Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe

Overview

General Information

Sample name:SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
Analysis ID:1446070
MD5:4a47cddaecb9c32a7dda070fa85534ee
SHA1:5f0794d9906e046fbd7d6aebcf8320bf63717bf8
SHA256:6091ebc6ab4572afe5fb8f16ddff0d6395abf68e19baf572442940e4344f977b
Tags:exe
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drString found in binary or memory: http://www.daisy.org/z3986/2005/ncx/
Source: is-IAGUC.tmp.1.drString found in binary or memory: http://www.epubforwindows.com
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2468314414.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065845650.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065760061.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067802930.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2466398394.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067734484.0000000003100000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.epubforwindows.com/
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2468314414.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065845650.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067802930.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2466398394.0000000002218000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.epubforwindows.com/.
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drString found in binary or memory: http://www.epubforwindows.com/buynow.htm
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drString found in binary or memory: http://www.epubforwindows.com/buynow.htmU
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drString found in binary or memory: http://www.idpf.org/2007/opf
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-736GC.tmp.1.dr, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drString found in binary or memory: http://www.innosetup.com/
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2468314414.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065845650.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065760061.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465905142.0000000000823000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067802930.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467674961.000000000083B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2466398394.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067734484.0000000003100000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465974307.000000000083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.luckhan.com/
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066259101.0000000002094000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066126533.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-736GC.tmp.1.dr, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066259101.0000000002094000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066126533.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-736GC.tmp.1.dr, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00478AC0 NtdllDefWindowProc_A,1_2_00478AC0
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_0040840C0_2_0040840C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004706A81_2_004706A8
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004809F71_2_004809F7
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004673A41_2_004673A4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0043035C1_2_0043035C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004444C81_2_004444C8
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004345C41_2_004345C4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00444A701_2_00444A70
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00486BD01_2_00486BD0
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00430EE81_2_00430EE8
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0045F0C41_2_0045F0C4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004451681_2_00445168
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0045B1741_2_0045B174
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004352C81_2_004352C8
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004694041_2_00469404
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004455741_2_00445574
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004519BC1_2_004519BC
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00487B301_2_00487B30
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0043DD501_2_0043DD50
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0048DF541_2_0048DF54
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00408C0C appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00406AC4 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 0040595C appears 117 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00457F1C appears 73 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00403400 appears 60 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00445DD4 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00457D10 appears 96 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 004344DC appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 004078F4 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00403494 appears 83 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00403684 appears 225 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 00453344 appears 97 times
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: String function: 004460A4 appears 59 times
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: is-736GC.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-736GC.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-736GC.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066259101.0000000002094000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066126533.0000000002340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean4.winEXE@5/18@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceExA,GetDiskFreeSpaceA,1_2_00455E0C
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Program Files (x86)\txt to epub converterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeFile created: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmpJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
Source: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe "C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeProcess created: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp "C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp" /SL5="$203F2,492927,56832,C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe"
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess created: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe "C:\Program Files (x86)\txt to epub converter\TXT to epub converter.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeProcess created: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp "C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp" /SL5="$203F2,492927,56832,C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess created: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe "C:\Program Files (x86)\txt to epub converter\TXT to epub converter.exe"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: mpr.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: TXT to ePub Converter.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe
Source: Uninstall TXT to ePub Converter.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\txt to epub converter\unins000.exe
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpWindow found: window name: TSelectLanguageFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: OK
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpAutomated click: I accept the agreement
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00483F88 push 00484096h; ret 1_2_0048408E
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00494CAC push ecx; mov dword ptr [esp], ecx1_2_00494CB1
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00485678 push ecx; mov dword ptr [esp], ecx1_2_0048567D
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00477B08 push ecx; mov dword ptr [esp], edx1_2_00477B09
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00499D30 pushad ; retf 1_2_00499D3F
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Program Files (x86)\txt to epub converter\is-IAGUC.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeFile created: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Program Files (x86)\txt to epub converter\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Program Files (x86)\txt to epub converter\is-736GC.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\txt to epub converterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\txt to epub converter\TXT to ePub Converter.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\txt to epub converter\Uninstall TXT to ePub Converter.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0048393C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0048393C
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpDropped PE file which has not been started: C:\Program Files (x86)\txt to epub converter\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpDropped PE file which has not been started: C:\Program Files (x86)\txt to epub converter\is-736GC.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5448
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_00478504 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478504
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: GetLocaleInfoA,0_2_0040520C
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: GetLocaleInfoA,0_2_00405258
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: GetLocaleInfoA,1_2_00408568
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: GetLocaleInfoA,1_2_004085B4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Exploitation for Privilege Escalation
2
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Access Token Manipulation
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Process Injection
2
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Registry Run Keys / Startup Folder
1
Deobfuscate/Decode Files or Information
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
2
Obfuscated Files or Information
LSA Secrets3
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe (copy)7%ReversingLabs
C:\Program Files (x86)\txt to epub converter\is-736GC.tmp7%ReversingLabs
C:\Program Files (x86)\txt to epub converter\is-IAGUC.tmp7%ReversingLabs
C:\Program Files (x86)\txt to epub converter\unins000.exe (copy)7%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp4%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.innosetup.com/0%URL Reputationsafe
http://www.remobjects.com/psU0%URL Reputationsafe
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%URL Reputationsafe
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline0%URL Reputationsafe
http://www.remobjects.com/ps0%URL Reputationsafe
http://www.idpf.org/2007/opf0%Avira URL Cloudsafe
http://www.epubforwindows.com/.0%Avira URL Cloudsafe
http://www.epubforwindows.com/0%Avira URL Cloudsafe
http://www.epubforwindows.com0%Avira URL Cloudsafe
http://www.epubforwindows.com/buynow.htmU0%Avira URL Cloudsafe
http://www.luckhan.com/0%Avira URL Cloudsafe
http://www.epubforwindows.com/buynow.htm0%Avira URL Cloudsafe
http://www.daisy.org/z3986/2005/ncx/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.idpf.org/2007/opfSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.innosetup.com/SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-736GC.tmp.1.dr, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.remobjects.com/psUSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066259101.0000000002094000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066126533.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-736GC.tmp.1.dr, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.epubforwindows.com/.SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2468314414.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065845650.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067802930.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2466398394.0000000002218000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exefalse
  • URL Reputation: safe
unknown
http://www.epubforwindows.com/SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2468314414.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065845650.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065760061.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067802930.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2466398394.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067734484.0000000003100000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.epubforwindows.com/buynow.htmUSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exefalse
  • URL Reputation: safe
unknown
http://www.epubforwindows.comis-IAGUC.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.remobjects.com/psSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066259101.0000000002094000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2066126533.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-736GC.tmp.1.dr, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.luckhan.com/SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2468314414.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065845650.0000000002081000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe, 00000000.00000003.2065760061.0000000002340000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465905142.0000000000823000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067802930.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000002.2467674961.000000000083B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2466398394.0000000002218000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2067734484.0000000003100000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465974307.000000000083A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.epubforwindows.com/buynow.htmSecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://www.daisy.org/z3986/2005/ncx/SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp, 00000001.00000003.2465220778.0000000006020000.00000004.00001000.00020000.00000000.sdmp, TXT to ePub converter.exe, 00000005.00000000.2463906666.0000000000401000.00000020.00000001.01000000.00000009.sdmp, is-IAGUC.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1446070
Start date and time:2024-05-22 22:12:29 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
Detection:CLEAN
Classification:clean4.winEXE@5/18@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 170
  • Number of non-executed functions: 156
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\is-4PPEK.tmp\_isetup\_setup64.tmphttp://adlvanced-ip-scanner.comGet hashmaliciousUnknownBrowse
    L1QnAwXT7U.exeGet hashmaliciousSocks5SystemzBrowse
      SecuriteInfo.com.FileRepMalware.9294.28999.exeGet hashmaliciousUnknownBrowse
        file.exeGet hashmaliciousGlupteba, Mars Stealer, Socks5Systemz, Stealc, VidarBrowse
          file.exeGet hashmaliciousGlupteba, Mars Stealer, SmokeLoader, Socks5Systemz, Stealc, VidarBrowse
            file.exeGet hashmaliciousGlupteba, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
              CtEeMS3H62.exeGet hashmaliciousAmadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                LIRR4A0xzv.exeGet hashmaliciousAmadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                  6BE4950D9A919F5D0150D19552B340E9B5EF1959A18FD.exeGet hashmaliciousLummaC, GCleaner, Mars Stealer, PrivateLoader, PureLog Stealer, RedLine, RisePro StealerBrowse
                    5i7hafPPeN.exeGet hashmaliciousSocks5SystemzBrowse
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, AIN 2.x self-extracting archive
                      Category:dropped
                      Size (bytes):1288192
                      Entropy (8bit):6.900542618562313
                      Encrypted:false
                      SSDEEP:24576:2t2J7qP5toteIxHqK8TxWmAy63/VSUATjn8TikJM8cMpv:XJkIxawUbToTXm8cMpv
                      MD5:8612893894937FCDBAF1EDCEEE250C18
                      SHA1:07B597BF936A2757C33D21D72240F059D06C34F8
                      SHA-256:E04A28AF82BE76162805E07A15793B9E4EE48D83C911B38BEC8084B38680B430
                      SHA-512:7D4822A0D94D5ADFEDAF4C85199FA42089E60B4DE857F98ACDAEA9B286BF09A981ED5705AD466E0C1EDF1F99BA2B56CCF4A2AF87D23D11B3FAB10DEFD54FDFC0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 7%
                      Reputation:low
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................(.......L.........................................................................................................CODE....(........................... ..`DATA...............................@...BSS.....!............r...................idata...(.......*...r..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc....L.......L...\..............@..P....................................@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:Microsoft HTML Help Project
                      Category:dropped
                      Size (bytes):42
                      Entropy (8bit):4.377336696990888
                      Encrypted:false
                      SSDEEP:3:SDomuR/W8SU8Ov:5ms9
                      MD5:D62C9D88ABA1C680A83D2F976B937A5A
                      SHA1:D2AB3BEA3953F22E4926311016647B6790A4EE11
                      SHA-256:B156911C9828468C582EEAE8FB7F47E690E7AF86C8ACA09367220CE606CF0F65
                      SHA-512:F37DB5C3178A5A4F1A8CB08EF8D80763EFE157B721FDB135AE1BF6BE65311AED7816FBC172B4B17348E0B3072266717E63A3E6A39426A96E4BB94D0E750DF711
                      Malicious:false
                      Reputation:low
                      Preview:;Options..[Options]..SavePath =D:\output..
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4165
                      Entropy (8bit):4.959238267754904
                      Encrypted:false
                      SSDEEP:96:QbQvVEG3q3uyI/A4tCQRif6LFoWVEQjQ3QBQhB+XklOGSFNZrG:QxGUX4tFRifiyaaB+XaOGSFNZrG
                      MD5:0F87FBCAE173289578DF48D56DA6084E
                      SHA1:9C9A3A11BBD971BDBD9F88F9FBA8C7F5879B2252
                      SHA-256:D8604FB1B40D28B63A266EB04E32BBA838A55D70B3EAABD5238F5D2B4E6941A6
                      SHA-512:3FE779B2247D4C3EF297063C4A7DB8DF8DDF37B55384DB4FF71D9264803C7FC11985E26B7554293DB4F55C018D829A07295F5832C8B0336F86E42BD0BE7F819B
                      Malicious:false
                      Reputation:low
                      Preview:../* coverpage */..#coverpage {...vertical-align: middle;...text-align: center;...background-color: white;...margin: 0em;..}.....coverimage {...height: 100%;...margin: 0em;..}....../* title page */..#titlepage {...text-align: center;...margin-top: 10%;..}.....booktitle {...text-align: center;...padding-bottom: 1em;...letter-spacing: .08em;...font-size: 2em;..}.....subtitle {...padding-bottom: 1em;...text-align: center;...font-style: normal;...font-weight: normal;...font-size: 1.5em;..}....p.embellish {...text-align: center;...text-indent: 0px;..}.....author {...padding-top: 1em;...text-align: center;...font-style: italic;...font-weight: normal;...font-size: 1.5em;..}.....illustrator {...padding-top: 1.2em;...text-align: center;...font-style: normal;...font-weight: normal;...font-size: 1.2em;..}....../* copyright */...copyright {...padding-top: 10%;...text-align:center;..}.....copyrightText {...font-size: 1em;...font-weight: normal;..}.....publisher {...font-weight: bold;...line-height:
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4165
                      Entropy (8bit):4.959238267754904
                      Encrypted:false
                      SSDEEP:96:QbQvVEG3q3uyI/A4tCQRif6LFoWVEQjQ3QBQhB+XklOGSFNZrG:QxGUX4tFRifiyaaB+XaOGSFNZrG
                      MD5:0F87FBCAE173289578DF48D56DA6084E
                      SHA1:9C9A3A11BBD971BDBD9F88F9FBA8C7F5879B2252
                      SHA-256:D8604FB1B40D28B63A266EB04E32BBA838A55D70B3EAABD5238F5D2B4E6941A6
                      SHA-512:3FE779B2247D4C3EF297063C4A7DB8DF8DDF37B55384DB4FF71D9264803C7FC11985E26B7554293DB4F55C018D829A07295F5832C8B0336F86E42BD0BE7F819B
                      Malicious:false
                      Reputation:low
                      Preview:../* coverpage */..#coverpage {...vertical-align: middle;...text-align: center;...background-color: white;...margin: 0em;..}.....coverimage {...height: 100%;...margin: 0em;..}....../* title page */..#titlepage {...text-align: center;...margin-top: 10%;..}.....booktitle {...text-align: center;...padding-bottom: 1em;...letter-spacing: .08em;...font-size: 2em;..}.....subtitle {...padding-bottom: 1em;...text-align: center;...font-style: normal;...font-weight: normal;...font-size: 1.5em;..}....p.embellish {...text-align: center;...text-indent: 0px;..}.....author {...padding-top: 1em;...text-align: center;...font-style: italic;...font-weight: normal;...font-size: 1.5em;..}.....illustrator {...padding-top: 1.2em;...text-align: center;...font-style: normal;...font-weight: normal;...font-size: 1.2em;..}....../* copyright */...copyright {...padding-top: 10%;...text-align:center;..}.....copyrightText {...font-size: 1em;...font-weight: normal;..}.....publisher {...font-weight: bold;...line-height:
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF, LF line terminators
                      Category:dropped
                      Size (bytes):257
                      Entropy (8bit):4.9797456858335245
                      Encrypted:false
                      SSDEEP:6:TMVBdYDoZz9UD7OSJtvL3GhJ0qbOMemM2:TMHdYsH2OSvvzMe6
                      MD5:85CC6CFA75A188C686848BE2C2A70FE5
                      SHA1:207DE5CF7201EE4F3E7C6623590BB51BA6BCFB31
                      SHA-256:67EDC11AFE98BC64A773426F957D48EB4D0DE5062EB111A3A45FE1A20563BB06
                      SHA-512:BD366559786CD12100EC90E4A2F9FEDCB15E33F4D7BEA4E5BF88AE0245A320C9117752196B779E591AF33FC442F69ADFB3863190D9144B0872CAA8CF15AE24D3
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" ?>..<container version="1.0" xmlns="urn:oasis:names:tc:opendocument:xmlns:container">.. <rootfiles>.. <rootfile full-path="OEBPS/fb.opf" media-type="application/oebps-package+xml"/>.. </rootfiles>..</container>.
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:XML 1.0 document, ASCII text, with CRLF, LF line terminators
                      Category:dropped
                      Size (bytes):257
                      Entropy (8bit):4.9797456858335245
                      Encrypted:false
                      SSDEEP:6:TMVBdYDoZz9UD7OSJtvL3GhJ0qbOMemM2:TMHdYsH2OSvvzMe6
                      MD5:85CC6CFA75A188C686848BE2C2A70FE5
                      SHA1:207DE5CF7201EE4F3E7C6623590BB51BA6BCFB31
                      SHA-256:67EDC11AFE98BC64A773426F957D48EB4D0DE5062EB111A3A45FE1A20563BB06
                      SHA-512:BD366559786CD12100EC90E4A2F9FEDCB15E33F4D7BEA4E5BF88AE0245A320C9117752196B779E591AF33FC442F69ADFB3863190D9144B0872CAA8CF15AE24D3
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" ?>..<container version="1.0" xmlns="urn:oasis:names:tc:opendocument:xmlns:container">.. <rootfiles>.. <rootfile full-path="OEBPS/fb.opf" media-type="application/oebps-package+xml"/>.. </rootfiles>..</container>.
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):22
                      Entropy (8bit):3.788754913993502
                      Encrypted:false
                      SSDEEP:3:8VCdMQb6uRn:8wh6+n
                      MD5:9A6039993ECE3708230913E507AE8BE4
                      SHA1:AD88ED02C92C171812B309E951C0E83300AEDC1E
                      SHA-256:338312C1AE3989057348595A23872534EB07A22F6F4B26A4F1DDA2EE74754FF3
                      SHA-512:265A01E0FBD1753094D9285F470013B20C18C4FEBB40052EBB25047611C7810FDA633F694931E01F446EA3FC32B019079BDD5F26F2FB412EF0B6D1E1BE5D54B9
                      Malicious:false
                      Reputation:low
                      Preview:application/epub+zip..
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):22
                      Entropy (8bit):3.788754913993502
                      Encrypted:false
                      SSDEEP:3:8VCdMQb6uRn:8wh6+n
                      MD5:9A6039993ECE3708230913E507AE8BE4
                      SHA1:AD88ED02C92C171812B309E951C0E83300AEDC1E
                      SHA-256:338312C1AE3989057348595A23872534EB07A22F6F4B26A4F1DDA2EE74754FF3
                      SHA-512:265A01E0FBD1753094D9285F470013B20C18C4FEBB40052EBB25047611C7810FDA633F694931E01F446EA3FC32B019079BDD5F26F2FB412EF0B6D1E1BE5D54B9
                      Malicious:false
                      Reputation:low
                      Preview:application/epub+zip..
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):717985
                      Entropy (8bit):6.514882897353911
                      Encrypted:false
                      SSDEEP:12288:6TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+1Iq5MRxyFc:SPcYn5c/rPx37/zHBA6pFptZ1CEQqMRd
                      MD5:A29F3D032533D29FC32FF63E13779C39
                      SHA1:434A947C3E62C0632A522A4431F2E0005B9AA26C
                      SHA-256:FD34D4C6C4F2BFE142191FE92DFC6040492A6D37F1FA19EF0216E993FB400C27
                      SHA-512:A7D14D0EE73C545F366A9D45D7E27E6FC32EFE5BF22AD89349EDA62A9E8B617534319F63BD54ADB74E47B82C88EE347E2083C89D623CE8D1A09A2E4F5AFA4ECE
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 7%
                      Reputation:low
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:Microsoft HTML Help Project
                      Category:dropped
                      Size (bytes):42
                      Entropy (8bit):4.377336696990888
                      Encrypted:false
                      SSDEEP:3:SDomuR/W8SU8Ov:5ms9
                      MD5:D62C9D88ABA1C680A83D2F976B937A5A
                      SHA1:D2AB3BEA3953F22E4926311016647B6790A4EE11
                      SHA-256:B156911C9828468C582EEAE8FB7F47E690E7AF86C8ACA09367220CE606CF0F65
                      SHA-512:F37DB5C3178A5A4F1A8CB08EF8D80763EFE157B721FDB135AE1BF6BE65311AED7816FBC172B4B17348E0B3072266717E63A3E6A39426A96E4BB94D0E750DF711
                      Malicious:false
                      Reputation:low
                      Preview:;Options..[Options]..SavePath =D:\output..
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, AIN 2.x self-extracting archive
                      Category:dropped
                      Size (bytes):1288192
                      Entropy (8bit):6.900542618562313
                      Encrypted:false
                      SSDEEP:24576:2t2J7qP5toteIxHqK8TxWmAy63/VSUATjn8TikJM8cMpv:XJkIxawUbToTXm8cMpv
                      MD5:8612893894937FCDBAF1EDCEEE250C18
                      SHA1:07B597BF936A2757C33D21D72240F059D06C34F8
                      SHA-256:E04A28AF82BE76162805E07A15793B9E4EE48D83C911B38BEC8084B38680B430
                      SHA-512:7D4822A0D94D5ADFEDAF4C85199FA42089E60B4DE857F98ACDAEA9B286BF09A981ED5705AD466E0C1EDF1F99BA2B56CCF4A2AF87D23D11B3FAB10DEFD54FDFC0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 7%
                      Reputation:low
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................(.......L.........................................................................................................CODE....(........................... ..`DATA...............................@...BSS.....!............r...................idata...(.......*...r..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc....L.......L...\..............@..P....................................@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:InnoSetup Log TXT to ePub Converter {BFBA7F3A-1F10-4754-ADEC-A8CFBB4F925B}, version 0x30, 2204 bytes, 301389\user, "C:\Program Files (x86)\txt to epub converter"
                      Category:dropped
                      Size (bytes):2204
                      Entropy (8bit):4.839749398159925
                      Encrypted:false
                      SSDEEP:48:cCU0VIxSua1CaEa2aBa1aZaJnbaoDhH1phH1AJHvHNGa:cOCi1PRb0g8JWolH1HH1AJHvHNGa
                      MD5:250F62EE085EC89B200A822A8D242027
                      SHA1:4D9D8B20A26866B495BEDCB48FFC8A36EC60A086
                      SHA-256:A7E874FCA355DE5E6CF2101C4B9CB1811EACE09C6F38CC4B29372825295F68DD
                      SHA-512:6108DCD937FA8FAB37D46C988FED11B0963C88093776A2C20EE902FCFEEFA8BEF37F5DFB9ACDC8C4F63A591F437487761324D65F07C38F56E08227539DEC4639
                      Malicious:false
                      Reputation:low
                      Preview:Inno Setup Uninstall Log (b)....................................{BFBA7F3A-1F10-4754-ADEC-A8CFBB4F925B}..........................................................................................TXT to ePub Converter...........................................................................................................0...........%......................................................................................................................./......q......O....301389.user,C:\Program Files (x86)\txt to epub converter.............0.... .......... ................................,C:\Program Files (x86)\txt to epub converterJC:\ProgramData\Microsoft\Windows\Start Menu\Programs\txt to epub converter.txt to epub converter.english............,C:\Program Files (x86)\txt to epub converter.......L...FC:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe...........=...7C:\Program Files (x86)\txt to epub converter\config.ini...........8...6C:\Program Files (x86)\txt to e
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):717985
                      Entropy (8bit):6.514882897353911
                      Encrypted:false
                      SSDEEP:12288:6TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+1Iq5MRxyFc:SPcYn5c/rPx37/zHBA6pFptZ1CEQqMRd
                      MD5:A29F3D032533D29FC32FF63E13779C39
                      SHA1:434A947C3E62C0632A522A4431F2E0005B9AA26C
                      SHA-256:FD34D4C6C4F2BFE142191FE92DFC6040492A6D37F1FA19EF0216E993FB400C27
                      SHA-512:A7D14D0EE73C545F366A9D45D7E27E6FC32EFE5BF22AD89349EDA62A9E8B617534319F63BD54ADB74E47B82C88EE347E2083C89D623CE8D1A09A2E4F5AFA4ECE
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 7%
                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 19:13:48 2024, mtime=Wed May 22 19:13:48 2024, atime=Fri Oct 18 00:01:10 2013, length=1288192, window=hide
                      Category:dropped
                      Size (bytes):1254
                      Entropy (8bit):4.592977747787203
                      Encrypted:false
                      SSDEEP:24:8mNrxQqHYSEHkdOE0EIDUAJhE1udtEyQdtEBUUTG3qygm:8mNikYFHkdOdJa1udkdnU5yg
                      MD5:49696B77901939A4DDC4C1399D3628CB
                      SHA1:A5E0B598AD23BC014636B5DE767AB9FF8546009D
                      SHA-256:0FEB318F4B4417EEC6ABB9A6DE1E064DC677D8EE6ED9D690794E65560CA02EF2
                      SHA-512:51A6084E52059F73737793FFF2272D153EB961C712B974AF0DF614426B31C3BEB6FA719B6FF1F55323960AA2FA2BA7A0DE504FF79E59E60402E182F2D9E93C0D
                      Malicious:false
                      Preview:L..................F.... ....IJ......pQ.......u..................................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....6...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....t.1......X....TXTTOE~1..\......X...X......{........................t.x.t. .t.o. .e.p.u.b. .c.o.n.v.e.r.t.e.r.......2.....RC%. .TXTTOE~1.EXE..d......X...X................................T.X.T. .t.o. .e.P.u.b. .c.o.n.v.e.r.t.e.r...e.x.e.......u...............-.......t.............h.....C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe..U.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.t.x.t. .t.o. .e.p.u.b. .c.o.n.v.e.r.t.e.r.\.T.X.T. .t.o. .e.P.u.b. .c.o.n.v.e.r.t.e.r...e.x.e.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.t.x.t. .t.o. .e.p.u.b. .c.o.n.v.e.r.t.e.r.........*................@Z|...K.J.........`.......X.......301389...........hT..CrF.f4... .G...Jc..
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 19:13:48 2024, mtime=Wed May 22 19:13:48 2024, atime=Wed May 22 19:13:13 2024, length=717985, window=hide
                      Category:dropped
                      Size (bytes):1189
                      Entropy (8bit):4.636522673400601
                      Encrypted:false
                      SSDEEP:24:8m4/SEUdOE0E5PkAMhERdtENBdtEBUUTGOLkLBqygm:8m4/FUdO+PzMaRdcBdnUDLkL4yg
                      MD5:E7629929ACFB59642056C16219818DB3
                      SHA1:34801B6E0F8D9391B2FCCDDB6D730E41ED876B76
                      SHA-256:D370F1970B588F25FCED91303D9D05ACA4AF78307B89015D7CF0465B4C38B034
                      SHA-512:777909F808F8D5C7120789C0DE063710E2A3E71D35F32A81DDC8196DF38127A1CDB81BDB9FDC6FBB3789ABB0BBBB9ABF7E97F2BCEDF1DA8FD75E46204F920114
                      Malicious:false
                      Preview:L..................F.... ....E......E........y.................................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....t.1......X....TXTTOE~1..\......X...X......{........................t.x.t. .t.o. .e.p.u.b. .c.o.n.v.e.r.t.e.r.....f.2......X.. .unins000.exe..J......X...X............................s&2.u.n.i.n.s.0.0.0...e.x.e.......h...............-.......g.............h.....C:\Program Files (x86)\txt to epub converter\unins000.exe..H.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.t.x.t. .t.o. .e.p.u.b. .c.o.n.v.e.r.t.e.r.\.u.n.i.n.s.0.0.0...e.x.e.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.t.x.t. .t.o. .e.p.u.b. .c.o.n.v.e.r.t.e.r.........*................@Z|...K.J.........`.......X.......301389...........hT..CrF.f4... .I...Jc...-...-$..hT..CrF.f4... .I...Jc...-...-$.............1SPS.XF.L8C.
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.289297026665552
                      Encrypted:false
                      SSDEEP:48:Sv1LfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2pGSS4k+bkg6j0KHc:wfkcXegaJ/ZAYNzcld1xaX12pfSKvkc
                      MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
                      SHA1:D0EACD5322C036554D509C7566F0BCC7607209BD
                      SHA-256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
                      SHA-512:2735BB610060F749E26ACD86F2DF2B8A05F2BDD3DCCF3E4B2946EBB21BA0805FB492C474B1EEB2C5B8BF1A421F7C1B8728245F649C644F4A9ECC5BD8770A16F6
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: , Detection: malicious, Browse
                      • Filename: L1QnAwXT7U.exe, Detection: malicious, Browse
                      • Filename: SecuriteInfo.com.FileRepMalware.9294.28999.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: CtEeMS3H62.exe, Detection: malicious, Browse
                      • Filename: LIRR4A0xzv.exe, Detection: malicious, Browse
                      • Filename: 6BE4950D9A919F5D0150D19552B340E9B5EF1959A18FD.exe, Detection: malicious, Browse
                      • Filename: 5i7hafPPeN.exe, Detection: malicious, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....HP..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                      Category:dropped
                      Size (bytes):23312
                      Entropy (8bit):4.596242908851566
                      Encrypted:false
                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):706560
                      Entropy (8bit):6.506360176420555
                      Encrypted:false
                      SSDEEP:12288:yTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+1Iq5MRxyF:6PcYn5c/rPx37/zHBA6pFptZ1CEQqMRU
                      MD5:A2C4D52C66B4B399FACADB8CC8386745
                      SHA1:C326304C56A52A3E5BFBDCE2FEF54604A0C653E0
                      SHA-256:6C0465CE64C07E729C399A338705941D77727C7D089430957DF3E91A416E9D2A
                      SHA-512:2A66256FF8535E2B300AA0CA27B76E85D42422B0AAF5E7E6D055F7ABB9E338929C979E185C6BE8918D920FB134B7F28A76B714579CACB8ACE09000C046DD34D6
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 4%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.968213290885379
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 98.73%
                      • Inno Setup installer (109748/4) 1.08%
                      • Windows Screen Saver (13104/52) 0.13%
                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      File name:SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
                      File size:752'353 bytes
                      MD5:4a47cddaecb9c32a7dda070fa85534ee
                      SHA1:5f0794d9906e046fbd7d6aebcf8320bf63717bf8
                      SHA256:6091ebc6ab4572afe5fb8f16ddff0d6395abf68e19baf572442940e4344f977b
                      SHA512:928b60098813edf7c65acf91292d029756ebb6ffafbb17307404f32036bcf1b952104e60d81784a667568df079502e90186d5b4aa00999e2fc8c0e20db15aec6
                      SSDEEP:12288:CQiGdBc03ibM4Bxay2yBehc8AttDK3PQzYpHGhU5sI+Rl7q3C8pJth:CQige03IvnwcPBzYp75snl7uh
                      TLSH:45F423136388C8B6C55055704A6AD1471A3BBA1B3CBD34A572EC5BDEAF372D6800A3F7
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:2d2e3797b32b2b99
                      Entrypoint:0x40a5f8
                      Entrypoint Section:CODE
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:1
                      OS Version Minor:0
                      File Version Major:1
                      File Version Minor:0
                      Subsystem Version Major:1
                      Subsystem Version Minor:0
                      Import Hash:884310b1928934402ea6fec1dbd3cf5e
                      Instruction
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFFC4h
                      push ebx
                      push esi
                      push edi
                      xor eax, eax
                      mov dword ptr [ebp-10h], eax
                      mov dword ptr [ebp-24h], eax
                      call 00007FD5B0B18F43h
                      call 00007FD5B0B1A14Ah
                      call 00007FD5B0B1A3D9h
                      call 00007FD5B0B1A47Ch
                      call 00007FD5B0B1C41Bh
                      call 00007FD5B0B1ED86h
                      call 00007FD5B0B1EEEDh
                      xor eax, eax
                      push ebp
                      push 0040ACC9h
                      push dword ptr fs:[eax]
                      mov dword ptr fs:[eax], esp
                      xor edx, edx
                      push ebp
                      push 0040AC92h
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      mov eax, dword ptr [0040C014h]
                      call 00007FD5B0B1F99Bh
                      call 00007FD5B0B1F586h
                      cmp byte ptr [0040B234h], 00000000h
                      je 00007FD5B0B2047Eh
                      call 00007FD5B0B1FA98h
                      xor eax, eax
                      call 00007FD5B0B19C39h
                      lea edx, dword ptr [ebp-10h]
                      xor eax, eax
                      call 00007FD5B0B1CA2Bh
                      mov edx, dword ptr [ebp-10h]
                      mov eax, 0040CE28h
                      call 00007FD5B0B18FDAh
                      push 00000002h
                      push 00000000h
                      push 00000001h
                      mov ecx, dword ptr [0040CE28h]
                      mov dl, 01h
                      mov eax, 0040738Ch
                      call 00007FD5B0B1D2BAh
                      mov dword ptr [0040CE2Ch], eax
                      xor edx, edx
                      push ebp
                      push 0040AC4Ah
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      call 00007FD5B0B1F9F6h
                      mov dword ptr [0040CE34h], eax
                      mov eax, dword ptr [0040CE34h]
                      cmp dword ptr [eax+0Ch], 00000000h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                      .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                      .rsrc0x110000x2c000x2c00c518b903db0551be9b702311a5caff88False0.32776988636363635data4.501905603198757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                      RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                      RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                      RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                      RT_STRING0x125740x2f2data0.35543766578249336
                      RT_STRING0x128680x30cdata0.3871794871794872
                      RT_STRING0x12b740x2cedata0.42618384401114207
                      RT_STRING0x12e440x68data0.75
                      RT_STRING0x12eac0xb4data0.6277777777777778
                      RT_STRING0x12f600xaedata0.5344827586206896
                      RT_RCDATA0x130100x2cdata1.1818181818181819
                      RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                      RT_VERSION0x1307c0x4f4dataEnglishUnited States0.278391167192429
                      RT_MANIFEST0x135700x5a4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42590027700831024
                      DLLImport
                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                      user32.dllMessageBoxA
                      oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                      kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                      user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                      comctl32.dllInitCommonControls
                      advapi32.dllAdjustTokenPrivileges
                      Language of compilation systemCountry where language is spokenMap
                      DutchNetherlands
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:16:13:13
                      Start date:22/05/2024
                      Path:C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe"
                      Imagebase:0x400000
                      File size:752'353 bytes
                      MD5 hash:4A47CDDAECB9C32A7DDA070FA85534EE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:16:13:13
                      Start date:22/05/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-V3QT6.tmp\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.tmp" /SL5="$203F2,492927,56832,C:\Users\user\Desktop\SecuriteInfo.com.BScope.TrojanPSW.Stealer.3956.28708.exe"
                      Imagebase:0x400000
                      File size:706'560 bytes
                      MD5 hash:A2C4D52C66B4B399FACADB8CC8386745
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 4%, ReversingLabs
                      Reputation:moderate
                      Has exited:true

