW 4244->4267 4247 401be2 4273 406682 lstrcpynW 4247->4273 4253 4066ca 4249->4253 4250 406911 4251 40692a 4250->4251 4296 406682 lstrcpynW 4250->4296 4251->4233 4253->4250 4254 4068e2 lstrlenW 4253->4254 4257 4067db GetSystemDirectoryW 4253->4257 4258 4066bf 15 API calls 4253->4258 4260 4067f1 GetWindowsDirectoryW 4253->4260 4261 4066bf 15 API calls 4253->4261 4262 406883 lstrcatW 4253->4262 4265 406853 SHGetPathFromIDListW CoTaskMemFree 4253->4265 4274 406550 4253->4274 4279 406a76 GetModuleHandleA 4253->4279 4285 406930 4253->4285 4294 4065c9 wsprintfW 4253->4294 4295 406682 lstrcpynW 4253->4295 4254->4253 4257->4253 4258->4254 4260->4253 4261->4253 4262->4253 4265->4253 4266->4244 4267->4247 4268->4242 4270 405cf7 4269->4270 4271 405d43 4270->4271 4272 405d0b MessageBoxIndirectW 4270->4272 4271->4243 4272->4271 4273->4243 4297 4064ef 4274->4297 4277 406584 RegQueryValueExW RegCloseKey 4278 4065b4 4277->4278 4278->4253 4280 406a92 4279->4280 4281 406a9c GetProcAddress 4279->4281 4301 406a06 GetSystemDirectoryW 4280->4301 4283 406aab 4281->4283 4283->4253 4284 406a98 4284->4281 4284->4283 4291 40693d 4285->4291 4286 4069b3 4287 4069b8 CharPrevW 4286->4287 4289 4069d9 4286->4289 4287->4286 4288 4069a6 CharNextW 4288->4286 4288->4291 4289->4253 4291->4286 4291->4288 4292 406992 CharNextW 4291->4292 4293 4069a1 CharNextW 4291->4293 4304 405f7e 4291->4304 4292->4291 4293->4288 4294->4253 4295->4253 4296->4251 4298 4064fe 4297->4298 4299 406502 4298->4299 4300 406507 RegOpenKeyExW 4298->4300 4299->4277 4299->4278 4300->4299 4302 406a28 wsprintfW LoadLibraryExW 4301->4302 4302->4284 4305 405f84 4304->4305 4306 405f9a 4305->4306 4307 405f8b CharNextW 4305->4307 4306->4291 4307->4305 5966 406da0 5967 406c24 5966->5967 5968 40758f 5967->5968 5969 406ca5 GlobalFree 5967->5969 5970 406cae GlobalAlloc 5967->5970 5971 406d25 GlobalAlloc 5967->5971 5972 406d1c GlobalFree 5967->5972 5969->5970 5970->5967 5970->5968 5971->5967 5971->5968 5972->5971 5973 402621 5974 402dab 21 API calls 5973->5974 5975 402628 5974->5975 5978 406172 GetFileAttributesW CreateFileW 5975->5978 5977 402634 5978->5977 4324 6e1d2a7f 4325 6e1d2acf 4324->4325 4326 6e1d2a8f VirtualProtect 4324->4326 4326->4325 4327 4025a3 4339 402deb 4327->4339 4331 4025b6 4332 4025c5 4331->4332 4337 402933 4331->4337 4333 4025d2 RegEnumKeyW 4332->4333 4334 4025de RegEnumValueW 4332->4334 4335 4025fa RegCloseKey 4333->4335 4334->4335 4336 4025f3 4334->4336 4335->4337 4336->4335 4340 402dab 21 API calls 4339->4340 4341 402e02 4340->4341 4342 4064ef RegOpenKeyExW 4341->4342 4343 4025ad 4342->4343 4344 402d89 4343->4344 4345 4066bf 21 API calls 4344->4345 4346 402d9e 4345->4346 4346->4331 5979 6e1d1979 5980 6e1d199c 5979->5980 5981 6e1d19d1 GlobalFree 5980->5981 5982 6e1d19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5980->5982 5981->5982 5983 6e1d1312 2 API calls 5982->5983 5984 6e1d1b6e GlobalFree GlobalFree 5983->5984 5985 4015a8 5986 402dab 21 API calls 5985->5986 5987 4015af SetFileAttributesW 5986->5987 5988 4015c1 5987->5988 4852 401fa9 4853 402dab 21 API calls 4852->4853 4854 401faf 4853->4854 4855 405707 28 API calls 4854->4855 4856 401fb9 4855->4856 4857 405c65 2 API calls 4856->4857 4858 401fbf 4857->4858 4860 402933 4858->4860 4866 401fe2 CloseHandle 4858->4866 4867 406b21 WaitForSingleObject 4858->4867 4862 401fd4 4863 401fe4 4862->4863 4864 401fd9 4862->4864 4863->4866 4872 4065c9 wsprintfW 4864->4872 4866->4860 4868 406b3b 4867->4868 4869 406b4d GetExitCodeProcess 4868->4869 4870 406ab2 2 API calls 4868->4870 4869->4862 4871 406b42 WaitForSingleObject 4870->4871 4871->4868 4872->4866 5989 6e1d1774 5990 6e1d17a3 5989->5990 5991 6e1d1bff 22 API calls 5990->5991 5992 6e1d17aa 5991->5992 5993 6e1d17bd 5992->5993 5994 6e1d17b1 5992->5994 5996 6e1d17c7 5993->5996 5998 6e1d17e4 5993->5998 5995 6e1d1312 2 API calls 5994->5995 5999 6e1d17bb 5995->5999 6000 6e1d15dd 3 API calls 5996->6000 5997 6e1d180e 6002 6e1d15dd 3 API calls 5997->6002 5998->5997 6001 6e1d1654 3 API calls 5998->6001 6003 6e1d17cc 6000->6003 6004 6e1d17ef 6001->6004 6002->5999 6005 6e1d1654 3 API calls 6003->6005 6006 6e1d1312 2 API calls 6004->6006 6007 6e1d17d2 6005->6007 6008 6e1d17f5 GlobalFree 6006->6008 6009 6e1d1312 2 API calls 6007->6009 6008->5997 6010 6e1d17d8 GlobalFree 6009->6010 6010->5999 6018 40142a 6019 401431 6018->6019 6020 405707 28 API calls 6018->6020 6020->6019 6021 404aab 6022 404ae1 6021->6022 6023 404abb 6021->6023 6025 404668 8 API calls 6022->6025 6024 404601 22 API calls 6023->6024 6026 404ac8 SetDlgItemTextW 6024->6026 6027 404aed 6025->6027 6026->6022 6028 40202f 6029 402dab 21 API calls 6028->6029 6030 402036 6029->6030 6031 406a76 5 API calls 6030->6031 6032 402045 6031->6032 6033 402061 GlobalAlloc 6032->6033 6034 4020d1 6032->6034 6033->6034 6035 402075 6033->6035 6036 406a76 5 API calls 6035->6036 6037 40207c 6036->6037 6038 406a76 5 API calls 6037->6038 6039 402086 6038->6039 6039->6034 6043 4065c9 wsprintfW 6039->6043 6041 4020bf 6044 4065c9 wsprintfW 6041->6044 6043->6041 6044->6034 6045 40252f 6046 402deb 21 API calls 6045->6046 6047 402539 6046->6047 6048 402dab 21 API calls 6047->6048 6049 402542 6048->6049 6050 40254d RegQueryValueExW 6049->6050 6053 402933 6049->6053 6051 402573 RegCloseKey 6050->6051 6052 40256d 6050->6052 6051->6053 6052->6051 6056 4065c9 wsprintfW 6052->6056 6056->6051 6057 4021af 6058 402dab 21 API calls 6057->6058 6059 4021b6 6058->6059 6060 402dab 21 API calls 6059->6060 6061 4021c0 6060->6061 6062 402dab 21 API calls 6061->6062 6063 4021ca 6062->6063 6064 402dab 21 API calls 6063->6064 6065 4021d4 6064->6065 6066 402dab 21 API calls 6065->6066 6067 4021de 6066->6067 6068 40221d CoCreateInstance 6067->6068 6069 402dab 21 API calls 6067->6069 6072 40223c 6068->6072 6069->6068 6070 401423 28 API calls 6071 4022fb 6070->6071 6072->6070 6072->6071 6073 6e1d23e9 6074 6e1d2453 6073->6074 6075 6e1d245e GlobalAlloc 6074->6075 6076 6e1d247d 6074->6076 6075->6074 6077 401a35 6078 402dab 21 API calls 6077->6078 6079 401a3e ExpandEnvironmentStringsW 6078->6079 6080 401a52 6079->6080 6082 401a65 6079->6082 6081 401a57 lstrcmpW 6080->6081 6080->6082 6081->6082 4973 4023b7 4974 4023c5 4973->4974 4975 4023bf 4973->4975 4977 4023d3 4974->4977 4978 402dab 21 API calls 4974->4978 4976 402dab 21 API calls 4975->4976 4976->4974 4979 4023e1 4977->4979 4981 402dab 21 API calls 4977->4981 4978->4977 4980 402dab 21 API calls 4979->4980 4982 4023ea WritePrivateProfileStringW 4980->4982 4981->4979 6083 404737 lstrcpynW lstrlenW 6089 4014b8 6090 4014be 6089->6090 6091 401389 2 API calls 6090->6091 6092 4014c6 6091->6092 4983 402439 4984 402441 4983->4984 4985 40246c 4983->4985 4986 402deb 21 API calls 4984->4986 4987 402dab 21 API calls 4985->4987 4988 402448 4986->4988 4989 402473 4987->4989 4990 402452 4988->4990 4993 402480 4988->4993 4995 402e69 4989->4995 4992 402dab 21 API calls 4990->4992 4994 402459 RegDeleteValueW RegCloseKey 4992->4994 4994->4993 4996 402e76 4995->4996 4997 402e7d 4995->4997 4996->4993 4997->4996 4999 402eae 4997->4999 5000 4064ef RegOpenKeyExW 4999->5000 5001 402edc 5000->5001 5002 402f91 5001->5002 5003 402ee6 5001->5003 5002->4996 5004 402eec RegEnumValueW 5003->5004 5008 402f0f 5003->5008 5005 402f76 RegCloseKey 5004->5005 5004->5008 5005->5002 5006 402f4b RegEnumKeyW 5007 402f54 RegCloseKey 5006->5007 5006->5008 5009 406a76 5 API calls 5007->5009 5008->5005 5008->5006 5008->5007 5010 402eae 6 API calls 5008->5010 5011 402f64 5009->5011 5010->5008 5012 402f86 5011->5012 5013 402f68 RegDeleteKeyW 5011->5013 5012->5002 5013->5002 6093 40173a 6094 402dab 21 API calls 6093->6094 6095 401741 SearchPathW 6094->6095 6096 40175c 6095->6096 6097 6e1d10e1 6103 6e1d1111 6097->6103 6098 6e1d12b0 GlobalFree 6099 6e1d11d7 GlobalAlloc 6099->6103 6100 6e1d1240 GlobalFree 6100->6103 6101 6e1d135a 2 API calls 6101->6103 6102 6e1d12ab 6102->6098 6103->6098 6103->6099 6103->6100 6103->6101 6103->6102 6104 6e1d1312 2 API calls 6103->6104 6105 6e1d129a GlobalFree 6103->6105 6106 6e1d1381 lstrcpyW 6103->6106 6107 6e1d116b GlobalAlloc 6103->6107 6104->6103 6105->6103 6106->6103 6107->6103 6108 401d3d 6109 402d89 21 API calls 6108->6109 6110 401d44 6109->6110 6111 402d89 21 API calls 6110->6111 6112 401d50 GetDlgItem 6111->6112 6113 40263d 6112->6113

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 7 403738-40374c call 406a06 lstrlenA 6->7 13 40374e-40376a call 406a76 * 3 7->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 36 403810-403817 33->36 37 403809-40380e 33->37 35 403917-403931 GetTempPathW call 403614 34->35 46 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 35->46 47 403989-4039a3 DeleteFileW call 4030d5 35->47 39 403819-40381e 36->39 40 40381f-403823 36->40 37->36 37->37 39->40 41 4038e4-4038f3 call 405f7e 40->41 42 403829-40382f 40->42 41->32 61 4038f5-4038f6 41->61 44 403831-403838 42->44 45 403849-403882 42->45 49 40383a-40383d 44->49 50 40383f 44->50 51 403884-403889 45->51 52 40389f-4038d9 45->52 46->47 66 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 46->66 62 403b90-403ba0 call 403c62 OleUninitialize 47->62 63 4039a9-4039af 47->63 49->45 49->50 50->45 51->52 56 40388b-403893 51->56 58 4038e1-4038e3 52->58 59 4038db-4038df 52->59 64 403895-403898 56->64 65 40389a 56->65 58->41 59->58 67 403905-403912 call 406682 59->67 61->32 77 403ba2-403bb2 call 405ce2 ExitProcess 62->77 78 403bc6-403bcc 62->78 68 4039b5-4039c0 call 405f7e 63->68 69 403a48-403a4f call 403d54 63->69 64->52 64->65 65->52 66->47 66->62 67->35 82 4039c2-4039f7 68->82 83 403a0e-403a18 68->83 80 403a54-403a58 69->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->62 89 4039f9-4039fd 82->89 92 403a1a-403a28 call 406059 83->92 93 403a5d-403a83 call 405c4d lstrlenW call 406682 83->93 86 403c54 84->86 87 403c58-403c5c ExitProcess 84->87 90 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->90 91 403c1a-403c28 call 406a76 85->91 86->87 94 403a06-403a0a 89->94 95 4039ff-403a04 89->95 90->91 104 403c36-403c41 ExitWindowsEx 91->104 105 403c2a-403c34 91->105 92->62 106 403a2e-403a44 call 406682 * 2 92->106 110 403a94-403aac 93->110 111 403a85-403a8f call 406682 93->111 94->89 99 403a0c 94->99 95->94 95->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->69 108->84 117 403ab1-403ab5 110->117 111->110 119 403aba-403ae4 wsprintfW call 4066bf 117->119 122 403ae6-403aeb call 405bd6 119->122 123 403aed call 405c30 119->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 136 403b51-403b72 call 406442 call 4066bf call 405c65 128->136 137 403b8e 128->137 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->117 135 403b2e 130->135 131->130 134 403b0d-403b1f call 405d8e 131->134 134->119 134->130 135->62 146 403b74-403b7e 136->146 147 403bb8-403bc4 CloseHandle 136->147 137->62 146->137 148 403b80-403b88 call 4069df 146->148 147->137 148->119 148->137
                        APIs
                        • SetErrorMode.KERNELBASE ref: 00403668
                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                        • #17.COMCTL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040377C
                        • OleInitialize.OLE32(00000000), ref: 00403783
                        • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                        • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004037B7
                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",?,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,0000000A,?), ref: 004037F0
                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403928
                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403939
                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403945