                      Target ID:5
                      Start time:16:13:53
                      Start date:22/05/2024
                      Path:C:\Program Files (x86)\txt to epub converter\TXT to ePub converter.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files (x86)\txt to epub converter\TXT to epub converter.exe"
                      Imagebase:0x400000
                      File size:1'288'192 bytes
                      MD5 hash:8612893894937FCDBAF1EDCEEE250C18
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:23.2%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:2.4%
                        Total number of Nodes:1471
                        Total number of Limit Nodes:21
                        execution_graph 5306 407548 5307 407554 CloseHandle 5306->5307 5308 40755d 5306->5308 5307->5308 6694 402b48 RaiseException 5309 407749 5310 4076dc WriteFile 5309->5310 5315 407724 5309->5315 5311 4076e8 5310->5311 5312 4076ef 5310->5312 5313 40748c 35 API calls 5311->5313 5314 407700 5312->5314 5316 4073ec 34 API calls 5312->5316 5313->5312 5315->5309 5317 4077e0 5315->5317 5316->5314 5318 4078db InterlockedExchange 5317->5318 5320 407890 5317->5320 5319 4078e7 5318->5319 6695 40294a 6696 402952 6695->6696 6697 402967 6696->6697 6698 403554 4 API calls 6696->6698 6698->6696 6699 403f4a 6700 403f53 6699->6700 6701 403f5c 6699->6701 6702 403f07 4 API calls 6700->6702 6702->6701 5332 40ac4f 5333 40abc1 5332->5333 5336 40abed 5333->5336 5344 4094d8 5333->5344 5335 40ac06 5337 40ac1a 5335->5337 5338 40ac0f DestroyWindow 5335->5338 5336->5335 5339 40ac00 RemoveDirectoryA 5336->5339 5340 40ac42 5337->5340 5352 40357c 5337->5352 5338->5337 5339->5335 5342 40ac38 5343 4025ac 4 API calls 5342->5343 5343->5340 5345 409532 5344->5345 5349 4094eb 5344->5349 5345->5336 5346 4094f3 Sleep 5346->5349 5347 409503 Sleep 5347->5349 5349->5345 5349->5346 5349->5347 5350 40951a GetLastError 5349->5350 5365 408fbc 5349->5365 5350->5345 5351 409524 GetLastError 5350->5351 5351->5345 5351->5349 5355 403591 5352->5355 5361 4035a0 5352->5361 5353 4035b1 5356 403198 4 API calls 5353->5356 5354 4035b8 5357 4031b8 4 API calls 5354->5357 5358 4035d0 5355->5358 5359 40359b 5355->5359 5360 4035b6 5355->5360 5356->5360 5357->5360 5358->5360 5363 40357c 4 API calls 5358->5363 5359->5361 5362 4035ec 5359->5362 5360->5342 5361->5353 5361->5354 5362->5360 5382 403554 5362->5382 5363->5358 5373 408f70 5365->5373 5367 408fd2 5368 408fd6 5367->5368 5369 408ff2 DeleteFileA GetLastError 5367->5369 5368->5349 5370 409010 5369->5370 5379 408fac 5370->5379 5374 408f7a 5373->5374 5375 408f7e 5373->5375 5374->5367 5376 408fa0 SetLastError 5375->5376 5377 408f87 Wow64DisableWow64FsRedirection 5375->5377 5378 408f9b 5376->5378 5377->5378 5378->5367 5380 408fb1 Wow64RevertWow64FsRedirection 5379->5380 5381 408fbb 5379->5381 5380->5381 5381->5349 5383 403566 5382->5383 5385 403578 5383->5385 5386 403604 5383->5386 5385->5362 5387 40357c 5386->5387 5392 40359b 5387->5392 5393 4035b6 5387->5393 5394 4035d0 5387->5394 5395 4035a0 5387->5395 5388 4035b1 5390 403198 4 API calls 5388->5390 5389 4035b8 5391 4031b8 4 API calls 5389->5391 5390->5393 5391->5393 5392->5395 5396 4035ec 5392->5396 5393->5383 5394->5393 5397 40357c 4 API calls 5394->5397 5395->5388 5395->5389 5396->5393 5398 403554 4 API calls 5396->5398 5397->5394 5398->5396 6243 403a52 6244 403a74 6243->6244 6245 403a5a WriteFile 6243->6245 6245->6244 6246 403a78 GetLastError 6245->6246 6246->6244 6247 402654 6248 403154 4 API calls 6247->6248 6249 402614 6248->6249 6250 403154 4 API calls 6249->6250 6251 402632 6249->6251 6250->6251 6252 40ac56 6253 40ac5d 6252->6253 6255 40ac88 6252->6255 6262 409448 6253->6262 6257 403198 4 API calls 6255->6257 6256 40ac62 6256->6255 6259 40ac80 MessageBoxA 6256->6259 6258 40acc0 6257->6258 6260 403198 4 API calls 6258->6260 6259->6255 6261 40acc8 6260->6261 6263 409454 GetCurrentProcess OpenProcessToken 6262->6263 6264 4094af ExitWindowsEx 6262->6264 6265 409466 6263->6265 6266 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6263->6266 6264->6265 6265->6256 6266->6264 6266->6265 6711 40995e 6713 409960 6711->6713 6712 409982 6713->6712 6714 40999e CallWindowProcA 6713->6714 6714->6712 6715 409960 6716 409982 6715->6716 6718 40996f 6715->6718 6717 40999e CallWindowProcA 6717->6716 6718->6716 6718->6717 6719 405160 6720 405173 6719->6720 6721 404e58 33 API calls 6720->6721 6722 405187 6721->6722 6267 402e64 6268 402e69 6267->6268 6269 402e7a RtlUnwind 6268->6269 6270 402e5e 6268->6270 6271 402e9d 6269->6271 5321 40766c SetFilePointer 5322 4076a3 5321->5322 5323 407693 GetLastError 5321->5323 5323->5322 5324 40769c 5323->5324 5325 40748c 35 API calls 5324->5325 5325->5322 6284 40667c IsDBCSLeadByte 6285 406694 6284->6285 6735 403f7d 6736 403fa2 6735->6736 6739 403f84 6735->6739 6738 403e8e 4 API calls 6736->6738 6736->6739 6737 403f8c 6738->6739 6739->6737 6740 402674 4 API calls 6739->6740 6741 403fca 6740->6741 4979 403d02 4981 403d12 4979->4981 4980 403ddf ExitProcess 4981->4980 4982 403db8 4981->4982 4984 403dea 4981->4984 4989 403da4 4981->4989 4990 403d8f MessageBoxA 4981->4990 4995 403cc8 4982->4995 4986 403cc8 4 API calls 4987 403dcc 4986->4987 4999 4019dc 4987->4999 5011 403fe4 4989->5011 4990->4982 4991 403dd1 4991->4980 4991->4984 4996 403cd6 4995->4996 4998 403ceb 4996->4998 5015 402674 4996->5015 4998->4986 5000 401abb 4999->5000 5001 4019ed 4999->5001 5000->4991 5002 401a04 RtlEnterCriticalSection 5001->5002 5003 401a0e LocalFree 5001->5003 5002->5003 5004 401a41 5003->5004 5005 401a2f VirtualFree 5004->5005 5006 401a49 5004->5006 5005->5004 5007 401a70 LocalFree 5006->5007 5008 401a87 5006->5008 5007->5007 5007->5008 5009 401aa9 RtlDeleteCriticalSection 5008->5009 5010 401a9f RtlLeaveCriticalSection 5008->5010 5009->4991 5010->5009 5012 403fe8 5011->5012 5031 403f07 5012->5031 5014 404006 5018 403154 5015->5018 5017 40267a 5017->4998 5019 403164 5018->5019 5020 40318c TlsGetValue 5018->5020 5019->5017 5021 403196 5020->5021 5022 40316f 5020->5022 5021->5017 5026 40310c 5022->5026 5024 403174 TlsGetValue 5025 403184 5024->5025 5025->5017 5027 403120 LocalAlloc 5026->5027 5028 403116 5026->5028 5029 40313e TlsSetValue 5027->5029 5030 403132 5027->5030 5028->5027 5029->5030 5030->5024 5034 403f09 5031->5034 5033 403f3c 5033->5014 5035 403154 4 API calls 5034->5035 5037 403e9c 5034->5037 5040 403f3d 5034->5040 5054 403e9c 5034->5054 5035->5034 5036 403ef2 5039 402674 4 API calls 5036->5039 5037->5033 5037->5036 5042 403ea9 5037->5042 5045 403e8e 5037->5045 5044 403ecf 5039->5044 5040->5014 5043 402674 4 API calls 5042->5043 5042->5044 5043->5044 5044->5014 5046 403e4c 5045->5046 5047 403e62 5046->5047 5048 403e7b 5046->5048 5050 403e67 5046->5050 5049 403cc8 4 API calls 5047->5049 5051 402674 4 API calls 5048->5051 5049->5050 5052 403e78 5050->5052 5053 402674 4 API calls 5050->5053 5051->5052 5052->5036 5052->5042 5053->5052 5055 403ed7 5054->5055 5061 403ea9 5054->5061 5056 403ef2 5055->5056 5058 403e8e 4 API calls 5055->5058 5059 402674 4 API calls 5056->5059 5057 403ecf 5057->5034 5060 403ee6 5058->5060 5059->5057 5060->5056 5060->5061 5061->5057 5062 402674 4 API calls 5061->5062 5062->5057 6290 404206 6291 4041cc 6290->6291 6294 40420a 6290->6294 6292 404282 6293 403154 4 API calls 6295 404323 6293->6295 6294->6292 6294->6293 6296 402c08 6297 402c82 6296->6297 6300 402c19 6296->6300 6298 402c56 RtlUnwind 6299 403154 4 API calls 6298->6299 6299->6297 6300->6297 6300->6298 6303 402b28 6300->6303 6304 402b31 RaiseException 6303->6304 6305 402b47 6303->6305 6304->6305 6305->6298 6306 408c10 6307 408c17 6306->6307 6308 403198 4 API calls 6307->6308 6316 408cb1 6308->6316 6309 408cdc 6310 4031b8 4 API calls 6309->6310 6311 408d69 6310->6311 6312 408cc8 6314 4032fc 18 API calls 6312->6314 6313 403278 18 API calls 6313->6316 6314->6309 6315 4032fc 18 API calls 6315->6316 6316->6309 6316->6312 6316->6313 6316->6315 6321 40a814 6322 40a839 6321->6322 6323 40993c 29 API calls 6322->6323 6326 40a83e 6323->6326 6324 40a891 6355 4026c4 GetSystemTime 6324->6355 6326->6324 6329 408dd8 18 API calls 6326->6329 6327 40a896 6328 409330 46 API calls 6327->6328 6330 40a89e 6328->6330 6331 40a86d 6329->6331 6332 4031e8 18 API calls 6330->6332 6335 40a875 MessageBoxA 6331->6335 6333 40a8ab 6332->6333 6334 406928 19 API calls 6333->6334 6336 40a8b8 6334->6336 6335->6324 6337 40a882 6335->6337 6338 4066c0 19 API calls 6336->6338 6339 405864 19 API calls 6337->6339 6340 40a8c8 6338->6340 6339->6324 6341 406638 19 API calls 6340->6341 6342 40a8d9 6341->6342 6343 403340 18 API calls 6342->6343 6344 40a8e7 6343->6344 6345 4031e8 18 API calls 6344->6345 6346 40a8f7 6345->6346 6347 4074e0 37 API calls 6346->6347 6348 40a936 6347->6348 6349 402594 18 API calls 6348->6349 6350 40a956 6349->6350 6351 407a28 19 API calls 6350->6351 6352 40a998 6351->6352 6353 407cb8 35 API calls 6352->6353 6354 40a9bf 6353->6354 6355->6327 5989 407017 5990 407008 SetErrorMode 5989->5990 6356 403018 6357 403070 6356->6357 6358 403025 6356->6358 6359 40302a RtlUnwind 6358->6359 6360 40304e 6359->6360 6362 402f78 6360->6362 6363 402be8 6360->6363 6364 402bf1 RaiseException 6363->6364 6365 402c04 6363->6365 6364->6365 6365->6357 6370 40901e 6371 409010 6370->6371 6372 408fac Wow64RevertWow64FsRedirection 6371->6372 6373 409018 6372->6373 6374 409020 SetLastError 6375 409029 6374->6375 6390 403a28 ReadFile 6391 403a46 6390->6391 6392 403a49 GetLastError 6390->6392 5326 40762c ReadFile 5327 407663 5326->5327 5328 40764c 5326->5328 5329 407652 GetLastError 5328->5329 5330 40765c 5328->5330 5329->5327 5329->5330 5331 40748c 35 API calls 5330->5331 5331->5327 6752 40712e 6753 407118 6752->6753 6754 403198 4 API calls 6753->6754 6755 407120 6754->6755 6756 403198 4 API calls 6755->6756 6757 407128 6756->6757 5399 40a82f 5436 409ae8 5399->5436 5401 40a834 5402 40a839 5401->5402 5526 402f24 5401->5526 5443 40993c 5402->5443 5405 40a891 5448 4026c4 GetSystemTime 5405->5448 5407 40a83e 5407->5405 5531 408dd8 5407->5531 5408 40a896 5449 409330 5408->5449 5412 40a86d 5416 40a875 MessageBoxA 5412->5416 5413 4031e8 18 API calls 5414 40a8ab 5413->5414 5467 406928 5414->5467 5416->5405 5418 40a882 5416->5418 5534 405864 5418->5534 5423 40a8d9 5494 403340 5423->5494 5425 40a8e7 5426 4031e8 18 API calls 5425->5426 5427 40a8f7 5426->5427 5509 4074e0 5427->5509 5430 402594 18 API calls 5431 40a956 5430->5431 5516 407a28 5431->5516 5433 40a998 5538 407cb8 5433->5538 5435 40a9bf 5437 409af1 5436->5437 5438 409b09 5436->5438 5439 405890 18 API calls 5437->5439 5440 405890 18 API calls 5438->5440 5441 409b03 5439->5441 5442 409b1a 5440->5442 5441->5401 5442->5401 5544 40953c 5443->5544 5448->5408 5458 409350 5449->5458 5452 409375 CreateDirectoryA 5453 4093ed 5452->5453 5454 40937f GetLastError 5452->5454 5455 40322c 4 API calls 5453->5455 5454->5458 5456 4093f7 5455->5456 5459 4031b8 4 API calls 5456->5459 5457 408dd8 18 API calls 5457->5458 5458->5452 5458->5457 5463 407284 19 API calls 5458->5463 5466 405890 18 API calls 5458->5466 5664 406cf4 5458->5664 5687 409224 5458->5687 5706 404c94 5458->5706 5709 408da8 5458->5709 5461 409411 5459->5461 5462 4031b8 4 API calls 5461->5462 5464 40941e 5462->5464 5463->5458 5464->5413 5466->5458 5818 406820 5467->5818 5470 403454 18 API calls 5471 40694a 5470->5471 5472 4066c0 5471->5472 5823 4068e4 5472->5823 5475 4066f0 5477 403340 18 API calls 5475->5477 5476 4066fe 5478 403454 18 API calls 5476->5478 5480 4066fc 5477->5480 5479 406711 5478->5479 5481 403340 18 API calls 5479->5481 5482 403198 4 API calls 5480->5482 5481->5480 5483 406733 5482->5483 5484 406638 5483->5484 5485 406642 5484->5485 5486 406665 5484->5486 5829 406950 5485->5829 5488 40322c 4 API calls 5486->5488 5490 40666e 5488->5490 5489 406649 5489->5486 5491 406654 5489->5491 5490->5423 5492 403340 18 API calls 5491->5492 5493 406662 5492->5493 5493->5423 5495 403344 5494->5495 5498 4033a5 5494->5498 5496 4031e8 5495->5496 5497 40334c 5495->5497 5501 403254 18 API calls 5496->5501 5504 4031fc 5496->5504 5497->5498 5499 40335b 5497->5499 5502 4031e8 18 API calls 5497->5502 5503 403254 18 API calls 5499->5503 5500 403228 5500->5425 5501->5504 5502->5499 5506 403375 5503->5506 5504->5500 5505 4025ac 4 API calls 5504->5505 5505->5500 5507 4031e8 18 API calls 5506->5507 5508 4033a1 5507->5508 5508->5425 5510 4074ea 5509->5510 5835 407576 5510->5835 5838 407578 5510->5838 5511 407516 5512 40752a 5511->5512 5513 40748c 35 API calls 5511->5513 5512->5430 5513->5512 5517 407a35 5516->5517 5518 405890 18 API calls 5517->5518 5519 407a89 5517->5519 5518->5519 5520 407918 InterlockedExchange 5519->5520 5521 407a9b 5520->5521 5522 405890 18 API calls 5521->5522 5523 407ab1 5521->5523 5522->5523 5524 405890 18 API calls 5523->5524 5525 407af4 5523->5525 5524->5525 5525->5433 5527 403154 4 API calls 5526->5527 5528 402f29 5527->5528 5841 402bcc 5528->5841 5530 402f51 5530->5530 5532 408da8 18 API calls 5531->5532 5533 408df4 5532->5533 5533->5412 5535 405869 5534->5535 5536 405940 19 API calls 5535->5536 5537 40587b 5536->5537 5537->5537 5539 407cd3 5538->5539 5541 407cc8 5538->5541 5844 407c5c 5539->5844 5541->5435 5543 405890 18 API calls 5543->5541 5551 40955b 5544->5551 5545 409590 5548 40959d GetUserDefaultLangID 5545->5548 5552 409592 5545->5552 5546 409594 5562 407024 GetModuleHandleA GetProcAddress 5546->5562 5548->5552 5550 40956f 5556 4098cc 5550->5556 5551->5545 5551->5546 5551->5550 5552->5550 5553 4095cb GetACP 5552->5553 5554 4095ef 5552->5554 5553->5550 5553->5552 5554->5550 5555 409615 GetACP 5554->5555 5555->5550 5555->5554 5557 40990e 5556->5557 5558 4098d4 5556->5558 5557->5407 5558->5557 5559 403420 18 API calls 5558->5559 5560 409908 5559->5560 5641 408e80 5560->5641 5563 407067 5562->5563 5564 40705e 5562->5564 5565 407070 5563->5565 5566 4070a8 5563->5566 5573 403198 4 API calls 5564->5573 5583 406f68 5565->5583 5567 406f68 RegOpenKeyExA 5566->5567 5571 4070c1 5567->5571 5569 407089 5570 4070de 5569->5570 5586 406f5c 5569->5586 5589 40322c 5570->5589 5571->5570 5574 406f5c 20 API calls 5571->5574 5577 407120 5573->5577 5578 4070d5 RegCloseKey 5574->5578 5580 403198 4 API calls 5577->5580 5578->5570 5582 407128 5580->5582 5582->5552 5584 406f73 5583->5584 5585 406f79 RegOpenKeyExA 5583->5585 5584->5585 5585->5569 5607 406e10 5586->5607 5591 403230 5589->5591 5590 403252 5593 4032fc 5590->5593 5591->5590 5592 4025ac 4 API calls 5591->5592 5592->5590 5594 403300 5593->5594 5595 40333f 5593->5595 5596 4031e8 5594->5596 5597 40330a 5594->5597 5595->5564 5603 403254 18 API calls 5596->5603 5604 4031fc 5596->5604 5598 403334 5597->5598 5599 40331d 5597->5599 5600 4034f0 18 API calls 5598->5600 5602 4034f0 18 API calls 5599->5602 5606 403322 5600->5606 5601 403228 5601->5564 5602->5606 5603->5604 5604->5601 5605 4025ac 4 API calls 5604->5605 5605->5601 5606->5564 5608 406e36 RegQueryValueExA 5607->5608 5609 406e59 5608->5609 5614 406e7b 5608->5614 5610 406e73 5609->5610 5609->5614 5615 403278 18 API calls 5609->5615 5624 403420 5609->5624 5612 403198 4 API calls 5610->5612 5611 403198 4 API calls 5613 406f47 RegCloseKey 5611->5613 5612->5614 5613->5570 5614->5611 5615->5609 5617 406eb0 RegQueryValueExA 5617->5608 5618 406ecc 5617->5618 5618->5614 5628 4034f0 5618->5628 5621 406f20 5622 4031e8 18 API calls 5621->5622 5622->5614 5623 403420 18 API calls 5623->5621 5625 403426 5624->5625 5627 403437 5624->5627 5626 403254 18 API calls 5625->5626 5625->5627 5626->5627 5627->5617 5629 4034fd 5628->5629 5636 40352d 5628->5636 5631 403526 5629->5631 5634 403509 5629->5634 5630 403198 4 API calls 5633 403517 5630->5633 5632 403254 18 API calls 5631->5632 5632->5636 5633->5621 5633->5623 5637 4025c4 5634->5637 5636->5630 5638 4025ca 5637->5638 5639 4025dc 5638->5639 5640 403154 4 API calls 5638->5640 5639->5633 5639->5639 5640->5639 5642 408e8e 5641->5642 5644 408ea6 5642->5644 5654 408e18 5642->5654 5645 408e18 18 API calls 5644->5645 5646 408eca 5644->5646 5645->5646 5657 407918 5646->5657 5649 408e18 18 API calls 5651 408ef8 5649->5651 5650 408e18 18 API calls 5650->5651 5651->5650 5652 403278 18 API calls 5651->5652 5653 408f27 5651->5653 5652->5651 5653->5557 5655 405890 18 API calls 5654->5655 5656 408e29 5655->5656 5656->5644 5660 4078c4 5657->5660 5661 4078d6 5660->5661 5662 4078e7 5660->5662 5663 4078db InterlockedExchange 5661->5663 5662->5649 5662->5651 5663->5662 5713 406a58 5664->5713 5668 406a58 19 API calls 5670 406d36 5668->5670 5669 406d26 5669->5668 5671 406d72 5669->5671 5672 406d42 5670->5672 5674 406a34 21 API calls 5670->5674 5721 406888 5671->5721 5672->5671 5675 406d67 5672->5675 5678 406a58 19 API calls 5672->5678 5674->5672 5675->5671 5733 406cc8 GetWindowsDirectoryA 5675->5733 5680 406d5b 5678->5680 5679 406638 19 API calls 5681 406d87 5679->5681 5680->5675 5682 406a34 21 API calls 5680->5682 5683 40322c 4 API calls 5681->5683 5682->5675 5684 406d91 5683->5684 5685 4031b8 4 API calls 5684->5685 5686 406dab 5685->5686 5686->5458 5688 409244 5687->5688 5689 406638 19 API calls 5688->5689 5690 40925d 5689->5690 5691 40322c 4 API calls 5690->5691 5698 409268 5691->5698 5693 406978 20 API calls 5693->5698 5694 408dd8 18 API calls 5694->5698 5696 405890 18 API calls 5696->5698 5698->5693 5698->5694 5698->5696 5699 4092e4 5698->5699 5775 4091b0 5698->5775 5783 4033b4 5698->5783 5789 409034 5698->5789 5700 40322c 4 API calls 5699->5700 5701 4092ef 5700->5701 5702 4031b8 4 API calls 5701->5702 5703 409309 5702->5703 5704 403198 4 API calls 5703->5704 5705 409311 5704->5705 5705->5458 5707 4051a8 33 API calls 5706->5707 5708 404cb2 5707->5708 5708->5458 5710 408dc8 5709->5710 5808 408c80 5710->5808 5714 4034f0 18 API calls 5713->5714 5716 406a6b 5714->5716 5715 406a82 GetEnvironmentVariableA 5715->5716 5717 406a8e 5715->5717 5716->5715 5720 406a95 5716->5720 5735 406dec 5716->5735 5719 403198 4 API calls 5717->5719 5719->5720 5720->5669 5730 406a34 5720->5730 5739 403414 5721->5739 5724 4068b7 5725 4068ce 5724->5725 5726 4068bf 5724->5726 5727 40322c 4 API calls 5725->5727 5728 403278 18 API calls 5726->5728 5729 4068cc 5727->5729 5728->5729 5729->5679 5741 4069dc 5730->5741 5734 406ce9 5733->5734 5734->5671 5736 406dfa 5735->5736 5737 4034f0 18 API calls 5736->5737 5738 406e08 5737->5738 5738->5716 5740 403418 GetFullPathNameA 5739->5740 5740->5724 5740->5725 5748 406978 5741->5748 5743 4069fe 5744 406a06 GetFileAttributesA 5743->5744 5745 406a1b 5744->5745 5746 403198 4 API calls 5745->5746 5747 406a23 5746->5747 5747->5669 5758 406744 5748->5758 5750 4069b0 5753 4069c6 5750->5753 5754 4069bb 5750->5754 5752 406989 5752->5750 5765 406970 CharPrevA 5752->5765 5766 403454 5753->5766 5755 40322c 4 API calls 5754->5755 5757 4069c4 5755->5757 5757->5743 5762 406755 5758->5762 5759 4067b9 5760 406680 IsDBCSLeadByte 5759->5760 5761 4067b4 5759->5761 5760->5761 5761->5752 5762->5759 5764 406773 5762->5764 5764->5761 5773 406680 IsDBCSLeadByte 5764->5773 5765->5752 5767 403486 5766->5767 5768 403459 5766->5768 5769 403198 4 API calls 5767->5769 5768->5767 5771 40346d 5768->5771 5770 40347c 5769->5770 5770->5757 5772 403278 18 API calls 5771->5772 5772->5770 5774 406694 5773->5774 5774->5764 5776 403198 4 API calls 5775->5776 5778 4091d1 5776->5778 5780 4091fe 5778->5780 5798 4032a8 5778->5798 5801 403494 5778->5801 5781 403198 4 API calls 5780->5781 5782 409213 5781->5782 5782->5698 5784 4033bc 5783->5784 5785 403254 18 API calls 5784->5785 5786 4033cf 5785->5786 5787 4031e8 18 API calls 5786->5787 5788 4033f7 5787->5788 5790 408f70 2 API calls 5789->5790 5791 40904a 5790->5791 5792 40904e 5791->5792 5805 406a48 5791->5805 5792->5698 5795 409081 5796 408fac Wow64RevertWow64FsRedirection 5795->5796 5797 409089 5796->5797 5797->5698 5799 403278 18 API calls 5798->5799 5800 4032b5 5799->5800 5800->5778 5802 403498 5801->5802 5804 4034c3 5801->5804 5803 4034f0 18 API calls 5802->5803 5803->5804 5804->5778 5806 4069dc 21 API calls 5805->5806 5807 406a52 GetLastError 5806->5807 5807->5795 5809 403198 4 API calls 5808->5809 5811 408cb1 5808->5811 5809->5811 5810 4031b8 4 API calls 5812 408d69 5810->5812 5813 408cc8 5811->5813 5814 403278 18 API calls 5811->5814 5816 408cdc 5811->5816 5817 4032fc 18 API calls 5811->5817 5812->5458 5815 4032fc 18 API calls 5813->5815 5814->5811 5815->5816 5816->5810 5817->5811 5819 406744 IsDBCSLeadByte 5818->5819 5821 406835 5819->5821 5820 40687f 5820->5470 5821->5820 5822 406680 IsDBCSLeadByte 5821->5822 5822->5821 5824 4068f3 5823->5824 5825 406820 IsDBCSLeadByte 5824->5825 5827 4068fe 5825->5827 5826 4066ea 5826->5475 5826->5476 5827->5826 5828 406680 IsDBCSLeadByte 5827->5828 5828->5827 5830 406957 5829->5830 5831 40695b 5829->5831 5830->5489 5834 406970 CharPrevA 5831->5834 5833 40696c 5833->5489 5834->5833 5836 407578 5835->5836 5837 4075b7 CreateFileA 5836->5837 5837->5511 5839 403414 5838->5839 5840 4075b7 CreateFileA 5839->5840 5840->5511 5842 402bd5 RaiseException 5841->5842 5843 402be6 5841->5843 5842->5843 5843->5530 5845 407c70 5844->5845 5846 407caf 5844->5846 5845->5846 5848 407bac 5845->5848 5846->5541 5846->5543 5849 407bb7 5848->5849 5853 407bc8 5848->5853 5851 405890 18 API calls 5849->5851 5851->5853 5860 4074a0 5853->5860 5854 4074a0 34 API calls 5855 407bfd 5854->5855 5856 407918 InterlockedExchange 5855->5856 5857 407c12 5856->5857 5858 407c28 5857->5858 5859 405890 18 API calls 5857->5859 5858->5845 5859->5858 5861 4074b4 5860->5861 5862 4074c4 5861->5862 5863 4073ec 34 API calls 5861->5863 5862->5854 5863->5862 6758 408f30 6761 408dfc 6758->6761 6762 408e05 6761->6762 6763 403198 4 API calls 6762->6763 6764 408e13 6762->6764 6763->6762 6765 403932 6766 403924 6765->6766 6767 40374c VariantClear 6766->6767 6768 40392c 6767->6768 5063 4075c4 SetFilePointer 5064 4075f7 5063->5064 5065 4075e7 GetLastError 5063->5065 5065->5064 5066 4075f0 5065->5066 5068 40748c GetLastError 5066->5068 5071 4073ec 5068->5071 5080 407284 FormatMessageA 5071->5080 5074 407434 5087 405890 5074->5087 5077 407443 5091 403198 5077->5091 5081 4072aa 5080->5081 5095 403278 5081->5095 5084 405194 5174 4051a8 5084->5174 5088 405897 5087->5088 5089 4031e8 18 API calls 5088->5089 5090 4058af 5089->5090 5090->5077 5092 4031b7 5091->5092 5093 40319e 5091->5093 5092->5064 5093->5092 5302 4025ac 5093->5302 5100 403254 5095->5100 5097 403288 5098 403198 4 API calls 5097->5098 5099 4032a0 5098->5099 5099->5074 5099->5084 5101 403274 5100->5101 5102 403258 5100->5102 5101->5097 5105 402594 5102->5105 5104 403261 5104->5097 5106 402598 5105->5106 5107 4025a2 5105->5107 5111 401fd4 5106->5111 5107->5104 5107->5107 5108 40259e 5108->5107 5109 403154 4 API calls 5108->5109 5109->5107 5112 401fe8 5111->5112 5113 401fed 5111->5113 5122 401918 RtlInitializeCriticalSection 5112->5122 5115 402012 RtlEnterCriticalSection 5113->5115 5116 40201c 5113->5116 5121 401ff1 5113->5121 5115->5116 5116->5121 5129 401ee0 5116->5129 5119 402147 5119->5108 5120 40213d RtlLeaveCriticalSection 5120->5119 5121->5108 5123 40193c RtlEnterCriticalSection 5122->5123 5124 401946 5122->5124 5123->5124 5125 401964 LocalAlloc 5124->5125 5126 40197e 5125->5126 5127 4019c3 RtlLeaveCriticalSection 5126->5127 5128 4019cd 5126->5128 5127->5128 5128->5113 5132 401ef0 5129->5132 5130 401f1c 5134 401f40 5130->5134 5140 401d00 5130->5140 5132->5130 5132->5134 5135 401e58 5132->5135 5134->5119 5134->5120 5144 4016d8 5135->5144 5138 401e75 5138->5132 5141 401d4e 5140->5141 5142 401d1e 5140->5142 5141->5142 5161 401c68 5141->5161 5142->5134 5147 4016f4 5144->5147 5145 401430 LocalAlloc VirtualAlloc VirtualFree 5145->5147 5146 4016fe 5148 4015c4 VirtualAlloc 5146->5148 5147->5145 5147->5146 5149 40175b 5147->5149 5150 40132c LocalAlloc 5147->5150 5151 40174f 5147->5151 5152 40170a 5148->5152 5149->5138 5154 401dcc 5149->5154 5150->5147 5153 40150c VirtualFree 5151->5153 5152->5149 5153->5149 5155 401d80 9 API calls 5154->5155 5156 401de0 5155->5156 5157 40132c LocalAlloc 5156->5157 5158 401df0 5157->5158 5159 401b44 9 API calls 5158->5159 5160 401df8 5158->5160 5159->5160 5160->5138 5162 401c7a 5161->5162 5163 401c9d 5162->5163 5164 401caf 5162->5164 5165 40188c LocalAlloc VirtualFree VirtualFree 5163->5165 5166 40188c LocalAlloc VirtualFree VirtualFree 5164->5166 5167 401cad 5165->5167 5166->5167 5168 401b44 9 API calls 5167->5168 5173 401cc5 5167->5173 5169 401cd4 5168->5169 5170 401cee 5169->5170 5171 401b98 9 API calls 5169->5171 5172 4013a0 LocalAlloc 5170->5172 5171->5170 5172->5173 5173->5142 5175 4051c5 5174->5175 5182 404e58 5175->5182 5178 4051f1 5180 403278 18 API calls 5178->5180 5181 4051a3 5180->5181 5181->5074 5185 404e73 5182->5185 5183 404e85 5183->5178 5187 404be4 5183->5187 5185->5183 5190 404f7a 5185->5190 5197 404e4c 5185->5197 5294 405940 5187->5294 5189 404bf5 5189->5178 5191 404f8b 5190->5191 5195 404fd9 5190->5195 5194 40505f 5191->5194 5191->5195 5193 404ff7 5193->5185 5194->5193 5204 404e38 5194->5204 5195->5193 5200 404df4 5195->5200 5198 403198 4 API calls 5197->5198 5199 404e56 5198->5199 5199->5185 5201 404e02 5200->5201 5207 404bfc 5201->5207 5203 404e30 5203->5195 5233 4039a4 5204->5233 5210 4059b0 5207->5210 5209 404c15 5209->5203 5211 4059be 5210->5211 5220 404cdc LoadStringA 5211->5220 5214 405194 33 API calls 5215 4059f6 5214->5215 5223 4031e8 5215->5223 5221 403278 18 API calls 5220->5221 5222 404d09 5221->5222 5222->5214 5224 4031ec 5223->5224 5227 4031fc 5223->5227 5226 403254 18 API calls 5224->5226 5224->5227 5225 403228 5229 4031b8 5225->5229 5226->5227 5227->5225 5228 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5227->5228 5228->5225 5231 4031be 5229->5231 5230 4031e3 5230->5209 5231->5230 5232 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5231->5232 5232->5231 5234 4039ab 5233->5234 5239 4038b4 5234->5239 5236 4039cb 5237 403198 4 API calls 5236->5237 5238 4039d2 5237->5238 5238->5193 5240 4038d5 5239->5240 5241 4038c8 5239->5241 5243 403934 5240->5243 5244 4038db 5240->5244 5267 403780 5241->5267 5245 403993 5243->5245 5246 40393b 5243->5246 5247 4038e1 5244->5247 5248 4038ee 5244->5248 5249 4037f4 3 API calls 5245->5249 5250 403941 5246->5250 5251 40394b 5246->5251 5274 403894 5247->5274 5253 403894 6 API calls 5248->5253 5256 4038d0 5249->5256 5289 403864 5250->5289 5255 4037f4 3 API calls 5251->5255 5257 4038fc 5253->5257 5258 40395d 5255->5258 5256->5236 5279 4037f4 5257->5279 5261 403864 23 API calls 5258->5261 5260 403917 5285 40374c 5260->5285 5262 403976 5261->5262 5265 40374c VariantClear 5262->5265 5264 40392c 5264->5236 5266 40398b 5265->5266 5266->5236 5268 4037f0 5267->5268 5270 403744 5267->5270 5268->5256 5269 403793 VariantClear 5269->5270 5270->5267 5270->5269 5271 4037ab 5270->5271 5272 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5270->5272 5273 4037dc VariantCopyInd 5270->5273 5271->5256 5272->5270 5273->5268 5273->5270 5275 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5274->5275 5276 4038a0 5275->5276 5277 40374c VariantClear 5276->5277 5278 4038a9 5277->5278 5278->5256 5280 403845 VariantChangeTypeEx 5279->5280 5281 40380a VariantChangeTypeEx 5279->5281 5284 403832 5280->5284 5282 403826 5281->5282 5283 40374c VariantClear 5282->5283 5283->5284 5284->5260 5286 403759 5285->5286 5287 403766 5285->5287 5286->5287 5288 403779 VariantClear 5286->5288 5287->5264 5288->5264 5290 40369c 22 API calls 5289->5290 5291 40387b 5290->5291 5292 40374c VariantClear 5291->5292 5293 403882 5292->5293 5293->5256 5295 40594c 5294->5295 5296 404cdc 19 API calls 5295->5296 5297 405972 5296->5297 5298 4031e8 18 API calls 5297->5298 5299 40597d 5298->5299 5300 403198 4 API calls 5299->5300 5301 405992 5300->5301 5301->5189 5303 4025b0 5302->5303 5304 4025ba 5302->5304 5303->5304 5305 403154 4 API calls 5303->5305 5304->5092 5304->5304 5305->5304 6401 4076c8 WriteFile 6402 4076e8 6401->6402 6403 4076ef 6401->6403 6404 40748c 35 API calls 6402->6404 6405 407700 6403->6405 6406 4073ec 34 API calls 6403->6406 6404->6403 6406->6405 6407 402ccc 6410 402cfe 6407->6410 6411 402cdd 6407->6411 6408 402d88 RtlUnwind 6409 403154 4 API calls 6408->6409 6409->6410 6411->6408 6411->6410 6412 402b28 RaiseException 6411->6412 6413 402d7f 6412->6413 6413->6408 6777 403fcd 6778 403f07 4 API calls 6777->6778 6779 403fd6 6778->6779 6780 403e9c 4 API calls 6779->6780 6781 403fe2 6780->6781 6420 4024d0 6421 4024e4 6420->6421 6422 4024e9 6420->6422 6425 401918 4 API calls 6421->6425 6423 402518 6422->6423 6424 40250e RtlEnterCriticalSection 6422->6424 6427 4024ed 6422->6427 6435 402300 6423->6435 6424->6423 6425->6422 6428 402525 6431 402581 6428->6431 6432 402577 RtlLeaveCriticalSection 6428->6432 6430 401fd4 14 API calls 6433 402531 6430->6433 6432->6431 6433->6428 6445 40215c 6433->6445 6436 402314 6435->6436 6438 4023b8 6436->6438 6440 402335 6436->6440 6437 402344 6437->6428 6437->6430 6438->6437 6443 402455 6438->6443 6462 401d80 6438->6462 6466 401e84 6438->6466 6440->6437 6459 401b74 6440->6459 6443->6437 6444 401d00 9 API calls 6443->6444 6444->6437 6446 40217a 6445->6446 6447 402175 6445->6447 6449 4021ab RtlEnterCriticalSection 6446->6449 6450 40217e 6446->6450 6457 4021b5 6446->6457 6448 401918 4 API calls 6447->6448 6448->6446 6449->6457 6450->6428 6451 4021c1 6453 4022e3 RtlLeaveCriticalSection 6451->6453 6454 4022ed 6451->6454 6452 402244 6452->6450 6455 401d80 7 API calls 6452->6455 6453->6454 6454->6428 6455->6450 6456 402270 6456->6451 6458 401d00 7 API calls 6456->6458 6457->6451 6457->6452 6457->6456 6458->6451 6460 40215c 9 API calls 6459->6460 6461 401b95 6460->6461 6461->6437 6463 401d89 6462->6463 6465 401d92 6462->6465 6464 401b74 9 API calls 6463->6464 6463->6465 6464->6465 6465->6438 6471 401768 6466->6471 6468 401e99 6469 401ea6 6468->6469 6470 401dcc 9 API calls 6468->6470 6469->6438 6470->6469 6472 401787 6471->6472 6473 40183b 6472->6473 6474 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6472->6474 6476 40132c LocalAlloc 6472->6476 6477 401821 6472->6477 6479 4017d6 6472->6479 6480 4017e7 6473->6480 6486 4015c4 6473->6486 6474->6472 6476->6472 6478 40150c VirtualFree 6477->6478 6478->6480 6482 40150c 6479->6482 6480->6468 6485 40153b 6482->6485 6483 401594 6483->6480 6484 401568 VirtualFree 6484->6485 6485->6483 6485->6484 6487 40160a 6486->6487 6488 40163a 6487->6488 6489 401626 VirtualAlloc 6487->6489 6488->6480 6489->6487 6489->6488 6490 4028d2 6491 4028da 6490->6491 6492 403554 4 API calls 6491->6492 6493 4028ef 6491->6493 6492->6491 6494 4025ac 4 API calls 6493->6494 6495 4028f4 6494->6495 6782 4019d3 6783 4019ba 6782->6783 6784 4019c3 RtlLeaveCriticalSection 6783->6784 6785 4019cd 6783->6785 6784->6785 5943 407fd4 5944 407fe6 5943->5944 5946 407fed 5943->5946 5954 407f10 5944->5954 5948 408017 5946->5948 5950 408015 5946->5950 5953 408021 5946->5953 5947 40804e 5965 407d7c 5948->5965 5949 407d7c 33 API calls 5949->5947 5968 407e2c 5950->5968 5953->5947 5953->5949 5955 407f25 5954->5955 5956 407d7c 33 API calls 5955->5956 5957 407f34 5955->5957 5956->5957 5958 407f6e 5957->5958 5959 407d7c 33 API calls 5957->5959 5960 407f82 5958->5960 5961 407d7c 33 API calls 5958->5961 5959->5958 5964 407fae 5960->5964 5975 407eb8 5960->5975 5961->5960 5964->5946 5978 4058c4 5965->5978 5967 407d9e 5967->5953 5969 405194 33 API calls 5968->5969 5970 407e57 5969->5970 5986 407de4 5970->5986 5972 407e5f 5973 403198 4 API calls 5972->5973 5974 407e74 5973->5974 5974->5953 5976 407ec7 VirtualFree 5975->5976 5977 407ed9 VirtualAlloc 5975->5977 5976->5977 5977->5964 5980 4058d0 5978->5980 5979 405194 33 API calls 5981 4058fd 5979->5981 5980->5979 5982 4031e8 18 API calls 5981->5982 5983 405908 5982->5983 5984 403198 4 API calls 5983->5984 5985 40591d 5984->5985 5985->5967 5987 4058c4 33 API calls 5986->5987 5988 407e06 5987->5988 5988->5972 6496 405ad4 6497 405adc 6496->6497 6499 405ae4 6496->6499 6498 405aeb 6497->6498 6500 405ae2 6497->6500 6501 405940 19 API calls 6498->6501 6503 405a4c 6500->6503 6501->6499 6504 405a54 6503->6504 6505 405a6e 6504->6505 6508 403154 4 API calls 6504->6508 6506 405a73 6505->6506 6507 405a8a 6505->6507 6509 405940 19 API calls 6506->6509 6510 403154 4 API calls 6507->6510 6508->6504 6511 405a86 6509->6511 6512 405a8f 6510->6512 6514 403154 4 API calls 6511->6514 6513 4059b0 33 API calls 6512->6513 6513->6511 6515 405ab8 6514->6515 6516 403154 4 API calls 6515->6516 6517 405ac6 6516->6517 6517->6499 6224 40a9de 6225 40aa03 6224->6225 6226 407918 InterlockedExchange 6225->6226 6227 40aa2d 6226->6227 6228 40aa3d 6227->6228 6229 409ae8 18 API calls 6227->6229 6234 4076ac SetEndOfFile 6228->6234 6229->6228 6231 40aa59 6232 4025ac 4 API calls 6231->6232 6233 40aa90 6232->6233 6235 4076c3 6234->6235 6236 4076bc 6234->6236 6235->6231 6237 40748c 35 API calls 6236->6237 6237->6235 6789 402be9 RaiseException 6790 402c04 6789->6790 6528 402af2 6529 402afe 6528->6529 6532 402ed0 6529->6532 6533 403154 4 API calls 6532->6533 6535 402ee0 6533->6535 6534 402b03 6535->6534 6537 402b0c 6535->6537 6538 402b25 6537->6538 6539 402b15 RaiseException 6537->6539 6538->6534 6539->6538 5991 40a5f8 6034 4030dc 5991->6034 5993 40a60e 6037 4042e8 5993->6037 5995 40a613 6040 40457c GetModuleHandleA GetProcAddress 5995->6040 5999 40a61d 6048 4065c8 5999->6048 6001 40a622 6057 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 6001->6057 6011 40a665 6079 406c2c 6011->6079 6012 4031e8 18 API calls 6013 40a683 6012->6013 6014 4074e0 37 API calls 6013->6014 6015 40a69b 6014->6015 6093 409c34 FindResourceA 6015->6093 6018 409ae8 18 API calls 6020 40a710 6018->6020 6019 407918 InterlockedExchange 6022 40a6d2 6019->6022 6021 4074a0 34 API calls 6020->6021 6024 40a736 6021->6024 6022->6018 6022->6020 6023 40a751 6026 407a28 19 API calls 6023->6026 6024->6023 6025 409ae8 18 API calls 6024->6025 6025->6023 6027 40a776 6026->6027 6106 408b08 6027->6106 6031 40a7bc 6032 408b08 35 API calls 6031->6032 6033 40a7f5 6031->6033 6032->6031 6132 403094 6034->6132 6036 4030e1 GetModuleHandleA GetCommandLineA 6036->5993 6038 403154 4 API calls 6037->6038 6039 404323 6037->6039 6038->6039 6039->5995 6041 404598 6040->6041 6042 40459f GetProcAddress 6040->6042 6041->6042 6043 4045b5 GetProcAddress 6042->6043 6044 4045ae 6042->6044 6045 4045c4 SetProcessDEPPolicy 6043->6045 6046 4045c8 6043->6046 6044->6043 6045->6046 6047 404624 6F9E1CD0 6046->6047 6047->5999 6133 405ca8 6048->6133 6058 4090f7 6057->6058 6213 406fa0 SetErrorMode 6058->6213 6061 407284 19 API calls 6062 409127 6061->6062 6063 403198 4 API calls 6062->6063 6064 40913c 6063->6064 6065 409b78 GetSystemInfo VirtualQuery 6064->6065 6066 409c2c 6065->6066 6069 409ba2 6065->6069 6071 409768 6066->6071 6067 409c0d VirtualQuery 6067->6066 6067->6069 6068 409bcc VirtualProtect 6068->6069 6069->6066 6069->6067 6069->6068 6070 409bfb VirtualProtect 6069->6070 6070->6067 6217 406bd0 GetCommandLineA 6071->6217 6073 409785 6074 409850 6073->6074 6075 406c2c 20 API calls 6073->6075 6078 403454 18 API calls 6073->6078 6076 4031b8 4 API calls 6074->6076 6075->6073 6077 40986a 6076->6077 6077->6011 6122 409c88 6077->6122 6078->6073 6080 406c53 GetModuleFileNameA 6079->6080 6081 406c77 GetCommandLineA 6079->6081 6082 403278 18 API calls 6080->6082 6089 406c7c 6081->6089 6083 406c75 6082->6083 6087 406ca4 6083->6087 6084 406c81 6085 403198 4 API calls 6084->6085 6088 406c89 6085->6088 6086 406af0 18 API calls 6086->6089 6090 403198 4 API calls 6087->6090 6091 40322c 4 API calls 6088->6091 6089->6084 6089->6086 6089->6088 6092 406cb9 6090->6092 6091->6087 6092->6012 6094 409c49 6093->6094 6095 409c4e SizeofResource 6093->6095 6096 409ae8 18 API calls 6094->6096 6097 409c60 LoadResource 6095->6097 6098 409c5b 6095->6098 6096->6095 6100 409c73 LockResource 6097->6100 6101 409c6e 6097->6101 6099 409ae8 18 API calls 6098->6099 6099->6097 6103 409c84 6100->6103 6104 409c7f 6100->6104 6102 409ae8 18 API calls 6101->6102 6102->6100 6103->6019 6103->6022 6105 409ae8 18 API calls 6104->6105 6105->6103 6118 408b39 6106->6118 6120 408b82 6106->6120 6107 408bcd 6109 407cb8 35 API calls 6107->6109 6108 407cb8 35 API calls 6108->6118 6110 408be4 6109->6110 6113 4031b8 4 API calls 6110->6113 6111 4034f0 18 API calls 6111->6118 6112 4034f0 18 API calls 6112->6120 6115 408bfe 6113->6115 6114 4031e8 18 API calls 6114->6118 6129 404c20 6115->6129 6116 403420 18 API calls 6116->6118 6117 4031e8 18 API calls 6117->6120 6118->6108 6118->6111 6118->6114 6118->6116 6118->6120 6119 403420 18 API calls 6119->6120 6120->6107 6120->6112 6120->6117 6120->6119 6121 407cb8 35 API calls 6120->6121 6121->6120 6123 40322c 4 API calls 6122->6123 6124 409cab 6123->6124 6125 409cba MessageBoxA 6124->6125 6126 409ccf 6125->6126 6127 403198 4 API calls 6126->6127 6128 409cd7 6127->6128 6128->6011 6130 402594 18 API calls 6129->6130 6131 404c2b 6130->6131 6131->6031 6132->6036 6134 405940 19 API calls 6133->6134 6135 405cb9 6134->6135 6136 405280 GetSystemDefaultLCID 6135->6136 6139 4052b6 6136->6139 6137 4031e8 18 API calls 6137->6139 6138 404cdc 19 API calls 6138->6139 6139->6137 6139->6138 6140 40520c 19 API calls 6139->6140 6141 405318 6139->6141 6140->6139 6142 404cdc 19 API calls 6141->6142 6143 40520c 19 API calls 6141->6143 6144 4031e8 18 API calls 6141->6144 6145 40539b 6141->6145 6142->6141 6143->6141 6144->6141 6146 4031b8 4 API calls 6145->6146 6147 4053b5 6146->6147 6148 4053c4 GetSystemDefaultLCID 6147->6148 6205 40520c GetLocaleInfoA 6148->6205 6151 4031e8 18 API calls 6152 405404 6151->6152 6153 40520c 19 API calls 6152->6153 6154 405419 6153->6154 6155 40520c 19 API calls 6154->6155 6156 40543d 6155->6156 6211 405258 GetLocaleInfoA 6156->6211 6159 405258 GetLocaleInfoA 6160 40546d 6159->6160 6161 40520c 19 API calls 6160->6161 6162 405487 6161->6162 6163 405258 GetLocaleInfoA 6162->6163 6164 4054a4 6163->6164 6165 40520c 19 API calls 6164->6165 6166 4054be 6165->6166 6167 4031e8 18 API calls 6166->6167 6168 4054cb 6167->6168 6169 40520c 19 API calls 6168->6169 6170 4054e0 6169->6170 6171 4031e8 18 API calls 6170->6171 6172 4054ed 6171->6172 6173 405258 GetLocaleInfoA 6172->6173 6174 4054fb 6173->6174 6175 40520c 19 API calls 6174->6175 6176 405515 6175->6176 6177 4031e8 18 API calls 6176->6177 6178 405522 6177->6178 6179 40520c 19 API calls 6178->6179 6180 405537 6179->6180 6181 4031e8 18 API calls 6180->6181 6182 405544 6181->6182 6183 40520c 19 API calls 6182->6183 6184 405559 6183->6184 6185 405576 6184->6185 6186 405567 6184->6186 6188 40322c 4 API calls 6185->6188 6187 40322c 4 API calls 6186->6187 6189 405574 6187->6189 6188->6189 6190 40520c 19 API calls 6189->6190 6191 405598 6190->6191 6192 4055b5 6191->6192 6193 4055a6 6191->6193 6194 403198 4 API calls 6192->6194 6195 40322c 4 API calls 6193->6195 6196 4055b3 6194->6196 6195->6196 6197 4033b4 18 API calls 6196->6197 6198 4055d7 6197->6198 6199 4033b4 18 API calls 6198->6199 6200 4055f1 6199->6200 6201 4031b8 4 API calls 6200->6201 6202 40560b 6201->6202 6203 405cf4 GetVersionExA 6202->6203 6204 405d0b 6203->6204 6204->6001 6206 405233 6205->6206 6207 405245 6205->6207 6208 403278 18 API calls 6206->6208 6209 40322c 4 API calls 6207->6209 6210 405243 6208->6210 6209->6210 6210->6151 6212 405274 6211->6212 6212->6159 6214 403414 6213->6214 6215 406fd8 LoadLibraryA 6214->6215 6216 406fee 6215->6216 6216->6061 6218 406af0 18 API calls 6217->6218 6219 406bf3 6218->6219 6220 406c05 6219->6220 6221 406af0 18 API calls 6219->6221 6222 403198 4 API calls 6220->6222 6221->6219 6223 406c1a 6222->6223 6223->6073 6791 402dfa 6792 402e0d 6791->6792 6794 402e26 6791->6794 6795 402ba4 6792->6795 6796 402bc9 6795->6796 6797 402bad 6795->6797 6796->6794 6798 402bb5 RaiseException 6797->6798 6798->6796 6799 4075fa GetFileSize 6800 407626 6799->6800 6801 407616 GetLastError 6799->6801 6801->6800 6802 40761f 6801->6802 6803 40748c 35 API calls 6802->6803 6803->6800 6804 406ffb 6805 407008 SetErrorMode 6804->6805 6544 403a80 CloseHandle 6545 403a90 6544->6545 6546 403a91 GetLastError 6544->6546 6547 404283 6548 4042c3 6547->6548 6549 403154 4 API calls 6548->6549 6550 404323 6549->6550 6806 404185 6807 4041ff 6806->6807 6808 4041cc 6807->6808 6809 403154 4 API calls 6807->6809 6810 404323 6809->6810 6551 403e87 6552 403e4c 6551->6552 6553 403e62 6552->6553 6554 403e7b 6552->6554 6557 403e67 6552->6557 6555 403cc8 4 API calls 6553->6555 6556 402674 4 API calls 6554->6556 6555->6557 6558 403e78 6556->6558 6557->6558 6559 402674 4 API calls 6557->6559 6559->6558 6568 407e90 6569 407eb8 VirtualFree 6568->6569 6570 407e9d 6569->6570 6582 40ac97 6591 4096fc 6582->6591 6585 402f24 5 API calls 6586 40aca1 6585->6586 6587 403198 4 API calls 6586->6587 6588 40acc0 6587->6588 6589 403198 4 API calls 6588->6589 6590 40acc8 6589->6590 6600 4056ac 6591->6600 6593 409717 6594 409745 6593->6594 6606 40720c 6593->6606 6597 403198 4 API calls 6594->6597 6596 409735 6599 40973d MessageBoxA 6596->6599 6598 40975a 6597->6598 6598->6585 6598->6586 6599->6594 6601 403154 4 API calls 6600->6601 6602 4056b1 6601->6602 6603 4056c9 6602->6603 6604 403154 4 API calls 6602->6604 6603->6593 6605 4056bf 6604->6605 6605->6593 6607 4056ac 4 API calls 6606->6607 6608 40721b 6607->6608 6609 407221 6608->6609 6610 40722f 6608->6610 6611 40322c 4 API calls 6609->6611 6613 40724b 6610->6613 6614 40723f 6610->6614 6612 40722d 6611->6612 6612->6596 6624 4032b8 6613->6624 6617 4071d0 6614->6617 6618 40322c 4 API calls 6617->6618 6619 4071df 6618->6619 6620 4071fc 6619->6620 6621 406950 CharPrevA 6619->6621 6620->6612 6622 4071eb 6621->6622 6622->6620 6623 4032fc 18 API calls 6622->6623 6623->6620 6625 403278 18 API calls 6624->6625 6626 4032c2 6625->6626 6626->6612 6627 403a97 6628 403aac 6627->6628 6629 403bbc GetStdHandle 6628->6629 6630 403b0e CreateFileA 6628->6630 6638 403ab2 6628->6638 6631 403c17 GetLastError 6629->6631 6644 403bba 6629->6644 6630->6631 6632 403b2c 6630->6632 6631->6638 6634 403b3b GetFileSize 6632->6634 6632->6644 6634->6631 6635 403b4e SetFilePointer 6634->6635 6635->6631 6640 403b6a ReadFile 6635->6640 6636 403be7 GetFileType 6637 403c02 CloseHandle 6636->6637 6636->6638 6637->6638 6640->6631 6641 403b8c 6640->6641 6642 403b9f SetFilePointer 6641->6642 6641->6644 6642->6631 6643 403bb0 SetEndOfFile 6642->6643 6643->6631 6643->6644 6644->6636 6644->6638 6649 40aaa2 6650 40aad2 6649->6650 6651 40aadc CreateWindowExA SetWindowLongA 6650->6651 6652 405194 33 API calls 6651->6652 6653 40ab5f 6652->6653 6654 4032fc 18 API calls 6653->6654 6655 40ab6d 6654->6655 6656 4032fc 18 API calls 6655->6656 6657 40ab7a 6656->6657 6658 406b7c 19 API calls 6657->6658 6659 40ab86 6658->6659 6660 4032fc 18 API calls 6659->6660 6661 40ab8f 6660->6661 6662 4099ec 43 API calls 6661->6662 6663 40aba1 6662->6663 6664 4098cc 19 API calls 6663->6664 6665 40abb4 6663->6665 6664->6665 6666 40abed 6665->6666 6667 4094d8 9 API calls 6665->6667 6668 40ac06 6666->6668 6671 40ac00 RemoveDirectoryA 6666->6671 6667->6666 6669 40ac1a 6668->6669 6670 40ac0f DestroyWindow 6668->6670 6672 40ac42 6669->6672 6673 40357c 4 API calls 6669->6673 6670->6669 6671->6668 6674 40ac38 6673->6674 6675 4025ac 4 API calls 6674->6675 6675->6672 6823 405ba2 6825 405ba4 6823->6825 6824 405be0 6828 405940 19 API calls 6824->6828 6825->6824 6826 405bf7 6825->6826 6827 405bda 6825->6827 6832 404cdc 19 API calls 6826->6832 6827->6824 6829 405c4c 6827->6829 6830 405bf3 6828->6830 6831 4059b0 33 API calls 6829->6831 6833 403198 4 API calls 6830->6833 6831->6830 6834 405c20 6832->6834 6835 405c86 6833->6835 6836 4059b0 33 API calls 6834->6836 6836->6830 6837 408da4 6838 408dc8 6837->6838 6839 408c80 18 API calls 6838->6839 6840 408dd1 6839->6840 6676 402caa 6677 403154 4 API calls 6676->6677 6678 402caf 6677->6678 6855 4011aa 6856 4011ac GetStdHandle 6855->6856 6679 4028ac 6680 402594 18 API calls 6679->6680 6681 4028b6 6680->6681 5864 40aab4 5865 40aab8 SetLastError 5864->5865 5895 409648 GetLastError 5865->5895 5868 40aad2 5870 40aadc CreateWindowExA SetWindowLongA 5868->5870 5869 402f24 5 API calls 5869->5868 5871 405194 33 API calls 5870->5871 5872 40ab5f 5871->5872 5873 4032fc 18 API calls 5872->5873 5874 40ab6d 5873->5874 5875 4032fc 18 API calls 5874->5875 5876 40ab7a 5875->5876 5908 406b7c GetCommandLineA 5876->5908 5879 4032fc 18 API calls 5880 40ab8f 5879->5880 5913 4099ec 5880->5913 5883 4098cc 19 API calls 5884 40abb4 5883->5884 5885 40abed 5884->5885 5886 4094d8 9 API calls 5884->5886 5887 40ac06 5885->5887 5890 40ac00 RemoveDirectoryA 5885->5890 5886->5885 5888 40ac1a 5887->5888 5889 40ac0f DestroyWindow 5887->5889 5891 40ac42 5888->5891 5892 40357c 4 API calls 5888->5892 5889->5888 5890->5887 5893 40ac38 5892->5893 5894 4025ac 4 API calls 5893->5894 5894->5891 5896 404c94 33 API calls 5895->5896 5897 40968f 5896->5897 5898 407284 19 API calls 5897->5898 5899 40969f 5898->5899 5900 408da8 18 API calls 5899->5900 5901 4096b4 5900->5901 5902 405890 18 API calls 5901->5902 5903 4096c3 5902->5903 5904 4031b8 4 API calls 5903->5904 5905 4096e2 5904->5905 5906 403198 4 API calls 5905->5906 5907 4096ea 5906->5907 5907->5868 5907->5869 5929 406af0 5908->5929 5910 406ba1 5911 403198 4 API calls 5910->5911 5912 406bbf 5911->5912 5912->5879 5914 4033b4 18 API calls 5913->5914 5915 409a27 5914->5915 5916 409a59 CreateProcessA 5915->5916 5917 409a65 5916->5917 5918 409a6c CloseHandle 5916->5918 5919 409648 35 API calls 5917->5919 5920 409a75 5918->5920 5919->5918 5939 4099c0 5920->5939 5923 409a91 5924 4099c0 3 API calls 5923->5924 5925 409a96 GetExitCodeProcess CloseHandle 5924->5925 5926 409ab6 5925->5926 5927 403198 4 API calls 5926->5927 5928 409abe 5927->5928 5928->5883 5928->5884 5930 406b1c 5929->5930 5931 403278 18 API calls 5930->5931 5932 406b29 5931->5932 5933 403420 18 API calls 5932->5933 5934 406b31 5933->5934 5935 4031e8 18 API calls 5934->5935 5936 406b49 5935->5936 5937 403198 4 API calls 5936->5937 5938 406b6b 5937->5938 5938->5910 5940 4099d4 PeekMessageA 5939->5940 5941 4099e6 MsgWaitForMultipleObjects 5940->5941 5942 4099c8 TranslateMessage DispatchMessageA 5940->5942 5941->5920 5941->5923 5942->5940 6682 401ab9 6683 401a96 6682->6683 6684 401aa9 RtlDeleteCriticalSection 6683->6684 6685 401a9f RtlLeaveCriticalSection 6683->6685 6685->6684

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 135 409b78-409b9c GetSystemInfo VirtualQuery 136 409ba2 135->136 137 409c2c-409c33 135->137 138 409c21-409c26 136->138 138->137 139 409ba4-409bab 138->139 140 409c0d-409c1f VirtualQuery 139->140 141 409bad-409bb1 139->141 140->137 140->138 141->140 142 409bb3-409bbb 141->142 143 409bcc-409bdd VirtualProtect 142->143 144 409bbd-409bc0 142->144 146 409be1-409be3 143->146 147 409bdf 143->147 144->143 145 409bc2-409bc5 144->145 145->143 148 409bc7-409bca 145->148 149 409bf2-409bf5 146->149 147->146 148->143 148->146 150 409be5-409bee call 409b70 149->150 151 409bf7-409bf9 149->151 150->149 151->140 153 409bfb-409c08 VirtualProtect 151->153 153->140
                        APIs
                        • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                        • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                        • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                        • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Virtual$ProtectQuery$InfoSystem
                        • String ID:
                        • API String ID: 2441996862-0
                        • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                        • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                        • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                        • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                        APIs
                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                        • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                        • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                        • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                        Control-flow Graph

                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModulePolicyProcess
                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                        • API String ID: 3256987805-3653653586
                        • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                        • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                        • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                        • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                        Control-flow Graph

                        APIs
                        • SetLastError.KERNEL32 ref: 0040AAC1
                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,02072128), ref: 0040966C
                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                        • SetWindowLongA.USER32(000203F2,000000FC,00409960), ref: 0040AB15
                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                        • DestroyWindow.USER32(000203F2,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                        • API String ID: 3757039580-3001827809
                        • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                        • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
                        • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                        • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D

                        Control-flow Graph

                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                        • API String ID: 1646373207-2130885113
                        • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                        • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                        • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                        • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                        Control-flow Graph

                        APIs
                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                        • SetWindowLongA.USER32(000203F2,000000FC,00409960), ref: 0040AB15
                          • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                          • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,02072128,00409AD8,00000000,00409ABF), ref: 00409A5C
                          • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,02072128,00409AD8,00000000), ref: 00409A70
                          • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                          • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                          • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,02072128,00409AD8), ref: 00409AA4
                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                        • DestroyWindow.USER32(000203F2,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                        • API String ID: 3586484885-3001827809
                        • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                        • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
                        • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                        • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D

                        Control-flow Graph

                        APIs
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,02072128,00409AD8,00000000,00409ABF), ref: 00409A5C
                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,02072128,00409AD8,00000000), ref: 00409A70
                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                        • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,02072128,00409AD8), ref: 00409AA4
                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,02072128), ref: 0040966C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                        • String ID: D
                        • API String ID: 3356880605-2746444292
                        • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                        • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                        • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                        • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 116 4019dc-4019e7 117 401abb-401abd 116->117 118 4019ed-401a02 116->118 119 401a04-401a09 RtlEnterCriticalSection 118->119 120 401a0e-401a2d LocalFree 118->120 119->120 121 401a41-401a47 120->121 122 401a49-401a6e call 4012dc * 3 121->122 123 401a2f-401a3f VirtualFree 121->123 130 401a70-401a85 LocalFree 122->130 131 401a87-401a9d 122->131 123->121 130->130 130->131 133 401aa9-401ab3 RtlDeleteCriticalSection 131->133 134 401a9f-401aa4 RtlLeaveCriticalSection 131->134 134->133
                        APIs
                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                        • LocalFree.KERNEL32(00000000,00000000,00401AB4), ref: 00401A1B
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A3A
                        • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A79
                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                        • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                        • String ID:
                        • API String ID: 3782394904-0
                        • Opcode ID: 2760f6fc436d2282df077fa3fe2c561b0ff429e9c23b98cc44d100e589fe962f
                        • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                        • Opcode Fuzzy Hash: 2760f6fc436d2282df077fa3fe2c561b0ff429e9c23b98cc44d100e589fe962f
                        • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 155 403d02-403d10 156 403d12-403d19 155->156 157 403d29-403d30 155->157 160 403ddf-403de5 ExitProcess 156->160 161 403d1f 156->161 158 403d32-403d3c 157->158 159 403d3e-403d45 157->159 158->157 162 403d47-403d51 159->162 163 403db8-403dcc call 403cc8 * 2 call 4019dc 159->163 161->157 164 403d21-403d23 161->164 166 403d56-403d62 162->166 180 403dd1-403dd8 163->180 164->157 168 403dea-403e19 call 4030b4 164->168 166->166 170 403d64-403d6e 166->170 173 403d73-403d84 170->173 173->173 176 403d86-403d8d 173->176 178 403da4-403db3 call 403fe4 call 403f67 176->178 179 403d8f-403da2 MessageBoxA 176->179 178->163 179->163 180->168 182 403dda call 4030b4 180->182 182->160
                        APIs
                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                        • ExitProcess.KERNEL32 ref: 00403DE5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExitMessageProcess
                        • String ID: Error$Runtime error at 00000000
                        • API String ID: 1220098344-2970929446
                        • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                        • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                        • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                        • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 186 401918-40193a RtlInitializeCriticalSection 187 401946-40197c call 4012dc * 3 LocalAlloc 186->187 188 40193c-401941 RtlEnterCriticalSection 186->188 195 4019ad-4019c1 187->195 196 40197e 187->196 188->187 200 4019c3-4019c8 RtlLeaveCriticalSection 195->200 201 4019cd 195->201 197 401983-401995 196->197 197->197 199 401997-4019a6 197->199 199->195 200->201
                        APIs
                        • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                        • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                        • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                        • String ID:
                        • API String ID: 730355536-0
                        • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                        • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                        • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                        • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                        Control-flow Graph

                        APIs
                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: .tmp$y@
                        • API String ID: 2030045667-2396523267
                        • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                        • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
                        • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                        • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD

                        Control-flow Graph

                        APIs
                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: .tmp$y@
                        • API String ID: 2030045667-2396523267
                        • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                        • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
                        • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                        • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD

                        Control-flow Graph

                        APIs
                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID: .tmp
                        • API String ID: 1375471231-2986845003
                        • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                        • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                        • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                        • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 327 4094d8-4094e9 328 409532-409537 327->328 329 4094eb-4094ec 327->329 330 4094ee-4094f1 329->330 331 4094f3-4094fc Sleep 330->331 332 4094fe-409501 330->332 333 40950c-409511 call 408fbc 331->333 332->333 334 409503-409507 Sleep 332->334 336 409516-409518 333->336 334->333 336->328 337 40951a-409522 GetLastError 336->337 337->328 338 409524-40952c GetLastError 337->338 338->328 339 40952e-409530 338->339 339->328 339->330
                        APIs
                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                        • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                        • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastSleep
                        • String ID:
                        • API String ID: 1458359878-0
                        • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                        • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                        • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                        • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 405 407749-40774a 406 4076dc-4076e6 WriteFile 405->406 407 40774c-40776f 405->407 408 4076e8-4076ea call 40748c 406->408 409 4076ef-4076f2 406->409 410 407770-407785 407->410 408->409 414 407700-407704 409->414 415 4076f4-4076fb call 4073ec 409->415 411 407787 410->411 412 4077f9 410->412 416 40778a-40778f 411->416 417 4077fd-407802 411->417 418 40783b-40783d 412->418 419 4077fb 412->419 415->414 422 407803-407819 416->422 425 407791-407792 416->425 417->422 423 407841-407843 418->423 419->417 424 40785b-40785c 422->424 433 40781b 422->433 423->424 426 4078d6-4078eb call 407890 InterlockedExchange 424->426 427 40785e-40788c 424->427 428 407724-407741 425->428 429 407794-4077b4 425->429 450 407912-407917 426->450 451 4078ed-407910 426->451 443 407820-407823 427->443 444 407890-407893 427->444 432 4077b5 428->432 435 407743 428->435 429->432 437 4077b6-4077b7 432->437 438 4077f7-4077f8 432->438 439 40781e-40781f 433->439 441 407746-407747 435->441 442 4077b9 435->442 437->442 438->412 439->443 441->405 445 4077bb-4077cd 441->445 442->445 447 407824 443->447 448 407898 443->448 444->448 445->423 449 4077cf-4077d4 445->449 452 407825 447->452 453 40789a 447->453 448->453 449->418 457 4077d6-4077de 449->457 451->450 451->451 455 407896-407897 452->455 456 407826-40782d 452->456 458 40789f 453->458 455->448 459 4078a1 456->459 460 40782f 456->460 457->410 468 4077e0 457->468 458->459 465 4078a3 459->465 466 4078ac 459->466 462 407832-407833 460->462 463 4078a5-4078aa 460->463 462->418 462->439 467 4078ae-4078af 463->467 465->463 466->467 467->458 469 4078b1-4078bd 467->469 468->438 469->448 470 4078bf-4078c0 469->470
                        APIs
                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileWrite
                        • String ID:
                        • API String ID: 3934441357-0
                        • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                        • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                        • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                        • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B
                        APIs
                        • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                          • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                          • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                          • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                          • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                        • String ID:
                        • API String ID: 296031713-0
                        • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                        • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                        • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                        • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48
                        APIs
                        • DeleteFileA.KERNEL32(00000000,00000000,00409019,?,0000000D,00000000), ref: 00408FF3
                        • GetLastError.KERNEL32(00000000,00000000,00409019,?,0000000D,00000000), ref: 00408FFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DeleteErrorFileLast
                        • String ID:
                        • API String ID: 2018770650-0
                        • Opcode ID: 51b14d3c2f7fde5c1a6bb776c84878c326085b2b0be15ffc15f9635c9f9f5f18
                        • Instruction ID: 1f0403e6899a51d1d5356f81b6020870d4ad1054c4e625117792cee712869c3b
                        • Opcode Fuzzy Hash: 51b14d3c2f7fde5c1a6bb776c84878c326085b2b0be15ffc15f9635c9f9f5f18
                        • Instruction Fuzzy Hash: 16F0C871A04704ABCB01DF759D4159DB3E8DB8831475045BBF814F3682EA385E108599
                        APIs
                        • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                        • DestroyWindow.USER32(000203F2,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                          • Part of subcall function 004094D8: Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                          • Part of subcall function 004094D8: GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                          • Part of subcall function 004094D8: GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$DestroyDirectoryRemoveSleepWindow
                        • String ID:
                        • API String ID: 2192421792-0
                        • Opcode ID: 2c973cdf999bbb1192929a8364406a109d64bb88cfdea17aa602a860d5632052
                        • Instruction ID: be585450a05658aa0cbbe96fcd01bcdb7ec8c3c433658d061b63fb0e61c88a9e
                        • Opcode Fuzzy Hash: 2c973cdf999bbb1192929a8364406a109d64bb88cfdea17aa602a860d5632052
                        • Instruction Fuzzy Hash: 24F03170244200DBD724EB69EEC9B1632A5A784305F10423BF500B72F1C7FC98A1CB9D
                        APIs
                        • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                        • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLibraryLoadMode
                        • String ID:
                        • API String ID: 2987862817-0
                        • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                        • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                        • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                        • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                        APIs
                        • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                        • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                        • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                        • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776
                        APIs
                        • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                        • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileLastRead
                        • String ID:
                        • API String ID: 1948546556-0
                        • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                        • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                        • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                        • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                        • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                        • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                        • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                        • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Virtual$AllocFree
                        • String ID:
                        • API String ID: 2087232378-0
                        • Opcode ID: efc6f27fa4c1f0416fcf42a0cb9c981ca4ea103f0f96f52908972bf4ed8d2b74
                        • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                        • Opcode Fuzzy Hash: efc6f27fa4c1f0416fcf42a0cb9c981ca4ea103f0f96f52908972bf4ed8d2b74
                        • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                        APIs
                        • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                          • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                          • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DefaultInfoLoadLocaleStringSystem
                        • String ID:
                        • API String ID: 1658689577-0
                        • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                        • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                        • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                        • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                        APIs
                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                        • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                        • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                        • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                        APIs
                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                        • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                        • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                        • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                        • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                        • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                        • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                        APIs
                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID:
                        • API String ID: 442123175-0
                        • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                        • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                        • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                        • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                        APIs
                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FormatMessage
                        • String ID:
                        • API String ID: 1306739567-0
                        • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                        • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                        • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                        • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                        APIs
                        • SetEndOfFile.KERNEL32(?,02094000,0040AA59,00000000), ref: 004076B3
                          • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileLast
                        • String ID:
                        • API String ID: 734332943-0
                        • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                        • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                        • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                        • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                        APIs
                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                        • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                        • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                        • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                        APIs
                        • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                        • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                        • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                        • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                        APIs
                        • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CharPrev
                        • String ID:
                        • API String ID: 122130370-0
                        • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                        • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                        • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                        • Instruction Fuzzy Hash:
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                        • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                        • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                        • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                        APIs
                        • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: a2f32dd8ef58eb042d1926e7c5d87192c2fb778a874e681f692e1318d4ea2181
                        • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                        • Opcode Fuzzy Hash: a2f32dd8ef58eb042d1926e7c5d87192c2fb778a874e681f692e1318d4ea2181
                        • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                        • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                        • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                        • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                        APIs
                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                        • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                        • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                        • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                        APIs
                        • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                        • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                        • String ID: SeShutdownPrivilege
                        • API String ID: 107509674-3733053543
                        • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                        • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                        • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                        • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                        APIs
                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                        • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeof
                        • String ID:
                        • API String ID: 3473537107-0
                        • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                        • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                        • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                        • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                        APIs
                        • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                        • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                        • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                        • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                        APIs
                        • GetSystemTime.KERNEL32(?), ref: 004026CE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: SystemTime
                        • String ID:
                        • API String ID: 2656138-0
                        • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                        • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                        • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                        • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                        APIs
                        • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Version
                        • String ID:
                        • API String ID: 1889659487-0
                        • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                        • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                        • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                        • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                        • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                        • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                        • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressCloseHandleModuleProc
                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                        • API String ID: 4190037839-2401316094
                        • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                        • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                        • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                        • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                        APIs
                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                        • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                        • String ID:
                        • API String ID: 1694776339-0
                        • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                        • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                        • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                        • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                        APIs
                        • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                          • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                          • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoLocale$DefaultSystem
                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                        • API String ID: 1044490935-665933166
                        • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                        • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                        • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                        • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocString
                        • String ID:
                        • API String ID: 262959230-0
                        • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                        • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                        • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                        • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                        APIs
                        • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                        • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CommandHandleLineModule
                        • String ID: U1hd.@$`(F
                        • API String ID: 2123368496-1518423589
                        • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                        • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                        • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                        • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                        APIs
                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                        • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID: )q@
                        • API String ID: 3660427363-2284170586
                        • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                        • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                        • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                        • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                        APIs
                        • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                        Strings
                        • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                        • Setup, xrefs: 00409CAD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2468391767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2468379403.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468405728.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2468417644.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                        • API String ID: 2030045667-3271211647
                        • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                        • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                        • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                        • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068