                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403959
                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403961
                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403972
                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040397A
                        • DeleteFileW.KERNELBASE(1033,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040398E
                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403A67
                          • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                        • wsprintfW.USER32 ref: 00403AC4
                        • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                        • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                          • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\2T10XBqS6g.exe,0042C800,?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                          • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                          • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                          • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(7511ED70,00425F98,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810), ref: 004069EA
                          • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                        • OleUninitialize.OLE32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403B95
                        • ExitProcess.KERNEL32 ref: 00403BB2
                        • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                        • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403BD5
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                        • ExitProcess.KERNEL32 ref: 00403C5C
                          • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                        • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\2T10XBqS6g.exe$C:\Users\user\eftermodnendes\ringeagt$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                        • API String ID: 1813718867-1787870659
                        • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                        • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                        • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                        • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 362 405f4a-405f4e 360->362 363 405dd6-405dd8 361->363 364 405de7-405df7 call 406682 361->364 365 405ef8-405efd 363->365 366 405dde-405de1 363->366 370 405e06-405e07 call 405f9d 364->370 371 405df9-405e04 lstrcatW 364->371 365->362 369 405eff-405f02 365->369 366->364 366->365 372 405f04-405f0a 369->372 373 405f0c-405f14 call 4069df 369->373 374 405e0c-405e10 370->374 371->374 372->362 373->362 381 405f16-405f2a call 405f51 call 405d46 373->381 377 405e12-405e1a 374->377 378 405e1c-405e22 lstrcatW 374->378 377->378 380 405e27-405e43 lstrlenW FindFirstFileW 377->380 378->380 383 405e49-405e51 380->383 384 405eed-405ef1 380->384 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 387 405e71-405e85 call 406682 383->387 388 405e53-405e5b 383->388 384->365 386 405ef3 384->386 386->365 399 405e87-405e8f 387->399 400 405e9c-405ea7 call 405d46 387->400 389 405ed0-405ee0 FindNextFileW 388->389 390 405e5d-405e65 388->390 389->383 396 405ee6-405ee7 FindClose 389->396 390->387 393 405e67-405e6f 390->393 393->387 393->389 396->384 397->362 398->372 401 405f31-405f40 call 405707 call 406442 398->401 399->389 402 405e91-405e9a call 405d8e 399->402 410 405ec8-405ecb call 405707 400->410 411 405ea9-405eac 400->411 401->362 402->389 410->389 414 405ec0-405ec6 411->414 415 405eae-405ebe call 405707 call 406442 411->415 414->389 415->389
                        APIs
                        • DeleteFileW.KERNELBASE(?,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DB7
                        • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DFF
                        • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E22
                        • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E28
                        • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E38
                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                        • FindClose.KERNEL32(00000000), ref: 00405EE7
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                        • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$POB$\*.*
                        • API String ID: 2035342205-1142732839
                        • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                        • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                        • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                        • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 678 406da0-406da5 679 406e16-406e34 678->679 680 406da7-406dd6 678->680 681 40740c-407421 679->681 682 406dd8-406ddb 680->682 683 406ddd-406de1 680->683 684 407423-407439 681->684 685 40743b-407451 681->685 686 406ded-406df0 682->686 687 406de3-406de7 683->687 688 406de9 683->688 689 407454-40745b 684->689 685->689 690 406df2-406dfb 686->690 691 406e0e-406e11 686->691 687->686 688->686 692 407482-40748e 689->692 693 40745d-407461 689->693 694 406e00-406e0c 690->694 695 406dfd 690->695 696 406fe3-407001 691->696 706 406c24-406c2d 692->706 697 407610-40761a 693->697 698 407467-40747f 693->698 702 406e76-406ea4 694->702 695->694 700 407003-407017 696->700 701 407019-40702b 696->701 703 407626-407639 697->703 698->692 707 40702e-407038 700->707 701->707 704 406ec0-406eda 702->704 705 406ea6-406ebe 702->705 708 40763e-407642 703->708 709 406edd-406ee7 704->709 705->709 710 406c33 706->710 711 40763b 706->711 712 40703a 707->712 713 406fdb-406fe1 707->713 715 406eed 709->715 716 406e5e-406e64 709->716 717 406c3a-406c3e 710->717 718 406d7a-406d9b 710->718 719 406cdf-406ce3 710->719 720 406d4f-406d53 710->720 711->708 721 406fb6-406fba 712->721 722 40714b-407158 712->722 713->696 714 406f7f-406f89 713->714 723 4075ce-4075d8 714->723 724 406f8f-406fb1 714->724 735 406e43-406e5b 715->735 736 4075aa-4075b4 715->736 725 406f17-406f1d 716->725 726 406e6a-406e70 716->726 717->703 732 406c44-406c51 717->732 718->681 727 406ce9-406d02 719->727 728 40758f-407599 719->728 733 406d59-406d6d 720->733 734 40759e-4075a8 720->734 729 406fc0-406fd8 721->729 730 4075c2-4075cc 721->730 722->706 723->703 724->722 737 406f7b 725->737 740 406f1f-406f3d 725->740 726->702 726->737 738 406d05-406d09 727->738 728->703 729->713 730->703 732->711 739 406c57-406c9d 732->739 741 406d70-406d78 733->741 734->703 735->716 736->703 737->714 738->719 742 406d0b-406d11 738->742 743 406cc5-406cc7 739->743 744 406c9f-406ca3 739->744 745 406f55-406f67 740->745 746 406f3f-406f53 740->746 741->718 741->720 749 406d13-406d1a 742->749 750 406d3b-406d4d 742->750 747 406cd5-406cdd 743->747 748 406cc9-406cd3 743->748 751 406ca5-406ca8 GlobalFree 744->751 752 406cae-406cbc GlobalAlloc 744->752 753 406f6a-406f74 745->753 746->753 747->738 748->747 748->748 755 406d25-406d35 GlobalAlloc 749->755 756 406d1c-406d1f GlobalFree 749->756 750->741 751->752 752->711 757 406cc2 752->757 753->725 754 406f76 753->754 759 4075b6-4075c0 754->759 760 406efc-406f14 754->760 755->711 755->750 756->755 757->743 759->703 760->725
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                        • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                        • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                        • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 761 4069df-4069f3 FindFirstFileW 762 406a00 761->762 763 4069f5-4069fe FindClose 761->763 764 406a02-406a03 762->764 763->764
                        APIs
                        • FindFirstFileW.KERNELBASE(7511ED70,00425F98,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810), ref: 004069EA
                        • FindClose.KERNEL32(00000000), ref: 004069F6
                        Strings
                        • C:\Users\user\AppData\Local\Temp\nsnB301.tmp, xrefs: 004069DF
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID: C:\Users\user\AppData\Local\Temp\nsnB301.tmp
                        • API String ID: 2295610775-1217847721
                        • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                        • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                        • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                        • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 160 403db9-403dca call 406550 154->160 161 403dcf-403dd5 lstrcatW 154->161 164 403dda-403e03 call 40402a call 406059 155->164 160->161 161->164 169 403e95-403e9d call 406059 164->169 170 403e09-403e0e 164->170 176 403eab-403ed0 LoadImageW 169->176 177 403e9f-403ea6 call 4066bf 169->177 170->169 171 403e14-403e3c call 406550 170->171 171->169 178 403e3e-403e42 171->178 180 403f51-403f59 call 40140b 176->180 181 403ed2-403f02 RegisterClassW 176->181 177->176 182 403e54-403e60 lstrlenW 178->182 183 403e44-403e51 call 405f7e 178->183 192 403f63-403f6e call 40402a 180->192 193 403f5b-403f5e 180->193 184 404020 181->184 185 403f08-403f4c SystemParametersInfoW CreateWindowExW 181->185 189 403e62-403e70 lstrcmpiW 182->189 190 403e88-403e90 call 405f51 call 406682 182->190 183->182 188 404022-404029 184->188 185->180 189->190 196 403e72-403e7c GetFileAttributesW 189->196 190->169 204 403f74-403f8e ShowWindow call 406a06 192->204 205 403ff7-403fff call 4057da 192->205 193->188 199 403e82-403e83 call 405f9d 196->199 200 403e7e-403e80 196->200 199->190 200->190 200->199 212 403f90-403f95 call 406a06 204->212 213 403f9a-403fac GetClassInfoW 204->213 210 404001-404007 205->210 211 404019-40401b call 40140b 205->211 210->193 214 40400d-404014 call 40140b 210->214 211->184 212->213 217 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 213->217 218 403fae-403fbe GetClassInfoW RegisterClassW 213->218 214->193 217->188 218->217
                        APIs
                          • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                          • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                        • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",00008001), ref: 00403DD5
                        • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,7511ED70), ref: 00403E55
                        • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                        • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                        • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                          • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                        • RegisterClassW.USER32(00428A00), ref: 00403EF9
                        • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403F11
                        • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                        • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                        • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                        • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                        • RegisterClassW.USER32(00428A00), ref: 00403FBE
                        • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                        • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                        • API String ID: 1975747703-4202538630