                        Execution Graph

                        Execution Coverage:14%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:7.5%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:80
                        execution_graph 49941 498ba8 49999 403344 49941->49999 49943 498bb6 50002 4056a0 49943->50002 49945 498bbb 50005 40631c GetModuleHandleA GetProcAddress 49945->50005 49949 498bc5 50013 40994c 49949->50013 50329 4032fc 49999->50329 50001 403349 GetModuleHandleA GetCommandLineA 50001->49943 50004 4056db 50002->50004 50330 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50002->50330 50004->49945 50006 406338 50005->50006 50007 40633f GetProcAddress 50005->50007 50006->50007 50008 406355 GetProcAddress 50007->50008 50009 40634e 50007->50009 50010 406364 SetProcessDEPPolicy 50008->50010 50011 406368 50008->50011 50009->50008 50010->50011 50012 4063c4 6F9E1CD0 50011->50012 50012->49949 50331 409024 50013->50331 50329->50001 50330->50004 50403 408cbc 50331->50403 50334 4085dc GetSystemDefaultLCID 50337 408612 50334->50337 50335 403450 18 API calls 50335->50337 50336 406dec 19 API calls 50336->50337 50337->50335 50337->50336 50338 408568 19 API calls 50337->50338 50339 408674 50337->50339 50338->50337 50340 406dec 19 API calls 50339->50340 50341 408568 19 API calls 50339->50341 50342 403450 18 API calls 50339->50342 50343 4086f7 50339->50343 50340->50339 50341->50339 50342->50339 50479 403420 50343->50479 50346 408720 GetSystemDefaultLCID 50483 408568 GetLocaleInfoA 50346->50483 50349 403450 18 API calls 50350 408760 50349->50350 50351 408568 19 API calls 50350->50351 50352 408775 50351->50352 50353 408568 19 API calls 50352->50353 50354 408799 50353->50354 50489 4085b4 GetLocaleInfoA 50354->50489 50357 4085b4 GetLocaleInfoA 50358 4087c9 50357->50358 50359 408568 19 API calls 50358->50359 50360 4087e3 50359->50360 50361 4085b4 GetLocaleInfoA 50360->50361 50362 408800 50361->50362 50363 408568 19 API calls 50362->50363 50364 40881a 50363->50364 50365 403450 18 API calls 50364->50365 50366 408827 50365->50366 50367 408568 19 API calls 50366->50367 50368 40883c 50367->50368 50369 403450 18 API calls 50368->50369 50370 408849 50369->50370 50371 4085b4 GetLocaleInfoA 50370->50371 50372 408857 50371->50372 50373 408568 19 API calls 50372->50373 50374 408871 50373->50374 50375 403450 18 API calls 50374->50375 50376 40887e 50375->50376 50377 408568 19 API calls 50376->50377 50378 408893 50377->50378 50379 403450 18 API calls 50378->50379 50380 4088a0 50379->50380 50381 408568 19 API calls 50380->50381 50382 4088b5 50381->50382 50404 408cc8 50403->50404 50411 406dec LoadStringA 50404->50411 50424 4034e0 50411->50424 50414 403450 50415 403454 50414->50415 50418 403464 50414->50418 50417 4034bc 18 API calls 50415->50417 50415->50418 50416 403490 50420 403400 50416->50420 50417->50418 50418->50416 50474 402660 50418->50474 50421 40341f 50420->50421 50422 403406 50420->50422 50421->50334 50422->50421 50423 402660 4 API calls 50422->50423 50423->50421 50429 4034bc 50424->50429 50426 4034f0 50427 403400 4 API calls 50426->50427 50428 403508 50427->50428 50428->50414 50430 4034c0 50429->50430 50431 4034dc 50429->50431 50434 402648 50430->50434 50431->50426 50433 4034c9 50433->50426 50435 40264c 50434->50435 50437 402656 50434->50437 50440 402088 50435->50440 50436 402652 50436->50437 50451 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50436->50451 50437->50433 50437->50437 50441 40209c 50440->50441 50442 4020a1 50440->50442 50452 4019cc RtlInitializeCriticalSection 50441->50452 50444 4020c6 RtlEnterCriticalSection 50442->50444 50445 4020d0 50442->50445 50448 4020a5 50442->50448 50444->50445 50445->50448 50459 401f94 50445->50459 50448->50436 50449 4021f1 RtlLeaveCriticalSection 50450 4021fb 50449->50450 50450->50436 50451->50437 50453 4019f0 RtlEnterCriticalSection 50452->50453 50454 4019fa 50452->50454 50453->50454 50455 401a18 LocalAlloc 50454->50455 50456 401a32 50455->50456 50457 401a81 50456->50457 50458 401a77 RtlLeaveCriticalSection 50456->50458 50457->50442 50458->50457 50460 401fa4 50459->50460 50461 401fd0 50460->50461 50464 401ff4 50460->50464 50465 401f0c 50460->50465 50461->50464 50470 401db4 50461->50470 50464->50449 50464->50450 50466 40178c LocalAlloc VirtualAlloc VirtualFree VirtualFree VirtualAlloc 50465->50466 50467 401f1c 50466->50467 50468 401e80 9 API calls 50467->50468 50469 401f29 50467->50469 50468->50469 50469->50460 50471 401e02 50470->50471 50472 401dd2 50470->50472 50471->50472 50473 401d1c 9 API calls 50471->50473 50472->50464 50473->50472 50475 402664 50474->50475 50476 40266e 50474->50476 50475->50476 50478 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50475->50478 50476->50416 50476->50476 50478->50476 50480 403426 50479->50480 50481 40344b 50480->50481 50482 402660 4 API calls 50480->50482 50481->50346 50482->50480 50484 4085a1 50483->50484 50485 40858f 50483->50485 50486 403494 4 API calls 50484->50486 50487 4034e0 18 API calls 50485->50487 50488 40859f 50486->50488 50487->50488 50488->50349 50490 4085d0 50489->50490 50490->50357 52949 476c04 52950 476c27 CallWindowProcW 52949->52950 52951 476c1f 52949->52951 52953 476c47 52950->52953 52951->52950 52952 476c38 CallWindowProcW 52951->52952 52952->52953 52954 416b42 52955 416bea 52954->52955 52956 416b5a 52954->52956 52973 41531c 18 API calls 52955->52973 52958 416b74 SendMessageA 52956->52958 52959 416b68 52956->52959 52969 416bc8 52958->52969 52960 416b72 CallWindowProcA 52959->52960 52961 416b8e 52959->52961 52960->52969 52970 41a058 GetSysColor 52961->52970 52964 416b99 SetTextColor 52965 416bae 52964->52965 52971 41a058 GetSysColor 52965->52971 52967 416bb3 SetBkColor 52972 41a6e0 GetSysColor CreateBrushIndirect 52967->52972 52970->52964 52971->52967 52972->52969 52973->52969 52974 416644 52975 416651 52974->52975 52976 4166ab 52974->52976 52981 416550 CreateWindowExA 52975->52981 52977 416658 SetPropA SetPropA 52977->52976 52978 41668b 52977->52978 52979 41669e SetWindowPos 52978->52979 52979->52976 52981->52977 52982 4222e4 52983 4222f3 52982->52983 52988 421274 52983->52988 52986 422313 52989 4212e3 52988->52989 53002 421283 52988->53002 52992 4212f4 52989->52992 53013 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 52989->53013 52991 421322 52994 421395 52991->52994 52999 42133d 52991->52999 52992->52991 52993 4213ba 52992->52993 52997 4213ce SetMenu 52993->52997 53010 421393 52993->53010 53001 4213a9 52994->53001 52994->53010 52995 4213e6 53016 4211bc 24 API calls 52995->53016 52997->53010 53005 421360 GetMenu 52999->53005 52999->53010 53000 4213ed 53000->52986 53011 4221e8 10 API calls 53000->53011 53004 4213b2 SetMenu 53001->53004 53002->52989 53012 408d2c 33 API calls 53002->53012 53004->53010 53006 421383 53005->53006 53007 42136a 53005->53007 53014 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 53006->53014 53009 42137d SetMenu 53007->53009 53009->53006 53010->52995 53015 421e2c 25 API calls 53010->53015 53011->52986 53012->53002 53013->52992 53014->53010 53015->52995 53016->53000 53017 404d2a 53020 404d3a 53017->53020 53018 404e07 ExitProcess 53019 404de0 53033 404cf0 53019->53033 53020->53018 53020->53019 53020->53020 53023 404e12 53020->53023 53027 404db7 MessageBoxA 53020->53027 53028 404dcc 53020->53028 53024 404cf0 4 API calls 53025 404df4 53024->53025 53037 401a90 53025->53037 53027->53019 53049 40500c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53028->53049 53029 404df9 53029->53018 53029->53023 53034 404cfe 53033->53034 53036 404d13 53034->53036 53050 402728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53034->53050 53036->53024 53038 401aa1 53037->53038 53039 401b6f 53037->53039 53040 401ac2 LocalFree 53038->53040 53041 401ab8 RtlEnterCriticalSection 53038->53041 53039->53029 53042 401af5 53040->53042 53041->53040 53043 401ae3 VirtualFree 53042->53043 53044 401afd 53042->53044 53043->53042 53045 401b24 LocalFree 53044->53045 53046 401b3b 53044->53046 53045->53045 53045->53046 53047 401b53 RtlLeaveCriticalSection 53046->53047 53048 401b5d RtlDeleteCriticalSection 53046->53048 53047->53048 53048->53029 53050->53036 53051 44b4a8 53052 44b4b6 53051->53052 53054 44b4d5 53051->53054 53053 44b38c 25 API calls 53052->53053 53052->53054 53053->53054 53055 42e3ef SetErrorMode 53056 423c0c 53059 423c42 53056->53059 53075 423c63 53059->53075 53150 423b68 53059->53150 53060 423cec 53062 423cf3 53060->53062 53063 423d27 53060->53063 53061 423c8d 53064 423c93 53061->53064 53065 423d50 53061->53065 53070 423cf9 53062->53070 53106 423fb1 53062->53106 53066 423d32 53063->53066 53067 42409a IsIconic 53063->53067 53071 423cc5 53064->53071 53072 423c98 53064->53072 53068 423d62 53065->53068 53069 423d6b 53065->53069 53073 4240d6 53066->53073 53074 423d3b 53066->53074 53067->53075 53079 4240ae GetFocus 53067->53079 53076 423d78 53068->53076 53077 423d69 53068->53077 53173 424194 11 API calls 53069->53173 53080 423f13 SendMessageA 53070->53080 53081 423d07 53070->53081 53071->53075 53096 423cde 53071->53096 53097 423e3f 53071->53097 53082 423df6 53072->53082 53083 423c9e 53072->53083 53199 424850 WinHelpA PostMessageA 53073->53199 53086 4240ed 53074->53086 53107 423cc0 53074->53107 53174 4241dc IsIconic 53076->53174 53182 423b84 NtdllDefWindowProc_A 53077->53182 53079->53075 53088 4240bf 53079->53088 53080->53075 53081->53075 53081->53107 53133 423f56 53081->53133 53186 423b84 NtdllDefWindowProc_A 53082->53186 53089 423ca7 53083->53089 53090 423e1e PostMessageA 53083->53090 53094 4240f6 53086->53094 53095 42410b 53086->53095 53197 41eff4 GetCurrentThreadId EnumThreadWindows 53088->53197 53091 423cb0 53089->53091 53092 423ea5 53089->53092 53154 423b84 NtdllDefWindowProc_A 53090->53154 53101 423cb9 53091->53101 53102 423dce IsIconic 53091->53102 53103 423eae 53092->53103 53104 423edf 53092->53104 53093 4240eb 53093->53075 53105 4244d4 19 API calls 53094->53105 53200 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 53095->53200 53096->53107 53108 423e0b 53096->53108 53155 423b84 NtdllDefWindowProc_A 53097->53155 53101->53107 53112 423d91 53101->53112 53114 423dea 53102->53114 53115 423dde 53102->53115 53113 423b14 5 API calls 53103->53113 53169 423b84 NtdllDefWindowProc_A 53104->53169 53105->53075 53106->53075 53122 423fd7 IsWindowEnabled 53106->53122 53107->53075 53172 423b84 NtdllDefWindowProc_A 53107->53172 53118 424178 26 API calls 53108->53118 53112->53075 53183 422c4c ShowWindow PostMessageA PostQuitMessage 53112->53183 53121 423eb6 53113->53121 53185 423b84 NtdllDefWindowProc_A 53114->53185 53184 423bc0 29 API calls 53115->53184 53118->53075 53119 423e45 53126 423e83 53119->53126 53127 423e61 53119->53127 53120 4240ce SetFocus 53120->53075 53130 423ec8 53121->53130 53187 41ef58 53121->53187 53122->53075 53131 423fe5 53122->53131 53125 423ee5 53132 423efd 53125->53132 53170 41eea4 GetCurrentThreadId EnumThreadWindows 53125->53170 53162 423a84 53126->53162 53156 423b14 53127->53156 53193 423b84 NtdllDefWindowProc_A 53130->53193 53142 423fec IsWindowVisible 53131->53142 53139 423a84 6 API calls 53132->53139 53133->53075 53140 423f78 IsWindowEnabled 53133->53140 53139->53075 53140->53075 53143 423f86 53140->53143 53142->53075 53145 423ffa GetFocus 53142->53145 53194 412310 21 API calls 53143->53194 53146 4181e0 53145->53146 53147 42400f SetFocus 53146->53147 53195 415240 53147->53195 53151 423b72 53150->53151 53152 423b7d 53150->53152 53151->53152 53153 408720 21 API calls 53151->53153 53152->53060 53152->53061 53153->53152 53154->53075 53155->53119 53157 423b62 PostMessageA 53156->53157 53160 423b23 53156->53160 53157->53075 53158 423b5a 53201 40b1d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53158->53201 53160->53157 53160->53158 53161 423b4e SetWindowPos 53160->53161 53161->53158 53161->53160 53163 423b0d PostMessageA 53162->53163 53164 423a94 53162->53164 53163->53075 53164->53163 53165 423a9a EnumWindows 53164->53165 53165->53163 53166 423ab6 GetWindow GetWindowLongA 53165->53166 53202 423a1c GetWindow 53165->53202 53167 423ad5 53166->53167 53167->53163 53168 423b01 SetWindowPos 53167->53168 53168->53163 53168->53167 53169->53125 53171 41ef29 53170->53171 53171->53132 53172->53075 53173->53075 53175 424223 53174->53175 53176 4241ed SetActiveWindow 53174->53176 53175->53075 53177 42364c 3 API calls 53176->53177 53178 424203 53177->53178 53179 423b14 5 API calls 53178->53179 53180 42420a 53179->53180 53180->53175 53181 42421d SetFocus 53180->53181 53181->53175 53182->53075 53183->53075 53184->53075 53185->53075 53186->53075 53188 41ef60 IsWindow 53187->53188 53189 41ef8c 53187->53189 53190 41ef7a 53188->53190 53191 41ef6f EnableWindow 53188->53191 53189->53130 53190->53188 53190->53189 53192 402660 4 API calls 53190->53192 53191->53190 53192->53190 53193->53075 53194->53075 53196 41525b SetFocus 53195->53196 53196->53075 53198 41f022 53197->53198 53198->53075 53198->53120 53199->53093 53200->53093 53201->53157 53203 423a3d GetWindowLongA 53202->53203 53204 423a49 53202->53204 53203->53204 53205 47cd48 53206 47cd53 53205->53206 53207 452908 5 API calls 53206->53207 53208 47cd94 53206->53208 53209 47cd69 GetLastError 53206->53209 53207->53206 53209->53208 53210 47cd73 GetLastError 53209->53210 53210->53208 53211 47cd7d GetTickCount 53210->53211 53211->53208 53212 47cd8b Sleep 53211->53212 53212->53206 53213 491bf8 53214 491c32 53213->53214 53215 491c3e 53214->53215 53216 491c34 53214->53216 53218 491c4d 53215->53218 53219 491c76 53215->53219 53410 409098 MessageBeep 53216->53410 53411 446ff8 32 API calls 53218->53411 53227 491cae 53219->53227 53228 491c85 53219->53228 53220 491c39 53222 403420 4 API calls 53220->53222 53223 49228a 53222->53223 53225 403400 4 API calls 53223->53225 53224 491c5a 53412 406bb0 53224->53412 53229 492292 53225->53229 53234 491cbd 53227->53234 53235 491ce6 53227->53235 53420 446ff8 32 API calls 53228->53420 53233 491c92 53421 406c00 18 API calls 53233->53421 53423 446ff8 32 API calls 53234->53423 53242 491d0e 53235->53242 53243 491cf5 53235->53243 53238 491c9d 53422 44734c 19 API calls 53238->53422 53239 491cca 53424 406c34 18 API calls 53239->53424 53249 491d1d 53242->53249 53250 491d42 53242->53250 53426 407280 19 API calls 53243->53426 53244 491cd5 53425 44734c 19 API calls 53244->53425 53246 491cfd 53427 44734c 19 API calls 53246->53427 53428 446ff8 32 API calls 53249->53428 53253 491d7a 53250->53253 53254 491d51 53250->53254 53252 491d2a 53429 4072a8 53252->53429 53261 491d89 53253->53261 53262 491db2 53253->53262 53433 446ff8 32 API calls 53254->53433 53257 491d32 53432 4470d0 19 API calls 53257->53432 53258 491d5e 53260 42c804 19 API calls 53258->53260 53263 491d69 53260->53263 53435 446ff8 32 API calls 53261->53435 53267 491dfe 53262->53267 53268 491dc1 53262->53268 53434 44734c 19 API calls 53263->53434 53266 491d96 53436 4071f8 22 API calls 53266->53436 53274 491e0d 53267->53274 53275 491e36 53267->53275 53438 446ff8 32 API calls 53268->53438 53271 491da1 53437 44734c 19 API calls 53271->53437 53272 491dd0 53439 446ff8 32 API calls 53272->53439 53442 446ff8 32 API calls 53274->53442 53282 491e6e 53275->53282 53283 491e45 53275->53283 53278 491de1 53440 4918fc 22 API calls 53278->53440 53279 491e1a 53281 42c8a4 19 API calls 53279->53281 53285 491e25 53281->53285 53290 491e7d 53282->53290 53291 491ea6 53282->53291 53444 446ff8 32 API calls 53283->53444 53284 491ded 53441 44734c 19 API calls 53284->53441 53443 44734c 19 API calls 53285->53443 53289 491e52 53445 42c8cc 53289->53445 53454 446ff8 32 API calls 53290->53454 53298 491ede 53291->53298 53299 491eb5 53291->53299 53295 491e8a 53455 42c8fc 19 API calls 53295->53455 53305 491eed 53298->53305 53306 491f16 53298->53306 53457 446ff8 32 API calls 53299->53457 53300 491e95 53456 44734c 19 API calls 53300->53456 53302 491ec2 53304 42c92c 19 API calls 53302->53304 53307 491ecd 53304->53307 53459 446ff8 32 API calls 53305->53459 53311 491f62 53306->53311 53312 491f25 53306->53312 53458 44734c 19 API calls 53307->53458 53310 491efa 53313 42c954 19 API calls 53310->53313 53319 491f71 53311->53319 53320 491fb4 53311->53320 53461 446ff8 32 API calls 53312->53461 53315 491f05 53313->53315 53460 44734c 19 API calls 53315->53460 53316 491f34 53462 446ff8 32 API calls 53316->53462 53465 446ff8 32 API calls 53319->53465 53327 491fc3 53320->53327 53328 492027 53320->53328 53321 491f45 53463 42c4f8 19 API calls 53321->53463 53323 491f84 53466 446ff8 32 API calls 53323->53466 53326 491f51 53464 44734c 19 API calls 53326->53464 53400 446ff8 32 API calls 53327->53400 53335 492066 53328->53335 53336 492036 53328->53336 53329 491f95 53467 491af4 26 API calls 53329->53467 53333 491fd0 53401 42c608 21 API calls 53333->53401 53334 491fa3 53468 44734c 19 API calls 53334->53468 53345 4920a5 53335->53345 53346 492075 53335->53346 53471 446ff8 32 API calls 53336->53471 53340 491fde 53342 491fe2 53340->53342 53343 492017 53340->53343 53341 492043 53348 452908 5 API calls 53341->53348 53402 446ff8 32 API calls 53342->53402 53470 4470d0 19 API calls 53343->53470 53355 4920e4 53345->53355 53356 4920b4 53345->53356 53473 446ff8 32 API calls 53346->53473 53349 492050 53348->53349 53472 4470d0 19 API calls 53349->53472 53350 491ff1 53403 452c80 53350->53403 53354 492082 53474 452770 53354->53474 53365 49212c 53355->53365 53366 4920f3 53355->53366 53482 446ff8 32 API calls 53356->53482 53357 492001 53469 4470d0 19 API calls 53357->53469 53361 49208f 53481 4470d0 19 API calls 53361->53481 53362 4920c1 53364 452e10 5 API calls 53362->53364 53367 4920ce 53364->53367 53371 49213b 53365->53371 53372 492174 53365->53372 53484 446ff8 32 API calls 53366->53484 53483 4470d0 19 API calls 53367->53483 53370 492102 53485 446ff8 32 API calls 53370->53485 53487 446ff8 32 API calls 53371->53487 53377 492187 53372->53377 53384 49223d 53372->53384 53375 492113 53486 447278 19 API calls 53375->53486 53376 49214a 53488 446ff8 32 API calls 53376->53488 53490 446ff8 32 API calls 53377->53490 53381 49215b 53489 447278 19 API calls 53381->53489 53382 4921b4 53491 446ff8 32 API calls 53382->53491 53384->53220 53496 446f9c 32 API calls 53384->53496 53385 4921cb 53492 407ddc 21 API calls 53385->53492 53388 492256 53389 42e8c8 19 API calls 53388->53389 53390 49225e 53389->53390 53497 44734c 19 API calls 53390->53497 53393 4921ed 53493 446ff8 32 API calls 53393->53493 53395 492201 53494 408508 18 API calls 53395->53494 53397 49220c 53495 44734c 19 API calls 53397->53495 53399 492218 53400->53333 53401->53340 53402->53350 53404 452724 2 API calls 53403->53404 53405 452c99 53404->53405 53406 452c9d 53405->53406 53407 452cc1 MoveFileA GetLastError 53405->53407 53406->53357 53408 452760 Wow64RevertWow64FsRedirection 53407->53408 53409 452ce7 53408->53409 53409->53357 53410->53220 53411->53224 53413 406bbf 53412->53413 53414 406be1 53413->53414 53415 406bd8 53413->53415 53417 403778 18 API calls 53414->53417 53416 403400 4 API calls 53415->53416 53418 406bdf 53416->53418 53417->53418 53419 44734c 19 API calls 53418->53419 53419->53220 53420->53233 53421->53238 53422->53220 53423->53239 53424->53244 53425->53220 53426->53246 53427->53220 53428->53252 53430 403738 53429->53430 53431 4072b2 SetCurrentDirectoryA 53430->53431 53431->53257 53432->53220 53433->53258 53434->53220 53435->53266 53436->53271 53437->53220 53438->53272 53439->53278 53440->53284 53441->53220 53442->53279 53443->53220 53444->53289 53498 42c674 53445->53498 53448 42c8e0 53451 403400 4 API calls 53448->53451 53449 42c8e9 53450 403778 18 API calls 53449->53450 53452 42c8e7 53450->53452 53451->53452 53453 44734c 19 API calls 53452->53453 53453->53220 53454->53295 53455->53300 53456->53220 53457->53302 53458->53220 53459->53310 53460->53220 53461->53316 53462->53321 53463->53326 53464->53220 53465->53323 53466->53329 53467->53334 53468->53220 53469->53220 53470->53220 53471->53341 53472->53220 53473->53354 53475 452724 2 API calls 53474->53475 53476 452786 53475->53476 53477 45278a 53476->53477 53478 4527a8 CreateDirectoryA GetLastError 53476->53478 53477->53361 53479 452760 Wow64RevertWow64FsRedirection 53478->53479 53480 4527ce 53479->53480 53480->53361 53481->53220 53482->53362 53483->53220 53484->53370 53485->53375 53486->53220 53487->53376 53488->53381 53489->53220 53490->53382 53491->53385 53492->53393 53493->53395 53494->53397 53495->53399 53496->53388 53497->53220 53499 42c67c IsDBCSLeadByte 53498->53499 53500 42c67b 53499->53500 53500->53448 53500->53449 53501 40cc34 53504 406f10 WriteFile 53501->53504 53505 406f2d 53504->53505 53506 48095d 53507 451004 19 API calls 53506->53507 53508 480971 53507->53508 53509 47fa0c 35 API calls 53508->53509 53510 480995 53509->53510 53511 402b58 DestroyWindow 53510->53511 53512 4809ab 53511->53512 53513 41ee54 53514 41ee63 IsWindowVisible 53513->53514 53515 41ee99 53513->53515 53514->53515 53516 41ee6d IsWindowEnabled 53514->53516 53516->53515 53517 41ee77 53516->53517 53518 402648 18 API calls 53517->53518 53519 41ee81 EnableWindow 53518->53519 53519->53515 53520 46bb10 53521 46bb44 53520->53521 53552 46bfad 53520->53552 53523 46bb80 53521->53523 53526 46bbdc 53521->53526 53527 46bbba 53521->53527 53528 46bbcb 53521->53528 53529 46bb98 53521->53529 53530 46bba9 53521->53530 53522 403400 4 API calls 53525 46bfec 53522->53525 53524 468c74 33 API calls 53523->53524 53523->53552 53540 46bc18 53524->53540 53534 403400 4 API calls 53525->53534 53827 46baa0 59 API calls 53526->53827 53580 46b6d0 53527->53580 53826 46b890 83 API calls 53528->53826 53824 46b420 62 API calls 53529->53824 53825 46b588 56 API calls 53530->53825 53538 46bff4 53534->53538 53537 46bb9e 53537->53523 53537->53552 53539 46bc5b 53541 468bb0 33 API calls 53539->53541 53543 414ae8 18 API calls 53539->53543 53547 403450 18 API calls 53539->53547 53548 42cbc0 20 API calls 53539->53548 53549 46af68 38 API calls 53539->53549 53539->53552 53553 46bdd7 53539->53553 53576 46be9f 53539->53576 53615 48358c 53539->53615 53640 46acd4 53539->53640 53752 483084 53539->53752 53829 46b1dc 34 API calls 53539->53829 53540->53539 53540->53552 53828 494da0 33 API calls 53540->53828 53541->53539 53543->53539 53547->53539 53548->53539 53549->53539 53552->53522 53647 469f1c 53553->53647 53554 46af68 38 API calls 53554->53552 53556 46be3d 53557 403450 18 API calls 53556->53557 53558 46be4d 53557->53558 53559 46bea9 53558->53559 53560 46be59 53558->53560 53561 46beb6 53559->53561 53562 46bf6b 53559->53562 53563 457f1c 38 API calls 53560->53563 53564 46af68 38 API calls 53561->53564 53565 402b58 DestroyWindow 53562->53565 53566 46be78 53563->53566 53571 46bec3 53564->53571 53567 46bf80 53565->53567 53568 457f1c 38 API calls 53566->53568 53569 402b58 DestroyWindow 53567->53569 53568->53576 53570 46bf88 53569->53570 53572 46bf04 53571->53572 53573 46beec SetActiveWindow 53571->53573 53710 46a2c4 53572->53710 53573->53572 53575 46bf2e 53575->53576 53577 46bf4e 53575->53577 53576->53554 53578 46ade4 36 API calls 53577->53578 53579 46bf63 53578->53579 53830 46c424 53580->53830 53583 46b852 53584 403420 4 API calls 53583->53584 53587 46b86c 53584->53587 53585 414ae8 18 API calls 53586 46b71e 53585->53586 53613 46b83e 53586->53613 53833 455f84 53586->53833 53588 403400 4 API calls 53587->53588 53591 46b874 53588->53591 53590 403450 18 API calls 53590->53583 53592 403400 4 API calls 53591->53592 53593 46b87c 53592->53593 53593->53523 53594 46b73c 53596 46b7a1 53594->53596 53599 466600 33 API calls 53594->53599 53595 46b801 53595->53583 53600 42cd48 21 API calls 53595->53600 53595->53613 53596->53583 53596->53595 53843 42cd48 53596->53843 53603 46b76b 53599->53603 53601 46b817 53600->53601 53606 451458 18 API calls 53601->53606 53601->53613 53602 451458 18 API calls 53604 46b7f1 53602->53604 53605 466600 33 API calls 53603->53605 53846 47efd0 56 API calls 53604->53846 53608 46b77c 53605->53608 53609 46b82e 53606->53609 53610 451428 18 API calls 53608->53610 53847 47efd0 56 API calls 53609->53847 53612 46b791 53610->53612 53842 47efd0 56 API calls 53612->53842 53613->53583 53613->53590 53616 4181e0 53615->53616 53617 4835c3 GetForegroundWindow 53616->53617 53618 4835ce SetActiveWindow 53617->53618 53619 4835dc 53617->53619 53618->53619 53622 4835fd 53619->53622 53993 483488 53619->53993 53623 483629 53622->53623 53626 483688 53622->53626 53627 4836be 53622->53627 53624 483700 53623->53624 53628 457d10 38 API calls 53623->53628 54006 4824b4 53624->54006 53630 466800 34 API calls 53626->53630 53631 466800 34 API calls 53627->53631 53628->53624 53632 4836ac 53630->53632 53633 4836bc 53631->53633 53635 403634 18 API calls 53632->53635 54005 47efd0 56 API calls 53633->54005 53635->53633 53637 48373c 53638 403420 4 API calls 53637->53638 53639 46bd99 KiUserCallbackDispatcher 53638->53639 53639->53539 53641 46ace5 53640->53641 53642 46ace0 53640->53642 54361 469a80 61 API calls 53641->54361 53643 46ace3 53642->53643 54272 46a740 53642->54272 53643->53539 53645 46aced 53645->53539 53648 403400 4 API calls 53647->53648 53649 469f4a 53648->53649 54375 47dd00 53649->54375 53651 469fad 53652 469fb1 53651->53652 53653 469fca 53651->53653 53655 466800 34 API calls 53652->53655 53654 469fbb 53653->53654 54384 494c90 18 API calls 53653->54384 53657 46a25e 53654->53657 53659 46a154 53654->53659 53660 46a0e9 53654->53660 53655->53654 53661 403420 4 API calls 53657->53661 53658 469fe6 53658->53654 53662 469fee 53658->53662 53664 403494 4 API calls 53659->53664 53663 403494 4 API calls 53660->53663 53665 46a288 53661->53665 53666 46af68 38 API calls 53662->53666 53667 46a0f6 53663->53667 53668 46a161 53664->53668 53665->53556 53677 469ffb 53666->53677 53669 40357c 18 API calls 53667->53669 53670 40357c 18 API calls 53668->53670 53672 46a103 53669->53672 53671 46a16e 53670->53671 53674 40357c 18 API calls 53671->53674 53673 40357c 18 API calls 53672->53673 53675 46a110 53673->53675 53676 46a17b 53674->53676 53678 40357c 18 API calls 53675->53678 53679 40357c 18 API calls 53676->53679 53682 46a024 SetActiveWindow 53677->53682 53683 46a03c 53677->53683 53680 46a11d 53678->53680 53681 46a188 53679->53681 53684 466800 34 API calls 53680->53684 53685 40357c 18 API calls 53681->53685 53682->53683 53688 42f560 28 API calls 53683->53688 53686 46a12b 53684->53686 53687 46a196 53685->53687 53689 40357c 18 API calls 53686->53689 53690 414b18 18 API calls 53687->53690 53691 46a052 53688->53691 53692 46a134 53689->53692 53693 46a152 53690->53693 54385 494f3c 33 API calls 53691->54385 53695 40357c 18 API calls 53692->53695 53696 466b38 25 API calls 53693->53696 53698 46a141 53695->53698 53704 46a1b8 53696->53704 53697 46a08d 53699 402b58 DestroyWindow 53697->53699 53700 414b18 18 API calls 53698->53700 53701 46a0b7 53699->53701 53700->53693 53702 46ade4 36 API calls 53701->53702 53703 46a0bf 53702->53703 53703->53556 53704->53657 53705 414b18 18 API calls 53704->53705 53706 46a21b 53705->53706 54386 495b50 MulDiv 53706->54386 53708 46a238 53709 414b18 18 API calls 53708->53709 53709->53657 53712 46a2f0 53710->53712 53711 46a32b 53718 46a4a0 53711->53718 53724 46a33f 53711->53724 53712->53711 54436 47e008 53712->54436 53714 46a4c7 53720 414b18 18 API calls 53714->53720 53715 46a47d 53721 46a498 53715->53721 53728 402660 4 API calls 53715->53728 53716 403400 4 API calls 53722 46a645 53716->53722 53717 402648 18 API calls 53717->53724 53718->53714 53719 46a4dd 53718->53719 53751 46a620 53718->53751 53726 414b18 18 API calls 53719->53726 53725 46a4db 53720->53725 53721->53575 53722->53575 53723 402660 4 API calls 53723->53724 53724->53717 53724->53723 53734 46a3b2 53724->53734 54452 495b50 MulDiv 53725->54452 53726->53725 53727 46a449 53729 457f1c 38 API calls 53727->53729 53728->53721 53729->53715 53732 46a4fe 53735 466b38 25 API calls 53732->53735 53733 457f1c 38 API calls 53733->53734 53734->53715 53734->53727 53734->53733 53737 40357c 18 API calls 53734->53737 54451 403ba4 21 API calls 53734->54451 53736 46a532 53735->53736 54453 466b40 KiUserCallbackDispatcher 53736->54453 53737->53734 53739 46a545 53740 466b38 25 API calls 53739->53740 53741 46a556 53740->53741 53742 414b18 18 API calls 53741->53742 53743 46a589 53742->53743 54454 495b50 MulDiv 53743->54454 53745 46a5a6 53746 414b18 18 API calls 53745->53746 53747 46a5dd 53746->53747 54455 495b50 MulDiv 53747->54455 53749 46a5fa 53750 414b18 18 API calls 53749->53750 53750->53751 53751->53716 53753 46c424 62 API calls 53752->53753 53754 4830c7 53753->53754 53755 4830d0 53754->53755 54702 408be0 19 API calls 53754->54702 53757 414ae8 18 API calls 53755->53757 53758 4830e0 53757->53758 53759 403450 18 API calls 53758->53759 53760 4830ed 53759->53760 54483 46c77c 53760->54483 53763 4830fd 53765 414ae8 18 API calls 53763->53765 53766 48310d 53765->53766 53767 403450 18 API calls 53766->53767 53768 48311a 53767->53768 53769 469868 SendMessageA 53768->53769 53770 483133 53769->53770 53771 483184 53770->53771 54704 479e18 37 API calls 53770->54704 53773 4241dc 11 API calls 53771->53773 53774 48318e 53773->53774 53775 48319f SetActiveWindow 53774->53775 53776 4831b4 53774->53776 53775->53776 53777 4824b4 33 API calls 53776->53777 53778 4831c7 53777->53778 54512 475bd0 53778->54512 53824->53537 53825->53523 53826->53523 53827->53523 53828->53539 53829->53539 53848 46c4bc 53830->53848 53834 42cbc0 20 API calls 53833->53834 53839 455fb2 53834->53839 53835 455fca 53836 403420 4 API calls 53835->53836 53838 456016 53836->53838 53838->53594 53839->53835 53840 42c8a4 19 API calls 53839->53840 53841 403494 4 API calls 53839->53841 53962 455e0c GetModuleHandleA GetProcAddress 53839->53962 53840->53839 53841->53839 53842->53596 53987 42cccc 53843->53987 53846->53595 53847->53613 53849 414ae8 18 API calls 53848->53849 53850 46c4f0 53849->53850 53909 466898 53850->53909 53853 414b18 18 API calls 53854 46c502 53853->53854 53855 46c511 53854->53855 53859 46c52a 53854->53859 53938 47efd0 56 API calls 53855->53938 53857 403420 4 API calls 53858 46b702 53857->53858 53858->53583 53858->53585 53860 46c571 53859->53860 53861 46c558 53859->53861 53862 46c5d6 53860->53862 53875 46c575 53860->53875 53939 47efd0 56 API calls 53861->53939 53941 42cb4c CharNextA 53862->53941 53865 46c5e5 53866 46c5e9 53865->53866 53870 46c602 53865->53870 53942 47efd0 56 API calls 53866->53942 53868 46c5bd 53940 47efd0 56 API calls 53868->53940 53869 46c626 53943 47efd0 56 API calls 53869->53943 53870->53869 53918 466a08 53870->53918 53875->53868 53875->53870 53878 46c63f 53879 403778 18 API calls 53878->53879 53880 46c655 53879->53880 53926 42c99c 53880->53926 53883 46c666 53944 466a94 18 API calls 53883->53944 53884 46c697 53886 42c8cc 19 API calls 53884->53886 53888 46c6a2 53886->53888 53887 46c679 53889 451458 18 API calls 53887->53889 53890 42c3fc 19 API calls 53888->53890 53892 46c686 53889->53892 53891 46c6ad 53890->53891 53893 42cbc0 20 API calls 53891->53893 53945 47efd0 56 API calls 53892->53945 53895 46c6b8 53893->53895 53930 46c450 53895->53930 53896 46c525 53896->53857 53898 46c6c0 53899 42cd48 21 API calls 53898->53899 53900 46c6c8 53899->53900 53901 46c6e2 53900->53901 53902 46c6cc 53900->53902 53901->53896 53904 46c6ec 53901->53904 53946 47efd0 56 API calls 53902->53946 53905 46c6f4 GetDriveTypeA 53904->53905 53905->53896 53906 46c6ff 53905->53906 53947 47efd0 56 API calls 53906->53947 53908 46c713 53908->53896 53910 4668b2 53909->53910 53912 42cbc0 20 API calls 53910->53912 53913 403450 18 API calls 53910->53913 53914 406bb0 18 API calls 53910->53914 53915 4668fb 53910->53915 53948 42caac 53910->53948 53912->53910 53913->53910 53914->53910 53916 403420 4 API calls 53915->53916 53917 466915 53916->53917 53917->53853 53919 466a12 53918->53919 53920 466a25 53919->53920 53959 42cb3c CharNextA 53919->53959 53920->53869 53922 466a38 53920->53922 53923 466a42 53922->53923 53924 466a6f 53923->53924 53960 42cb3c CharNextA 53923->53960 53924->53869 53924->53878 53927 42c9f5 53926->53927 53928 42c9b2 53926->53928 53927->53883 53927->53884 53928->53927 53961 42cb3c CharNextA 53928->53961 53931 46c4b5 53930->53931 53932 46c463 53930->53932 53931->53898 53932->53931 53933 41eea4 2 API calls 53932->53933 53934 46c473 53933->53934 53935 46c48d SHPathPrepareForWriteA 53934->53935 53936 41ef58 6 API calls 53935->53936 53937 46c4ad 53936->53937 53937->53898 53938->53896 53939->53896 53940->53896 53941->53865 53942->53896 53943->53896 53944->53887 53945->53896 53946->53896 53947->53908 53949 403494 4 API calls 53948->53949 53950 42cabc 53949->53950 53951 403744 18 API calls 53950->53951 53955 42caf2 53950->53955 53957 42c444 IsDBCSLeadByte 53950->53957 53951->53950 53953 42cb36 53953->53910 53955->53953 53956 4037b8 18 API calls 53955->53956 53958 42c444 IsDBCSLeadByte 53955->53958 53956->53955 53957->53950 53958->53955 53959->53919 53960->53923 53961->53928 53963 452724 2 API calls 53962->53963 53964 455e54 53963->53964 53965 455e61 53964->53965 53966 455e58 53964->53966 53967 455ea5 53965->53967 53968 455e73 53965->53968 53969 403420 4 API calls 53966->53969 53970 42c804 19 API calls 53967->53970 53971 42c804 19 API calls 53968->53971 53972 455f4a 53969->53972 53973 455ebf 53970->53973 53974 455e84 53971->53974 53972->53839 53976 42c8cc 19 API calls 53973->53976 53975 42c3fc 19 API calls 53974->53975 53977 455e8f 53975->53977 53978 455eca 53976->53978 53980 455e97 GetDiskFreeSpaceExA 53977->53980 53979 42c3fc 19 API calls 53978->53979 53981 455ed5 53979->53981 53982 455f13 53980->53982 53984 455edd GetDiskFreeSpaceA 53981->53984 53983 452760 Wow64RevertWow64FsRedirection 53982->53983 53985 455f28 53983->53985 53984->53982 53986 455ef2 53984->53986 53985->53839 53986->53982 53988 42cbc0 20 API calls 53987->53988 53989 42ccee 53988->53989 53990 42ccf6 GetFileAttributesA 53989->53990 53991 403400 4 API calls 53990->53991 53992 42cd13 53991->53992 53992->53595 53992->53602 54003 4834be 53993->54003 53994 48355b 53995 483566 53994->53995 54124 483450 GetTickCount 53994->54124 53997 402b58 DestroyWindow 53995->53997 53998 48357b KiUserCallbackDispatcher 53997->53998 53998->53622 54003->53994 54011 42f560 54003->54011 54027 47e1b8 54003->54027 54031 4792a4 54003->54031 54034 482760 54003->54034 54131 4792d0 34 API calls 54003->54131 54005->53623 54007 482505 54006->54007 54008 4824d7 54006->54008 54010 481c6c PostMessageA 54007->54010 54271 494cec 33 API calls 54008->54271 54010->53637 54012 42f56c 54011->54012 54013 42f58f GetActiveWindow GetFocus 54012->54013 54014 41eea4 2 API calls 54013->54014 54015 42f5a6 54014->54015 54016 42f5c3 54015->54016 54017 42f5b3 RegisterClassA 54015->54017 54018 42f652 SetFocus 54016->54018 54019 42f5d1 CreateWindowExA 54016->54019 54017->54016 54020 403400 4 API calls 54018->54020 54019->54018 54021 42f604 54019->54021 54022 42f66e 54020->54022 54132 42427c 54021->54132 54022->54003 54024 42f62c 54025 42f634 CreateWindowExA 54024->54025 54025->54018 54026 42f64a ShowWindow 54025->54026 54026->54018 54028 47e25f 54027->54028 54029 47e1cc 54027->54029 54028->54003 54029->54028 54138 457470 29 API calls 54029->54138 54139 479200 54031->54139 54035 457d10 38 API calls 54034->54035 54036 4827a5 54035->54036 54037 4827bc 54036->54037 54038 4827b0 54036->54038 54040 457d10 38 API calls 54037->54040 54039 457d10 38 API calls 54038->54039 54041 4827ba 54039->54041 54040->54041 54042 4827d8 54041->54042 54043 4827cc 54041->54043 54044 457d10 38 API calls 54042->54044 54045 457d10 38 API calls 54043->54045 54046 4827d6 54044->54046 54045->54046 54047 47c26c 58 API calls 54046->54047 54048 4827ec 54047->54048 54049 403494 4 API calls 54048->54049 54050 4827f9 54049->54050 54051 40357c 18 API calls 54050->54051 54052 482804 54051->54052 54053 457d10 38 API calls 54052->54053 54054 48280c 54053->54054 54055 47c26c 58 API calls 54054->54055 54056 482817 54055->54056 54057 48283d 54056->54057 54058 403494 4 API calls 54056->54058 54061 482862 54057->54061 54062 482975 54057->54062 54059 48282a 54058->54059 54060 40357c 18 API calls 54059->54060 54063 482835 54060->54063 54147 4826ec 54061->54147 54065 48298b 54062->54065 54188 42cd5c 54062->54188 54066 457d10 38 API calls 54063->54066 54067 47c26c 58 API calls 54065->54067 54066->54057 54071 48299a 54067->54071 54075 47c26c 58 API calls 54071->54075 54072 482885 54073 47c26c 58 API calls 54072->54073 54077 482894 54073->54077 54074 482a49 54079 457d10 38 API calls 54074->54079 54078 4829ba 54075->54078 54151 477dec 54077->54151 54191 477f14 51 API calls 54078->54191 54123 482961 54079->54123 54083 482966 54086 457d10 38 API calls 54083->54086 54084 4828b6 54087 48292d 54084->54087 54089 451458 18 API calls 54084->54089 54085 4829c7 54090 451458 18 API calls 54085->54090 54085->54123 54086->54123 54093 4078f4 33 API calls 54087->54093 54087->54123 54088 403420 4 API calls 54091 482a8d 54088->54091 54092 4828c7 54089->54092 54094 4829dc 54090->54094 54095 403420 4 API calls 54091->54095 54097 40357c 18 API calls 54092->54097 54098 482959 54093->54098 54099 40357c 18 API calls 54094->54099 54096 482a9a 54095->54096 54100 403420 4 API calls 54096->54100 54101 4828d4 54097->54101 54102 457d10 38 API calls 54098->54102 54103 4829e9 54099->54103 54104 482aa7 54100->54104 54186 406d68 33 API calls 54101->54186 54102->54123 54192 406d68 33 API calls 54103->54192 54104->54003 54107 4828ef 54109 42e8c8 19 API calls 54107->54109 54108 482a04 54110 42e8c8 19 API calls 54108->54110 54112 482900 54109->54112 54111 482a15 54110->54111 54113 451428 18 API calls 54111->54113 54114 451428 18 API calls 54112->54114 54115 482a2a 54113->54115 54116 482915 54114->54116 54117 40357c 18 API calls 54115->54117 54118 40357c 18 API calls 54116->54118 54120 482a33 54117->54120 54119 48291e 54118->54119 54187 408c0c 18 API calls 54119->54187 54193 408c0c 18 API calls 54120->54193 54123->54088 54128 483468 54124->54128 54126 48345a GetTickCount 54127 483485 54126->54127 54126->54128 54127->53995 54128->54126 54128->54127 54129 4824a8 12 API calls 54128->54129 54266 42ec74 MsgWaitForMultipleObjects 54128->54266 54267 48341c GetForegroundWindow 54128->54267 54129->54128 54131->54003 54133 4242ae 54132->54133 54134 42428e GetWindowTextA 54132->54134 54136 403494 4 API calls 54133->54136 54135 4034e0 18 API calls 54134->54135 54137 4242ac 54135->54137 54136->54137 54137->54024 54138->54028 54140 47920c 54139->54140 54144 479234 54139->54144 54141 47922d 54140->54141 54145 453344 18 API calls 54140->54145 54146 4790c0 34 API calls 54141->54146 54144->54003 54145->54141 54146->54144 54149 4826f8 54147->54149 54148 482713 54148->54072 54179 452da0 54148->54179 54149->54148 54194 453344 18 API calls 54149->54194 54152 477e13 54151->54152 54153 477e1c 54151->54153 54152->54153 54155 477e43 54152->54155 54195 455010 54153->54195 54237 477b08 19 API calls 54155->54237 54158 403400 4 API calls 54160 477eff 54158->54160 54159 477e6c 54238 477b1c 19 API calls 54159->54238 54160->54084 54162 477e76 54239 477b1c 19 API calls 54162->54239 54164 477e80 54240 477b1c 19 API calls 54164->54240 54166 477e8b 54241 477b08 19 API calls 54166->54241 54168 477e98 54242 477b08 19 API calls 54168->54242 54170 477ea3 54243 407280 19 API calls 54170->54243 54172 477eab 54244 477b1c 19 API calls 54172->54244 54174 477eb6 54245 477c6c 42 API calls 54174->54245 54176 477eca 54177 402b58 DestroyWindow 54176->54177 54178 477ee2 54177->54178 54178->54084 54180 452724 2 API calls 54179->54180 54181 452db6 54180->54181 54182 452dba 54181->54182 54183 42cd24 GetFileAttributesA 54181->54183 54182->54072 54182->54083 54184 452dd5 GetLastError 54183->54184 54185 452760 Wow64RevertWow64FsRedirection 54184->54185 54185->54182 54186->54107 54187->54087 54189 42cccc 21 API calls 54188->54189 54190 42cd66 54189->54190 54190->54065 54190->54074 54191->54085 54192->54108 54193->54123 54194->54148 54196 455036 54195->54196 54197 455061 54196->54197 54198 455052 54196->54198 54199 403634 18 API calls 54197->54199 54200 403494 4 API calls 54198->54200 54201 455079 54199->54201 54205 45505c 54200->54205 54202 455093 54201->54202 54203 403634 18 API calls 54201->54203 54262 42c8fc 19 API calls 54202->54262 54203->54202 54206 42d8c4 GetSystemDirectoryA 54205->54206 54208 45517c 54205->54208 54206->54208 54207 45509d 54210 4550b8 54207->54210 54263 42c8fc 19 API calls 54207->54263 54246 4527e8 54208->54246 54211 4550d2 54210->54211 54212 455109 54210->54212 54217 455107 54210->54217 54214 42d8c4 GetSystemDirectoryA 54211->54214 54264 42d898 GetWindowsDirectoryA 54212->54264 54218 4550df 54214->54218 54216 4551ae 54220 4551c3 CloseHandle 54216->54220 54221 4551ba GetLastError 54216->54221 54217->54205 54226 42c8a4 19 API calls 54217->54226 54224 42c3fc 19 API calls 54218->54224 54219 455116 54225 42c3fc 19 API calls 54219->54225 54253 454f7c 54220->54253 54222 4551db 54221->54222 54227 403420 4 API calls 54222->54227 54228 4550ea 54224->54228 54229 455121 54225->54229 54226->54205 54230 4551f5 54227->54230 54231 403634 18 API calls 54228->54231 54232 403634 18 API calls 54229->54232 54233 403400 4 API calls 54230->54233 54231->54217 54232->54217 54234 4551fd 54233->54234 54235 403400 4 API calls 54234->54235 54236 455205 54235->54236 54236->54158 54237->54159 54238->54162 54239->54164 54240->54166 54241->54168 54242->54170 54243->54172 54244->54174 54245->54176 54247 452724 2 API calls 54246->54247 54248 452801 54247->54248 54249 452805 54248->54249 54250 45280c CreateProcessA GetLastError 54248->54250 54249->54216 54251 452760 Wow64RevertWow64FsRedirection 54250->54251 54252 452861 54251->54252 54252->54216 54254 454fa0 WaitForInputIdle 54253->54254 54256 454fb4 54253->54256 54254->54256 54255 454fd4 GetExitCodeProcess 54258 454fe2 54255->54258 54259 454fe8 CloseHandle 54255->54259 54256->54255 54260 454fbb MsgWaitForMultipleObjects 54256->54260 54258->54259 54259->54222 54260->54256 54261 454fd2 54260->54261 54261->54255 54262->54207 54263->54210 54265 42d8b9 54264->54265 54265->54219 54266->54128 54268 483448 54267->54268 54269 48342f GetWindowThreadProcessId 54267->54269 54268->54128 54269->54268 54270 48343d GetCurrentProcessId 54269->54270 54270->54268 54271->54007 54274 46a787 54272->54274 54273 46abff 54276 46ac1a 54273->54276 54277 46ac4b 54273->54277 54274->54273 54275 46a842 54274->54275 54280 403494 4 API calls 54274->54280 54279 46a863 54275->54279 54283 46a8a4 54275->54283 54281 403494 4 API calls 54276->54281 54278 403494 4 API calls 54277->54278 54282 46ac59 54278->54282 54284 403494 4 API calls 54279->54284 54285 46a7c6 54280->54285 54286 46ac28 54281->54286 54374 46915c 26 API calls 54282->54374 54287 403400 4 API calls 54283->54287 54289 46a871 54284->54289 54290 414ae8 18 API calls 54285->54290 54373 46915c 26 API calls 54286->54373 54292 46a8a2 54287->54292 54293 414ae8 18 API calls 54289->54293 54294 46a7e7 54290->54294 54315 46a999 54292->54315 54362 469868 54292->54362 54297 46a892 54293->54297 54298 403634 18 API calls 54294->54298 54295 46ac36 54296 403400 4 API calls 54295->54296 54300 46ac7c 54296->54300 54302 403634 18 API calls 54297->54302 54303 46a7f7 54298->54303 54306 403400 4 API calls 54300->54306 54301 46aa10 54304 403400 4 API calls 54301->54304 54302->54292 54307 414ae8 18 API calls 54303->54307 54309 46aa0e 54304->54309 54305 46a8c4 54310 46a902 54305->54310 54311 46a8ca 54305->54311 54312 46ac84 54306->54312 54308 46a80b 54307->54308 54308->54275 54317 414ae8 18 API calls 54308->54317 54368 469ca4 58 API calls 54309->54368 54316 403400 4 API calls 54310->54316 54313 403494 4 API calls 54311->54313 54314 403420 4 API calls 54312->54314 54318 46a8d8 54313->54318 54319 46ac91 54314->54319 54315->54301 54320 46a9cf 54315->54320 54321 46a900 54316->54321 54322 46a832 54317->54322 54324 47c26c 58 API calls 54318->54324 54319->53643 54325 403494 4 API calls 54320->54325 54330 469b5c 58 API calls 54321->54330 54326 403634 18 API calls 54322->54326 54328 46a8f0 54324->54328 54329 46a9dd 54325->54329 54326->54275 54327 46aa39 54336 46aa44 54327->54336 54337 46aa9a 54327->54337 54331 403634 18 API calls 54328->54331 54332 414ae8 18 API calls 54329->54332 54333 46a929 54330->54333 54331->54321 54334 46a9fe 54332->54334 54340 46a934 54333->54340 54341 46a98a 54333->54341 54335 403634 18 API calls 54334->54335 54335->54309 54339 403494 4 API calls 54336->54339 54338 403400 4 API calls 54337->54338 54342 46aaa2 54338->54342 54343 46aa52 54339->54343 54345 403494 4 API calls 54340->54345 54344 403400 4 API calls 54341->54344 54346 402b58 DestroyWindow 54342->54346 54343->54342 54353 403634 18 API calls 54343->54353 54355 46aa98 54343->54355 54357 46a988 54344->54357 54347 46a942 54345->54347 54348 46aaa9 54346->54348 54356 403634 18 API calls 54347->54356 54347->54357 54354 46ab4b 54348->54354 54369 494c90 18 API calls 54348->54369 54349 402b58 DestroyWindow 54349->54315 54351 46aac5 54351->54354 54370 494f3c 33 API calls 54351->54370 54353->54343 54371 4290f4 SendMessageA 54354->54371 54355->54342 54356->54347 54357->54349 54359 46abec 54372 429144 SendMessageA SendMessageA 54359->54372 54361->53645 54363 42a040 SendMessageA 54362->54363 54364 469877 54363->54364 54365 469897 54364->54365 54366 42a040 SendMessageA 54364->54366 54365->54305 54367 469887 54366->54367 54367->54305 54368->54327 54369->54351 54370->54354 54371->54359 54372->54273 54373->54295 54374->54295 54376 47dd19 54375->54376 54379 47dd56 54375->54379 54387 455d0c 54376->54387 54379->53651 54382 402b58 DestroyWindow 54383 47dd87 54382->54383 54383->53651 54384->53658 54385->53697 54386->53708 54388 455d1d 54387->54388 54389 455d21 54388->54389 54390 455d2a 54388->54390 54412 455a10 54389->54412 54420 455af0 44 API calls 54390->54420 54393 455d27 54393->54379 54394 47d970 54393->54394 54401 47da6c 54394->54401 54402 47d9b0 54394->54402 54395 403420 4 API calls 54396 47db4f 54395->54396 54396->54382 54397 479770 34 API calls 54397->54402 54400 47c26c 58 API calls 54400->54401 54401->54400 54403 454100 34 API calls 54401->54403 54407 47da0f 54401->54407 54434 479630 34 API calls 54401->54434 54402->54397 54402->54401 54404 47c26c 58 API calls 54402->54404 54402->54407 54409 47da18 54402->54409 54429 4798d4 54402->54429 54403->54401 54404->54402 54405 47c26c 58 API calls 54405->54409 54406 42c92c 19 API calls 54406->54409 54407->54395 54408 42c954 19 API calls 54408->54409 54409->54402 54409->54405 54409->54406 54409->54408 54411 47da59 54409->54411 54433 47d67c 67 API calls 54409->54433 54411->54407 54413 42de1c RegOpenKeyExA 54412->54413 54414 455a2d 54413->54414 54415 455a7b 54414->54415 54421 455944 54414->54421 54415->54393 54418 455944 20 API calls 54419 455a5c RegCloseKey 54418->54419 54419->54393 54420->54393 54426 42dd58 54421->54426 54423 403420 4 API calls 54424 4559f6 54423->54424 54424->54418 54425 45596c 54425->54423 54427 42dc00 20 API calls 54426->54427 54428 42dd61 54427->54428 54428->54425 54430 4798e0 54429->54430 54431 4798fb 54430->54431 54435 453344 18 API calls 54430->54435 54431->54402 54433->54409 54434->54401 54435->54431 54437 402648 18 API calls 54436->54437 54438 47e02c 54437->54438 54439 47d970 76 API calls 54438->54439 54440 47e04f 54439->54440 54441 47e0e4 54440->54441 54442 47e05c 54440->54442 54444 47e0f8 54441->54444 54456 47dd98 54441->54456 54479 494cec 33 API calls 54442->54479 54447 47e124 54444->54447 54450 402660 4 API calls 54444->54450 54445 47e09e 54445->53711 54448 402660 4 API calls 54447->54448 54449 47e12e 54448->54449 54449->53711 54450->54444 54451->53734 54452->53732 54453->53739 54454->53745 54455->53749 54457 403494 4 API calls 54456->54457 54458 47ddc7 54457->54458 54459 42c92c 19 API calls 54458->54459 54460 47de2b 54458->54460 54461 47dde2 54459->54461 54463 47dea7 54460->54463 54473 402660 4 API calls 54460->54473 54475 47de3b 54460->54475 54480 42ca00 21 API calls 54461->54480 54467 47defc 54463->54467 54463->54475 54482 453c0c 25 API calls 54463->54482 54464 403400 4 API calls 54465 47df75 54464->54465 54468 403420 4 API calls 54465->54468 54472 402648 18 API calls 54467->54472 54470 47df82 54468->54470 54469 47def1 54471 403494 4 API calls 54469->54471 54470->54444 54471->54467 54474 47df10 54472->54474 54473->54460 54476 47df38 MultiByteToWideChar 54474->54476 54475->54464 54476->54475 54477 47dded 54477->54460 54481 42e8a0 CharNextA 54477->54481 54479->54445 54480->54477 54481->54477 54482->54469 54484 46c7a5 54483->54484 54485 46c7f2 54484->54485 54486 414ae8 18 API calls 54484->54486 54488 403420 4 API calls 54485->54488 54487 46c7bb 54486->54487 54708 466924 20 API calls 54487->54708 54490 46c89c 54488->54490 54490->53763 54703 408be0 19 API calls 54490->54703 54491 46c7c3 54492 414b18 18 API calls 54491->54492 54493 46c7d1 54492->54493 54494 46c7de 54493->54494 54496 46c7f7 54493->54496 54709 47efd0 56 API calls 54494->54709 54497 46c80f 54496->54497 54498 466a08 CharNextA 54496->54498 54710 47efd0 56 API calls 54497->54710 54500 46c80b 54498->54500 54500->54497 54501 46c825 54500->54501 54502 46c841 54501->54502 54503 46c82b 54501->54503 54504 42c99c CharNextA 54502->54504 54711 47efd0 56 API calls 54503->54711 54506 46c84e 54504->54506 54506->54485 54712 466a94 18 API calls 54506->54712 54508 46c865 54509 451458 18 API calls 54508->54509 54510 46c872 54509->54510 54713 47efd0 56 API calls 54510->54713 54513 457d10 38 API calls 54512->54513 54514 475c1c 54513->54514 54515 4072a8 SetCurrentDirectoryA 54514->54515 54516 475c26 54515->54516 54714 46e308 54516->54714 54520 475c36 54722 45a148 54520->54722 54523 47c26c 58 API calls 54524 475c8d 54523->54524 54526 475c9d 54524->54526 55167 453344 18 API calls 54524->55167 54527 475cbf 54526->54527 55168 453344 18 API calls 54526->55168 54529 478e24 34 API calls 54527->54529 54530 475cca 54529->54530 54726 4794c0 54530->54726 54533 403450 18 API calls 54534 475cf1 54533->54534 54535 403450 18 API calls 54534->54535 54536 475cff 54535->54536 54730 46e964 54536->54730 54704->53771 54708->54491 54709->54485 54710->54485 54711->54485 54712->54508 54713->54485 54715 46e37b 54714->54715 54717 46e325 54714->54717 54718 46e380 54715->54718 54716 479770 34 API calls 54716->54717 54717->54715 54717->54716 54719 46e3a6 54718->54719 55175 44fb1c 54719->55175 54721 46e402 54721->54520 54723 45a14e 54722->54723 54724 45a430 4 API calls 54723->54724 54725 45a16a 54724->54725 54725->54523 54727 4794cd 54726->54727 54728 475cd2 54727->54728 55184 479368 34 API calls 54727->55184 54728->54533 54731 46e9a2 54730->54731 54732 46e992 54730->54732 54734 403400 4 API calls 54731->54734 54733 403494 4 API calls 54732->54733 54735 46e9a0 54733->54735 54734->54735 54736 455560 5 API calls 54735->54736 54737 46e9b6 54736->54737 54738 45559c 5 API calls 54737->54738 54739 46e9c4 54738->54739 54740 46e93c 19 API calls 54739->54740 54741 46e9d8 54740->54741 54742 45a204 18 API calls 54741->54742 54743 46e9f0 54742->54743 55167->54526 55168->54527 55178 44fb30 55175->55178 55179 44fb41 55178->55179 55180 44fb2d 55179->55180 55181 44fb6b MulDiv 55179->55181 55180->54721 55182 4181e0 55181->55182 55183 44fb96 SendMessageA 55182->55183 55183->55180 55184->54728 56253 41fb58 56254 41fb61 56253->56254 56257 41fdfc 56254->56257 56256 41fb6e 56258 41feee 56257->56258 56259 41fe13 56257->56259 56258->56256 56259->56258 56278 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56259->56278 56261 41fe49 56262 41fe73 56261->56262 56263 41fe4d 56261->56263 56288 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56262->56288 56279 41fb9c 56263->56279 56267 41fe81 56269 41fe85 56267->56269 56270 41feab 56267->56270 56268 41fb9c 10 API calls 56271 41fe71 56268->56271 56272 41fb9c 10 API calls 56269->56272 56273 41fb9c 10 API calls 56270->56273 56271->56256 56274 41fe97 56272->56274 56275 41febd 56273->56275 56276 41fb9c 10 API calls 56274->56276 56277 41fb9c 10 API calls 56275->56277 56276->56271 56277->56271 56278->56261 56280 41fbb7 56279->56280 56281 41f93c 4 API calls 56280->56281 56282 41fbcd 56280->56282 56281->56282 56289 41f93c 56282->56289 56284 41fc15 56285 41fc38 SetScrollInfo 56284->56285 56297 41fa9c 56285->56297 56288->56267 56290 4181e0 56289->56290 56291 41f959 GetWindowLongA 56290->56291 56292 41f996 56291->56292 56293 41f976 56291->56293 56309 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56292->56309 56308 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56293->56308 56296 41f982 56296->56284 56298 41faaa 56297->56298 56299 41fab2 56297->56299 56298->56268 56300 41faf1 56299->56300 56301 41fae1 56299->56301 56307 41faef 56299->56307 56311 417e48 IsWindowVisible ScrollWindow SetWindowPos 56300->56311 56310 417e48 IsWindowVisible ScrollWindow SetWindowPos 56301->56310 56302 41fb31 GetScrollPos 56302->56298 56305 41fb3c 56302->56305 56306 41fb4b SetScrollPos 56305->56306 56306->56298 56307->56302 56308->56296 56309->56296 56310->56307 56311->56307 56312 416bf8 56315 4136f4 56312->56315 56314 416c04 56316 413724 56315->56316 56317 4136ff GetWindowThreadProcessId 56315->56317 56316->56314 56317->56316 56318 41370a GetCurrentProcessId 56317->56318 56318->56316 56319 413714 GetPropA 56318->56319 56319->56316 56320 420598 56321 4205ab 56320->56321 56341 415b30 56321->56341 56323 4206f2 56324 420709 56323->56324 56348 4146d4 KiUserCallbackDispatcher 56323->56348 56328 420720 56324->56328 56349 414718 KiUserCallbackDispatcher 56324->56349 56325 420651 56346 420848 34 API calls 56325->56346 56326 4205e6 56326->56323 56326->56325 56334 420642 MulDiv 56326->56334 56331 420742 56328->56331 56350 420060 12 API calls 56328->56350 56332 42066a 56332->56323 56347 420060 12 API calls 56332->56347 56345 41a304 19 API calls 56334->56345 56337 420687 56338 4206a3 MulDiv 56337->56338 56339 4206c6 56337->56339 56338->56339 56339->56323 56340 4206cf MulDiv 56339->56340 56340->56323 56342 415b42 56341->56342 56351 414470 56342->56351 56344 415b5a 56344->56326 56345->56325 56346->56332 56347->56337 56348->56324 56349->56328 56350->56331 56352 41448a 56351->56352 56355 410458 56352->56355 56354 4144a0 56354->56344 56358 40dca4 56355->56358 56357 41045e 56357->56354 56359 40dd06 56358->56359 56360 40dcb7 56358->56360 56361 40dd14 33 API calls 56359->56361 56369 40dd14 56360->56369 56362 40dd10 56361->56362 56362->56357 56366 40dce9 56382 40d728 DestroyWindow 56366->56382 56368 40dcfe 56368->56357 56370 40dd24 56369->56370 56372 40dd3a 56370->56372 56383 40e09c 56370->56383 56399 40d5e0 56370->56399 56402 40df4c 56372->56402 56375 40d5e0 19 API calls 56376 40dd42 56375->56376 56376->56375 56377 40ddae 56376->56377 56405 40db60 56376->56405 56379 40df4c 19 API calls 56377->56379 56380 40dce1 56379->56380 56381 40d67c DestroyWindow 56380->56381 56381->56366 56382->56368 56384 40e96c 19 API calls 56383->56384 56392 40e0d7 56384->56392 56385 403778 18 API calls 56385->56392 56386 40e18d 56387 40e1b7 56386->56387 56388 40e1a8 56386->56388 56470 40ba24 56387->56470 56419 40e3c0 56388->56419 56392->56385 56392->56386 56473 40d774 19 API calls 56392->56473 56474 40e080 19 API calls 56392->56474 56395 40e1b5 56396 403400 4 API calls 56395->56396 56397 40e25c 56396->56397 56397->56370 56400 40ea08 19 API calls 56399->56400 56401 40d5ea 56400->56401 56401->56370 56507 40d4bc 56402->56507 56406 40df54 19 API calls 56405->56406 56407 40db93 56406->56407 56408 40e96c 19 API calls 56407->56408 56409 40db9e 56408->56409 56410 40e96c 19 API calls 56409->56410 56411 40dba9 56410->56411 56412 40dbc4 56411->56412 56413 40dbbb 56411->56413 56418 40dbc1 56411->56418 56516 40d9d8 56412->56516 56519 40dac8 33 API calls 56413->56519 56416 403420 4 API calls 56417 40dc8f 56416->56417 56417->56376 56418->56416 56420 40e3f6 56419->56420 56421 40e3ec 56419->56421 56423 40e511 56420->56423 56424 40e495 56420->56424 56425 40e4f6 56420->56425 56426 40e576 56420->56426 56427 40e438 56420->56427 56428 40e4d9 56420->56428 56429 40e47a 56420->56429 56430 40e4bb 56420->56430 56463 40e45c 56420->56463 56476 40d440 19 API calls 56421->56476 56438 40d764 19 API calls 56423->56438 56484 40de24 19 API calls 56424->56484 56489 40e890 19 API calls 56425->56489 56433 40d764 19 API calls 56426->56433 56477 40d764 56427->56477 56487 40e9a8 19 API calls 56428->56487 56483 40d818 19 API calls 56429->56483 56486 40dde4 19 API calls 56430->56486 56432 403400 4 API calls 56440 40e5eb 56432->56440 56441 40e57e 56433->56441 56445 40e519 56438->56445 56440->56395 56446 40e582 56441->56446 56447 40e59b 56441->56447 56442 40e4e4 56488 409d38 18 API calls 56442->56488 56444 40e4a0 56485 40d470 19 API calls 56444->56485 56452 40e523 56445->56452 56453 40e51d 56445->56453 56457 40ea08 19 API calls 56446->56457 56496 40de24 19 API calls 56447->56496 56449 40e461 56482 40ded8 19 API calls 56449->56482 56450 40e444 56480 40de24 19 API calls 56450->56480 56490 40ea08 56452->56490 56454 40e521 56453->56454 56455 40e53c 56453->56455 56494 40de24 19 API calls 56454->56494 56461 40ea08 19 API calls 56455->56461 56457->56463 56464 40e544 56461->56464 56462 40e44f 56481 40e26c 19 API calls 56462->56481 56463->56432 56493 40d8a0 19 API calls 56464->56493 56467 40e566 56495 40e2d4 18 API calls 56467->56495 56502 40b9d0 56470->56502 56473->56392 56474->56392 56475 40d774 19 API calls 56475->56395 56476->56420 56478 40ea08 19 API calls 56477->56478 56479 40d76e 56478->56479 56479->56449 56479->56450 56480->56462 56481->56463 56482->56463 56483->56463 56484->56444 56485->56463 56486->56463 56487->56442 56488->56463 56489->56463 56497 40d780 56490->56497 56493->56463 56494->56467 56495->56463 56496->56463 56500 40d78b 56497->56500 56498 40d7c5 56498->56463 56500->56498 56501 40d7cc 19 API calls 56500->56501 56501->56500 56503 40b9e2 56502->56503 56505 40ba07 56502->56505 56503->56505 56506 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56503->56506 56505->56395 56505->56475 56506->56505 56508 40ea08 19 API calls 56507->56508 56509 40d4c9 56508->56509 56510 40d4dc 56509->56510 56514 40eb0c 19 API calls 56509->56514 56510->56376 56512 40d4d7 56515 40d458 19 API calls 56512->56515 56514->56512 56515->56510 56520 40ab7c 33 API calls 56516->56520 56518 40da00 56518->56418 56519->56418 56520->56518 56521 416a1c 56522 416a47 56521->56522 56523 416a2f 56521->56523 56535 416a42 56522->56535 56546 416990 PtInRect GetCapture 56522->56546 56524 416a31 56523->56524 56525 416a9a 56523->56525 56530 416a36 56524->56530 56531 416a64 56524->56531 56538 415270 56525->56538 56528 416ad1 56529 415270 73 API calls 56529->56528 56532 416b01 GetCapture 56530->56532 56530->56535 56531->56535 56537 421aec 6 API calls 56531->56537 56532->56535 56533 416aa3 56533->56528 56545 4168d0 PtInRect 56533->56545 56535->56528 56535->56529 56537->56535 56539 41527d 56538->56539 56540 4152e3 56539->56540 56541 4152d8 56539->56541 56544 4152e1 56539->56544 56547 424b8c 13 API calls 56540->56547 56541->56544 56548 41505c 60 API calls 56541->56548 56544->56533 56545->56528 56546->56535 56547->56544 56548->56544 56549 41363c SetWindowLongA GetWindowLongA 56550 413699 SetPropA SetPropA 56549->56550 56551 41367b GetWindowLongA 56549->56551 56556 41f39c KiUserCallbackDispatcher 56550->56556 56551->56550 56552 41368a SetWindowLongA 56551->56552 56552->56550 56554 4136e9 56556->56554 56557 42285c 56558 42288c 56557->56558 56559 42286f 56557->56559 56561 422aa1 56558->56561 56562 4228c6 56558->56562 56566 422aff 56558->56566 56559->56558 56560 408cbc 19 API calls 56559->56560 56560->56558 56563 422af3 56561->56563 56564 422ae9 56561->56564 56583 42291d 56562->56583 56597 4231a8 GetSystemMetrics 56562->56597 56563->56566 56570 422b37 56563->56570 56571 422b18 56563->56571 56600 421e2c 25 API calls 56564->56600 56567 4229c9 56572 4229d5 56567->56572 56573 422a0b 56567->56573 56568 422a7c 56575 422a96 ShowWindow 56568->56575 56579 422b41 GetActiveWindow 56570->56579 56578 422b2f SetWindowPos 56571->56578 56576 4229df SendMessageA 56572->56576 56577 422a25 ShowWindow 56573->56577 56574 422961 56598 4231a0 GetSystemMetrics 56574->56598 56575->56566 56580 4181e0 56576->56580 56582 4181e0 56577->56582 56578->56566 56584 422b4c 56579->56584 56585 422b6b 56579->56585 56586 422a03 ShowWindow 56580->56586 56587 422a47 CallWindowProcA 56582->56587 56583->56567 56583->56568 56590 422b54 IsIconic 56584->56590 56588 422b71 56585->56588 56589 422b96 56585->56589 56591 422a5a SendMessageA 56586->56591 56599 414cc4 56587->56599 56594 422b88 SetWindowPos SetActiveWindow 56588->56594 56595 422ba0 ShowWindow 56589->56595 56590->56585 56593 422b5e 56590->56593 56591->56566 56596 41eff4 2 API calls 56593->56596 56594->56566 56595->56566 56596->56585 56597->56574 56598->56583 56599->56591 56600->56563 56601 4809f7 56602 480a00 56601->56602 56603 480a2b 56601->56603 56602->56603 56726 476c50 56602->56726 56604 480a6a 56603->56604 56955 47f4a4 18 API calls 56603->56955 56605 480a8e 56604->56605 56608 480a81 56604->56608 56609 480a83 56604->56609 56613 480aca 56605->56613 56614 480aac 56605->56614 56618 47f4e8 56 API calls 56608->56618 56957 47f57c 56 API calls 56609->56957 56611 480a5d 56956 47f50c 56 API calls 56611->56956 56960 47f33c 38 API calls 56613->56960 56619 480ac1 56614->56619 56958 47f50c 56 API calls 56614->56958 56618->56605 56959 47f33c 38 API calls 56619->56959 56621 480ac8 56623 480ada 56621->56623 56624 480ae0 56621->56624 56625 480ade 56623->56625 56629 47f4e8 56 API calls 56623->56629 56624->56625 56626 47f4e8 56 API calls 56624->56626 56759 47c66c 56625->56759 56626->56625 56628 480b07 56833 47cb94 56628->56833 56629->56625 56981 476f64 56726->56981 56728 476c84 56729 476c9e GetClassInfoW 56728->56729 56730 476cda 56728->56730 56729->56730 56731 476cb2 56729->56731 56736 476da1 56730->56736 56737 476d0d GetACP 56730->56737 56738 4035c0 18 API calls 56730->56738 56750 476d52 SendMessageW 56730->56750 57039 403ba4 21 API calls 56730->57039 56734 476ccf SetWindowLongW 56731->56734 56732 476e3f 56733 42a040 SendMessageA 56732->56733 56735 476e4d 56733->56735 56734->56730 56740 476e50 56735->56740 56741 476e73 56735->56741 56736->56732 56739 47c26c 58 API calls 56736->56739 56737->56730 56738->56730 56742 476dd6 56739->56742 57041 42a05c SendMessageA 56740->57041 56743 476ecc 56741->56743 57018 422e50 56741->57018 57005 478e98 56742->57005 56748 402b58 DestroyWindow 56743->56748 56751 476ee7 56748->56751 56749 476e92 56749->56743 56752 42a040 SendMessageA 56749->56752 56750->56730 56751->56603 56954 408be0 19 API calls 56751->56954 56753 476eab 56752->56753 56753->56743 56756 47e474 27 API calls 56753->56756 56754 476de5 56754->56732 56755 476e18 56754->56755 57040 42a05c SendMessageA 56755->57040 56756->56743 56758 476e37 56758->56732 56760 42d898 GetWindowsDirectoryA 56759->56760 56761 47c690 56760->56761 56762 403450 18 API calls 56761->56762 56763 47c69d 56762->56763 56764 42d8c4 GetSystemDirectoryA 56763->56764 56765 47c6a5 56764->56765 56766 403450 18 API calls 56765->56766 56767 47c6b2 56766->56767 56768 42d8f0 6 API calls 56767->56768 56769 47c6ba 56768->56769 56770 403450 18 API calls 56769->56770 56771 47c6c7 56770->56771 56772 47c6d0 56771->56772 56773 47c6ec 56771->56773 57092 42d208 56772->57092 56775 403400 4 API calls 56773->56775 56777 47c6ea 56775->56777 56779 47c731 56777->56779 56780 42c8cc 19 API calls 56777->56780 56778 403450 18 API calls 56778->56777 57072 47c4f4 56779->57072 56782 47c70c 56780->56782 56784 403450 18 API calls 56782->56784 56786 47c719 56784->56786 56785 403450 18 API calls 56787 47c74d 56785->56787 56786->56779 56789 403450 18 API calls 56786->56789 56788 47c76b 56787->56788 56790 4035c0 18 API calls 56787->56790 56791 47c4f4 22 API calls 56788->56791 56789->56779 56790->56788 56792 47c77a 56791->56792 56793 403450 18 API calls 56792->56793 56794 47c787 56793->56794 56795 47c7af 56794->56795 56796 42c3fc 19 API calls 56794->56796 56797 47c816 56795->56797 56800 47c4f4 22 API calls 56795->56800 56798 47c79d 56796->56798 56799 47c8de 56797->56799 56804 47c836 SHGetKnownFolderPath 56797->56804 56803 4035c0 18 API calls 56798->56803 56801 47c8e7 56799->56801 56802 47c908 56799->56802 56805 47c7c7 56800->56805 56806 42c3fc 19 API calls 56801->56806 56807 42c3fc 19 API calls 56802->56807 56803->56795 56808 47c850 56804->56808 56809 47c88b SHGetKnownFolderPath 56804->56809 56810 403450 18 API calls 56805->56810 56811 47c8f4 56806->56811 56812 47c915 56807->56812 57102 403ba4 21 API calls 56808->57102 56809->56799 56814 47c8a5 56809->56814 56819 47c7d4 56810->56819 56815 4035c0 18 API calls 56811->56815 56816 4035c0 18 API calls 56812->56816 57103 403ba4 21 API calls 56814->57103 56821 47c906 56815->56821 56816->56821 56817 47c86b 771883B0 56817->56628 56818 47c7e7 56824 47c4f4 22 API calls 56818->56824 56819->56818 57100 453344 18 API calls 56819->57100 57083 47c5d8 56821->57083 56823 47c8c0 771883B0 56823->56628 56825 47c7f6 56824->56825 56827 403450 18 API calls 56825->56827 56829 47c803 56827->56829 56829->56797 57101 453344 18 API calls 56829->57101 56830 403400 4 API calls 56831 47c941 56830->56831 56831->56628 56834 47cb9c 56833->56834 56834->56834 57105 453a24 56834->57105 56837 403450 18 API calls 56838 47cbc9 56837->56838 56839 403494 4 API calls 56838->56839 56840 47cbd6 56839->56840 56841 40357c 18 API calls 56840->56841 56842 47cbe4 56841->56842 56843 457d10 38 API calls 56842->56843 56844 47cbec 56843->56844 56845 47cbff 56844->56845 57137 457508 20 API calls 56844->57137 56847 42c3fc 19 API calls 56845->56847 56848 47cc0c 56847->56848 56849 4035c0 18 API calls 56848->56849 56850 47cc1c 56849->56850 56851 47cc26 CreateDirectoryA 56850->56851 56852 47cc30 GetLastError 56851->56852 56874 47cc8c 56851->56874 56854 451458 18 API calls 56852->56854 56856 47cc48 56854->56856 57138 406d68 33 API calls 56856->57138 56860 47cc58 57123 458410 56874->57123 56955->56611 56956->56604 56957->56605 56958->56619 56959->56621 56960->56621 56982 476f6e 56981->56982 56983 49577c 66 API calls 56982->56983 56984 476f84 56983->56984 56985 495a84 35 API calls 56984->56985 56986 476f8b 56985->56986 56987 4959f0 11 API calls 56986->56987 56988 476f92 56987->56988 56989 414b18 18 API calls 56988->56989 56990 476f9f 56989->56990 56991 414b18 18 API calls 56990->56991 56992 476fb0 56991->56992 56993 414b18 18 API calls 56992->56993 56994 476fc1 56993->56994 56995 414b18 18 API calls 56994->56995 56996 476fd2 56995->56996 56997 41d0d0 38 API calls 56996->56997 56998 476fe3 56997->56998 56999 41a6ac 19 API calls 56998->56999 57000 476fee 56999->57000 57001 41d0d0 38 API calls 57000->57001 57002 477048 57001->57002 57042 41ab38 57002->57042 57004 477051 57004->56728 57006 403494 4 API calls 57005->57006 57007 478eca 57006->57007 57008 478f7e 57007->57008 57009 478e24 34 API calls 57007->57009 57010 403420 4 API calls 57008->57010 57014 478edc 57009->57014 57011 478f98 57010->57011 57011->56754 57012 4078f4 33 API calls 57012->57014 57013 42de1c RegOpenKeyExA 57013->57014 57014->57008 57014->57012 57014->57013 57015 478f34 57014->57015 57016 42dd4c 20 API calls 57015->57016 57017 478f56 RegCloseKey 57016->57017 57017->56754 57054 4140e0 57018->57054 57021 408cbc 19 API calls 57022 422e9f 57021->57022 57023 422ea4 GetCapture 57022->57023 57024 422ebe ReleaseCapture GetActiveWindow 57023->57024 57025 422ead GetCapture SendMessageA 57023->57025 57058 423394 57024->57058 57025->57024 57028 41eea4 2 API calls 57029 422f13 57028->57029 57030 422f4b SendMessageA 57029->57030 57032 422f5c 57030->57032 57034 422f9b 57032->57034 57068 4244bc 39 API calls 57032->57068 57069 422d54 PostMessageA 57032->57069 57035 422faf SendMessageA 57034->57035 57036 4181e0 57035->57036 57037 422fbd GetActiveWindow 57036->57037 57038 422fc8 57037->57038 57038->56749 57039->56730 57040->56758 57041->56741 57043 41ab53 57042->57043 57050 41aba5 57042->57050 57043->57050 57051 41b168 33 API calls 57043->57051 57045 41ab72 57052 41a058 GetSysColor 57045->57052 57047 41ab7f SetBkColor 57053 41a058 GetSysColor 57047->57053 57049 41ab94 SetTextColor 57049->57050 57050->57004 57051->57045 57052->57047 57053->57049 57055 4140f0 57054->57055 57056 4140e9 57054->57056 57055->57021 57055->57023 57070 413f74 16 API calls 57056->57070 57059 4233a5 57058->57059 57060 422f0c 57058->57060 57061 423408 57059->57061 57062 4233ae GetCursorPos WindowFromPoint 57059->57062 57060->57028 57065 423412 SetCursor 57061->57065 57062->57061 57063 4233c7 GetWindowThreadProcessId GetCurrentThreadId 57062->57063 57063->57061 57064 4233da SendMessageA 57063->57064 57071 406244 57064->57071 57065->57060 57067 4233fc SendMessageA 57067->57060 57068->57032 57069->57032 57070->57055 57071->57067 57073 42de1c RegOpenKeyExA 57072->57073 57074 47c51a 57073->57074 57075 47c540 57074->57075 57076 47c51e 57074->57076 57078 403400 4 API calls 57075->57078 57077 42dd4c 20 API calls 57076->57077 57079 47c52a 57077->57079 57080 47c547 57078->57080 57081 47c535 RegCloseKey 57079->57081 57082 403400 4 API calls 57079->57082 57080->56785 57081->57080 57082->57081 57084 47c5e6 57083->57084 57085 42de1c RegOpenKeyExA 57084->57085 57086 47c60e 57085->57086 57087 47c63f 57086->57087 57088 42dd4c 20 API calls 57086->57088 57087->56830 57089 47c624 57088->57089 57090 42dd4c 20 API calls 57089->57090 57091 47c636 RegCloseKey 57090->57091 57091->57087 57093 4038a4 18 API calls 57092->57093 57094 42d21b 57093->57094 57095 42d232 GetEnvironmentVariableA 57094->57095 57099 42d245 57094->57099 57104 42dbd0 18 API calls 57094->57104 57095->57094 57096 42d23e 57095->57096 57097 403400 4 API calls 57096->57097 57097->57099 57099->56778 57100->56818 57101->56797 57102->56817 57103->56823 57104->57094 57122 453a44 57105->57122 57107 4537b0 25 API calls 57107->57122 57108 453a69 CreateDirectoryA 57109 453ae1 57108->57109 57110 453a73 GetLastError 57108->57110 57111 403494 4 API calls 57109->57111 57110->57122 57112 453aeb 57111->57112 57114 403420 4 API calls 57112->57114 57113 451458 18 API calls 57113->57122 57115 453b05 57114->57115 57117 403420 4 API calls 57115->57117 57118 453b12 57117->57118 57118->56837 57119 42e8c8 19 API calls 57119->57122 57120 451428 18 API calls 57120->57122 57122->57107 57122->57108 57122->57113 57122->57119 57122->57120 57140 42da18 57122->57140 57163 406d68 33 API calls 57122->57163 57164 408c0c 18 API calls 57122->57164 57124 45841c 57123->57124 57125 45842a 57123->57125 57126 403494 4 API calls 57124->57126 57127 403400 4 API calls 57125->57127 57137->56845 57138->56860 57141 42d208 19 API calls 57140->57141 57142 42da3e 57141->57142 57143 42da4a 57142->57143 57144 42cd48 21 API calls 57142->57144 57145 42d208 19 API calls 57143->57145 57146 42da96 57143->57146 57144->57143 57147 42da5a 57145->57147 57148 42c804 19 API calls 57146->57148 57149 42cd48 21 API calls 57147->57149 57150 42da66 57147->57150 57153 42daa0 57148->57153 57149->57150 57150->57146 57151 42da8b 57150->57151 57154 42d208 19 API calls 57150->57154 57151->57146 57152 42d898 GetWindowsDirectoryA 57151->57152 57152->57146 57155 42c3fc 19 API calls 57153->57155 57156 42da7f 57154->57156 57157 42daab 57155->57157 57156->57151 57159 42cd48 21 API calls 57156->57159 57158 403494 4 API calls 57157->57158 57160 42dab5 57158->57160 57159->57151 57161 403420 4 API calls 57160->57161 57162 42dacf 57161->57162 57162->57122 57163->57122 57164->57122
                        Strings
                        • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470CC4
                        • Dest filename: %s, xrefs: 00470894
                        • Couldn't read time stamp. Skipping., xrefs: 00470D35
                        • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470CB5
                        • Same version. Skipping., xrefs: 00470CE5
                        • Time stamp of existing file: %s, xrefs: 00470A2B
                        • , xrefs: 00470BCF, 00470DA0, 00470E1E
                        • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470E96
                        • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470CD0
                        • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470DEC
                        • Will register the file (a DLL/OCX) later., xrefs: 0047151F
                        • Non-default bitness: 64-bit, xrefs: 004708AF
                        • Version of existing file: %u.%u.%u.%u, xrefs: 00470B7C
                        • User opted not to overwrite the existing file. Skipping., xrefs: 00470E4D
                        • -- File entry --, xrefs: 004706FB
                        • Dest file exists., xrefs: 004709BB
                        • Version of our file: (none), xrefs: 00470AFC
                        • Same time stamp. Skipping., xrefs: 00470D55
                        • Failed to strip read-only attribute., xrefs: 00470ED3
                        • InUn, xrefs: 0047115F
                        • Incrementing shared file count (32-bit)., xrefs: 004715A5
                        • Uninstaller requires administrator: %s, xrefs: 0047118F
                        • Version of existing file: (none), xrefs: 00470CFA
                        • Non-default bitness: 32-bit, xrefs: 004708BB
                        • Incrementing shared file count (64-bit)., xrefs: 0047158C
                        • Installing the file., xrefs: 00470F09
                        • Time stamp of our file: %s, xrefs: 0047099B
                        • Time stamp of our file: (failed to read), xrefs: 004709A7
                        • @, xrefs: 004707B0
                        • Skipping due to "onlyifdoesntexist" flag., xrefs: 004709CE
                        • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470EFA
                        • Version of our file: %u.%u.%u.%u, xrefs: 00470AF0
                        • Existing file is a newer version. Skipping., xrefs: 00470C02
                        • Dest file is protected by Windows File Protection., xrefs: 004708ED
                        • Existing file has a later time stamp. Skipping., xrefs: 00470DCF
                        • Installing into GAC, xrefs: 00471714
                        • .tmp, xrefs: 00470FB7
                        • Stripped read-only attribute., xrefs: 00470EC7
                        • Will register the file (a type library) later., xrefs: 00471513
                        • Time stamp of existing file: (failed to read), xrefs: 00470A37
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                        • API String ID: 0-4021121268
                        • Opcode ID: a27af26e7e39879e55e12172b3fa09cc2b88a96f453993cfd7508716b919e6cb
                        • Instruction ID: 04e5041402f80353ef90c659d92e8d378e84d4fed116f8838aecbbc27e5febe3
                        • Opcode Fuzzy Hash: a27af26e7e39879e55e12172b3fa09cc2b88a96f453993cfd7508716b919e6cb
                        • Instruction Fuzzy Hash: 31927574A0424CDFDB21DFA9C445BDDBBB5AF05304F1480ABE848A7392D7789E49CB19

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1381 42e09c-42e0ad 1382 42e0b8-42e0dd AllocateAndInitializeSid 1381->1382 1383 42e0af-42e0b3 1381->1383 1384 42e287-42e28f 1382->1384 1385 42e0e3-42e100 GetVersion 1382->1385 1383->1384 1386 42e102-42e117 GetModuleHandleA GetProcAddress 1385->1386 1387 42e119-42e11b 1385->1387 1386->1387 1388 42e142-42e15c GetCurrentThread OpenThreadToken 1387->1388 1389 42e11d-42e12b CheckTokenMembership 1387->1389 1392 42e193-42e1bb GetTokenInformation 1388->1392 1393 42e15e-42e168 GetLastError 1388->1393 1390 42e131-42e13d 1389->1390 1391 42e269-42e27f FreeSid 1389->1391 1390->1391 1394 42e1d6-42e1fa call 402648 GetTokenInformation 1392->1394 1395 42e1bd-42e1c5 GetLastError 1392->1395 1396 42e174-42e187 GetCurrentProcess OpenProcessToken 1393->1396 1397 42e16a-42e16f call 4031bc 1393->1397 1408 42e208-42e210 1394->1408 1409 42e1fc-42e206 call 4031bc * 2 1394->1409 1395->1394 1399 42e1c7-42e1d1 call 4031bc * 2 1395->1399 1396->1392 1398 42e189-42e18e call 4031bc 1396->1398 1397->1384 1398->1384 1399->1384 1410 42e212-42e213 1408->1410 1411 42e243-42e261 call 402660 CloseHandle 1408->1411 1409->1384 1414 42e215-42e228 EqualSid 1410->1414 1419 42e22a-42e237 1414->1419 1420 42e23f-42e241 1414->1420 1419->1420 1423 42e239-42e23d 1419->1423 1420->1411 1420->1414 1423->1411
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
                        • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
                        • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
                        • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
                        • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                        • String ID: CheckTokenMembership$advapi32.dll
                        • API String ID: 2252812187-1888249752
                        • Opcode ID: ddfde2249367763e4ec650b3d771d1987385f17006922e03e7cb49a40b8ec1f8
                        • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
                        • Opcode Fuzzy Hash: ddfde2249367763e4ec650b3d771d1987385f17006922e03e7cb49a40b8ec1f8
                        • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1553 4502c0-4502cd 1554 4502d3-4502e0 GetVersion 1553->1554 1555 45037c-450386 1553->1555 1554->1555 1556 4502e6-4502fc LoadLibraryA 1554->1556 1556->1555 1557 4502fe-450377 GetProcAddress * 6 1556->1557 1557->1555
                        APIs
                        • GetVersion.KERNEL32(00480B52), ref: 004502D3
                        • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480B52), ref: 004502EB
                        • GetProcAddress.KERNEL32(00000000,RmStartSession), ref: 00450309
                        • GetProcAddress.KERNEL32(00000000,RmRegisterResources), ref: 0045031E
                        • GetProcAddress.KERNEL32(00000000,RmGetList), ref: 00450333
                        • GetProcAddress.KERNEL32(00000000,RmShutdown), ref: 00450348
                        • GetProcAddress.KERNEL32(00000000,RmRestart), ref: 0045035D
                        • GetProcAddress.KERNEL32(00000000,RmEndSession), ref: 00450372
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoadVersion
                        • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                        • API String ID: 1968650500-3419246398
                        • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                        • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
                        • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                        • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1701 423c0c-423c40 1702 423c42-423c43 1701->1702 1703 423c74-423c8b call 423b68 1701->1703 1704 423c45-423c61 call 40b24c 1702->1704 1709 423cec-423cf1 1703->1709 1710 423c8d 1703->1710 1730 423c63-423c6b 1704->1730 1731 423c70-423c72 1704->1731 1711 423cf3 1709->1711 1712 423d27-423d2c 1709->1712 1713 423c93-423c96 1710->1713 1714 423d50-423d60 1710->1714 1720 423fb1-423fb9 1711->1720 1721 423cf9-423d01 1711->1721 1715 423d32-423d35 1712->1715 1716 42409a-4240a8 IsIconic 1712->1716 1722 423cc5-423cc8 1713->1722 1723 423c98 1713->1723 1718 423d62-423d67 1714->1718 1719 423d6b-423d73 call 424194 1714->1719 1724 4240d6-4240eb call 424850 1715->1724 1725 423d3b-423d3c 1715->1725 1726 424152-42415a 1716->1726 1735 4240ae-4240b9 GetFocus 1716->1735 1732 423d78-423d80 call 4241dc 1718->1732 1733 423d69-423d8c call 423b84 1718->1733 1719->1726 1720->1726 1727 423fbf-423fca call 4181e0 1720->1727 1736 423f13-423f3a SendMessageA 1721->1736 1737 423d07-423d0c 1721->1737 1728 423da9-423db0 1722->1728 1729 423cce-423ccf 1722->1729 1738 423df6-423e06 call 423b84 1723->1738 1739 423c9e-423ca1 1723->1739 1724->1726 1749 423d42-423d45 1725->1749 1750 4240ed-4240f4 1725->1750 1747 424171-424177 1726->1747 1727->1726 1782 423fd0-423fdf call 4181e0 IsWindowEnabled 1727->1782 1728->1726 1742 423db6-423dbd 1728->1742 1743 423cd5-423cd8 1729->1743 1744 423f3f-423f46 1729->1744 1730->1747 1731->1703 1731->1704 1732->1726 1733->1726 1735->1726 1754 4240bf-4240c8 call 41eff4 1735->1754 1736->1726 1745 423d12-423d13 1737->1745 1746 42404a-424055 1737->1746 1738->1726 1755 423ca7-423caa 1739->1755 1756 423e1e-423e34 PostMessageA call 423b84 1739->1756 1742->1726 1763 423dc3-423dc9 1742->1763 1764 423cde-423ce1 1743->1764 1765 423e3f-423e5f call 423b84 1743->1765 1744->1726 1772 423f4c-423f51 call 404e54 1744->1772 1766 424072-42407d 1745->1766 1767 423d19-423d1c 1745->1767 1746->1726 1769 42405b-42406d 1746->1769 1770 424120-424127 1749->1770 1771 423d4b 1749->1771 1760 4240f6-424109 call 4244d4 1750->1760 1761 42410b-42411e call 42452c 1750->1761 1754->1726 1813 4240ce-4240d4 SetFocus 1754->1813 1757 423cb0-423cb3 1755->1757 1758 423ea5-423eac 1755->1758 1793 423e39-423e3a 1756->1793 1777 423cb9-423cba 1757->1777 1778 423dce-423ddc IsIconic 1757->1778 1779 423eae-423ec1 call 423b14 1758->1779 1780 423edf-423ef0 call 423b84 1758->1780 1760->1726 1761->1726 1763->1726 1783 423ce7 1764->1783 1784 423e0b-423e19 call 424178 1764->1784 1824 423e83-423ea0 call 423a84 PostMessageA 1765->1824 1825 423e61-423e7e call 423b14 PostMessageA 1765->1825 1766->1726 1791 424083-424095 1766->1791 1788 423d22 1767->1788 1789 423f56-423f5e 1767->1789 1769->1726 1786 42413a-424149 1770->1786 1787 424129-424138 1770->1787 1790 42414b-42414c call 423b84 1771->1790 1772->1726 1797 423cc0 1777->1797 1798 423d91-423d99 1777->1798 1804 423dea-423df1 call 423b84 1778->1804 1805 423dde-423de5 call 423bc0 1778->1805 1828 423ed3-423eda call 423b84 1779->1828 1829 423ec3-423ecd call 41ef58 1779->1829 1833 423ef2-423ef8 call 41eea4 1780->1833 1834 423f06-423f0e call 423a84 1780->1834 1782->1726 1830 423fe5-423ff4 call 4181e0 IsWindowVisible 1782->1830 1783->1790 1784->1726 1786->1726 1787->1726 1788->1790 1789->1726 1811 423f64-423f6b 1789->1811 1820 424151 1790->1820 1791->1726 1793->1726 1797->1790 1798->1726 1814 423d9f-423da4 call 422c4c 1798->1814 1804->1726 1805->1726 1811->1726 1823 423f71-423f80 call 4181e0 IsWindowEnabled 1811->1823 1813->1726 1814->1726 1820->1726 1823->1726 1851 423f86-423f9c call 412310 1823->1851 1824->1726 1825->1726 1828->1726 1829->1828 1830->1726 1853 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 1830->1853 1849 423efd-423f00 1833->1849 1834->1726 1849->1834 1851->1726 1856 423fa2-423fac 1851->1856 1853->1726 1856->1726
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a8f88a0fad56de9c729f2995427ba7f602706c1c2dd85511d5f0d29e6fe2ee61
                        • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
                        • Opcode Fuzzy Hash: a8f88a0fad56de9c729f2995427ba7f602706c1c2dd85511d5f0d29e6fe2ee61
                        • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2026 42285c-42286d 2027 422891-4228b0 2026->2027 2028 42286f-422879 2026->2028 2029 422ba6-422bbd 2027->2029 2030 4228b6-4228c0 2027->2030 2028->2027 2031 42287b-42288c call 408cbc call 40311c 2028->2031 2032 422aa1-422ae7 call 402c00 2030->2032 2033 4228c6-42290b call 402c00 2030->2033 2031->2027 2043 422af3-422afd 2032->2043 2044 422ae9-422aee call 421e2c 2032->2044 2045 422911-42291b 2033->2045 2046 4229af-4229c3 2033->2046 2048 422aff-422b07 call 4166b0 2043->2048 2049 422b0c-422b16 2043->2049 2044->2043 2050 422957-42296b call 4231a8 2045->2050 2051 42291d-422934 call 4146bc 2045->2051 2052 4229c9-4229d3 2046->2052 2053 422a7c-422a9c call 4181e0 ShowWindow 2046->2053 2048->2029 2057 422b37-422b4a call 4181e0 GetActiveWindow 2049->2057 2058 422b18-422b35 call 4181e0 SetWindowPos 2049->2058 2071 422970-422984 call 4231a0 2050->2071 2072 42296d 2050->2072 2074 422936 2051->2074 2075 422939-422950 call 414700 2051->2075 2060 4229d5-422a09 call 4181e0 SendMessageA call 4181e0 ShowWindow 2052->2060 2061 422a0b-422a55 call 4181e0 ShowWindow call 4181e0 CallWindowProcA call 414cc4 2052->2061 2053->2029 2082 422b4c-422b5c call 4181e0 IsIconic 2057->2082 2083 422b6d-422b6f 2057->2083 2058->2029 2092 422a5a-422a77 SendMessageA 2060->2092 2061->2092 2093 422986 2071->2093 2094 422989-42298b 2071->2094 2072->2071 2074->2075 2075->2094 2098 422952-422955 2075->2098 2082->2083 2099 422b5e-422b6b call 4181e0 call 41eff4 2082->2099 2088 422b71-422b94 call 4181e0 SetWindowPos SetActiveWindow 2083->2088 2089 422b96-422ba1 call 4181e0 ShowWindow 2083->2089 2088->2029 2089->2029 2092->2029 2093->2094 2100 42298f-422991 2094->2100 2101 42298d 2094->2101 2098->2094 2099->2083 2105 422993 2100->2105 2106 422995-4229aa 2100->2106 2101->2100 2105->2106 2106->2046
                        APIs
                        • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
                        • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MessageSendShowWindow
                        • String ID:
                        • API String ID: 1631623395-0
                        • Opcode ID: 3fc7cefd77d309d2013a8afda780c24615e088d2c333d8c3c434309d64232e3f
                        • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
                        • Opcode Fuzzy Hash: 3fc7cefd77d309d2013a8afda780c24615e088d2c333d8c3c434309d64232e3f
                        • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
                        APIs
                          • Part of subcall function 004958CC: GetWindowRect.USER32(00000000), ref: 004958E2
                        • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
                          • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
                          • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                          • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                          • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                          • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                          • Part of subcall function 00495B50: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495B5A
                          • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                          • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                          • Part of subcall function 0049581C: GetDC.USER32(00000000), ref: 0049583E
                          • Part of subcall function 0049581C: SelectObject.GDI32(?,00000000), ref: 00495864
                          • Part of subcall function 0049581C: ReleaseDC.USER32(00000000,?), ref: 004958B5
                          • Part of subcall function 00495B40: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495B4A
                        • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,00000000,?), ref: 004683FD
                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046840E
                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468426
                          • Part of subcall function 0042A05C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A072
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectReleaseSelectSendSystemUserWindow
                        • String ID: $(Default)$STOPIMAGE$%H
                        • API String ID: 3231140908-2624782221
                        • Opcode ID: 061c577f146de6d102eda1e26f425fafce425150d5b53e721a6d527fc500dab5
                        • Instruction ID: 1a3196d4b4984e68f3522cc8585b165e0004af585c118fa25862355e2bbb38c0
                        • Opcode Fuzzy Hash: 061c577f146de6d102eda1e26f425fafce425150d5b53e721a6d527fc500dab5
                        • Instruction Fuzzy Hash: 95F2C6346005248FCB00EF69D9D9F9973F1BF49304F1582BAE5049B36ADB74AC46CB9A
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
                        • GetDiskFreeSpaceExA.KERNELBASE(00000000,?,?,00000000,00000000,00455F29,?,00000000,kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E98
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressDiskFreeHandleModuleProcSpace
                        • String ID: GetDiskFreeSpaceExA$kernel32.dll
                        • API String ID: 1197914913-3712701948
                        • Opcode ID: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                        • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
                        • Opcode Fuzzy Hash: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                        • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
                        APIs
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 00474FE1
                        • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750BE
                        • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID: unins$unins???.*
                        • API String ID: 3541575487-1009660736
                        • Opcode ID: 77a1736b55a15cdfeb079fd35295a2b37346dc69cd938272e48e3e7d747c03bd
                        • Instruction ID: 191fa049ef1442540897bd6b232d6b1da598bf4afdbbee48782243349675ce5a
                        • Opcode Fuzzy Hash: 77a1736b55a15cdfeb079fd35295a2b37346dc69cd938272e48e3e7d747c03bd
                        • Instruction Fuzzy Hash: 95315074A00548ABCB10EB65CD81BDEB7A9DF45304F50C0B6E40CAB3A2DB789F418B59
                        APIs
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
                        • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileFindFirstLast
                        • String ID:
                        • API String ID: 873889042-0
                        • Opcode ID: 77a4f9a42a9b182eca9a30cb1eee9c943385d3d0e7805387745d9337962f8593
                        • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
                        • Opcode Fuzzy Hash: 77a4f9a42a9b182eca9a30cb1eee9c943385d3d0e7805387745d9337962f8593
                        • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
                        APIs
                        • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                        • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
                        • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                        • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
                        APIs
                        • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: NtdllProc_Window
                        • String ID:
                        • API String ID: 4255912815-0
                        • Opcode ID: 88ecfa13f3ee270e805d5ccef1650ee506ec8760b8390f8b6ad1d401d880426f
                        • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                        • Opcode Fuzzy Hash: 88ecfa13f3ee270e805d5ccef1650ee506ec8760b8390f8b6ad1d401d880426f
                        • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                        • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
                        • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                        • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 844 46f058-46f08a 845 46f0a7 844->845 846 46f08c-46f093 844->846 847 46f0ae-46f0e6 call 403634 call 403738 call 42dec0 845->847 848 46f095-46f09c 846->848 849 46f09e-46f0a5 846->849 856 46f101-46f12a call 403738 call 42dde4 847->856 857 46f0e8-46f0fc call 403738 call 42dec0 847->857 848->845 848->849 849->847 865 46f12c-46f135 call 46ed28 856->865 866 46f13a-46f163 call 46ee44 856->866 857->856 865->866 870 46f175-46f178 call 403400 866->870 871 46f165-46f173 call 403494 866->871 875 46f17d-46f1c8 call 46ee44 call 42c3fc call 46ee8c call 46ee44 870->875 871->875 884 46f1de-46f1ff call 45559c call 46ee44 875->884 885 46f1ca-46f1dd call 46eeb4 875->885 892 46f255-46f25c 884->892 893 46f201-46f254 call 46ee44 call 431404 call 46ee44 call 431404 call 46ee44 884->893 885->884 894 46f25e-46f296 call 431404 call 46ee44 call 431404 call 46ee44 892->894 895 46f29c-46f2a3 892->895 893->892 928 46f29b 894->928 897 46f2e4-46f309 call 40b24c call 46ee44 895->897 898 46f2a5-46f2e3 call 46ee44 * 3 895->898 919 46f30b-46f316 call 47c26c 897->919 920 46f318-46f321 call 403494 897->920 898->897 929 46f326-46f331 call 478e04 919->929 920->929 928->895 934 46f333-46f338 929->934 935 46f33a 929->935 936 46f33f-46f509 call 403778 call 46ee44 call 47c26c call 46ee8c call 403494 call 40357c * 2 call 46ee44 call 403494 call 40357c * 2 call 46ee44 call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c 934->936 935->936 999 46f51f-46f52d call 46eeb4 936->999 1000 46f50b-46f51d call 46ee44 936->1000 1004 46f532 999->1004 1005 46f533-46f57c call 46eeb4 call 46eee8 call 46ee44 call 47c26c call 46ef4c 1000->1005 1004->1005 1016 46f5a2-46f5af 1005->1016 1017 46f57e-46f59c call 46eeb4 * 2 1005->1017 1019 46f5b5-46f5bc 1016->1019 1020 46f67e-46f685 1016->1020 1032 46f5a1 1017->1032 1024 46f5be-46f5c5 1019->1024 1025 46f629-46f638 1019->1025 1021 46f687-46f6bd call 494cec 1020->1021 1022 46f6df-46f6f5 RegCloseKey 1020->1022 1021->1022 1024->1025 1026 46f5c7-46f5eb call 430bcc 1024->1026 1029 46f63b-46f648 1025->1029 1026->1029 1038 46f5ed-46f5ee 1026->1038 1033 46f65f-46f678 call 430c08 call 46eeb4 1029->1033 1034 46f64a-46f657 1029->1034 1032->1016 1043 46f67d 1033->1043 1034->1033 1035 46f659-46f65d 1034->1035 1035->1020 1035->1033 1040 46f5f0-46f616 call 40b24c call 479630 1038->1040 1047 46f623-46f625 1040->1047 1048 46f618-46f61e call 430bcc 1040->1048 1043->1020 1047->1040 1050 46f627 1047->1050 1048->1047 1050->1029
                        APIs
                          • Part of subcall function 0046EE44: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                          • Part of subcall function 0046EEB4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                        • RegCloseKey.ADVAPI32(?,0046F6FD,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F748,?,?,0049C1E0,00000000), ref: 0046F6F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Value$Close
                        • String ID: " /SILENT$5.5.3 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                        • API String ID: 3391052094-3342197833
                        • Opcode ID: 20177b5e09bda3d39b0f5a3b3099d0b20d53ab700288e26487c926a63f738ffb
                        • Instruction ID: 0d1426ff9ce9a688a4d167ea33859b9e50b28094dc6fe7db73e07d6bdcf854ec
                        • Opcode Fuzzy Hash: 20177b5e09bda3d39b0f5a3b3099d0b20d53ab700288e26487c926a63f738ffb
                        • Instruction Fuzzy Hash: D1125935A001089BDB04EF95E881ADE73F5EB48304F24817BE8506B366EB79AD45CF5E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1424 456638-45666a call 403728 1427 456685 1424->1427 1428 45666c-456683 7715E550 1424->1428 1429 45668a-45668c 1427->1429 1428->1429 1430 45668e-4566ab 7715E550 1429->1430 1431 4566b9-4566fd call 403738 * 2 1429->1431 1430->1431 1432 4566ad-4566b4 call 4534b0 1430->1432 1440 4566ff-456705 call 45645c 1431->1440 1441 45670a-45670e 1431->1441 1432->1431 1440->1441 1443 456710-456717 1441->1443 1444 45674e-45675d 1441->1444 1445 456719-456733 call 47c26c call 42db10 1443->1445 1446 456738-456749 call 403738 1443->1446 1451 456770-456775 1444->1451 1452 45675f-45676b call 403738 1444->1452 1445->1446 1446->1444 1455 456785-45678c call 45643c 1451->1455 1456 456777-456780 1451->1456 1452->1451 1461 456792-45679a 1455->1461 1462 4568ed-456900 1455->1462 1456->1455 1463 4567a6-4567b9 1461->1463 1464 45679c-4567a0 1461->1464 1467 456902-456909 call 4534b0 1462->1467 1468 45690e-456912 1462->1468 1472 4567c7-4567cb 1463->1472 1473 4567bb-4567c2 call 4534b0 1463->1473 1464->1462 1464->1463 1467->1468 1470 456914-45691b call 45641c 1468->1470 1471 456937-45693f call 403ca4 1468->1471 1470->1471 1483 45691d-456935 call 42c4f8 call 403ca4 1470->1483 1487 456942-456946 1471->1487 1476 4567cd-4567ed 1472->1476 1477 4567fb-4567fd 1472->1477 1473->1472 1476->1477 1491 4567ef-4567f6 call 4534b0 1476->1491 1481 4567ff-456813 call 403ca4 1477->1481 1482 456868-45686c 1477->1482 1494 456815 call 408c00 1481->1494 1495 45681a-45683c 1481->1495 1485 4568d4-4568df 1482->1485 1486 45686e-45688e 1482->1486 1483->1487 1485->1462 1504 4568e1-4568e8 call 4534b0 1485->1504 1505 456890-456897 call 4534b0 1486->1505 1506 45689c-4568a3 call 45644c 1486->1506 1492 45694d-456957 1487->1492 1493 456948 call 408c00 1487->1493 1491->1477 1502 45695c-45695e 1492->1502 1493->1492 1494->1495 1517 45683e-456845 call 4534b0 1495->1517 1518 45684a-456860 SysFreeString 1495->1518 1508 456960-456967 call 4534b0 1502->1508 1509 45696c-45698b call 456550 1502->1509 1504->1462 1505->1506 1506->1485 1519 4568a5-4568c6 1506->1519 1508->1509 1522 456996-45699a 1509->1522 1523 45698d-456991 SysFreeString 1509->1523 1517->1518 1519->1485 1527 4568c8-4568cf call 4534b0 1519->1527 1525 4569a5-4569a9 1522->1525 1526 45699c-4569a0 1522->1526 1523->1522 1528 4569b4-4569bd 1525->1528 1529 4569ab-4569af 1525->1529 1526->1525 1527->1485 1529->1528
                        APIs
                        • 7715E550.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
                        • 7715E550.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
                        • SysFreeString.OLEAUT32(00000000), ref: 0045685B
                        Strings
                        • %ProgramFiles(x86)%\, xrefs: 0045672E
                        • IPersistFile::Save, xrefs: 00456962
                        • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
                        • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
                        • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
                        • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
                        • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
                        • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
                        • {pf32}\, xrefs: 0045671E
                        • CoCreateInstance, xrefs: 004566AF
                        • IPropertyStore::Commit, xrefs: 004568E3
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: 7715E550$FreeString
                        • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                        • API String ID: 3367576848-2363233914
                        • Opcode ID: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                        • Instruction ID: 2d3acbfbfe5134b3b68b6dcde43dfe431d970b0eaffbfac770a5f5266a6492d0
                        • Opcode Fuzzy Hash: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                        • Instruction Fuzzy Hash: 39B13170A00104AFDB50DFA9C845B9E7BF8AF09706F5540AAF804E7362DB78DD48CB69