                        • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                        • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                        • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                        • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 230 40336f-403373 228->230 237 403163 229->237 238 403248-403256 call 403033 229->238 240 403168-40317f 237->240 245 403327-40332c 238->245 246 40325c-40325f 238->246 242 403181 240->242 243 403183-40318c call 4035e7 240->243 242->243 250 403192-403199 243->250 251 4032e3-4032eb call 403033 243->251 245->230 248 403261-403279 call 4035fd call 4035e7 246->248 249 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 246->249 248->245 271 40327f-403285 248->271 276 4032d9-4032de 249->276 277 4032ed-40331d call 4035fd call 403376 249->277 255 403215-403219 250->255 256 40319b-4031af call 40612d 250->256 251->245 260 403223-403229 255->260 261 40321b-403222 call 403033 255->261 256->260 274 4031b1-4031b8 256->274 267 403238-403240 260->267 268 40322b-403235 call 406b63 260->268 261->260 267->240 275 403246 267->275 268->267 271->245 271->249 274->260 279 4031ba-4031c1 274->279 275->238 276->230 285 403322-403325 277->285 279->260 281 4031c3-4031ca 279->281 281->260 284 4031cc-4031d3 281->284 284->260 286 4031d5-4031f5 284->286 285->245 287 40332e-40333f 285->287 286->245 288 4031fb-4031ff 286->288 289 403341 287->289 290 403347-40334c 287->290 291 403201-403205 288->291 292 403207-40320f 288->292 289->290 293 40334d-403353 290->293 291->275 291->292 292->260 294 403211-403213 292->294 293->293 295 403355-40336d call 40612d 293->295 294->260 295->230
                        APIs
                        • GetTickCount.KERNEL32 ref: 004030E9
                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\2T10XBqS6g.exe,00000400), ref: 00403105
                          • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                          • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                        • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 0040314E
                        • GlobalAlloc.KERNELBASE(?,00008001), ref: 00403290
                        Strings
                        • Inst, xrefs: 004031BA
                        • Null, xrefs: 004031CC
                        • Error launching installer, xrefs: 00403125
                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403327
                        • "C:\Users\user\Desktop\2T10XBqS6g.exe", xrefs: 004030DE
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DF, 004032A8
                        • soft, xrefs: 004031C3
                        • C:\Users\user\Desktop\2T10XBqS6g.exe, xrefs: 004030EF, 004030FE, 00403112, 0040312F
                        • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D9
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                        • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\2T10XBqS6g.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                        • API String ID: 2803837635-285632637
                        • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                        • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                        • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                        • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 304 406911-40691e 301->304 305 406719-406726 301->305 302->301 303 40670d-406714 302->303 303->301 307 406920-406925 call 406682 304->307 308 40692a-40692d 304->308 305->304 306 40672c-406735 305->306 309 4068f2 306->309 310 40673b-40677e 306->310 307->308 312 406900-406903 309->312 313 4068f4-4068fe 309->313 314 406784-406790 310->314 315 406896-40689a 310->315 312->301 313->301 316 406792 314->316 317 40679a-40679c 314->317 318 40689c-4068a3 315->318 319 4068ce-4068d2 315->319 316->317 324 4067d6-4067d9 317->324 325 40679e-4067c4 call 406550 317->325 322 4068b3-4068bf call 406682 318->322 323 4068a5-4068b1 call 4065c9 318->323 320 4068e2-4068f0 lstrlenW 319->320 321 4068d4-4068dd call 4066bf 319->321 320->301 321->320 334 4068c4-4068ca 322->334 323->334 328 4067db-4067e7 GetSystemDirectoryW 324->328 329 4067ec-4067ef 324->329 338 4067ca-4067d1 call 4066bf 325->338 339 40687e-406881 325->339 335 406879-40687c 328->335 336 406801-406805 329->336 337 4067f1-4067fd GetWindowsDirectoryW 329->337 334->320 340 4068cc 334->340 335->339 341 40688e-406894 call 406930 335->341 336->335 342 406807-406825 336->342 337->336 338->335 339->341 344 406883-406889 lstrcatW 339->344 340->341 341->320 346 406827-40682d 342->346 347 406839-406851 call 406a76 342->347 344->341 352 406835-406837 346->352 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 347->355 356 406868-406871 347->356 352->347 353 406873-406877 352->353 353->335 355->353 355->356 356->342 356->353
                        APIs
                        • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                        • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                        • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                        • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                        • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                        • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                        • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                        • API String ID: 4024019347-3319343437
                        • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                        • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                        • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                        • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 432 4017ba-4017bb call 406930 426->432 427->432 436 4017c0-4017c4 432->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 445 4017e2-4017f4 437->445 446 4017d2-4017e0 CompareFileTime 437->446 439 401802-40181e call 406172 438->439 440 4017fc-4017fd call 40614d 438->440 448 401820-401823 439->448 449 401892-4018bb call 405707 call 403376 439->449 440->439 445->438 446->445 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 461 4018c3-4018cf SetFileTime 449->461 462 4018bd-4018c1 449->462 463 401887-40188d 450->463 451->436 483 401869-40186a 451->483 465 4018d5-4018e0 CloseHandle 461->465 462->461 462->465 466 402c38 463->466 470 4018e6-4018e9 465->470 471 402c2f-402c32 465->471 468 402c3a-402c3e 466->468 473 4018eb-4018fc call 4066bf lstrcatW 470->473 474 4018fe-401901 call 4066bf 470->474 471->466 480 401906-40239d 473->480 474->480 484 4023a2-4023a7 480->484 485 40239d call 405ce2 480->485 483->463 486 40186c-40186d 483->486 484->468 485->484 486->450
                        APIs
                        • lstrcatW.KERNEL32(00000000,00000000,Call,00435000,?,?,00000031), ref: 004017B5
                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,00435000,?,?,00000031), ref: 004017DA
                          • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                          • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                          • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                        • String ID: C:\Users\user\AppData\Local\Temp\nsnB301.tmp$C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dll$Call
                        • API String ID: 1941528284-3498836143
                        • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                        • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                        • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                        • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 516 402806 504->516 505->504 507 4027e3-4027ee call 406253 505->507 506->496 509 402776-402784 506->509 507->496 507->504 512 40278a-40279c MultiByteToWideChar 509->512 513 40283f-40284b call 4065c9 509->513 512->516 517 40279e-4027a1 512->517 513->494 519 402809-40280c 516->519 520 4027a3-4027ae 517->520 519->513 522 40280e-402813 519->522 520->519 521 4027b0-4027d5 SetFilePointer MultiByteToWideChar 520->521 521->520 523 4027d7 521->523 524 402850-402854 522->524 525 402815-40281a 522->525 523->516 526 402871-40287d SetFilePointer 524->526 527 402856-40285a 524->527 525->524 528 40281c-40282f 525->528 526->496 529 402862-40286f 527->529 530 40285c-402860 527->530 528->496 531 402831-402837 528->531 529->496 530->526 530->529 531->501 532 40283d 531->532 532->496
                        APIs
                        • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00402798
                        • SetFilePointer.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 004027BB
                        • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004027D1
                          • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406269
                        • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040287D
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: File$Pointer$ByteCharMultiWide$Read
                        • String ID: 9
                        • API String ID: 163830602-2366072709
                        • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                        • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                        • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                        • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                        APIs
                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                        • wsprintfW.USER32 ref: 00406A58
                        • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406A6C
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: DirectoryLibraryLoadSystemwsprintf
                        • String ID: %s%S.dll$UXTHEME
                        • API String ID: 2200240437-1106614640
                        • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                        • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                        • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                        • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 551 402f28-402f3c call 402eae 549->551 556 402f86-402f8c 550->556 557 402f68-402f74 RegDeleteKeyW 550->557 551->550 558 402f3e-402f4a 551->558 556->543 557->543 558->548
                        APIs
                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CloseEnum$DeleteValue
                        • String ID:
                        • API String ID: 1354259210-0
                        • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                        • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                        • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                        • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 559 6e1d1817-6e1d1856 call 6e1d1bff 563 6e1d185c-6e1d1860 559->563 564 6e1d1976-6e1d1978 559->564 565 6e1d1869-6e1d1876 call 6e1d2480 563->565 566 6e1d1862-6e1d1868 call 6e1d243e 563->566 571 6e1d1878-6e1d187d 565->571 572 6e1d18a6-6e1d18ad 565->572 566->565 575 6e1d187f-6e1d1880 571->575 576 6e1d1898-6e1d189b 571->576 573 6e1d18cd-6e1d18d1 572->573 574 6e1d18af-6e1d18cb call 6e1d2655 call 6e1d1654 call 6e1d1312 GlobalFree 572->574 581 6e1d191e-6e1d1924 call 6e1d2655 573->581 582 6e1d18d3-6e1d191c call 6e1d1666 call 6e1d2655 573->582 598 6e1d1925-6e1d1929 574->598 579 6e1d1888-6e1d1889 call 6e1d2b98 575->579 580 6e1d1882-6e1d1883 575->580 576->572 577 6e1d189d-6e1d189e call 6e1d2e23 576->577 591 6e1d18a3 577->591 594 6e1d188e 579->594 586 6e1d1885-6e1d1886 580->586 587 6e1d1890-6e1d1896 call 6e1d2810 580->587 581->598 582->598 586->572 586->579 597 6e1d18a5 587->597 591->597 594->591 597->572 602 6e1d192b-6e1d1939 call 6e1d2618 598->602 603 6e1d1966-6e1d196d 598->603 609 6e1d193b-6e1d193e 602->609 610 6e1d1951-6e1d1958 602->610 603->564 605 6e1d196f-6e1d1970 GlobalFree 603->605 605->564 609->610 611 6e1d1940-6e1d1948 609->611 610->603 612 6e1d195a-6e1d1965 call 6e1d15dd 610->612 611->610 613 6e1d194a-6e1d194b FreeLibrary 611->613 612->603 613->610