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1532 483a7c-483aa1 GetModuleHandleA GetProcAddress 1533 483b08-483b0d GetSystemInfo 1532->1533 1534 483aa3-483ab9 GetNativeSystemInfo GetProcAddress 1532->1534 1535 483b12-483b1b 1533->1535 1534->1535 1536 483abb-483ac6 GetCurrentProcess 1534->1536 1537 483b2b-483b32 1535->1537 1538 483b1d-483b21 1535->1538 1536->1535 1545 483ac8-483acc 1536->1545 1541 483b4d-483b52 1537->1541 1539 483b23-483b27 1538->1539 1540 483b34-483b3b 1538->1540 1543 483b29-483b46 1539->1543 1544 483b3d-483b44 1539->1544 1540->1541 1543->1541 1544->1541 1545->1535 1546 483ace-483ad5 call 45271c 1545->1546 1546->1535 1550 483ad7-483ae4 GetProcAddress 1546->1550 1550->1535 1551 483ae6-483afd GetModuleHandleA GetProcAddress 1550->1551 1551->1535 1552 483aff-483b06 1551->1552 1552->1535
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                        • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                        • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                        • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483B0D
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                        • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                        • API String ID: 2230631259-2623177817
                        • Opcode ID: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                        • Instruction ID: d1db678d6bd555fecb25ccca0b477ef677e73c145b16f55f8d8b06b946339d0c
                        • Opcode Fuzzy Hash: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                        • Instruction Fuzzy Hash: 7F1181C0204741A4DA00BFB94D45B6F65889B11F2AF040C7B6840AA287EABCEF44A76E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1558 468d88-468dc0 call 47c26c 1561 468dc6-468dd6 call 478e24 1558->1561 1562 468fa2-468fbc call 403420 1558->1562 1567 468ddb-468e20 call 4078f4 call 403738 call 42de1c 1561->1567 1573 468e25-468e27 1567->1573 1574 468e2d-468e42 1573->1574 1575 468f98-468f9c 1573->1575 1576 468e57-468e5e 1574->1576 1577 468e44-468e52 call 42dd4c 1574->1577 1575->1562 1575->1567 1579 468e60-468e82 call 42dd4c call 42dd64 1576->1579 1580 468e8b-468e92 1576->1580 1577->1576 1579->1580 1598 468e84 1579->1598 1582 468e94-468eb9 call 42dd4c * 2 1580->1582 1583 468eeb-468ef2 1580->1583 1602 468ebb-468ec4 call 4314f8 1582->1602 1603 468ec9-468edb call 42dd4c 1582->1603 1585 468ef4-468f06 call 42dd4c 1583->1585 1586 468f38-468f3f 1583->1586 1599 468f16-468f28 call 42dd4c 1585->1599 1600 468f08-468f11 call 4314f8 1585->1600 1588 468f41-468f75 call 42dd4c * 3 1586->1588 1589 468f7a-468f90 RegCloseKey 1586->1589 1588->1589 1598->1580 1599->1586 1611 468f2a-468f33 call 4314f8 1599->1611 1600->1599 1602->1603 1603->1583 1615 468edd-468ee6 call 4314f8 1603->1615 1611->1586 1615->1583
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(?,00468FA2,?,?,00000001,00000000,00000000,00468FBD,?,00000000,00000000,?), ref: 00468F8B
                        Strings
                        • Inno Setup: User Info: Organization, xrefs: 00468F5A
                        • Inno Setup: Setup Type, xrefs: 00468E9A
                        • Inno Setup: Selected Components, xrefs: 00468EAA
                        • Inno Setup: App Path, xrefs: 00468E4A
                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468DE7
                        • %s\%s_is1, xrefs: 00468E05
                        • Inno Setup: User Info: Name, xrefs: 00468F47
                        • Inno Setup: User Info: Serial, xrefs: 00468F6D
                        • Inno Setup: Icon Group, xrefs: 00468E66
                        • Inno Setup: Selected Tasks, xrefs: 00468EF7
                        • Inno Setup: Deselected Tasks, xrefs: 00468F19
                        • Inno Setup: Deselected Components, xrefs: 00468ECC
                        • Inno Setup: No Icons, xrefs: 00468E73
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                        • API String ID: 47109696-1093091907
                        • Opcode ID: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                        • Instruction ID: 069c4cdb4b1287edb5c1b702bebeb6c44c7684ad2aa17a57d1fdfe9a2539746b
                        • Opcode Fuzzy Hash: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                        • Instruction Fuzzy Hash: 6B51A330A006449BCB15DB65D881BDEB7F5EB48304F50857EE840AB391EB79AF01CB59

                        Control-flow Graph

                        APIs
                          • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5), ref: 0042D8AB
                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                          • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                          • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                        • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047C942), ref: 0047C846
                        • 771883B0.OLE32(?,0047C88B), ref: 0047C87E
                          • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Directory$771883AddressEnvironmentFolderHandleKnownModulePathProcSystemVariableWindows
                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                        • API String ID: 3587502637-544719455
                        • Opcode ID: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                        • Instruction ID: 88e29a10730232d74bbdb0c5b7d00c3ea12cf2700f44d19641833b453bfd909d
                        • Opcode Fuzzy Hash: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                        • Instruction Fuzzy Hash: 1461CF74A00204AFDB10EBA5D8C2A9E7B69EB44319F90C47FE404A7392DB3C9A44CF5D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1860 472b48-472c44 call 403728 call 403778 call 403684 call 47c26c call 403494 * 2 call 40357c call 42c804 call 403494 call 40357c call 42c804 call 403494 call 40357c call 42c804 * 2 1891 472c46-472c49 1860->1891 1892 472c4b-472c4f 1860->1892 1893 472c54-472c58 1891->1893 1892->1893 1894 472c51 1892->1894 1895 472c6b-472c79 call 472818 1893->1895 1896 472c5a-472c65 call 478e04 1893->1896 1894->1893 1902 472c7b-472c86 call 403494 1895->1902 1903 472c88-472c8e call 403494 1895->1903 1896->1895 1901 472c67 1896->1901 1901->1895 1907 472c93-472cef call 457f1c call 46e220 call 42c8a4 call 46fadc call 406f50 * 2 call 42cd24 1902->1907 1903->1907 1922 472d05-472d19 call 406f50 call 4729f8 1907->1922 1923 472cf1-472d00 call 403738 WritePrivateProfileStringA 1907->1923 1930 472d1f-472d51 call 456638 1922->1930 1931 472dcc-472de7 call 4728b4 call 403494 1922->1931 1923->1922 1934 472d56-472d5a 1930->1934 1943 472deb-472df6 1931->1943 1936 472d5c-472d66 call 42cd48 1934->1936 1937 472d68-472d6a 1934->1937 1936->1937 1945 472d6c 1936->1945 1941 472d6e-472d75 1937->1941 1941->1943 1944 472d77-472d7b 1941->1944 1946 472e0e-472e1d call 403738 SHChangeNotify 1943->1946 1947 472df8-472e0c call 403738 SHChangeNotify 1943->1947 1944->1943 1948 472d7d-472d97 call 42c8fc call 406ac4 1944->1948 1945->1941 1955 472e22-472e4b call 42c8a4 call 403738 SHChangeNotify 1946->1955 1947->1955 1948->1943 1959 472d99-472dbe call 4554a8 1948->1959 1965 472e51-472e55 1955->1965 1966 472f4f-472f83 call 46e4c4 call 403400 call 403420 call 403400 1955->1966 1959->1943 1967 472e5b-472ee8 call 45a204 call 42c3fc call 40357c call 45a204 call 42c3fc call 40357c call 45a204 1965->1967 1968 472eea-472eee 1965->1968 1967->1966 1970 472f11-472f4a call 45a204 * 2 1968->1970 1971 472ef0-472f0f call 45a204 1968->1971 1970->1966 1971->1966
                        APIs
                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472D00
                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472E07
                        • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472E1D
                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472E42
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                        • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                        • API String ID: 971782779-3668018701
                        • Opcode ID: 7a5ae740bf12d7c0914506075995ef9616c65b722964304fe64b2cd854615d78
                        • Instruction ID: 7edda302242157afef40b0e7c7e05039b068dedd9e36cd510e855ba872eb221a
                        • Opcode Fuzzy Hash: 7a5ae740bf12d7c0914506075995ef9616c65b722964304fe64b2cd854615d78
                        • Instruction Fuzzy Hash: D0D14574A001489FDB11EFA9D981BDDBBF4AF08304F50816AF904B7392C778AE45CB69

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1998 423874-42387e 1999 4239a7-4239ab 1998->1999 2000 423884-4238a6 call 41f3c4 GetClassInfoA 1998->2000 2003 4238d7-4238e0 GetSystemMetrics 2000->2003 2004 4238a8-4238bf RegisterClassA 2000->2004 2005 4238e2 2003->2005 2006 4238e5-4238ef GetSystemMetrics 2003->2006 2004->2003 2007 4238c1-4238d2 call 408cbc call 40311c 2004->2007 2005->2006 2009 4238f1 2006->2009 2010 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 2006->2010 2007->2003 2009->2010 2021 423952-423965 call 424178 SendMessageA 2010->2021 2022 42396a-423998 GetSystemMenu DeleteMenu * 2 2010->2022 2021->2022 2022->1999 2024 42399a-4239a2 DeleteMenu 2022->2024 2024->1999
                        APIs
                          • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                        • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
                        • RegisterClassA.USER32(00499630), ref: 004238B7
                        • GetSystemMetrics.USER32(00000000), ref: 004238D9
                        • GetSystemMetrics.USER32(00000001), ref: 004238E8
                        • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
                        • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
                        • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
                        • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
                        • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                        • String ID: |6B
                        • API String ID: 183575631-3009739247
                        • Opcode ID: 4cae07da4ecbd82a5ef2c5022e230c145e19d211ee6ce0cd027d67cd6f27acc7
                        • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
                        • Opcode Fuzzy Hash: 4cae07da4ecbd82a5ef2c5022e230c145e19d211ee6ce0cd027d67cd6f27acc7
                        • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2110 47ce78-47cece call 42c3fc call 4035c0 call 47cb3c call 4525d8 2119 47ced0-47ced5 call 453344 2110->2119 2120 47ceda-47cee9 call 4525d8 2110->2120 2119->2120 2124 47cf03-47cf09 2120->2124 2125 47ceeb-47cef1 2120->2125 2128 47cf20-47cf48 call 42e394 * 2 2124->2128 2129 47cf0b-47cf11 2124->2129 2126 47cf13-47cf1b call 403494 2125->2126 2127 47cef3-47cef9 2125->2127 2126->2128 2127->2124 2132 47cefb-47cf01 2127->2132 2136 47cf6f-47cf89 GetProcAddress 2128->2136 2137 47cf4a-47cf6a call 4078f4 call 453344 2128->2137 2129->2126 2129->2128 2132->2124 2132->2126 2139 47cf95-47cfb2 call 403400 * 2 2136->2139 2140 47cf8b-47cf90 call 453344 2136->2140 2137->2136 2140->2139
                        APIs
                        • GetProcAddress.KERNEL32(00000000,SHGetFolderPathA), ref: 0047CF7A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$]xI$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                        • API String ID: 190572456-256906917
                        • Opcode ID: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                        • Instruction ID: ec9c61b31d03a4d18d2fa5da2167344019e511a33ceb5cf80618cf604467b355
                        • Opcode Fuzzy Hash: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                        • Instruction Fuzzy Hash: 20311D30E001499BCB10EFA5D5D1ADEB7B5EF44308F50847BE504E7281D778AE458B6D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2259 40631c-406336 GetModuleHandleA GetProcAddress 2260 406338 2259->2260 2261 40633f-40634c GetProcAddress 2259->2261 2260->2261 2262 406355-406362 GetProcAddress 2261->2262 2263 40634e 2261->2263 2264 406364-406366 SetProcessDEPPolicy 2262->2264 2265 406368-406369 2262->2265 2263->2262 2264->2265
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                        • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                        • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                        • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModulePolicyProcess
                        • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                        • API String ID: 3256987805-3653653586
                        • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                        • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                        • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                        • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                        APIs
                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                        • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                        • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                        • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                        • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: LongWindow$Prop
                        • String ID: 3A$yA
                        • API String ID: 3887896539-3278460822
                        • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                        • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
                        • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                        • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A
                        APIs
                        • FreeLibrary.KERNEL32(00000000), ref: 00481A11
                        • FreeLibrary.KERNEL32(00000000), ref: 00481A25
                        • SendNotifyMessageA.USER32(000203F2,00000496,00002710,00000000), ref: 00481A97
                        Strings
                        • GetCustomSetupExitCode, xrefs: 004818B1
                        • Deinitializing Setup., xrefs: 00481872
                        • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481A46
                        • DeinitializeSetup, xrefs: 0048190D
                        • Restarting Windows., xrefs: 00481A72
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FreeLibrary$MessageNotifySend
                        • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                        • API String ID: 3817813901-1884538726
                        • Opcode ID: 050724d5784164bcc6f320fb88d14c1ed674207e07551f10b43b093d89fd870c
                        • Instruction ID: b122ee3e0244d1cffd13458a0655c780be2d4a3cdc4850abd58d30bc7702deed
                        • Opcode Fuzzy Hash: 050724d5784164bcc6f320fb88d14c1ed674207e07551f10b43b093d89fd870c
                        • Instruction Fuzzy Hash: C651BF347042409FD715EB69E9A5B6E7BE8EB19314F10887BE800C72B2DB389C46CB5D
                        APIs
                        • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                          • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
                          • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
                        • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                        • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
                        • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                        • String ID: c:\directory$shell32.dll$%H
                        • API String ID: 3376378930-166502273
                        • Opcode ID: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                        • Instruction ID: 732e1a1751fb8a235258c93266195bfa595ebd68417bad8a6af0601d960a2915
                        • Opcode Fuzzy Hash: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                        • Instruction Fuzzy Hash: 8A516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D6789E81DA59
                        APIs
                        • GetActiveWindow.USER32 ref: 0042F58F
                        • GetFocus.USER32 ref: 0042F597
                        • RegisterClassA.USER32(004997AC), ref: 0042F5B8
                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
                        • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
                        • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
                        • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$CreateFocus$ActiveClassRegisterShow
                        • String ID: TWindowDisabler-Window
                        • API String ID: 3167913817-1824977358
                        • Opcode ID: 6457ecc35c2f1d364d6e716b0d71ec85e57c583cde0b886464f42e17a697c21b
                        • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
                        • Opcode Fuzzy Hash: 6457ecc35c2f1d364d6e716b0d71ec85e57c583cde0b886464f42e17a697c21b
                        • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15,?,?,00000000,00472F84), ref: 00472A1C
                          • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15), ref: 00472A93
                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000), ref: 00472A99
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                        • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                        • API String ID: 884541143-1710247218
                        • Opcode ID: d8d5a0be0440fc7cb79ca7a1d8c05833802e09f0bac54326b854a3cb5eabaf25
                        • Instruction ID: 1765d5ebfc4e6887f49e3816ac39c9d5a3c16910e93b0aec031ce55b1572895b
                        • Opcode Fuzzy Hash: d8d5a0be0440fc7cb79ca7a1d8c05833802e09f0bac54326b854a3cb5eabaf25
                        • Instruction Fuzzy Hash: 6711B2707005147BD721EAAA8D82B9F73ACDB49714F61C17BB404B72C2DBBCAE01861C
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                        • API String ID: 1646373207-2130885113
                        • Opcode ID: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                        • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
                        • Opcode Fuzzy Hash: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                        • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
                        APIs
                        • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
                        • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
                        • GetCurrentThreadId.KERNEL32 ref: 00430971
                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                        • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                        • API String ID: 4130936913-2943970505
                        • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                        • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
                        • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                        • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
                        APIs
                        • GetCapture.USER32 ref: 00422EA4
                        • GetCapture.USER32 ref: 00422EB3
                        • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
                        • ReleaseCapture.USER32 ref: 00422EBE
                        • GetActiveWindow.USER32 ref: 00422ECD
                        • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
                        • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
                        • GetActiveWindow.USER32 ref: 00422FBF
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CaptureMessageSend$ActiveWindow$Release
                        • String ID:
                        • API String ID: 862346643-0
                        • Opcode ID: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                        • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
                        • Opcode Fuzzy Hash: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                        • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
                        APIs
                        • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476CA9
                        • SetWindowLongW.USER32(00000000,000000FC,00476C04), ref: 00476CD0
                        • GetACP.KERNEL32(00000000,00476EE8,?,00000000,00476F12), ref: 00476D0D
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476D53
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ClassInfoLongMessageSendWindow
                        • String ID: COMBOBOX$Inno Setup: Language
                        • API String ID: 3391662889-4234151509
                        • Opcode ID: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                        • Instruction ID: b13fa11fcbd9abdf7db93726dac51e4442bd67f198c8610d2c1064f44be53319
                        • Opcode Fuzzy Hash: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                        • Instruction Fuzzy Hash: 46812C346006059FDB10DF69D985AEAB7F2FB09304F15C1BAE808EB762D778AD41CB58
                        APIs
                        • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
                          • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                          • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                          • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                          • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                        • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                        • API String ID: 854858120-615399546
                        • Opcode ID: 33a21594b2f272348ca173e1bf8fbb29317a3fdaed0398a7107b4f02c3bab763
                        • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
                        • Opcode Fuzzy Hash: 33a21594b2f272348ca173e1bf8fbb29317a3fdaed0398a7107b4f02c3bab763
                        • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
                        APIs
                        • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                        • OemToCharA.USER32(?,?), ref: 0042375C
                        • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Char$FileIconLoadLowerModuleName
                        • String ID: 2$MAINICON
                        • API String ID: 3935243913-3181700818
                        • Opcode ID: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
                        • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
                        • Opcode Fuzzy Hash: cdc8d4d12959e52a4e35ddab44250c7989461c9b781fe211d3ab07d5faa44346
                        • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
                        APIs
                        • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
                        • GetCurrentThreadId.KERNEL32 ref: 00418F79
                        • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
                          • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
                          • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                          • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                          • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
                          • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                          • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                          • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
                          • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                          • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                          • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                          • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                          • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                          • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                        • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                        • API String ID: 316262546-2767913252
                        • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                        • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
                        • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                        • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
                        APIs
                        • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                        • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                        • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                        • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                        • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                        • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: LongWindow$Prop
                        • String ID:
                        • API String ID: 3887896539-0
                        • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                        • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
                        • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                        • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
                        APIs
                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                        • LocalFree.KERNEL32(00000000,00000000,00401B68), ref: 00401ACF
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401AEE
                        • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401B2D
                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                        • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                        • String ID:
                        • API String ID: 3782394904-0
                        • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                        • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                        • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                        • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
                        Strings
                        • PendingFileRenameOperations, xrefs: 00455754
                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
                        • PendingFileRenameOperations2, xrefs: 00455784
                        • WININIT.INI, xrefs: 004557E4
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                        • API String ID: 47109696-2199428270
                        • Opcode ID: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                        • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
                        • Opcode Fuzzy Hash: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                        • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
                        APIs
                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC27
                        • GetLastError.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC30
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                        • API String ID: 1375471231-2952887711
                        • Opcode ID: 15246a7260a354d37efc87005b8c751c01ee3b74e4206f1c0260e9ccc9d04e3e
                        • Instruction ID: e6577b7b61f0e0a35e690824fc442bae28cfcbc8f9cba78cd8161ab2dbd6b5d1
                        • Opcode Fuzzy Hash: 15246a7260a354d37efc87005b8c751c01ee3b74e4206f1c0260e9ccc9d04e3e
                        • Instruction Fuzzy Hash: E6412834A001099BDB11EFA5D882ADEB7B5EF45309F50843BE81577392DA38AE05CF68
                        APIs
                        • EnumWindows.USER32(00423A1C), ref: 00423AA8
                        • GetWindow.USER32(?,00000003), ref: 00423ABD
                        • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                        • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$EnumLongWindows
                        • String ID: \AB
                        • API String ID: 4191631535-3948367934
                        • Opcode ID: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                        • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
                        • Opcode Fuzzy Hash: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                        • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
                        APIs
                        • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE50
                        • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000,0049785D), ref: 0042DE6B
                        • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressDeleteHandleModuleProc
                        • String ID: RegDeleteKeyExA$advapi32.dll
                        • API String ID: 588496660-1846899949
                        • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                        • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
                        • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                        • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
                        Strings
                        • PrepareToInstall failed: %s, xrefs: 0046BE6E
                        • Need to restart Windows? %s, xrefs: 0046BE95
                        • NextButtonClick, xrefs: 0046BC4C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                        • API String ID: 0-2329492092
                        • Opcode ID: 5d17874146d60b75ad460dbe0a65a057f1b706e416996ea922dce04c170435bc
                        • Instruction ID: 9de4db1b3e70fdebeced0fe060001c857bcfdee1b2562a0b259a97201065334e
                        • Opcode Fuzzy Hash: 5d17874146d60b75ad460dbe0a65a057f1b706e416996ea922dce04c170435bc
                        • Instruction Fuzzy Hash: 46D12F34A00108DFCB14EB99D985AED77F5EF49304F5440BAE404EB362D778AE85CB9A
                        APIs
                        • SetActiveWindow.USER32(?,?,00000000,004833D5), ref: 004831A8
                        • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00483246
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ActiveChangeNotifyWindow
                        • String ID: $Need to restart Windows? %s
                        • API String ID: 1160245247-4200181552
                        • Opcode ID: f3164b8d1c7f9ae2aabe4aebf04c2bbf0d3651d11bf05fff97eb65ef8f772e24
                        • Instruction ID: 855c298393525188f16043e43c8caa20abfdb27870bda8f6eb76b0fac02994d3
                        • Opcode Fuzzy Hash: f3164b8d1c7f9ae2aabe4aebf04c2bbf0d3651d11bf05fff97eb65ef8f772e24
                        • Instruction Fuzzy Hash: 7E918F34A042449FDB10EF69D8C6BAD77E0AF55708F5484BBE8009B362DB78AE05CB5D
                        APIs
                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                        • GetLastError.KERNEL32(00000000,0046FCD9,?,?,0049C1E0,00000000), ref: 0046FBB6
                        • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FC30
                        • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FC55
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ChangeNotify$ErrorFullLastNamePath
                        • String ID: Creating directory: %s
                        • API String ID: 2451617938-483064649
                        • Opcode ID: b081b5451f9253bf7df266bab53e6145b6a86aabad9903036a0d0a35cf4a9b86
                        • Instruction ID: a145aa70eb484b5d007d33f2831cd5d1f219efd535f83afbcf26a903565c5eea
                        • Opcode Fuzzy Hash: b081b5451f9253bf7df266bab53e6145b6a86aabad9903036a0d0a35cf4a9b86
                        • Instruction Fuzzy Hash: 7D512F74E00248ABDB01DBA5D982ADEBBF4AF49304F50847AEC50B7382D7795E08CB59
                        APIs
                        • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressByteCharMultiProcWide
                        • String ID: SfcIsFileProtected$sfc.dll
                        • API String ID: 2508298434-591603554
                        • Opcode ID: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                        • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
                        • Opcode Fuzzy Hash: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                        • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
                        APIs
                        • 751C1520.VERSION(00000000,?,?,?,00497900), ref: 00452530
                        • 751C1500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 0045255D
                        • 751C1540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 00452577
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: C1500C1520C1540
                        • String ID: %E
                        • API String ID: 1315064709-175436132
                        • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                        • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
                        • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                        • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
                        APIs
                        • GetDC.USER32(00000000), ref: 0044B401
                        • SelectObject.GDI32(?,00000000), ref: 0044B424
                        • ReleaseDC.USER32(00000000,?), ref: 0044B457
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ObjectReleaseSelect
                        • String ID: %H
                        • API String ID: 1831053106-1959103961
                        • Opcode ID: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                        • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
                        • Opcode Fuzzy Hash: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                        • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
                        APIs
                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                        • ExitProcess.KERNEL32 ref: 00404E0D
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExitMessageProcess
                        • String ID: Error$Runtime error at 00000000
                        • API String ID: 1220098344-2970929446
                        • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                        • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                        • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                        • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,%H,?,?), ref: 0044B11E
                        • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
                        • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DrawText$ByteCharMultiWide
                        • String ID: %H
                        • API String ID: 65125430-1959103961
                        • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                        • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
                        • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                        • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
                        APIs
                        • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                        • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                        • String ID: SHAutoComplete$shlwapi.dll
                        • API String ID: 395431579-1506664499
                        • Opcode ID: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                        • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
                        • Opcode Fuzzy Hash: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                        • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
                        Strings
                        • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
                        • PendingFileRenameOperations, xrefs: 00455A40
                        • PendingFileRenameOperations2, xrefs: 00455A4F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                        • API String ID: 47109696-2115312317
                        • Opcode ID: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                        • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
                        • Opcode Fuzzy Hash: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                        • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
                        APIs
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472301
                        • FindClose.KERNEL32(000000FF,0047232C,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 0047231F
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472423
                        • FindClose.KERNEL32(000000FF,0047244E,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 00472441
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$CloseFileNext
                        • String ID:
                        • API String ID: 2066263336-0
                        • Opcode ID: d369753856367b0287cffb73039cd8ab1db66acb1aaed6d6e6c358537efe0372
                        • Instruction ID: ff38abb04fb96460afd2c3532f2e87b2ffc4f25b99c166b2ff4046d92e8ebf4f
                        • Opcode Fuzzy Hash: d369753856367b0287cffb73039cd8ab1db66acb1aaed6d6e6c358537efe0372
                        • Instruction Fuzzy Hash: 3EC14C3490424D9FCF11DFA5C981ADEBBB8FF49304F5080AAE808B3251D7789A46CF58
                        APIs
                        • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?,00000000), ref: 0047FD9E
                        • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?), ref: 0047FDAB
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147), ref: 0047FEA0
                        • FindClose.KERNEL32(000000FF,0047FECB,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?), ref: 0047FEBE
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$CloseFileNext
                        • String ID:
                        • API String ID: 2066263336-0
                        • Opcode ID: f2453ac968e711b17f020bfe82841346ecffcf769e40057e5c798d9b2b4654c8
                        • Instruction ID: 5570db9595827249690d4c596f970be035a6cb65fb6c4bc3b070d2a6e7e06d26
                        • Opcode Fuzzy Hash: f2453ac968e711b17f020bfe82841346ecffcf769e40057e5c798d9b2b4654c8
                        • Instruction Fuzzy Hash: 34512D71A006499FCB21DF65CC45ADEB7B8EB88319F1084BAA818A7351D7389F89CF54
                        APIs
                        • GetMenu.USER32(00000000), ref: 00421361
                        • SetMenu.USER32(00000000,00000000), ref: 0042137E
                        • SetMenu.USER32(00000000,00000000), ref: 004213B3
                        • SetMenu.USER32(00000000,00000000), ref: 004213CF
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Menu
                        • String ID:
                        • API String ID: 3711407533-0
                        • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                        • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
                        • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                        • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
                        APIs
                        • SendMessageA.USER32(?,?,?,?), ref: 00416B84
                        • SetTextColor.GDI32(?,00000000), ref: 00416B9E
                        • SetBkColor.GDI32(?,00000000), ref: 00416BB8
                        • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Color$CallMessageProcSendTextWindow
                        • String ID:
                        • API String ID: 601730667-0
                        • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                        • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
                        • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                        • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
                        APIs
                        • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                        • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                        • String ID:
                        • API String ID: 4071923889-0
                        • Opcode ID: e6feda7d3358a80d2693463bb1cb51aaf78648cef31b4280cf5022ab190105ae
                        • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
                        • Opcode Fuzzy Hash: e6feda7d3358a80d2693463bb1cb51aaf78648cef31b4280cf5022ab190105ae
                        • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
                        APIs
                        • GetDC.USER32(00000000), ref: 0042311E
                        • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                        • ReleaseDC.USER32(00000000,00000000), ref: 00423144
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CapsDeviceEnumFontsRelease
                        • String ID:
                        • API String ID: 2698912916-0
                        • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                        • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
                        • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                        • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
                        APIs
                        • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                        • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                        • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                        • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                        • String ID:
                        • API String ID: 730355536-0
                        • Opcode ID: 46a689739c098c0829933ff4921327776432a14e69d4c62b65241a59cfc7f4a2
                        • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                        • Opcode Fuzzy Hash: 46a689739c098c0829933ff4921327776432a14e69d4c62b65241a59cfc7f4a2
                        • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$CountSleepTick
                        • String ID:
                        • API String ID: 2227064392-0
                        • Opcode ID: 81c97dbf5948de899416f6368447fdcf0451c727da6d5f131c1a33ac7977f59e
                        • Instruction ID: 56d8cd0ebf6ab4a4d31aad6ab38b951dee0ff9c0bbbb70c30f4e079d31b44593
                        • Opcode Fuzzy Hash: 81c97dbf5948de899416f6368447fdcf0451c727da6d5f131c1a33ac7977f59e
                        • Instruction Fuzzy Hash: C6E0ED6A30921149863131AE98CA6AF4D48CBC2324B28853FE08CE6283C89C4C0A867E
                        APIs
                          • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                        • FlushFileBuffers.KERNEL32(?), ref: 0045C499
                        Strings
                        • EndOffset range exceeded, xrefs: 0045C3CD
                        • NumRecs range exceeded, xrefs: 0045C396
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File$BuffersFlush
                        • String ID: EndOffset range exceeded$NumRecs range exceeded
                        • API String ID: 3593489403-659731555
                        • Opcode ID: a46ebc0c75e38cfc1d47e83880391ac29e35d2e9842f1f48ebdcfee3728b7fb6
                        • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
                        • Opcode Fuzzy Hash: a46ebc0c75e38cfc1d47e83880391ac29e35d2e9842f1f48ebdcfee3728b7fb6
                        • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
                        APIs
                        • GetForegroundWindow.USER32(00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835C5
                        • SetActiveWindow.USER32(?,00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835D7
                        Strings
                        • Will not restart Windows automatically., xrefs: 004836F6
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ActiveForeground
                        • String ID: Will not restart Windows automatically.
                        • API String ID: 307657957-4169339592
                        • Opcode ID: fd09d5a5f6cccbb829e281a43361b03d1ada35bfa693f2951a58170467c6de9f
                        • Instruction ID: 4bdce942002d158aae482430f0c171f92fa141a3e9c551c877f01fd154286bbb
                        • Opcode Fuzzy Hash: fd09d5a5f6cccbb829e281a43361b03d1ada35bfa693f2951a58170467c6de9f
                        • Instruction Fuzzy Hash: 7F414870648240BFD321FF68DC92B6D3BE49718B09F6448B7E440573A2E37D9A059B1D
                        APIs
                          • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                          • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                          • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                          • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                          • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                          • Part of subcall function 004063C4: 6F9E1CD0.COMCTL32(00498BC5), ref: 004063C4
                          • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
                          • Part of subcall function 00419040: GetVersion.KERNEL32(00498BDE), ref: 00419040
                          • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                          • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                          • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498BF7), ref: 0044FC1F
                          • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                          • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                          • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                          • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                          • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                          • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                          • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                          • Part of subcall function 0046CDF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                          • Part of subcall function 00478C20: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                          • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                          • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                          • Part of subcall function 00483F88: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                          • Part of subcall function 00495BB4: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495BCD
                        • SetErrorMode.KERNEL32(00000001,00000000,00498C6C), ref: 00498C3E
                          • Part of subcall function 00498968: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                          • Part of subcall function 00498968: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                          • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                        • ShowWindow.USER32(?,00000005,00000000,00498C6C), ref: 00498C9F
                          • Part of subcall function 004825C8: SetActiveWindow.USER32(?), ref: 00482676
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                        • String ID: Setup
                        • API String ID: 504348408-3839654196
                        • Opcode ID: b35466028edd7e3a1b236c6640422c08041f3fa3d34e6d3560873e5a4108b4d0
                        • Instruction ID: b535e719d7157e93998cc10f536158ae488692691c8c4e2dacdcbf5c7207fd3e
                        • Opcode Fuzzy Hash: b35466028edd7e3a1b236c6640422c08041f3fa3d34e6d3560873e5a4108b4d0
                        • Instruction Fuzzy Hash: 873104312446409FD601BBBBFD5392D3B94EF8A728B91447FF80496693DE3C68508A7E
                        APIs
                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID: $=H
                        • API String ID: 3660427363-3538597426
                        • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                        • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
                        • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                        • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(?,00478F7E,?,?,00000001,00000000,00000000,00478F99), ref: 00478F67
                        Strings
                        • %s\%s_is1, xrefs: 00478F10
                        • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478EF2
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                        • API String ID: 47109696-1598650737
                        • Opcode ID: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                        • Instruction ID: 4b2a563bf9abf46f4fe3d7c32e0d4fce195dfbf5fea183d3e913b06dd9c9918d
                        • Opcode Fuzzy Hash: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                        • Instruction Fuzzy Hash: EC218070B44244AFDB11DBA9CC45A9EBBF9EB8D704F90847BE408E7381DB789D018B58
                        APIs
                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID: .tmp
                        • API String ID: 1375471231-2986845003
                        • Opcode ID: ad15d04db016d8ec48b224cf88302df48740c9a9b896926c32662353b3187fec
                        • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
                        • Opcode Fuzzy Hash: ad15d04db016d8ec48b224cf88302df48740c9a9b896926c32662353b3187fec
                        • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
                        APIs
                          • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                          • Part of subcall function 00483A7C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                          • Part of subcall function 00483A7C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                          • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                          • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                          • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483DB6
                          • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(0000009C,?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483E08
                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                        • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                        • String ID: SHGetKnownFolderPath$shell32.dll
                        • API String ID: 3869789854-2936008475
                        • Opcode ID: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                        • Instruction ID: 8066e8dcbdf9c94243579ba2519058cd674f052446347c20ec70bbddfecd8a90
                        • Opcode Fuzzy Hash: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                        • Instruction Fuzzy Hash: 1021F1B06103116AC700BFBE599611B3BA5EB9570C380893FF904DB391D77E68149B6E
                        APIs
                        • DeleteFileA.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 0045293F
                        • GetLastError.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 00452947
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DeleteErrorFileLast
                        • String ID: T$H
                        • API String ID: 2018770650-488339322
                        • Opcode ID: fbcc140a81a3acb9c96393828f2cc587f034b3ec3a8bc9b7824854e1d547cdb8
                        • Instruction ID: a1d21d86fbcf93c7076efe682877c1f84c37cf58088428800e153654eea74c02
                        • Opcode Fuzzy Hash: fbcc140a81a3acb9c96393828f2cc587f034b3ec3a8bc9b7824854e1d547cdb8
                        • Instruction Fuzzy Hash: 05F0C2B2B04608ABDB01EFB59D414AEB7E8EB4E315B6045B7FC04E3742E6B85E148598
                        APIs
                        • RemoveDirectoryA.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E47
                        • GetLastError.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E4F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DirectoryErrorLastRemove
                        • String ID: T$H
                        • API String ID: 377330604-488339322
                        • Opcode ID: 8769a646033274a50feaa89106c60670f2dbad91017c501587ea10a2b48d2d14
                        • Instruction ID: a8b2bafe79397aca91686f8656b478e2385adfe3b855dfce5f6cc0b9ba314abc
                        • Opcode Fuzzy Hash: 8769a646033274a50feaa89106c60670f2dbad91017c501587ea10a2b48d2d14
                        • Instruction Fuzzy Hash: 70F0FC71A04708AFCF01EF759D4249EB7E8DB4E31575049B7FC14E3642E7785E048598
                        APIs
                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C92C,00000000,0047C942), ref: 0047C63A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Close
                        • String ID: RegisteredOrganization$RegisteredOwner
                        • API String ID: 3535843008-1113070880
                        • Opcode ID: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                        • Instruction ID: 97ba07fcc0924f8d698b93a4c32f8f7a3ceb81663af41ec066a5e596666b9838
                        • Opcode Fuzzy Hash: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                        • Instruction Fuzzy Hash: F5F09060700204ABEB00D6A8ACD2BAA3769D750304F60907FA1058F382C679EE019B5C
                        APIs
                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475271
                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475288
                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseCreateErrorFileHandleLast
                        • String ID: CreateFile
                        • API String ID: 2528220319-823142352
                        • Opcode ID: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                        • Instruction ID: b0794b45f16520e4762b2717541816a935241bfc2e667b83be7f23d95be3de9d
                        • Opcode Fuzzy Hash: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                        • Instruction Fuzzy Hash: 99E06D702403447FEA10FA69CCC6F4A77989B04728F10C152BA48AF3E3C5B9FC808A58
                        APIs
                        • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Open
                        • String ID: System\CurrentControlSet\Control\Windows$;H
                        • API String ID: 71445658-2565060666
                        • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                        • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
                        • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                        • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
                        APIs
                          • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                        • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressErrorInitializeLibraryLoadModeProc
                        • String ID: SHCreateItemFromParsingName$shell32.dll
                        • API String ID: 2906209438-2320870614
                        • Opcode ID: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                        • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
                        • Opcode Fuzzy Hash: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                        • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
                        APIs
                          • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                          • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                        • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressErrorLibraryLoadModeProc
                        • String ID: SHPathPrepareForWriteA$shell32.dll
                        • API String ID: 2492108670-2683653824
                        • Opcode ID: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                        • Instruction ID: c0603f0a452a360a01ce82207306765f02b8a986224f2e77b24b084cc810d505
                        • Opcode Fuzzy Hash: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                        • Instruction Fuzzy Hash: 44B092A060074086DB40B7A298D262B28269740319B20843BB0CC9BA95EB3E88240B9F
                        APIs
                        • GetSystemMenu.USER32(00000000,00000000,00000000,00481DB4), ref: 00481D4C
                        • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481D5D
                        • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481D75
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Menu$Append$System
                        • String ID:
                        • API String ID: 1489644407-0
                        • Opcode ID: 85f8085dd59925224ce994ed4abb72c3226e4b8b9fa082300e4d7a64be9e7d0b
                        • Instruction ID: 44f8b16540ed1c6eecf525242fd074403e334eda66194076213ef08da8c10300
                        • Opcode Fuzzy Hash: 85f8085dd59925224ce994ed4abb72c3226e4b8b9fa082300e4d7a64be9e7d0b
                        • Instruction Fuzzy Hash: 3431D4307043441AD721FB769C82BAE3A989F15318F54483FF901AB2E3CA7CAD09879D
                        APIs
                        • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
                        • TranslateMessage.USER32(?), ref: 0042448F
                        • DispatchMessageA.USER32(?), ref: 00424499
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Message$DispatchPeekTranslate
                        • String ID:
                        • API String ID: 4217535847-0
                        • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                        • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
                        • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                        • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
                        APIs
                        • SetPropA.USER32(00000000,00000000), ref: 0041666A
                        • SetPropA.USER32(00000000,00000000), ref: 0041667F
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Prop$Window
                        • String ID:
                        • API String ID: 3363284559-0
                        • Opcode ID: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                        • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
                        • Opcode Fuzzy Hash: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                        • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
                        APIs
                        • IsWindowVisible.USER32(?), ref: 0041EE64
                        • IsWindowEnabled.USER32(?), ref: 0041EE6E
                        • EnableWindow.USER32(?,00000000), ref: 0041EE94
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$EnableEnabledVisible
                        • String ID:
                        • API String ID: 3234591441-0
                        • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                        • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
                        • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                        • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
                        APIs
                        • GetForegroundWindow.USER32(00000000,00000000,?,?,00483481,?,00483566,?,?,00000000), ref: 00483422
                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00483434
                        • GetCurrentProcessId.KERNEL32(00000000,?,00000000,00000000,?,?,00483481,?,00483566,?,?,00000000), ref: 0048343D
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ProcessWindow$CurrentForegroundThread
                        • String ID:
                        • API String ID: 3477312055-0
                        • Opcode ID: 30efa22169b90dc38136f66a6467a27c26b4f04e2e52f09e67eefe2d80cac6ea
                        • Instruction ID: beb4f515369edaf5f7f8104bbb2c2e6743f65f25389461d3c194e507fd2f85f2
                        • Opcode Fuzzy Hash: 30efa22169b90dc38136f66a6467a27c26b4f04e2e52f09e67eefe2d80cac6ea
                        • Instruction Fuzzy Hash: 8AD01233506A2A7E6611F9E59D828AFB35CD900B58754057BF904A3241D72D9E0446BE
                        APIs
                        • SetActiveWindow.USER32(?), ref: 0046A02D
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ActiveWindow
                        • String ID: PrepareToInstall
                        • API String ID: 2558294473-1101760603
                        • Opcode ID: ce905d11a8887108f3ad14969444655d730b3b5d2faccfdd66681012e3d11b0c
                        • Instruction ID: c614f106b7f0b4f176116dff63491c2ec041d81708a05a15fd0d1780f22877a3
                        • Opcode Fuzzy Hash: ce905d11a8887108f3ad14969444655d730b3b5d2faccfdd66681012e3d11b0c
                        • Instruction Fuzzy Hash: 97A14934A00109DFCB00EF99D986EDEB7F5AF48304F5540B6E404AB362D738AE45CB9A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: /:*?"<>|
                        • API String ID: 0-4078764451
                        • Opcode ID: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                        • Instruction ID: 6c3526c54916fe71946563460b5bd12015a165326d65a32731909bc5939f884d
                        • Opcode Fuzzy Hash: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                        • Instruction Fuzzy Hash: CF71C370A40215BADB10E766DCD2FEE7BA19F05308F148067F580BB292E779AD458B4E
                        APIs
                        • SetActiveWindow.USER32(?), ref: 00482676
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ActiveWindow
                        • String ID: InitializeWizard
                        • API String ID: 2558294473-2356795471
                        • Opcode ID: 610dba628312dcddd63cee716be368e1ad8af3103a0d365a4a52240be508be69
                        • Instruction ID: 0fabbc08dbff6a0894d12042e1c617afa12541eacf44f0b659f2bb150b55c2ae
                        • Opcode Fuzzy Hash: 610dba628312dcddd63cee716be368e1ad8af3103a0d365a4a52240be508be69
                        • Instruction Fuzzy Hash: 8311C130204200AFD700EB69EED6B1A37E4E764328F60057BE404D72A1EA796C41CB5E
                        APIs
                        Strings
                        • Failed to remove temporary directory: , xrefs: 0047CDFF
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CountTick
                        • String ID: Failed to remove temporary directory:
                        • API String ID: 536389180-3544197614
                        • Opcode ID: 45da43fd3ae20599d6e25ac9ed9d33e8d604a7859b1119de6f2a098991fc0130
                        • Instruction ID: ec3213607a6b09ae82705bdd380353c192e2de6e0dbfdfb704aaf67811413441
                        • Opcode Fuzzy Hash: 45da43fd3ae20599d6e25ac9ed9d33e8d604a7859b1119de6f2a098991fc0130
                        • Instruction Fuzzy Hash: 0F01B930644604BADB21EB72ED87BDA7798DB45709F60847FB804A7192EA7CA904C95C
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C740,00000000,0047C942), ref: 0047C539
                        Strings
                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C509
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: Software\Microsoft\Windows\CurrentVersion
                        • API String ID: 47109696-1019749484
                        • Opcode ID: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                        • Instruction ID: acdf9366f140fa0c09696ff4b806567a5b27613a006b44f2785fa8682630d216
                        • Opcode Fuzzy Hash: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                        • Instruction Fuzzy Hash: 6CF0823170052477DA00A65E6C82B9FA79D8B84758F60403FF508DB242EABAEE0243EC
                        APIs
                        • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                        Strings
                        • Inno Setup: Setup Version, xrefs: 0046EE65
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Value
                        • String ID: Inno Setup: Setup Version
                        • API String ID: 3702945584-4166306022
                        • Opcode ID: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                        • Instruction ID: 37dbbd71146fd60ed96ba35b84ff74d599aeccd68d0f9eb37ee109455dfe34ad
                        • Opcode Fuzzy Hash: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                        • Instruction Fuzzy Hash: B1E06D753012043FE710AA2B9C85F5BBADCDF88365F10403AB908DB392D578DD0181A9
                        APIs
                        • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Value
                        • String ID: NoModify
                        • API String ID: 3702945584-1699962838
                        • Opcode ID: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                        • Instruction ID: 84621f748531697c6bb4a8e0450a59e651a2caf9945441e4ffcb8bd5fa838dfd
                        • Opcode Fuzzy Hash: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                        • Instruction Fuzzy Hash: F6E04FB4640308BFEB04DB55CD4AF6B77ECDB48714F10405ABA049B281E674FE00C669
                        APIs
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00454346,?,00000000,004543BA,?,?,-00000001,00000000,?,0047CDFB,00000000,0047CD48,00000000), ref: 00454322
                        • FindClose.KERNEL32(000000FF,0045434D,00454346,?,00000000,004543BA,?,?,-00000001,00000000,?,0047CDFB,00000000,0047CD48,00000000,00000000), ref: 00454340
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$CloseFileNext
                        • String ID:
                        • API String ID: 2066263336-0
                        • Opcode ID: 45376c9c9c7299f2ca5a0f926fcd92763639dc1ad46c037637ac30030cc39b69
                        • Instruction ID: 54d7d993b90550b5414970fc4389b15b7902a372ed294bc13edf2f45dfba5a61
                        • Opcode Fuzzy Hash: 45376c9c9c7299f2ca5a0f926fcd92763639dc1ad46c037637ac30030cc39b69
                        • Instruction Fuzzy Hash: BE817430A0424D9FCF11DFA5C8457EFBB74AF49309F1440A6EC546B3A2D3399A8ACB58
                        APIs
                        • GetACP.KERNEL32(?,?,00000001,00000000,0047E753,?,-0000001A,00480609,-00000010,?,00000004,0000001B,00000000,00480956,?,0045DB68), ref: 0047E4EA
                          • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
                          • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,004809BD,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
                          • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
                        • SendNotifyMessageA.USER32(000203F2,00000496,00002711,-00000001), ref: 0047E6BA
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: EnumFontsMessageNotifyReleaseSend
                        • String ID:
                        • API String ID: 2649214853-0
                        • Opcode ID: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                        • Instruction ID: a62c935d52da393e7312112ce75ddb0898731394ffd2a16b1d4fc3e518f8127d
                        • Opcode Fuzzy Hash: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                        • Instruction Fuzzy Hash: 5B5195746001049BC710FF67E98169A37E5EB58308B90C67BA8049B3A6DB3CED45CB9D
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047DF83,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DF3D
                          • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ByteCharMetricsMultiSystemWide
                        • String ID: /G
                        • API String ID: 224039744-2088674125
                        • Opcode ID: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                        • Instruction ID: 84c81a41a939c89cd5cf89585cf0d961f9543ff151f38a86aad590f5673b43e0
                        • Opcode Fuzzy Hash: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                        • Instruction Fuzzy Hash: 53518070A04215AFDB21DF55D8C4FAA7BB8EF64318F118077E404AB3A1C778AE45CB99
                        APIs
                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,004021FC), ref: 004020CB
                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                        • String ID:
                        • API String ID: 296031713-0
                        • Opcode ID: ab3545b22e3440e815b1719652ff5d854977479bd1b850cbba673e5eb4522dee
                        • Instruction ID: 30adadd309813d1a6846ca6b4958dbaac508113c784b73a5bb8d11bfdb372a30
                        • Opcode Fuzzy Hash: ab3545b22e3440e815b1719652ff5d854977479bd1b850cbba673e5eb4522dee
                        • Instruction Fuzzy Hash: 3941E3B2E00304DFDB10CF69EE8521A77A4F7A8324B15417FD854A77E2D3789801DB88
                        APIs
                        • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
                        • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseEnum
                        • String ID:
                        • API String ID: 2818636725-0
                        • Opcode ID: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                        • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
                        • Opcode Fuzzy Hash: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                        • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
                        APIs
                        • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
                        • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateErrorLastProcess
                        • String ID:
                        • API String ID: 2919029540-0
                        • Opcode ID: c95f5f81879e10580f0beb684fbefc560c00cfbc54ddd80bc382dcc14dc7984f
                        • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
                        • Opcode Fuzzy Hash: c95f5f81879e10580f0beb684fbefc560c00cfbc54ddd80bc382dcc14dc7984f
                        • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
                        APIs
                        • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
                        • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Resource$FindFree
                        • String ID:
                        • API String ID: 4097029671-0
                        • Opcode ID: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                        • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
                        • Opcode Fuzzy Hash: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                        • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                        • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Thread$CurrentEnumWindows
                        • String ID:
                        • API String ID: 2396873506-0
                        • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                        • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
                        • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                        • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
                        APIs
                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
                        • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileLastMove
                        • String ID:
                        • API String ID: 55378915-0
                        • Opcode ID: bd02338dff925e1bcf0a80027825a402961c9c10eaaecac7b210e684feb30c76
                        • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
                        • Opcode Fuzzy Hash: bd02338dff925e1bcf0a80027825a402961c9c10eaaecac7b210e684feb30c76
                        • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
                        APIs
                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
                        • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateDirectoryErrorLast
                        • String ID:
                        • API String ID: 1375471231-0
                        • Opcode ID: 903dc6f46ae0353656b5ef1fe2250cc8cd8775a19ac3db80fd29e7e5856ea863
                        • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
                        • Opcode Fuzzy Hash: 903dc6f46ae0353656b5ef1fe2250cc8cd8775a19ac3db80fd29e7e5856ea863
                        • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
                        APIs
                        • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
                        • LoadCursorA.USER32(00000000,00000000), ref: 00423273
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CursorLoad
                        • String ID:
                        • API String ID: 3238433803-0
                        • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                        • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
                        • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                        • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
                        APIs
                        • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                        • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLibraryLoadMode
                        • String ID:
                        • API String ID: 2987862817-0
                        • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                        • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
                        • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                        • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
                        APIs
                        • CallWindowProcW.USER32(6F9A27E0,?,?,?,?), ref: 00476C31
                        • CallWindowProcW.USER32(FFFF0429,?,?,?,?), ref: 00476C42
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: 346703960cce2f9af075a41cf2183f1073599ecc9318cb7bb591473e17ab3077
                        • Instruction ID: f2bf2b0b1abe5bd87c33c6b7c80241fb96b27bc6aca7ec08f51a493da5dc8bb7
                        • Opcode Fuzzy Hash: 346703960cce2f9af075a41cf2183f1073599ecc9318cb7bb591473e17ab3077
                        • Instruction Fuzzy Hash: EDF030B6111718BFDA04DAA9DD89CB77B6DDF19360B008627BD58932A4D174AC0086B4
                        APIs
                        • GetVersion.KERNEL32(?,0046E17A), ref: 0046E0EE
                        • 7715E550.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E17A), ref: 0046E10A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: 7715E550Version
                        • String ID:
                        • API String ID: 1030236662-0
                        • Opcode ID: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                        • Instruction ID: e32462cabb755f907f5de1887460af807d545ab7c9798ff14e002636b2035e3f
                        • Opcode Fuzzy Hash: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                        • Instruction Fuzzy Hash: 90F0A7352812009FEB10975ADC86B8937C47B22315F50007BE04497292D2BD94C0471F
                        APIs
                        • SHGetKnownFolderPath.SHELL32(00499D40,00008000,00000000,?), ref: 0047C89B
                        • 771883B0.OLE32(?,0047C8DE), ref: 0047C8D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: 771883FolderKnownPath
                        • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                        • API String ID: 1848010826-544719455
                        • Opcode ID: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                        • Instruction ID: f48ec61de784b6bea0373c7a91bc006da4a0813e938d35ae17fa89473a65de5f
                        • Opcode Fuzzy Hash: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                        • Instruction Fuzzy Hash: 22E09230340604BFEB15EB61DC92F6977A8EB48B01B72847BF504E2680D67CAD00DB1C
                        APIs
                        • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 0045090E
                        • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 00450916
                          • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$FilePointer
                        • String ID:
                        • API String ID: 1156039329-0
                        • Opcode ID: da9b101d890a5785f8a9e71de1b90467d9f3c90ee8d89fa87e0c2c0eb401b44d
                        • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
                        • Opcode Fuzzy Hash: da9b101d890a5785f8a9e71de1b90467d9f3c90ee8d89fa87e0c2c0eb401b44d
                        • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
                        APIs
                        • GetTickCount.KERNEL32 ref: 0048345A
                        • GetTickCount.KERNEL32 ref: 00483451
                          • Part of subcall function 0048341C: GetForegroundWindow.USER32(00000000,00000000,?,?,00483481,?,00483566,?,?,00000000), ref: 00483422
                          • Part of subcall function 0048341C: GetWindowThreadProcessId.USER32(00000000,?), ref: 00483434
                          • Part of subcall function 0048341C: GetCurrentProcessId.KERNEL32(00000000,?,00000000,00000000,?,?,00483481,?,00483566,?,?,00000000), ref: 0048343D
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CountProcessTickWindow$CurrentForegroundThread
                        • String ID:
                        • API String ID: 711787588-0
                        • Opcode ID: 9d6382f4410c0cf8a4c80b06530e5f0b551ab039682d9658fc9d01bb6d2efe45
                        • Instruction ID: 3b4ff2fc5ab93e416a174b14f81b6e436b7efe9d21b952af33b17f0fc18b5d19
                        • Opcode Fuzzy Hash: 9d6382f4410c0cf8a4c80b06530e5f0b551ab039682d9658fc9d01bb6d2efe45
                        • Instruction Fuzzy Hash: 59D0C94060065155DD033EFB668222D0108AB56F2EB501D7FB08A99183CD5C8A46133F
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 0041F00E
                        • EnumThreadWindows.USER32(00000000,0041EF90,00000000), ref: 0041F014
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Thread$CurrentEnumWindows
                        • String ID:
                        • API String ID: 2396873506-0
                        • Opcode ID: 28faba8d13260114aebe4435219a546304dde162066a62bc81d999aa95987238
                        • Instruction ID: 1bd0ab66c6aeceffdc4f5e21b8af03a27ec20acb013402289ac5ff21683637d0
                        • Opcode Fuzzy Hash: 28faba8d13260114aebe4435219a546304dde162066a62bc81d999aa95987238
                        • Instruction Fuzzy Hash: EBE02676600200AEDB12DF7AAD4575B37D0A394314F12483FA904D61A1D2745C84DB19
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                        • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Virtual$AllocFree
                        • String ID:
                        • API String ID: 2087232378-0
                        • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                        • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                        • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                        • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                        APIs
                        • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
                          • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
                          • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DefaultInfoLoadLocaleStringSystem
                        • String ID:
                        • API String ID: 1658689577-0
                        • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                        • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
                        • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                        • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
                        APIs
                        • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoScroll
                        • String ID:
                        • API String ID: 629608716-0
                        • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                        • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
                        • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                        • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
                        APIs
                          • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                          • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                        • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C4AE,?,00000000,?,?,0046C6C0,?,00000000,0046C734), ref: 0046C492
                          • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
                          • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                        • String ID:
                        • API String ID: 3319771486-0
                        • Opcode ID: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                        • Instruction ID: eef1953176fed27c4f60a3b97998f4e8fb1447464a393d6256780c84e8a913cd
                        • Opcode Fuzzy Hash: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                        • Instruction Fuzzy Hash: 5AF0B471248300BFE705DF62ECA6B35B6E8D748714F61047BF40886590E97D5844D51E
                        APIs
                        • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                        • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                        • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                        • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                        • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                        • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                        • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                        APIs
                        • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                        • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                        • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                        • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 93d9079c03dc8f32fd5285902e105fc94467d2f9586780870fbde36cd9cf365c
                        • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
                        • Opcode Fuzzy Hash: 93d9079c03dc8f32fd5285902e105fc94467d2f9586780870fbde36cd9cf365c
                        • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
                        APIs
                        • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FormatMessage
                        • String ID:
                        • API String ID: 1306739567-0
                        • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                        • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
                        • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                        • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
                        APIs
                        • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                        • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                        • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                        • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                        APIs
                        • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                        • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
                        • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                        • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
                        APIs
                        • FindClose.KERNEL32(00000000,000000FF,0047096C,00000000,00471782,?,00000000,004717CB,?,00000000,00471904,?,00000000,?,00000000), ref: 00454C0E
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseFind
                        • String ID:
                        • API String ID: 1863332320-0
                        • Opcode ID: 88d2105ec3fd8a59a595d8a01c36b656b09b6eed00d95942a14a255e30e6dd7e
                        • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
                        • Opcode Fuzzy Hash: 88d2105ec3fd8a59a595d8a01c36b656b09b6eed00d95942a14a255e30e6dd7e
                        • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(004959E6,?,00495A08,?,?,00000000,004959E6,?,?), ref: 0041469B
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                        • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                        • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                        • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                        APIs
                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileWrite
                        • String ID:
                        • API String ID: 3934441357-0
                        • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                        • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
                        • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                        • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
                        APIs
                          • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
                        • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                          • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoParametersSystem$ShowWindow
                        • String ID:
                        • API String ID: 3202724764-0
                        • Opcode ID: 5ea0717b5a237d90ae3b60c45d238232e42852dd61880cea7560cbd7bb09fbd7
                        • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
                        • Opcode Fuzzy Hash: 5ea0717b5a237d90ae3b60c45d238232e42852dd61880cea7560cbd7bb09fbd7
                        • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
                        APIs
                        • SetWindowTextA.USER32(?,00000000), ref: 004242DC
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: TextWindow
                        • String ID:
                        • API String ID: 530164218-0
                        • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                        • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
                        • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                        • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,?,00452C55,00000000,00452C6E,?,-00000001,00000000), ref: 0042CD77
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: abded0c002ebc78192aa504463f5e40d8ea57a748cef45cf468d0a982b541a78
                        • Instruction ID: 2eab32a2699244162946c929296992ee32eb3599f5fc22494aed3d9886f7b4af
                        • Opcode Fuzzy Hash: abded0c002ebc78192aa504463f5e40d8ea57a748cef45cf468d0a982b541a78
                        • Instruction Fuzzy Hash: 51D012D036121015DF1455BD28C535F05884B65375BA82F37B66DE62E2D23D8857281C
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                        • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                        • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                        • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: a2c5bb09e392fd69b508e639abd752817b5c1d67cf81785bd365d6d583db0f26
                        • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
                        • Opcode Fuzzy Hash: a2c5bb09e392fd69b508e639abd752817b5c1d67cf81785bd365d6d583db0f26
                        • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
                        APIs
                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                        • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                        • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                        • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,00000000), ref: 0041F3B0
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
                        • Instruction ID: 48f25c4fc7afed193c39a16cc91a0304f94a1296cd048c63733264e3b5f0309e
                        • Opcode Fuzzy Hash: aa2ab5d04534ce78fd06398472ac87fc8e200d4b6eb1d54961e47d4e7a3c3f50
                        • Instruction Fuzzy Hash: D2D0C932100108AFDB018E94AC018677B69EB48210B148815FD0485221D633E831AA91
                        APIs
                        • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                          • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorFileLast
                        • String ID:
                        • API String ID: 734332943-0
                        • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                        • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
                        • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                        • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
                        APIs
                        • DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: 974406c8209f5f2baf9aa7f60898e2c16b4dbb69ce3e1bfb04616041c36a0a4c
                        • Instruction ID: 1cff4f98fe1f8e2c1d524c72e998173d896329315b0501cca3ecf0a0fad01fcd
                        • Opcode Fuzzy Hash: 974406c8209f5f2baf9aa7f60898e2c16b4dbb69ce3e1bfb04616041c36a0a4c
                        • Instruction Fuzzy Hash: E4B012E13D224A26CB0079FE4CC1D1A00CC4A293063406A3A3006F72C3D83CC8180014
                        APIs
                        • SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CurrentDirectory
                        • String ID:
                        • API String ID: 1611563598-0
                        • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                        • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                        • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                        • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                        APIs
                        • FreeLibrary.KERNEL32(00000000,00450010,00000000,?,004683E0,0000000C,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?), ref: 0044FE22
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 737efbd1d05e8daf9b2f5d4ad47827039e352d1058cf7efe3c38226c1680fcb2
                        • Instruction ID: 66f3cd114cd8849fa0b5cd02f95834ec0ce5bd652375c405162ae2aedd08d897
                        • Opcode Fuzzy Hash: 737efbd1d05e8daf9b2f5d4ad47827039e352d1058cf7efe3c38226c1680fcb2
                        • Instruction Fuzzy Hash: A1D0C9B05022448EDB50EB69FA8472233E4E328346F18503FE500CA26AF33A8C44CF9C
                        APIs
                        • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                        • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
                        • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                        • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
                        APIs
                        • FreeLibrary.KERNEL32(00000000,00481A2F), ref: 0047D0E2
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 798a4a0ef963ce7c9d3a16661f4bde20b6947b212f410e13b3a4d6eab8997eff
                        • Instruction ID: 195a0cc7c2ab23ef077b9fe4dc52bf4a0a1d122fd989c5672d6e5019e3023c1d
                        • Opcode Fuzzy Hash: 798a4a0ef963ce7c9d3a16661f4bde20b6947b212f410e13b3a4d6eab8997eff
                        • Instruction Fuzzy Hash: D2C00271B902018FC754EB759DD4B6536E49715305F1144775424EB164D6746484CF29
                        APIs
                        • PostMessageA.USER32(00000000,00000012,00000000,00000000), ref: 00481C74
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 1bc723d2fafea9f50f28bdb772eb68fb7ee591a9533dee5a29c72c4421e393ba
                        • Instruction ID: fbd2fd99f2342ae97ce2e912f06b4f6775a0193fa59faa32ac81747571f1ea96
                        • Opcode Fuzzy Hash: 1bc723d2fafea9f50f28bdb772eb68fb7ee591a9533dee5a29c72c4421e393ba
                        • Instruction Fuzzy Hash: E2A002343C430430F47462511D03F4400441744F05EE1909573053C0C704D82520201E
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DestroyWindow
                        • String ID:
                        • API String ID: 3375834691-0
                        • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                        • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                        • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                        • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                        • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
                        • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                        • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
                        APIs
                        • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 9b36e42861a8e97045d3d1c2d68090febbf4b925d95e27d87fd5eab6f39d8911
                        • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
                        • Opcode Fuzzy Hash: 9b36e42861a8e97045d3d1c2d68090febbf4b925d95e27d87fd5eab6f39d8911
                        • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
                        APIs
                        • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,?,?,00401973), ref: 00401766
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                        • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                        • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                        • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                        APIs
                        • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                        • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                        • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                        • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                        • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                        • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                        • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                        • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                        • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                        • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                        • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                        • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                        • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                        • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                        • API String ID: 2323315520-3614243559
                        • Opcode ID: 671fdaa251972b62047104a2fe9ad863bdd7b53d79a33238f475940deae409a8
                        • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
                        • Opcode Fuzzy Hash: 671fdaa251972b62047104a2fe9ad863bdd7b53d79a33238f475940deae409a8
                        • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
                        APIs
                        • GetTickCount.KERNEL32 ref: 0045862F
                        • QueryPerformanceCounter.KERNEL32(00000000,00000000,004588C2,?,?,00000000,00000000,?,00458FBE,?,00000000,00000000), ref: 00458638
                        • GetSystemTimeAsFileTime.KERNEL32(00000000,00000000), ref: 00458642
                        • GetCurrentProcessId.KERNEL32(?,00000000,00000000,004588C2,?,?,00000000,00000000,?,00458FBE,?,00000000,00000000), ref: 0045864B
                        • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
                        • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,00000000,00000000), ref: 004586CF
                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
                        • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                        • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
                        • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
                        • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                        • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                        • API String ID: 770386003-3271284199
                        • Opcode ID: be3e2aad74af535179bad2a73bbdbce7deeedee64d3617dbf3cbed6bd2dfb7d8
                        • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
                        • Opcode Fuzzy Hash: be3e2aad74af535179bad2a73bbdbce7deeedee64d3617dbf3cbed6bd2dfb7d8
                        • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
                        APIs
                          • Part of subcall function 00478370: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02202C30,?,?,?,02202C30,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                          • Part of subcall function 00478370: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                          • Part of subcall function 00478370: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02202C30,?,?,?,02202C30,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                          • Part of subcall function 00478370: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02202C30,?,?,?,02202C30), ref: 004783CC
                          • Part of subcall function 00478370: CloseHandle.KERNEL32(00000000,?,?,?,02202C30,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                          • Part of subcall function 00478448: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004784DA,?,?,?,02202C30,?,0047853C,00000000,00478652,?,?,-00000010,?), ref: 00478478
                        • ShellExecuteEx.SHELL32(0000003C), ref: 0047858C
                        • GetLastError.KERNEL32(00000000,00478652,?,?,-00000010,?), ref: 00478595
                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004785E2
                        • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478606
                        • CloseHandle.KERNEL32(00000000,00478637,00000000,00000000,000000FF,000000FF,00000000,00478630,?,00000000,00478652,?,?,-00000010,?), ref: 0047862A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                        • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                        • API String ID: 883996979-221126205
                        • Opcode ID: 79d3e53d443c3b79e7afe342da530abadc549f51104da72aa591649ec2f08439
                        • Instruction ID: b05a94d88e1d9ee0fbafe330a65326fe691daae9ca7e583bddfe233bc85c86e1
                        • Opcode Fuzzy Hash: 79d3e53d443c3b79e7afe342da530abadc549f51104da72aa591649ec2f08439
                        • Instruction Fuzzy Hash: 0E314470A40208BEDB11EFE6C859ADEB7B8EB45718F50843FF508E7281DA7C99058B5D
                        APIs
                        • IsIconic.USER32(?), ref: 00418393
                        • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
                        • GetWindowRect.USER32(?), ref: 004183CC
                        • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
                        • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
                        • ScreenToClient.USER32(00000000), ref: 004183F8
                        • ScreenToClient.USER32(00000000,?), ref: 00418403
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ClientLongScreen$IconicPlacementRect
                        • String ID: ,
                        • API String ID: 2266315723-3772416878
                        • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                        • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
                        • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                        • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
                        APIs
                        • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
                        • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                        • String ID: SeShutdownPrivilege
                        • API String ID: 107509674-3733053543
                        • Opcode ID: df5f2c4a541694cd1c04f8324160b67a3be1538f30066156bb5e3b01538ef1f2
                        • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
                        • Opcode Fuzzy Hash: df5f2c4a541694cd1c04f8324160b67a3be1538f30066156bb5e3b01538ef1f2
                        • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
                        APIs
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0,?,?,00000000,0049B628), ref: 004980FB
                        • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049817E
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000), ref: 00498196
                        • FindClose.KERNEL32(000000FF,004981C1,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0), ref: 004981B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirstNext
                        • String ID: isRS-$isRS-???.tmp
                        • API String ID: 134685335-3422211394
                        • Opcode ID: 2cb7e2670026ff323e8dee1ec3b8b1f3f25956717e63939b2755f6d65d425c3e
                        • Instruction ID: fc6fb5a4e2302b333323d0d019d05182e8323e6fc1a1653111c694b95695a562
                        • Opcode Fuzzy Hash: 2cb7e2670026ff323e8dee1ec3b8b1f3f25956717e63939b2755f6d65d425c3e
                        • Instruction Fuzzy Hash: E1316A719016186FCF10EF69CC42ADEBBBCDB45314F5044BBA808E3291DA3C9F458E58
                        APIs
                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
                        • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
                        • SetForegroundWindow.USER32(?), ref: 00457649
                        • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
                        Strings
                        • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MessagePostWindow$ForegroundNtdllProc_
                        • String ID: Cannot evaluate variable because [Code] isn't running yet
                        • API String ID: 2236967946-3182603685
                        • Opcode ID: 07d9476e03c8d7360a343fdd7a71a2d4d0b169a7e8f0ef14eb54f7c401357684
                        • Instruction ID: 8776962154e21e4b1c8854f5ca4bcfaa90dd950cda3ad59ac2e2fede597431d6
                        • Opcode Fuzzy Hash: 07d9476e03c8d7360a343fdd7a71a2d4d0b169a7e8f0ef14eb54f7c401357684
                        • Instruction Fuzzy Hash: 2B91D334608204DFEB15CF55E991F5ABBF5EB89704F2184BAE80497792C638AE04DB68
                        APIs
                        • IsIconic.USER32(?), ref: 00417D0F
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$Placement$Iconic
                        • String ID: ,
                        • API String ID: 568898626-3772416878
                        • Opcode ID: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                        • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
                        • Opcode Fuzzy Hash: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                        • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
                        APIs
                        • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
                        • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$File$CloseErrorFirstModeNext
                        • String ID:
                        • API String ID: 4011626565-0
                        • Opcode ID: 5158f659c4e1215f99186bd7ba8854c88035ca64dff55ff97fa9415a11482c3d
                        • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
                        • Opcode Fuzzy Hash: 5158f659c4e1215f99186bd7ba8854c88035ca64dff55ff97fa9415a11482c3d
                        • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
                        APIs
                        • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
                        • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$File$CloseErrorFirstModeNext
                        • String ID:
                        • API String ID: 4011626565-0
                        • Opcode ID: abeb1b2530df01007ba7b3f2f5985a83fe19df2c1382cd7cab5931380c1d4a65
                        • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
                        • Opcode Fuzzy Hash: abeb1b2530df01007ba7b3f2f5985a83fe19df2c1382cd7cab5931380c1d4a65
                        • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
                        APIs
                        • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
                        • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
                        • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
                        • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                        • String ID:
                        • API String ID: 1177325624-0
                        • Opcode ID: ca7e64f53124eee773614f4530e241cea0742e07ac6524e5167bff1d6a405f94
                        • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
                        • Opcode Fuzzy Hash: ca7e64f53124eee773614f4530e241cea0742e07ac6524e5167bff1d6a405f94
                        • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
                        APIs
                        • IsIconic.USER32(?), ref: 0048397A
                        • GetWindowLongA.USER32(00000000,000000F0), ref: 00483998
                        • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839BA
                        • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839CE
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$Show$IconicLong
                        • String ID:
                        • API String ID: 2754861897-0