                        APIs
                          • Part of subcall function 6E1D1BFF: GlobalFree.KERNEL32(?), ref: 6E1D1E74
                          • Part of subcall function 6E1D1BFF: GlobalFree.KERNEL32(?), ref: 6E1D1E79
                          • Part of subcall function 6E1D1BFF: GlobalFree.KERNEL32(?), ref: 6E1D1E7E
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D18C5
                        • FreeLibrary.KERNEL32(?), ref: 6E1D194B
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D1970
                          • Part of subcall function 6E1D243E: GlobalAlloc.KERNEL32(?,?), ref: 6E1D246F
                          • Part of subcall function 6E1D2810: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,6E1D1896,00000000), ref: 6E1D28E0
                          • Part of subcall function 6E1D1666: wsprintfW.USER32 ref: 6E1D1694
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc$Librarywsprintf
                        • String ID:
                        • API String ID: 3962662361-3916222277
                        • Opcode ID: 23ca5242b269d5880db11d17b7ef1d2ad12370715acc91f4bfd0a4f54092b842
                        • Instruction ID: b3d87b4a91b6f004674ba2ad25924ac579fa88eec1d9355eb4169886181806b3
                        • Opcode Fuzzy Hash: 23ca5242b269d5880db11d17b7ef1d2ad12370715acc91f4bfd0a4f54092b842
                        • Instruction Fuzzy Hash: A441A3716002469BDF04DFE4D884BDA37ACBF15318F248865ED259A086DBB4D4CCF760

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 624 401c84-401c8a 621->624 625 401c7a-401c81 call 402dab 621->625 622->621 628 401cd8-401d02 call 402dab * 2 FindWindowExW 624->628 629 401c8c-401ca8 call 402d89 * 2 624->629 625->624 641 401d08 628->641 639 401cc8-401cd6 SendMessageW 629->639 640 401caa-401cc6 SendMessageTimeoutW 629->640 639->641 642 401d0b-401d0e 640->642 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                        APIs
                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$Timeout
                        • String ID: !
                        • API String ID: 1777923405-2657877971
                        • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                        • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                        • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                        • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 647 40248f-4024b6 call 402dab * 2 call 402e3b 653 4024bb-4024c0 647->653 654 4024c6-4024d0 653->654 655 402c2f-402c3e 653->655 656 4024d2-4024df call 402dab lstrlenW 654->656 657 4024e3-4024e6 654->657 656->657 661 4024e8-4024f9 call 402d89 657->661 662 4024fa-4024fd 657->662 661->662 665 40250e-402522 RegSetValueExW 662->665 666 4024ff-402509 call 403376 662->666 669 402524 665->669 670 402527-402608 RegCloseKey 665->670 666->665 669->670 670->655
                        APIs
                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000023,00000011,00000002), ref: 004024DA
                        • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,00000011,00000002), ref: 0040251A
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,00000011,00000002), ref: 00402602
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CloseValuelstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nsnB301.tmp
                        • API String ID: 2655323295-1217847721
                        • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                        • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                        • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                        • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 672 4061a1-4061ad 673 4061ae-4061e2 GetTickCount GetTempFileNameW 672->673 674 4061f1-4061f3 673->674 675 4061e4-4061e6 673->675 677 4061eb-4061ee 674->677 675->673 676 4061e8 675->676 676->677
                        APIs
                        • GetTickCount.KERNEL32 ref: 004061BF
                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CountFileNameTempTick
                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                        • API String ID: 1716503409-2083210678
                        • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                        • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                        • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                        • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                        • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                        • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                        • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                        • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                        • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                        • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                        • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                        • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                        • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                        • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                        • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                        • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                        • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                        • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                        • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                        • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                        • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                        • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                        • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                        • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                        • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                        APIs
                        • GetTickCount.KERNEL32 ref: 00403492
                          • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                        • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                        • SetFilePointer.KERNELBASE(00119FB8,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FilePointer$CountTick
                        • String ID:
                        • API String ID: 1092082344-0
                        • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                        • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                        • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                        • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000,?,?), ref: 00402108
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                          • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                          • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                        • LoadLibraryExW.KERNEL32(00000000,?,?,?,?), ref: 00402119
                        • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,?,?), ref: 00402196
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                        • String ID:
                        • API String ID: 334405425-0
                        • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                        • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                        • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                        • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D
                        APIs
                        • GlobalFree.KERNEL32(0062D108), ref: 00401C10
                        • GlobalAlloc.KERNELBASE(?,00000804), ref: 00401C22
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Global$AllocFree
                        • String ID: Call
                        • API String ID: 3394109436-1824292864
                        • Opcode ID: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                        • Instruction ID: 755843c12eef3f61fe3821796784c52372e38f60d99e915cd62482290075d307
                        • Opcode Fuzzy Hash: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                        • Instruction Fuzzy Hash: 7D210872904254DBDB20FBA4CE84A5E73B8AB04718715093FF542F32D0C6B89C418BDD
                        APIs
                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,00000011,00000002), ref: 00402602
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Enum$CloseValue
                        • String ID:
                        • API String ID: 397863658-0
                        • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                        • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                        • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                        • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                        APIs
                        • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                        • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                        • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                        • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                        APIs
                          • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                        • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 0040161F
                          • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                        • SetCurrentDirectoryW.KERNELBASE(?,00435000,?,000000E6,00000000,?), ref: 00401652
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                        • String ID:
                        • API String ID: 1892508949-0
                        • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                        • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                        • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                        • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                        APIs
                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                        • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                        • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                        • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                        • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                        APIs
                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                        • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CloseDeleteValue
                        • String ID:
                        • API String ID: 2831762973-0
                        • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                        • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                        • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                        • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                        APIs
                        • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                        • GetLastError.KERNEL32 ref: 00405C26
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID:
                        • API String ID: 1375471231-0
                        • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                        • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                        • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                        • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                        APIs
                        • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                        • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcess
                        • String ID:
                        • API String ID: 3712363035-0
                        • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                        • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                        • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                        • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                        APIs
                        • GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                          • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                          • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                          • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406A6C
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                        • String ID:
                        • API String ID: 2547128583-0
                        • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                        • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                        • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                        • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                        APIs
                        • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                        • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: File$AttributesCreate
                        • String ID:
                        • API String ID: 415043291-0
                        • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                        • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                        • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                        • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                        APIs
                        • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                        • GetLastError.KERNEL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405C44
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID:
                        • API String ID: 1375471231-0
                        • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                        • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                        • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                        • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                        APIs
                        • EnumWindows.USER32(00000000), ref: 6E1D2C57
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: EnumWindows
                        • String ID:
                        • API String ID: 1129996299-0
                        • Opcode ID: 78772dca451b024662d2dc4c684515726c360c8ca7ac2e9ea326fac3193bfdb7
                        • Instruction ID: a8f50aaa083b36d9fc9b6bf049f1281ba54950c0902049ff920b9e5a266092c1
                        • Opcode Fuzzy Hash: 78772dca451b024662d2dc4c684515726c360c8ca7ac2e9ea326fac3193bfdb7
                        • Instruction Fuzzy Hash: BD416972505A08DBDB11DFE4D984B9D37ACFB56358F20C826E42487104D778A8C9FB91
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                          • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FilePointerwsprintf
                        • String ID:
                        • API String ID: 327478801-0
                        • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                        • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                        • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                        • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                        APIs
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: PrivateProfileStringWrite
                        • String ID:
                        • API String ID: 390214022-0
                        • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                        • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                        • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                        • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                        APIs
                        • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                        • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                        • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                        • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                        APIs
                        • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040DAE4,0040CEF0,0040357E,0040CEF0,0040DAE4,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FileWrite
                        • String ID:
                        • API String ID: 3934441357-0
                        • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                        • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                        • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                        • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                        APIs
                        • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                        • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                        • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                        • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                        APIs
                        • VirtualProtect.KERNELBASE(6E1D505C,?,?,6E1D504C), ref: 6E1D2A9D
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 798e2e82553bf455242ea29c9e25e5667d9866aa7f9eb99972ca086eb6077949
                        • Instruction ID: 68f5105cc74d86334e0f9c82693218970f8b28b65991d244a0fbc7074804dd5a
                        • Opcode Fuzzy Hash: 798e2e82553bf455242ea29c9e25e5667d9866aa7f9eb99972ca086eb6077949
                        • Instruction Fuzzy Hash: EEF0C9B0506B88DECB50CF78844470E3FE0F71B309B54C52AE188D6244E3346488FBA1
                        APIs
                        • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: PrivateProfileString
                        • String ID:
                        • API String ID: 1096422788-0
                        • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                        • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                        • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                        • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                        APIs
                        • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                        • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                        • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                        • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                        • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                        • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                        • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                        APIs
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                          • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                          • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                          • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                          • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                          • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,?), ref: 00406B32
                          • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                          • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                        • String ID:
                        • API String ID: 2972824698-0
                        • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                        • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                        • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                        • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                        APIs
                        • GlobalAlloc.KERNELBASE(?,?,6E1D12DB,?,6E1D137F,00000019,6E1D11CA,-000000A0), ref: 6E1D12C5
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: AllocGlobal
                        • String ID:
                        • API String ID: 3761449716-0
                        • Opcode ID: c32233480e6ccc48ef195c83b62a3b802c168fd67413a4fd2603bffbb6b7feab
                        • Instruction ID: fb42010aaa6d0fc7b3b9befb63de284a67d9917f86ef978e611e27d7bd03f3ff
                        • Opcode Fuzzy Hash: c32233480e6ccc48ef195c83b62a3b802c168fd67413a4fd2603bffbb6b7feab
                        • Instruction Fuzzy Hash: E2B011B0A02808EFEF00AB28EC0AF3C32A8FB02300F28C000BA00C2080C2208C00EA38
                        APIs
                        • GetDlgItem.USER32(?,00000403), ref: 004058A4
                        • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                        • GetClientRect.USER32(?,?), ref: 004058F0
                        • GetSystemMetrics.USER32(00000002), ref: 004058F7
                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                        • ShowWindow.USER32(?,?), ref: 00405993
                        • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                        • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                          • Part of subcall function 00404636: SendMessageW.USER32(?,?,?,00404461), ref: 00404644
                        • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                        • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                        • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                        • ShowWindow.USER32(00000000), ref: 00405A3F
                        • ShowWindow.USER32(?,?), ref: 00405A44
                        • ShowWindow.USER32(?), ref: 00405A8E
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                        • CreatePopupMenu.USER32 ref: 00405AD3
                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                        • GetWindowRect.USER32(?,?), ref: 00405B07
                        • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405B20
                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                        • OpenClipboard.USER32(00000000), ref: 00405B68
                        • EmptyClipboard.USER32 ref: 00405B6E
                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                        • GlobalLock.KERNEL32(00000000), ref: 00405B84
                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                        • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                        • CloseClipboard.USER32 ref: 00405BC9
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                        • String ID: H/B${
                        • API String ID: 590372296-332483393
                        • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                        • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                        • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                        • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                        APIs
                        • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                        • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                        • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                        • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                        • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                        • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                          • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                          • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00406993
                          • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004069A2
                          • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\2T10XBqS6g.exe",7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069A7
                          • Part of subcall function 00406930: CharPrevW.USER32(?,?,7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069BA
                        • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D3A
                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                          • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                          • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                          • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                        • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                        • API String ID: 2624150263-2126803556
                        • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                        • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                        • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                        • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                        APIs
                          • Part of subcall function 6E1D12BB: GlobalAlloc.KERNELBASE(?,?,6E1D12DB,?,6E1D137F,00000019,6E1D11CA,-000000A0), ref: 6E1D12C5
                        • GlobalAlloc.KERNEL32(?,00001CA4), ref: 6E1D1D2D
                        • lstrcpyW.KERNEL32(00000008,?), ref: 6E1D1D75
                        • lstrcpyW.KERNEL32(00000808,?), ref: 6E1D1D7F
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D1D92
                        • GlobalFree.KERNEL32(?), ref: 6E1D1E74
                        • GlobalFree.KERNEL32(?), ref: 6E1D1E79
                        • GlobalFree.KERNEL32(?), ref: 6E1D1E7E
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D2068
                        • lstrcpyW.KERNEL32(?,?), ref: 6E1D2222
                        • GetModuleHandleW.KERNEL32(00000008), ref: 6E1D22A1
                        • LoadLibraryW.KERNEL32(00000008), ref: 6E1D22B2
                        • GetProcAddress.KERNEL32(?,?), ref: 6E1D230C
                        • lstrlenW.KERNEL32(00000808), ref: 6E1D2326
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                        • String ID:
                        • API String ID: 245916457-0
                        • Opcode ID: 1b3c566130b20ba0932bd1c2daeb2a719563e130965d0f0e824305bccffce751
                        • Instruction ID: e0fda7bb89b7423a6a8b312ed704260a07493cc7838a8963500428482e5680e6
                        • Opcode Fuzzy Hash: 1b3c566130b20ba0932bd1c2daeb2a719563e130965d0f0e824305bccffce751
                        • Instruction Fuzzy Hash: 4B22CB71E5460ADEDB50CFE9C4842EEB7B4FB19305F21852AD1A5E3280E7709ACDEB50
                        APIs
                        • CoCreateInstance.OLE32(004084DC,?,?,004084CC,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040222E
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CreateInstance
                        • String ID:
                        • API String ID: 542301482-0
                        • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                        • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                        • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                        • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                        APIs
                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FileFindFirst
                        • String ID:
                        • API String ID: 1974802433-0
                        • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                        • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                        • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                        • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                        APIs
                        • GetDlgItem.USER32(?,000003F9), ref: 00405086
                        • GetDlgItem.USER32(?,00000408), ref: 00405091
                        • GlobalAlloc.KERNEL32(?,?), ref: 004050DB
                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                        • SetWindowLongW.USER32(?,?,0040567B), ref: 0040510B
                        • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 0040511F
                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                        • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                        • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00405165
                        • DeleteObject.GDI32(00000000), ref: 00405168
                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                          • Part of subcall function 00404636: SendMessageW.USER32(?,?,?,00404461), ref: 00404644
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                        • GetWindowLongW.USER32(?,?), ref: 004052AC
                        • SetWindowLongW.USER32(?,?,00000000), ref: 004052BA
                        • ShowWindow.USER32(?,00000005), ref: 004052CA
                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 0040543F
                        • SendMessageW.USER32(?,00000420,00000000,?), ref: 00405463
                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                        • ImageList_Destroy.COMCTL32(?), ref: 00405498
                        • GlobalFree.KERNEL32(?), ref: 004054A8
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                        • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                        • InvalidateRect.USER32(?,00000000,?), ref: 00405604
                        • ShowWindow.USER32(?,00000000), ref: 00405652
                        • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                        • ShowWindow.USER32(00000000), ref: 00405664
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                        • String ID: $M$N
                        • API String ID: 2564846305-813528018
                        • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                        • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                        • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                        • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                        APIs
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                        • ShowWindow.USER32(?), ref: 0040415E
                        • GetWindowLongW.USER32(?,?), ref: 00404170
                        • ShowWindow.USER32(?,?), ref: 00404189
                        • DestroyWindow.USER32 ref: 0040419D
                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                        • GetDlgItem.USER32(?,?), ref: 004041D5
                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                        • IsWindowEnabled.USER32(00000000), ref: 004041F0
                        • GetDlgItem.USER32(?,?), ref: 0040429B
                        • GetDlgItem.USER32(?,00000002), ref: 004042A5
                        • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                        • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404310
                        • GetDlgItem.USER32(?,00000003), ref: 004043B6
                        • ShowWindow.USER32(00000000,?), ref: 004043D7
                        • EnableWindow.USER32(?,?), ref: 004043E9
                        • EnableWindow.USER32(?,?), ref: 00404404
                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040441A
                        • EnableMenuItem.USER32(00000000), ref: 00404421
                        • SendMessageW.USER32(?,?,00000000,?), ref: 00404439
                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                        • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                        • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                        • ShowWindow.USER32(?,0000000A), ref: 004045BE
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                        • String ID: H/B
                        • API String ID: 1860320154-184950203
                        • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                        • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                        • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                        • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                        APIs
                        • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040485E
                        • GetDlgItem.USER32(?,000003E8), ref: 00404872
                        • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040488F
                        • GetSysColor.USER32(?), ref: 004048A0
                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                        • lstrlenW.KERNEL32(?), ref: 004048C1
                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                        • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                        • SendMessageW.USER32(00000000), ref: 00404943
                        • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                        • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                        • SetCursor.USER32(00000000), ref: 004049C2
                        • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                        • SetCursor.USER32(00000000), ref: 004049DE
                        • SendMessageW.USER32(00000111,?,00000000), ref: 00404A0D
                        • SendMessageW.USER32(?,00000000,00000000), ref: 00404A1F
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                        • String ID: 7G@$Call$N
                        • API String ID: 3103080414-3155595626
                        • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                        • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                        • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                        • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                        APIs
                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406463,?,?), ref: 00406303
                        • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                          • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                          • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                        • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                        • wsprintfA.USER32 ref: 00406347
                        • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,?,00426DE8,?,?,?,?,?), ref: 00406382
                        • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00406391
                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                        • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                        • GlobalFree.KERNEL32(00000000), ref: 00406430
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                          • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                          • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                        • String ID: %ls=%ls$[Rename]$eB$mB$mB
                        • API String ID: 2171350718-2529913679
                        • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                        • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                        • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                        • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                        APIs
                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                        • BeginPaint.USER32(?,?), ref: 00401047
                        • GetClientRect.USER32(?,?), ref: 0040105B
                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                        • DeleteObject.GDI32(?), ref: 004010ED
                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                        • SelectObject.GDI32(00000000,?), ref: 00401140
                        • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                        • DeleteObject.GDI32(?), ref: 00401165
                        • EndPaint.USER32(?,?), ref: 0040116E
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                        • String ID: F
                        • API String ID: 941294808-1304234792
                        • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                        • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                        • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                        • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                        APIs
                        • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00406993
                        • CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004069A2
                        • CharNextW.USER32(?,"C:\Users\user\Desktop\2T10XBqS6g.exe",7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069A7
                        • CharPrevW.USER32(?,?,7511ED70,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069BA
                        Strings
                        • *?|<>/":, xrefs: 00406982
                        • "C:\Users\user\Desktop\2T10XBqS6g.exe", xrefs: 00406974
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Char$Next$Prev
                        • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                        • API String ID: 589700163-481421272
                        • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                        • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                        • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                        • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                        APIs
                        • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                        • GetSysColor.USER32(00000000), ref: 004046C3
                        • SetTextColor.GDI32(?,00000000), ref: 004046CF
                        • SetBkMode.GDI32(?,?), ref: 004046DB
                        • GetSysColor.USER32(?), ref: 004046EE
                        • SetBkColor.GDI32(?,?), ref: 004046FE
                        • DeleteObject.GDI32(?), ref: 00404718
                        • CreateBrushIndirect.GDI32(?), ref: 00404722
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                        • String ID:
                        • API String ID: 2320649405-0
                        • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                        • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                        • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                        • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                        APIs
                        • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                        • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                        • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                        • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                        • String ID:
                        • API String ID: 2531174081-0
                        • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                        • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                        • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                        • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                        APIs
                        • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                        • GetTickCount.KERNEL32 ref: 0040306C
                        • wsprintfW.USER32 ref: 0040309A
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                          • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                          • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                          • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                          • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                          • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                        • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                        • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                          • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,?,00000BF4), ref: 0040302C
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                        • String ID: ... %d%%
                        • API String ID: 722711167-2449383134
                        • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                        • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                        • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                        • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                        APIs
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                        • GetMessagePos.USER32 ref: 00404FDF
                        • ScreenToClient.USER32(?,?), ref: 00404FF9
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Message$Send$ClientScreen
                        • String ID: f
                        • API String ID: 41195575-1993550816
                        • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                        • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                        • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                        • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                        APIs
                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                        • wsprintfW.USER32 ref: 00402FEA
                        • SetWindowTextW.USER32(?,?), ref: 00402FFA
                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Text$ItemTimerWindowwsprintf
                        • String ID: unpacking data: %d%%$verifying installer: %d%%
                        • API String ID: 1451636040-1158693248
                        • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                        • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                        • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                        • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                        APIs
                          • Part of subcall function 6E1D12BB: GlobalAlloc.KERNELBASE(?,?,6E1D12DB,?,6E1D137F,00000019,6E1D11CA,-000000A0), ref: 6E1D12C5
                        • GlobalFree.KERNEL32(?), ref: 6E1D2743
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D2778
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc
                        • String ID:
                        • API String ID: 1780285237-0
                        • Opcode ID: fdb2bfff1ebe68adc93e3d3401f7974a860861aeb8fb721619b85f648f33221c
                        • Instruction ID: 6f9dc87da371bc65f0b28f6db159862b8a8e210e3e325c3828b0ddd52427a868
                        • Opcode Fuzzy Hash: fdb2bfff1ebe68adc93e3d3401f7974a860861aeb8fb721619b85f648f33221c
                        • Instruction Fuzzy Hash: C531CD71609505EFCB258FA4C8C4CAE77BAFFA73253258528F12093260C7356C8AFB61
                        APIs
                          • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                          • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                        • GlobalAlloc.KERNEL32(?,?), ref: 004029B6
                          • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                        • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004029D2
                        • GlobalFree.KERNEL32(?), ref: 00402A0B
                        • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                          • Part of subcall function 00403376: SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                        • CloseHandle.KERNEL32(?,?,?), ref: 00402A3A
                        • DeleteFileW.KERNEL32(?), ref: 00402A4D
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                        • String ID:
                        • API String ID: 488507980-0
                        • Opcode ID: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                        • Instruction ID: ba218adf5694e25fd77313e1ccbbfbab35a2a379656f90145ff8969d650460ca
                        • Opcode Fuzzy Hash: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                        • Instruction Fuzzy Hash: 8E218B71D00118BFCF21AFA4DD8989EBFB9EF08360B14422AF555762E1CB7949419F68
                        APIs
                        • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                        • wsprintfW.USER32 ref: 00404F58
                        • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: ItemTextlstrlenwsprintf
                        • String ID: %u.%u%s%s$H/B
                        • API String ID: 3540041739-2222257793
                        • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                        • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                        • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                        • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                        APIs
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: FreeGlobal
                        • String ID:
                        • API String ID: 2979337801-0
                        • Opcode ID: 119a59ee9327e839e1cafa7175e54335442891d1960f7d47bc56bc2147461032
                        • Instruction ID: 12f371af529f0160d24847f281e6d2dc292464685d6038dfad38488f2fff1142
                        • Opcode Fuzzy Hash: 119a59ee9327e839e1cafa7175e54335442891d1960f7d47bc56bc2147461032
                        • Instruction Fuzzy Hash: 7A51CF32F04119AEAB409FE9C4805EEBBB9FB51314F21855AD400A3250E771BECDB791
                        APIs
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D25C2
                          • Part of subcall function 6E1D12CC: lstrcpynW.KERNEL32(00000000,?,6E1D137F,00000019,6E1D11CA,-000000A0), ref: 6E1D12DC
                        • GlobalAlloc.KERNEL32(?), ref: 6E1D2548
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E1D2563
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                        • String ID:
                        • API String ID: 4216380887-0
                        • Opcode ID: 7539d69d198f18df0a9538c2778104035ca091fe6e51c658572a25a712329453
                        • Instruction ID: a4cbcee8fdbff320843154b10faa48a3e0f320fa3e4299e71075d49d40dfa1c7
                        • Opcode Fuzzy Hash: 7539d69d198f18df0a9538c2778104035ca091fe6e51c658572a25a712329453
                        • Instruction Fuzzy Hash: 2041BFB1108709EFD714DFA9D854EAA77B8FB95310F10891DE86587180EB30A9CDFB61
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 00401D9F
                        • GetClientRect.USER32(?,?), ref: 00401DEA
                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                        • DeleteObject.GDI32(00000000), ref: 00401E3E
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                        • String ID:
                        • API String ID: 1849352358-0
                        • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                        • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                        • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                        • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                        APIs
                        • GetDC.USER32(?), ref: 00401E56
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                        • ReleaseDC.USER32(?,00000000), ref: 00401E89
                        • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CapsCreateDeviceFontIndirectRelease
                        • String ID:
                        • API String ID: 3808545654-0
                        • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                        • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                        • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                        • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                        APIs
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E1D22D8,?,00000808), ref: 6E1D16D5
                        • GlobalAlloc.KERNEL32(?,00000000,?,00000000,6E1D22D8,?,00000808), ref: 6E1D16DC
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E1D22D8,?,00000808), ref: 6E1D16F0
                        • GetProcAddress.KERNEL32(6E1D22D8,00000000), ref: 6E1D16F7
                        • GlobalFree.KERNEL32(00000000), ref: 6E1D1700
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                        • String ID:
                        • API String ID: 1148316912-0
                        • Opcode ID: 1d45bffa38631a3973016abc1b11ba1a524ccebc164c9fd93f873c8df8d92503
                        • Instruction ID: 0d62076a2ed19fe83febf00fa3e1d69dec6eb811f9d920de7ef0a8777f7aa650
                        • Opcode Fuzzy Hash: 1d45bffa38631a3973016abc1b11ba1a524ccebc164c9fd93f873c8df8d92503
                        • Instruction Fuzzy Hash: 07F0AC722075387BDA2117A69C4CDEBBE9CEF8B2F5B114315F628E219086615D02E7F1
                        APIs
                        • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                        • CharNextW.USER32(00000000), ref: 0040600F
                        • CharNextW.USER32(00000000), ref: 00406027
                        Strings
                        • C:\Users\user\AppData\Local\Temp\nsnB301.tmp, xrefs: 00405FFD
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CharNext
                        • String ID: C:\Users\user\AppData\Local\Temp\nsnB301.tmp
                        • API String ID: 3213498283-1217847721
                        • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                        • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                        • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                        • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                        APIs
                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F57
                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F61
                        • lstrcatW.KERNEL32(?,0040A014,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405F73
                        Strings
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CharPrevlstrcatlstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\
                        • API String ID: 2659869361-1890098029
                        • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                        • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                        • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                        • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                        APIs
                        Memory Dump Source
                        • Source File: 00000002.00000002.3826398582.000000006E1D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E1D0000, based on PE: true
                        • Associated: 00000002.00000002.3826375791.000000006E1D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826592395.000000006E1D4000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000002.00000002.3826642284.000000006E1D6000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6e1d0000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc
                        • String ID:
                        • API String ID: 1780285237-0
                        • Opcode ID: 65f76f51b0a8ace2470cb1dbd6083eab609be345bc85326d3d0e5fee38bf4824
                        • Instruction ID: 5db536c3556a75137331888077d3eab83192dab5af99865c0ff2c7567d1f699b
                        • Opcode Fuzzy Hash: 65f76f51b0a8ace2470cb1dbd6083eab609be345bc85326d3d0e5fee38bf4824
                        • Instruction Fuzzy Hash: 2E51B2B560160ADFDB00CFE8C844A5A7BF8FB16715B208519F904DB210E775ED8DEB50
                        APIs
                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dll), ref: 0040269A
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nsnB301.tmp$C:\Users\user\AppData\Local\Temp\nsnB301.tmp\System.dll
                        • API String ID: 1659193697-816252712
                        • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                        • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                        • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                        • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                        APIs
                        • CloseHandle.KERNEL32(0000031C,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403C74
                        • CloseHandle.KERNEL32(00000320,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403C88
                        Strings
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                        • C:\Users\user\AppData\Local\Temp\nsnB301.tmp, xrefs: 00403C98
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsnB301.tmp
                        • API String ID: 2962429428-2095310778
                        • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                        • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                        • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                        • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                        APIs
                          • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                          • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                          • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 004060B2
                        • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,C:\Users\user\AppData\Local\Temp\nsnB301.tmp,7511ED70,?,7511E810,00405DAE,?,7511ED70,7511E810), ref: 004060C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nsnB301.tmp
                        • API String ID: 3248276644-1217847721
                        • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                        • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                        • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                        • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                        APIs
                        • IsWindowVisible.USER32(?), ref: 004056AA
                        • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                          • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: Window$CallMessageProcSendVisible
                        • String ID:
                        • API String ID: 3748168415-3916222277
                        • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                        • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                        • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                        • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                        APIs
                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                        • RegCloseKey.ADVAPI32(?), ref: 004065A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: CloseQueryValue
                        • String ID: Call
                        • API String ID: 3356406503-1824292864
                        • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                        • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                        • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                        • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                        APIs
                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                        • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                        • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                        • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                        Memory Dump Source
                        • Source File: 00000002.00000002.3821744301.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000002.00000002.3821652236.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821857062.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3821951740.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000002.00000002.3823644746.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_2T10XBqS6g.jbxd
                        Similarity
                        • API ID: lstrlen$CharNextlstrcmpi
                        • String ID:
                        • API String ID: 190613189-0
                        • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                        • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                        • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                        • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99