                        • Opcode ID: eced40890854bebd7317fa2d6d43d84d766b7a93c8695781d913d3e5347b8eed
                        • Instruction ID: 3cea9153c2b451a1fdc95e78a984a36fb28f479a74ffefb17a89e5a976076ef3
                        • Opcode Fuzzy Hash: eced40890854bebd7317fa2d6d43d84d766b7a93c8695781d913d3e5347b8eed
                        • Instruction Fuzzy Hash: 160156B0705200ABEA00BF659CCBB5F22C55714745F44093BF4459B292CAADDA859B5C
                        APIs
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
                        • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 5abcc9c321325ced0386872c73161ee21156d1b576f74443c312b00ff4da3d0e
                        • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
                        • Opcode Fuzzy Hash: 5abcc9c321325ced0386872c73161ee21156d1b576f74443c312b00ff4da3d0e
                        • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
                        APIs
                        • IsIconic.USER32(?), ref: 004241E4
                        • SetActiveWindow.USER32(?,?,?,0046CD53), ref: 004241F1
                          • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                          • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022025AC,0042420A,?,?,?,0046CD53), ref: 00423B4F
                        • SetFocus.USER32(00000000,?,?,?,0046CD53), ref: 0042421E
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ActiveFocusIconicShow
                        • String ID:
                        • API String ID: 649377781-0
                        • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                        • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
                        • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                        • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
                        APIs
                        • IsIconic.USER32(?), ref: 00417D0F
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                        • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                        • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$Placement$Iconic
                        • String ID:
                        • API String ID: 568898626-0
                        • Opcode ID: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                        • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
                        • Opcode Fuzzy Hash: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                        • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CaptureIconic
                        • String ID:
                        • API String ID: 2277910766-0
                        • Opcode ID: c8f0edb1377470e81cbec4a2b95b5efcfd9f911131a56f14dd142127f01798ba
                        • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
                        • Opcode Fuzzy Hash: c8f0edb1377470e81cbec4a2b95b5efcfd9f911131a56f14dd142127f01798ba
                        • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
                        APIs
                        • IsIconic.USER32(?), ref: 0042419B
                          • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
                          • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
                          • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                          • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                        • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
                          • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ActiveEnumIconicLongShowWindows
                        • String ID:
                        • API String ID: 2671590913-0
                        • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                        • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
                        • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                        • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
                        APIs
                        • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: NtdllProc_Window
                        • String ID:
                        • API String ID: 4255912815-0
                        • Opcode ID: 52e37b400ef70ce07d55a0833d187e2ce83493dd1eac51222033d67a41acb98e
                        • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
                        • Opcode Fuzzy Hash: 52e37b400ef70ce07d55a0833d187e2ce83493dd1eac51222033d67a41acb98e
                        • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
                        APIs
                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478C0E
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: NtdllProc_Window
                        • String ID:
                        • API String ID: 4255912815-0
                        • Opcode ID: 844696e8b897343bdf835c25a6a000e65cc716b27902cfddd3917abf911a0a20
                        • Instruction ID: 8fc52e73ba06cc46e730b07d7f7f94568764801a7b8f51cd1014d1f63996c257
                        • Opcode Fuzzy Hash: 844696e8b897343bdf835c25a6a000e65cc716b27902cfddd3917abf911a0a20
                        • Instruction Fuzzy Hash: EC4148B5A44104DFCB10CF99C6888AAB7F5FB49310B64C99AF848DB701D738EE45DB58
                        APIs
                        • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: NtdllProc_Window
                        • String ID:
                        • API String ID: 4255912815-0
                        • Opcode ID: 84fa915654b0e9cabe4af8b3610e56d273e883bd018482bfacacc2813b1fcd3b
                        • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
                        • Opcode Fuzzy Hash: 84fa915654b0e9cabe4af8b3610e56d273e883bd018482bfacacc2813b1fcd3b
                        • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5
                        APIs
                          • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
                        • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                        • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                        • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                        • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                        • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                        • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                        • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                        • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                        • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                        • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                        • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                        • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                        • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                        • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                        • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                        • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                        • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
                        • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
                        • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
                        • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
                        • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
                        • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
                        • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
                        • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
                        • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
                        • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
                        • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
                        • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
                        • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
                        • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
                        • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
                        • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
                        • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
                        • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
                        • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
                        • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
                        • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
                        • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoadVersion
                        • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                        • API String ID: 1968650500-2910565190
                        • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                        • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
                        • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                        • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                        APIs
                        • Sleep.KERNEL32(00000000,00000000,00492D3D,?,?,?,?,00000000,00000000,00000000), ref: 00492888
                        • FindWindowA.USER32(00000000,00000000), ref: 004928B9
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FindSleepWindow
                        • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                        • API String ID: 3078808852-3310373309
                        • Opcode ID: fe0993328b1714d090c62d4b65a95ce68cbab2884a00f13d32d38987ffe254b3
                        • Instruction ID: 092cd3663c6e49ee7eb77a287a3c2ed341282e51176ce6ebc4a466309821376d
                        • Opcode Fuzzy Hash: fe0993328b1714d090c62d4b65a95ce68cbab2884a00f13d32d38987ffe254b3
                        • Instruction Fuzzy Hash: D9C182A0B042003BDB14BF3E9D4551F59A99F95708B119A3FB446EB78BCE7CEC0A4359
                        APIs
                        • GetDC.USER32(00000000), ref: 0041CA40
                        • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
                        • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
                        • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
                        • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
                        • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
                        • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
                        • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
                        • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
                        • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
                        • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
                        • RealizePalette.GDI32(00000000), ref: 0041CB7D
                        • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
                        • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
                        • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
                        • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
                        • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
                        • SelectObject.GDI32(00000000,?), ref: 0041CBEE
                        • DeleteDC.GDI32(00000000), ref: 0041CC04
                          • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                        • String ID:
                        • API String ID: 269503290-0
                        • Opcode ID: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                        • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
                        • Opcode Fuzzy Hash: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                        • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
                        APIs
                        • ShowWindow.USER32(?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000,00498B29,?,00000000), ref: 00498453
                        • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000), ref: 00498466
                        • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000), ref: 00498476
                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498497
                        • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000), ref: 004984A7
                          • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                        • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                        • API String ID: 2000705611-3672972446
                        • Opcode ID: 6acfce5c0d266c00f3cb08664922df7ad17872da4bad7acadb5bfb626d6c80a7
                        • Instruction ID: 1a66146e65e487955493167600903b91e60bc3637ed1504a34615a6495e02ea1
                        • Opcode Fuzzy Hash: 6acfce5c0d266c00f3cb08664922df7ad17872da4bad7acadb5bfb626d6c80a7
                        • Instruction Fuzzy Hash: 5191A434A042049FDF11EBA9DC52BAE7BE5EF4A304F5144BBF500AB692DE7C9C05CA19
                        APIs
                        • GetLastError.KERNEL32(00000000,0045A994,?,?,?,?,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 0045A846
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                        • API String ID: 1452528299-3112430753
                        • Opcode ID: 43171a4fcbad40929b381a5514e069f0f32426cb02f36866d449381604384e36
                        • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
                        • Opcode Fuzzy Hash: 43171a4fcbad40929b381a5514e069f0f32426cb02f36866d449381604384e36
                        • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
                        APIs
                        • GetVersion.KERNEL32 ref: 0045CBDA
                        • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
                        • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
                        • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
                        • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
                          • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
                        • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                        • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                        • API String ID: 59345061-4263478283
                        • Opcode ID: 428efc784f41d3aa7d264c2f262ec685fe65e126583ce7bbd5579cd36a3925cf
                        • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
                        • Opcode Fuzzy Hash: 428efc784f41d3aa7d264c2f262ec685fe65e126583ce7bbd5579cd36a3925cf
                        • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
                        APIs
                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
                        • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
                        • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
                        • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
                        • GetDC.USER32(00000000), ref: 0041B402
                        • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
                        • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
                        • SelectObject.GDI32(00000000,?), ref: 0041B470
                        • SelectObject.GDI32(?,00000000), ref: 0041B47F
                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                        • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                        • DeleteDC.GDI32(00000000), ref: 0041B4D0
                        • DeleteDC.GDI32(?), ref: 0041B4D9
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                        • String ID:
                        • API String ID: 644427674-0
                        • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                        • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
                        • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                        • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,?,00000000,?,00000000,00454B0D,?,0045AB6A,00000003,00000000,00000000,00454B44), ref: 0045498D
                          • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
                        • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
                        Strings
                        • , xrefs: 004548FE
                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
                        • RegOpenKeyEx, xrefs: 00454910
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: QueryValue$FormatMessageOpen
                        • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                        • API String ID: 2812809588-1577016196
                        • Opcode ID: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                        • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
                        • Opcode Fuzzy Hash: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                        • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
                        APIs
                          • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
                        Strings
                        • v2.0.50727, xrefs: 0045955B
                        • v1.1.4322, xrefs: 004595C2
                        • .NET Framework version %s not found, xrefs: 00459609
                        • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
                        • .NET Framework not found, xrefs: 0045961D
                        • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
                        • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
                        • v4.0.30319, xrefs: 004594F1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Close$Open
                        • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                        • API String ID: 2976201327-446240816
                        • Opcode ID: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                        • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
                        • Opcode Fuzzy Hash: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                        • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
                        APIs
                        • CloseHandle.KERNEL32(?), ref: 00458A7B
                        • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
                        • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
                        • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
                        • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
                        • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
                        Strings
                        • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
                        • Helper isn't responding; killing it., xrefs: 00458A87
                        • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
                        • Helper process exited., xrefs: 00458AC5
                        • Helper process exited, but failed to get exit code., xrefs: 00458AEF
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                        • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                        • API String ID: 3355656108-1243109208
                        • Opcode ID: 8d11a9d6b8ebfffa9e94c3bd241da5180e5b7166b03f76cd8ec90a905d120898
                        • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
                        • Opcode Fuzzy Hash: 8d11a9d6b8ebfffa9e94c3bd241da5180e5b7166b03f76cd8ec90a905d120898
                        • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
                        APIs
                          • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
                        • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
                          • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                        Strings
                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
                        • RegCreateKeyEx, xrefs: 004545C3
                        • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
                        • , xrefs: 004545B1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseCreateFormatMessageQueryValue
                        • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                        • API String ID: 2481121983-1280779767
                        • Opcode ID: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                        • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
                        • Opcode Fuzzy Hash: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                        • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
                        APIs
                          • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                          • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                        • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496CCD
                        • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496E21), ref: 00496CEE
                        • CreateWindowExA.USER32(00000000,STATIC,00496E30,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496D15
                        • SetWindowLongA.USER32(?,000000FC,004964A8), ref: 00496D28
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC,00496E30), ref: 00496D58
                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496DCC
                        • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000), ref: 00496DD8
                          • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                        • DestroyWindow.USER32(?,00496DFB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC), ref: 00496DEE
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                        • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                        • API String ID: 1549857992-2312673372
                        • Opcode ID: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                        • Instruction ID: 18f462a79ff6f3765b6ab1b49dcd34ad23a8ddcce266b6658739bc0f5698dca4
                        • Opcode Fuzzy Hash: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                        • Instruction Fuzzy Hash: 61414C70A40208AFDF00EBA5DD42F9E7BB8EB08714F52457AF510F7291D7799E008B68
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E441
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E495
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressCloseHandleModuleProc
                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
                        • API String ID: 4190037839-2312295185
                        • Opcode ID: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                        • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
                        • Opcode Fuzzy Hash: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                        • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
                        APIs
                        • GetActiveWindow.USER32 ref: 004629FC
                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
                        • GetWindowRect.USER32(?,00000000), ref: 00462A76
                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                        • API String ID: 2610873146-3407710046
                        • Opcode ID: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                        • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
                        • Opcode Fuzzy Hash: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                        • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
                        APIs
                        • GetActiveWindow.USER32 ref: 0042F194
                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
                        • GetWindowRect.USER32(?,00000000), ref: 0042F20E
                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$AddressProc$ActiveHandleModuleRect
                        • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                        • API String ID: 2610873146-3407710046
                        • Opcode ID: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                        • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
                        • Opcode Fuzzy Hash: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                        • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
                        APIs
                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,00000000,00000000), ref: 00458C79
                        • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
                        • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
                        • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
                        • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000), ref: 00458D55
                        • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00458D90,?,00000000), ref: 00458D5C
                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                        • String ID: CreateEvent$TransactNamedPipe
                        • API String ID: 2182916169-3012584893
                        • Opcode ID: ef16c20a6daf1f887f3bc2a9a4f4fdabf826d35dd2b72c43caf5f800eb3833ff
                        • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
                        • Opcode Fuzzy Hash: ef16c20a6daf1f887f3bc2a9a4f4fdabf826d35dd2b72c43caf5f800eb3833ff
                        • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
                        APIs
                        • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85,?,?,00000031,?), ref: 00456D48
                        • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
                        • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressErrorHandleLastLoadModuleProcType
                        • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                        • API String ID: 1914119943-2711329623
                        • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                        • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
                        • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                        • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
                        APIs
                        • RectVisible.GDI32(?,?), ref: 00416E13
                        • SaveDC.GDI32(?), ref: 00416E27
                        • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
                        • RestoreDC.GDI32(?,?), ref: 00416E65
                        • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
                        • FrameRect.USER32(?,?,?), ref: 00416F18
                        • DeleteObject.GDI32(?), ref: 00416F22
                        • CreateSolidBrush.GDI32(00000000), ref: 00416F32
                        • FrameRect.USER32(?,?,?), ref: 00416F65
                        • DeleteObject.GDI32(?), ref: 00416F6F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                        • String ID:
                        • API String ID: 375863564-0
                        • Opcode ID: 31305b42e63a20fe9f9ee5f73744d5e2f5e6a90e84c308e69de84060d35988a9
                        • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
                        • Opcode Fuzzy Hash: 31305b42e63a20fe9f9ee5f73744d5e2f5e6a90e84c308e69de84060d35988a9
                        • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
                        APIs
                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                        • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                        • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                        • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                        • GetLastError.KERNEL32(000000F5), ref: 00404C46
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                        • String ID:
                        • API String ID: 1694776339-0
                        • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                        • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                        • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                        • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                        APIs
                        • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
                        • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
                        • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
                        • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
                        • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
                        • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
                        • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
                        • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
                        • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
                        • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Menu$Delete$EnableItem$System
                        • String ID:
                        • API String ID: 3985193851-0
                        • Opcode ID: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                        • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
                        • Opcode Fuzzy Hash: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                        • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
                        APIs
                        • SHGetMalloc.SHELL32(?), ref: 004616C7
                        • GetActiveWindow.USER32 ref: 0046172B
                        • CoInitialize.OLE32(00000000), ref: 0046173F
                        • SHBrowseForFolder.SHELL32(?), ref: 00461756
                        • 7712D120.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
                        • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
                        • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ActiveWindow$7712BrowseD120FolderInitializeMalloc
                        • String ID: A
                        • API String ID: 3129831556-3554254475
                        • Opcode ID: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                        • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
                        • Opcode Fuzzy Hash: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                        • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
                        APIs
                        • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D2BD
                        • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D2CD
                        • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D2DD
                        • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D2ED
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                        • API String ID: 190572456-3516654456
                        • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                        • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
                        • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                        • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
                        APIs
                        • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
                        • SetBkColor.GDI32(?,?), ref: 0041AA08
                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
                        • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
                        • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
                        • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
                        • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Color$StretchText
                        • String ID:
                        • API String ID: 2984075790-0
                        • Opcode ID: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                        • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
                        • Opcode Fuzzy Hash: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                        • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
                        APIs
                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                        • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseDirectoryHandleSystem
                        • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                        • API String ID: 2051275411-1862435767
                        • Opcode ID: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                        • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
                        • Opcode Fuzzy Hash: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                        • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
                        APIs
                        • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
                        • GetSysColor.USER32(00000014), ref: 0044D1B0
                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
                        • GetSysColor.USER32(00000010), ref: 0044D202
                        • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
                        • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Text$Color$Draw$OffsetRect
                        • String ID:
                        • API String ID: 1005981011-0
                        • Opcode ID: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                        • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
                        • Opcode Fuzzy Hash: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                        • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
                        APIs
                        • GetFocus.USER32 ref: 0041B745
                        • GetDC.USER32(?), ref: 0041B751
                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
                        • RealizePalette.GDI32(00000000), ref: 0041B792
                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Palette$Select$BitmapCreateFocusRealize
                        • String ID: %H
                        • API String ID: 3275473261-1959103961
                        • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                        • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
                        • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                        • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
                        APIs
                        • GetFocus.USER32 ref: 0041BA17
                        • GetDC.USER32(?), ref: 0041BA23
                        • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
                        • RealizePalette.GDI32(00000000), ref: 0041BA69
                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Palette$Select$BitmapCreateFocusRealize
                        • String ID: %H
                        • API String ID: 3275473261-1959103961
                        • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                        • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
                        • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                        • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
                        APIs
                          • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496585
                        • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496599
                        • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 004965B3
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965BF
                        • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965C5
                        • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965D8
                        Strings
                        • Deleting Uninstall data files., xrefs: 004964FB
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                        • String ID: Deleting Uninstall data files.
                        • API String ID: 1570157960-2568741658
                        • Opcode ID: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                        • Instruction ID: caddedc05ae4add9971b90b84c259ce0cd5246952d50e779d54ebc968ffbf915
                        • Opcode Fuzzy Hash: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                        • Instruction Fuzzy Hash: 73216170204250BFEB10EB6ABC82B2637A8DB54728F53453BB501961D6DA7CAC448A6D
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9,?,?,?,?,00000000), ref: 00470263
                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9), ref: 0047027A
                        • AddFontResourceA.GDI32(00000000), ref: 00470297
                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004702AB
                        Strings
                        • Failed to open Fonts registry key., xrefs: 00470281
                        • Failed to set value in Fonts registry key., xrefs: 0047026C
                        • AddFontResource, xrefs: 004702B5
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseFontMessageNotifyOpenResourceSendValue
                        • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                        • API String ID: 955540645-649663873
                        • Opcode ID: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                        • Instruction ID: 122e39bb1ea2b43e4c2a7da55aa69ddad999e5e54c07bca5f4119535fc7344d3
                        • Opcode Fuzzy Hash: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                        • Instruction Fuzzy Hash: 6921E271741204BBDB10EAA68C46FAE67AC9B14704F208477B904EB3C3DA7C9E01866D
                        APIs
                          • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                          • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
                          • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
                        • GetVersion.KERNEL32 ref: 00462E60
                        • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
                        • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
                        • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
                        • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
                        • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                        • String ID: Explorer
                        • API String ID: 2594429197-512347832
                        • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                        • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
                        • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                        • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02202C30,?,?,?,02202C30,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                        • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02202C30,?,?,?,02202C30,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                        • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02202C30,?,?,?,02202C30), ref: 004783CC
                        • CloseHandle.KERNEL32(00000000,?,?,?,02202C30,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                        • String ID: GetFinalPathNameByHandleA$kernel32.dll
                        • API String ID: 2704155762-2318956294
                        • Opcode ID: 6bc275baaa87b820f83455aa3780e808e355a1b98666f0b165ca17ab90bcbd73
                        • Instruction ID: 2a72e966618face2f1bd82d2a524167157479a72732682c44667b4342ad9b4bf
                        • Opcode Fuzzy Hash: 6bc275baaa87b820f83455aa3780e808e355a1b98666f0b165ca17ab90bcbd73
                        • Instruction Fuzzy Hash: 370180A07C070536E520316A4C8AFBB654C8B50769F14863FBA1DFA2D3FDED9D06016E
                        APIs
                        • GetLastError.KERNEL32(00000000,00459F8E,?,00000000,00000000,00000000,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 00459ED2
                          • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
                        Strings
                        • Deleting directory: %s, xrefs: 00459E5B
                        • Failed to strip read-only attribute., xrefs: 00459EA0
                        • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
                        • Stripped read-only attribute., xrefs: 00459E94
                        • Failed to delete directory (%d)., xrefs: 00459F68
                        • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
                        • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseErrorFindLast
                        • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                        • API String ID: 754982922-1448842058
                        • Opcode ID: 825b69e71020358a2790d5b66baca682891f253eb20f6d4b4ab0a73fce46c835
                        • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
                        • Opcode Fuzzy Hash: 825b69e71020358a2790d5b66baca682891f253eb20f6d4b4ab0a73fce46c835
                        • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
                        APIs
                        • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
                        • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
                        • GetActiveWindow.USER32 ref: 0042F2DA
                        • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
                        • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ActiveLong$Message
                        • String ID:
                        • API String ID: 2785966331-0
                        • Opcode ID: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                        • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
                        • Opcode Fuzzy Hash: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                        • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
                        APIs
                        • GetDC.USER32(00000000), ref: 0042948A
                        • GetTextMetricsA.GDI32(00000000), ref: 00429493
                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                        • SelectObject.GDI32(00000000,00000000), ref: 004294A2
                        • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
                        • SelectObject.GDI32(00000000,00000000), ref: 004294B6
                        • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
                        • GetSystemMetrics.USER32(00000006), ref: 004294E3
                        • GetSystemMetrics.USER32(00000006), ref: 004294FD
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                        • String ID:
                        • API String ID: 1583807278-0
                        • Opcode ID: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                        • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
                        • Opcode Fuzzy Hash: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                        • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
                        APIs
                        • GetDC.USER32(00000000), ref: 0041DE27
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
                        • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
                        • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
                        • GetStockObject.GDI32(00000007), ref: 0041DE5B
                        • GetStockObject.GDI32(00000005), ref: 0041DE67
                        • GetStockObject.GDI32(0000000D), ref: 0041DE73
                        • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ObjectStock$CapsDeviceIconLoadRelease
                        • String ID:
                        • API String ID: 225703358-0
                        • Opcode ID: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
                        • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
                        • Opcode Fuzzy Hash: cf3de45f10179e040e4bf754cd3e00afbbff0486b0448c288d4be5e1939ebdb6
                        • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
                        APIs
                        • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
                        • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Cursor$Load
                        • String ID: $ $Internal error: Item already expanding
                        • API String ID: 1675784387-1948079669
                        • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                        • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
                        • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                        • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
                        APIs
                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: PrivateProfileStringWrite
                        • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                        • API String ID: 390214022-3304407042
                        • Opcode ID: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                        • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
                        • Opcode Fuzzy Hash: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                        • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
                        APIs
                        • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
                          • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                          • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: InfoLocale$DefaultSystem
                        • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                        • API String ID: 1044490935-665933166
                        • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                        • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
                        • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                        • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
                        APIs
                        • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
                        • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
                          • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
                        • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
                          • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
                        • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Menu$Insert$Create$ItemPopupVersion
                        • String ID: ,$?
                        • API String ID: 2359071979-2308483597
                        • Opcode ID: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                        • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
                        • Opcode Fuzzy Hash: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                        • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
                        APIs
                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
                        • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
                        • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
                        • DeleteObject.GDI32(?), ref: 0041BF9F
                        • DeleteObject.GDI32(?), ref: 0041BFA8
                        • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Object$BitmapBitsDelete$CreateIcon
                        • String ID:
                        • API String ID: 1030595962-0
                        • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                        • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
                        • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                        • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
                        APIs
                        • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
                        • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
                        • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
                        • RealizePalette.GDI32(?), ref: 0041CF92
                        • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
                        • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
                        • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                        • String ID:
                        • API String ID: 2222416421-0
                        • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                        • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
                        • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                        • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
                        APIs
                        • SendMessageA.USER32(00000000,?,?), ref: 0045732E
                          • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
                          • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                          • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
                        • TranslateMessage.USER32(?), ref: 004573B3
                        • DispatchMessageA.USER32(?), ref: 004573BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                        • String ID: [Paused]
                        • API String ID: 1007367021-4230553315
                        • Opcode ID: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                        • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
                        • Opcode Fuzzy Hash: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                        • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
                        APIs
                        • GetCursor.USER32(00000000,0046B55F), ref: 0046B4DC
                        • LoadCursorA.USER32(00000000,00007F02), ref: 0046B4EA
                        • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4F0
                        • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4FA
                        • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B500
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Cursor$LoadSleep
                        • String ID: CheckPassword
                        • API String ID: 4023313301-1302249611
                        • Opcode ID: a15a8593e9f633b5a85a0686193dd54b7b5146f7df37d6bd0e19c7d70d8febf0
                        • Instruction ID: 9465d4cba05e43c3341d6d018928b45656d3fee3f016636846a90655da25d4f4
                        • Opcode Fuzzy Hash: a15a8593e9f633b5a85a0686193dd54b7b5146f7df37d6bd0e19c7d70d8febf0
                        • Instruction Fuzzy Hash: D0316334740204AFD711EF69C899B9A7BE4EF45308F5580B6F9049B3A2D7789E40CB99
                        APIs
                          • Part of subcall function 00477B94: GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                          • Part of subcall function 00477B94: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                          • Part of subcall function 00477B94: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                        • SendMessageA.USER32(00000000,0000004A,00000000,00478026), ref: 00477CA1
                        • GetTickCount.KERNEL32 ref: 00477CE6
                        • GetTickCount.KERNEL32 ref: 00477CF0
                        • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477D45
                        Strings
                        • CallSpawnServer: Unexpected status: %d, xrefs: 00477D2E
                        • CallSpawnServer: Unexpected response: $%x, xrefs: 00477CD6
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                        • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                        • API String ID: 613034392-3771334282
                        • Opcode ID: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                        • Instruction ID: 262cbc5b9954910938d5a1e8e32dc50db46ad6f301169d9d39307b56b522dac3
                        • Opcode Fuzzy Hash: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                        • Instruction Fuzzy Hash: 87318474B042159EDB10EBB9C8867EE76A0AF08714F90807AB548EB392D67C9D4187AD
                        APIs
                        • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045983F
                        Strings
                        • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
                        • Fusion.dll, xrefs: 004597DF
                        • Failed to load .NET Framework DLL "%s", xrefs: 00459824
                        • CreateAssemblyCache, xrefs: 00459836
                        • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                        • API String ID: 190572456-3990135632
                        • Opcode ID: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                        • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
                        • Opcode Fuzzy Hash: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                        • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
                        APIs
                          • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
                        • GetFocus.USER32 ref: 0041C168
                        • GetDC.USER32(?), ref: 0041C174
                        • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
                        • RealizePalette.GDI32(?), ref: 0041C1A1
                        • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
                        • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
                        • ReleaseDC.USER32(?,?), ref: 0041C1ED
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                        • String ID:
                        • API String ID: 3303097818-0
                        • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                        • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
                        • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                        • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
                        APIs
                        • GetSystemMetrics.USER32(0000000E), ref: 00418C70
                        • GetSystemMetrics.USER32(0000000D), ref: 00418C78
                        • 6F9C2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
                          • Part of subcall function 004107F8: 6F9BC400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
                        • 6FA2CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
                        • 6FA2C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
                        • 6FA2CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
                        • 6F9C0860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MetricsSystem$C0860C2980C400C740
                        • String ID:
                        • API String ID: 624341609-0
                        • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                        • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
                        • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                        • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483D24), ref: 00483D09
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                        • API String ID: 47109696-2530820420
                        • Opcode ID: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                        • Instruction ID: 212569cff1cfb7858b589fbdbabdc9c693f1f7cc945fcf11155ec0ddb5f1f406
                        • Opcode Fuzzy Hash: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                        • Instruction Fuzzy Hash: CC117C30704244AADB10FF65D862B5E7BF9DB45B05F618877A800E7282EB78AE05875C
                        APIs
                        • SelectObject.GDI32(00000000,?), ref: 0041B470
                        • SelectObject.GDI32(?,00000000), ref: 0041B47F
                        • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                        • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                        • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                        • DeleteDC.GDI32(00000000), ref: 0041B4D0
                        • DeleteDC.GDI32(?), ref: 0041B4D9
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ObjectSelect$Delete$Stretch
                        • String ID:
                        • API String ID: 1458357782-0
                        • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                        • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
                        • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                        • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
                        APIs
                        • GetDC.USER32(00000000), ref: 00495519
                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                        • SelectObject.GDI32(00000000,00000000), ref: 0049553B
                        • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
                        • GetTextMetricsA.GDI32(00000000,?), ref: 00495571
                        • ReleaseDC.USER32(00000000,00000000), ref: 0049558E
                        Strings
                        • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495546
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                        • API String ID: 2948443157-222967699
                        • Opcode ID: a4d12ece59ca6c64cb8c4defcdc73c5f067a9176de86fed221050984d74d5100
                        • Instruction ID: fbfe8d588f566b1ae935688c8d8bbf43f3780a3d17a9f30f48774e54417b88ea
                        • Opcode Fuzzy Hash: a4d12ece59ca6c64cb8c4defcdc73c5f067a9176de86fed221050984d74d5100
                        • Instruction Fuzzy Hash: 98018476A04704BFEB05DBE9CC41E5EB7EDEB48714F614476F604E7281D678AE008B28
                        APIs
                        • GetCursorPos.USER32 ref: 004233AF
                        • WindowFromPoint.USER32(?,?), ref: 004233BC
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
                        • GetCurrentThreadId.KERNEL32 ref: 004233D1
                        • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
                        • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
                        • SetCursor.USER32(00000000), ref: 00423413
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                        • String ID:
                        • API String ID: 1770779139-0
                        • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                        • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
                        • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                        • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049533C
                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495349
                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495356
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                        • API String ID: 667068680-2254406584
                        • Opcode ID: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                        • Instruction ID: d6622564654ba01390171a2dbbf88ec7785202fdd48675fe733a6c53722864ad
                        • Opcode Fuzzy Hash: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                        • Instruction Fuzzy Hash: 7EF0F692741F156ADA3121660C41B7F6B8CCB917B1F240137BE44A7382E9ED8C0047ED
                        APIs
                        • GetProcAddress.KERNEL32(00000000,ISCryptGetVersion), ref: 0045D191
                        • GetProcAddress.KERNEL32(00000000,ArcFourInit), ref: 0045D1A1
                        • GetProcAddress.KERNEL32(00000000,ArcFourCrypt), ref: 0045D1B1
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                        • API String ID: 190572456-508647305
                        • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                        • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
                        • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                        • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
                        APIs
                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D691
                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D6A1
                        • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D6B1
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                        • API String ID: 190572456-212574377
                        • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                        • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
                        • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                        • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004812C8), ref: 0042EA35
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
                        • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
                          • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                          • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                          • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                        • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                        • String ID: ChangeWindowMessageFilterEx$user32.dll
                        • API String ID: 142928637-2676053874
                        • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                        • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
                        • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                        • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
                        APIs
                        • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
                        • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
                        • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                        • API String ID: 2238633743-1050967733
                        • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                        • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
                        • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                        • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                        • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                        • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                        • API String ID: 667068680-222143506
                        • Opcode ID: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                        • Instruction ID: 32a0137ea675787c0bb1f7a77b9c903aea73f6d33f3aa717a8ad139b0a70eb03
                        • Opcode Fuzzy Hash: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                        • Instruction Fuzzy Hash: 4DC0C9F02C1700EEAA01B7B11DCAA7A255CC500728320843F7049BA182D97C0C104F3C
                        APIs
                        • GetFocus.USER32 ref: 0041B57E
                        • GetDC.USER32(?), ref: 0041B58A
                        • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
                        • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
                        • ReleaseDC.USER32(?,?), ref: 0041B626
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                        • String ID:
                        • API String ID: 2502006586-0
                        • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                        • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
                        • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                        • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
                        APIs
                        • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                        • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                        • API String ID: 1452528299-1580325520
                        • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                        • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
                        • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                        • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
                        APIs
                        • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
                        • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
                        • GetDC.USER32(00000000), ref: 0041BDE9
                        • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
                        • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CapsDeviceMetricsSystem$Release
                        • String ID:
                        • API String ID: 447804332-0
                        • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                        • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
                        • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                        • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
                        APIs
                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E766
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CD49), ref: 0047E78C
                        • GetWindowLongA.USER32(?,000000EC), ref: 0047E79C
                        • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E7BD
                        • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E7D1
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E7ED
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$Long$Show
                        • String ID:
                        • API String ID: 3609083571-0
                        • Opcode ID: 761baba5ea275c4f8ba8f3b2538ab5f77c1d2b06cda4c3ad0feadca871259e14
                        • Instruction ID: 463a5c2536fff799c7bf7cf61cbf8045bc8b98cac2b0bb45a0840e8ed8c25010
                        • Opcode Fuzzy Hash: 761baba5ea275c4f8ba8f3b2538ab5f77c1d2b06cda4c3ad0feadca871259e14
                        • Instruction Fuzzy Hash: 53010CB5641210ABEA00D769DE81F6637D8AB1C320F0943A6B959DF3E3C738EC408B49
                        APIs
                          • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
                        • UnrealizeObject.GDI32(00000000), ref: 0041B27C
                        • SelectObject.GDI32(?,00000000), ref: 0041B28E
                        • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
                        • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
                        • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
                        • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
                          • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                        • String ID:
                        • API String ID: 3527656728-0
                        • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                        • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
                        • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                        • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
                        APIs
                        • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                        • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseCreateFileHandle
                        • String ID: !nI$.tmp$_iu
                        • API String ID: 3498533004-584216493
                        • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                        • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
                        • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                        • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
                        APIs
                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                        • ShowWindow.USER32(?,00000005,00000000,00497FC1,?,?,00000000), ref: 00497D92
                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                          • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                          • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                        • String ID: .dat$.msg$IMsg$Uninstall
                        • API String ID: 3312786188-1660910688
                        • Opcode ID: d050b8c65b09966d21fe0fc985d660f82682418f1ef04ac2b8f2793e44e24393
                        • Instruction ID: abb28459e614be91aca1b68aa70fad33032f6e559e3bf784a216f74f74fa669e
                        • Opcode Fuzzy Hash: d050b8c65b09966d21fe0fc985d660f82682418f1ef04ac2b8f2793e44e24393
                        • Instruction Fuzzy Hash: 89314F34A14114AFCB00EF65DD9296E7BB5EF89314F91857AF800AB395DB38BD01CB68
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressByteCharHandleModuleMultiProcWide
                        • String ID: ShutdownBlockReasonCreate$user32.dll
                        • API String ID: 828529508-2866557904
                        • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                        • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
                        • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                        • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
                        APIs
                        • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
                        • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                        • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                        • API String ID: 2573145106-3235461205
                        • Opcode ID: 0165f3f1031fc1aa6e60b3a9799ba1014783226e14f241c311df118ccfede771
                        • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
                        • Opcode Fuzzy Hash: 0165f3f1031fc1aa6e60b3a9799ba1014783226e14f241c311df118ccfede771
                        • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                        • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressExchangeHandleInterlockedModuleProc
                        • String ID: ChangeWindowMessageFilter$user32.dll
                        • API String ID: 3478007392-2498399450
                        • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                        • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
                        • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                        • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
                        APIs
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                        • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProcProcessThreadWindow
                        • String ID: AllowSetForegroundWindow$user32.dll
                        • API String ID: 1782028327-3855017861
                        • Opcode ID: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                        • Instruction ID: d51ed2a8d8be4cb67b0f2e6afaff03014389f5b4c9f6752a27b175deb1fe6994
                        • Opcode Fuzzy Hash: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                        • Instruction Fuzzy Hash: D7D0C790248701B9D910B3F64D46E9F3A5D894471CB50C47BB418E61C5DA7CFD04893D
                        APIs
                        • BeginPaint.USER32(00000000,?), ref: 00416C52
                        • SaveDC.GDI32(?), ref: 00416C83
                        • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
                        • RestoreDC.GDI32(?,?), ref: 00416D0B
                        • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Paint$BeginClipExcludeRectRestoreSave
                        • String ID:
                        • API String ID: 3808407030-0
                        • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                        • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
                        • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                        • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                        • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
                        • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                        • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
                        APIs
                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
                        • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
                        • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
                        • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
                        • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                        • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
                        • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                        • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
                        APIs
                        • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
                        • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
                        • GetDC.USER32(00000000), ref: 0041BC12
                        • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
                        • DeleteObject.GDI32(00000000), ref: 0041BC9A
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MetricsSystem$BitmapCreateDeleteObject
                        • String ID:
                        • API String ID: 1095203571-0
                        • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                        • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
                        • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                        • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
                        APIs
                          • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                        • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
                        • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
                        Strings
                        • Could not set permissions on the registry key because it currently does not exist., xrefs: 0047366F
                        • Setting permissions on registry key: %s\%s, xrefs: 0047362A
                        • Failed to set permissions on registry key (%d)., xrefs: 0047368C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                        • API String ID: 1452528299-4018462623
                        • Opcode ID: f83a2768d3c65ea5df61b415147cb4a980a2a4da2a2eeea125c2e66a17c72d68
                        • Instruction ID: ad6b00cc897a6d1501f3fc6a2a631de3da5dc8c6e7b4eccdfad28332e4495c63
                        • Opcode Fuzzy Hash: f83a2768d3c65ea5df61b415147cb4a980a2a4da2a2eeea125c2e66a17c72d68
                        • Instruction Fuzzy Hash: A121C870A046445FCB10DFA9C8826EEBBE4DF49319F50817BE408E7392D7785E098B6D
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocString
                        • String ID:
                        • API String ID: 262959230-0
                        • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                        • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                        • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                        • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                        APIs
                        • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
                        • RealizePalette.GDI32(00000000), ref: 00414421
                        • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
                        • RealizePalette.GDI32(00000000), ref: 0041443B
                        • ReleaseDC.USER32(00000000,00000000), ref: 00414446
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Palette$RealizeSelect$Release
                        • String ID:
                        • API String ID: 2261976640-0
                        • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                        • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
                        • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                        • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
                        APIs
                          • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
                          • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
                          • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
                          • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
                        • OffsetRect.USER32(?,?,?), ref: 00424DC9
                        • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
                        • OffsetRect.USER32(?,?,?), ref: 00424E9D
                          • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
                          • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
                          • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
                          • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
                        • String ID: vLB
                        • API String ID: 1477829881-1797516613
                        • Opcode ID: b071e8f690a675b1b5ec03376c9d1dc0568a9cea913d7d114b2f1dd6f13c8b48
                        • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
                        • Opcode Fuzzy Hash: b071e8f690a675b1b5ec03376c9d1dc0568a9cea913d7d114b2f1dd6f13c8b48
                        • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
                        APIs
                        • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
                        • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
                        • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Enum$NameOpenResourceUniversal
                        • String ID: Z
                        • API String ID: 3604996873-1505515367
                        • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                        • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
                        • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                        • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
                        APIs
                        • SetRectEmpty.USER32(?), ref: 0044D04E
                        • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
                        • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DrawText$EmptyRect
                        • String ID:
                        • API String ID: 182455014-2867612384
                        • Opcode ID: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                        • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
                        • Opcode Fuzzy Hash: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                        • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
                        APIs
                        • GetDC.USER32(00000000), ref: 0042EF9E
                          • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                        • SelectObject.GDI32(?,00000000), ref: 0042EFC1
                        • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CreateFontIndirectObjectReleaseSelect
                        • String ID: ...\
                        • API String ID: 3133960002-983595016
                        • Opcode ID: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                        • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
                        • Opcode Fuzzy Hash: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                        • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
                        APIs
                        • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                        • UnregisterClassA.USER32(?,00400000), ref: 004164AB
                        • RegisterClassA.USER32(?), ref: 004164CE
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Class$InfoRegisterUnregister
                        • String ID: @
                        • API String ID: 3749476976-2766056989
                        • Opcode ID: 5b42dbe956ccb297a4347149b64d01d8291e8cf711d902875b0d5c2af7b22291
                        • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
                        • Opcode Fuzzy Hash: 5b42dbe956ccb297a4347149b64d01d8291e8cf711d902875b0d5c2af7b22291
                        • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
                        APIs
                        • GetFileAttributesA.KERNEL32(00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 00498280
                        • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 004982A9
                        • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004982C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File$Attributes$Move
                        • String ID: isRS-%.3u.tmp
                        • API String ID: 3839737484-3657609586
                        • Opcode ID: caa082c947593af69ac399f5aa69a479bfa54a7c4d0fec8f0c1611cec8706775
                        • Instruction ID: fc33356634acd7bce8b4c2965ae56e8bcff63ef6fc68eceab8a95db248f88364
                        • Opcode Fuzzy Hash: caa082c947593af69ac399f5aa69a479bfa54a7c4d0fec8f0c1611cec8706775
                        • Instruction Fuzzy Hash: 0B216471E00609ABCF10EFA9C8819AFBBB8AF45714F10457FB814B72D1DB389E018A59
                        APIs
                          • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                        • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
                        • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                        • String ID: LoadTypeLib$RegisterTypeLib
                        • API String ID: 1312246647-2435364021
                        • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                        • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
                        • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                        • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
                        APIs
                        • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
                        • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
                        Strings
                        • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
                        • Failed to create DebugClientWnd, xrefs: 004571D4
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                        • API String ID: 3850602802-3720027226
                        • Opcode ID: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                        • Instruction ID: a6ca84080c04e90ac639e3db27cd2c1e4b46fe4ea5f20cae781d9f83c3d7e460
                        • Opcode Fuzzy Hash: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                        • Instruction Fuzzy Hash: 1011E770248240AFD710AB69AC85B5FBBD89B54319F15407AFA849B383D7798C18C7AE
                        APIs
                          • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                        • GetFocus.USER32 ref: 00478757
                        • GetKeyState.USER32(0000007A), ref: 00478769
                        • WaitMessage.USER32(?,00000000,00478790,?,00000000,004787B7,?,?,00000001,00000000,?,?,?,00480402,00000000,004812C8), ref: 00478773
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FocusMessageStateTextWaitWindow
                        • String ID: Wnd=$%x
                        • API String ID: 1381870634-2927251529
                        • Opcode ID: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                        • Instruction ID: f17a5035e7dee30901ec9a03c3a5a372f1d0714b29ccd98a4f066b2945bd060b
                        • Opcode Fuzzy Hash: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                        • Instruction Fuzzy Hash: CE11C634A40244AFD704EF65DC49A9EBBF8EB49314F6184BFF409E7681DB386D00CA69
                        APIs
                        • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E618
                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E627
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Time$File$LocalSystem
                        • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                        • API String ID: 1748579591-1013271723
                        • Opcode ID: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                        • Instruction ID: 5dd65cae4c1adac9d47cc9ad6336eda1851498fedff4a8a979bd050f9c4a6815
                        • Opcode Fuzzy Hash: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                        • Instruction Fuzzy Hash: A81136A440C3909ED340DF2AC04432BBAE4AB99704F44892EF8C8C6381E779C848DBB7
                        APIs
                        • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
                          • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
                          • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: File$AttributesDeleteErrorLastMove
                        • String ID: DeleteFile$MoveFile
                        • API String ID: 3024442154-139070271
                        • Opcode ID: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                        • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
                        • Opcode Fuzzy Hash: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                        • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpen
                        • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                        • API String ID: 47109696-2631785700
                        • Opcode ID: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                        • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
                        • Opcode Fuzzy Hash: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                        • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C05
                        • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C28
                        Strings
                        • System\CurrentControlSet\Control\Windows, xrefs: 00483BD2
                        • CSDVersion, xrefs: 00483BFC
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                        • API String ID: 3677997916-1910633163
                        • Opcode ID: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                        • Instruction ID: 1d850e848a14c5c59b8e95f13e5f63a8fb365af486cc5d6c9f9b701d22fca986
                        • Opcode Fuzzy Hash: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                        • Instruction Fuzzy Hash: 56F03176E40208A6DF10EAD48C45BAFB3BCAB14B05F104967EA10F7280E678AB048B59
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: GetSystemWow64DirectoryA$kernel32.dll
                        • API String ID: 1646373207-4063490227
                        • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                        • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
                        • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                        • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: ShutdownBlockReasonDestroy$user32.dll
                        • API String ID: 1646373207-260599015
                        • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                        • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
                        • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                        • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: NotifyWinEvent$user32.dll
                        • API String ID: 1646373207-597752486
                        • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                        • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
                        • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                        • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
                        APIs
                        • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                        • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: DisableProcessWindowsGhosting$user32.dll
                        • API String ID: 1646373207-834958232
                        • Opcode ID: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                        • Instruction ID: 34f838485a85c0df890c3e192e44216071158a5cea444d63bbc0a0b2480586ef
                        • Opcode Fuzzy Hash: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                        • Instruction Fuzzy Hash: 22B002C0651707589D5032FA0D06B3F48484C5276D728057F3414A51C6DD6C89115D3F
                        APIs
                          • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                          • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                        • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                        • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: SHPathPrepareForWriteA$shell32.dll
                        • API String ID: 2238633743-2683653824
                        • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                        • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
                        • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                        • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
                        APIs
                        • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54), ref: 0047D7CC
                        • FindClose.KERNEL32(000000FF,0047D7F7,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54,00000000), ref: 0047D7EA
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Find$CloseFileNext
                        • String ID:
                        • API String ID: 2066263336-0
                        • Opcode ID: a6a6de62ca6c42606125c8bf602dc313b21ff567e24e7e5ea6ef40873b2a201c
                        • Instruction ID: 2ce97de6e4eb512f8d4c2eb376340b964b0e691095a652a34be041e4083b4e02
                        • Opcode Fuzzy Hash: a6a6de62ca6c42606125c8bf602dc313b21ff567e24e7e5ea6ef40873b2a201c
                        • Instruction Fuzzy Hash: 07813A74D0024D9FCF11EFA5CC91ADFBBB8EF49304F5080AAE908A7291D6399A46CF54
                        APIs
                          • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
                          • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
                        • GetLastError.KERNEL32(00000000,00475721,?,?,0049C1E0,00000000), ref: 0047560A
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CountErrorFileLastMoveTick
                        • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                        • API String ID: 2406187244-2685451598
                        • Opcode ID: a13b4d41162069bde37ca5ba37a3bfc16fb44220c5afb8832f1568bbfa6ce935
                        • Instruction ID: cfe7f312216358cbd0971b398f0cafde252de4893b1317a5ce8d70824cf78b76
                        • Opcode Fuzzy Hash: a13b4d41162069bde37ca5ba37a3bfc16fb44220c5afb8832f1568bbfa6ce935
                        • Instruction Fuzzy Hash: 4D418570A006099BDB10EFA5D882AEF77B5FF48314F508537E408BB395D7789A058BA9
                        APIs
                        • GetDesktopWindow.USER32 ref: 00413D46
                        • GetDesktopWindow.USER32 ref: 00413DFE
                          • Part of subcall function 00418EC0: 6FA2C6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
                          • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
                        • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CursorDesktopWindow$Show
                        • String ID:
                        • API String ID: 2074268717-0
                        • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                        • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
                        • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                        • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
                        APIs
                        • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
                        • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
                        • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
                        • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: LoadString$FileMessageModuleName
                        • String ID:
                        • API String ID: 704749118-0
                        • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                        • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
                        • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                        • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
                        APIs
                        • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
                          • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
                        • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
                          • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
                        • IsRectEmpty.USER32(?), ref: 0044E953
                        • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                        • String ID:
                        • API String ID: 855768636-0
                        • Opcode ID: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                        • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
                        • Opcode Fuzzy Hash: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                        • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
                        APIs
                        • OffsetRect.USER32(?,?,00000000), ref: 00495988
                        • OffsetRect.USER32(?,00000000,?), ref: 004959A3
                        • OffsetRect.USER32(?,?,00000000), ref: 004959BD
                        • OffsetRect.USER32(?,00000000,?), ref: 004959D8
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: OffsetRect
                        • String ID:
                        • API String ID: 177026234-0
                        • Opcode ID: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                        • Instruction ID: 9409249b62c1188f54b5b62e2685c04785358b71117f53a2337039625fc08c68
                        • Opcode Fuzzy Hash: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                        • Instruction Fuzzy Hash: 1121AEB6700701AFDB00DE69CD81E5BB7DAEFC4350F248A2AF944C3249D638ED048761
                        APIs
                        • GetCursorPos.USER32 ref: 00417260
                        • SetCursor.USER32(00000000), ref: 004172A3
                        • GetLastActivePopup.USER32(?), ref: 004172CD
                        • GetForegroundWindow.USER32(?), ref: 004172D4
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Cursor$ActiveForegroundLastPopupWindow
                        • String ID:
                        • API String ID: 1959210111-0
                        • Opcode ID: f57167407fddf9cd78af34a0bec631c5eda0cffb2877c5f098be8ccd36a9b240
                        • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
                        • Opcode Fuzzy Hash: f57167407fddf9cd78af34a0bec631c5eda0cffb2877c5f098be8ccd36a9b240
                        • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
                        APIs
                        • MulDiv.KERNEL32(?,00000008,?), ref: 004955F1
                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495605
                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495619
                        • MulDiv.KERNEL32(?,00000008,?), ref: 00495637
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                        • Instruction ID: b77f8f3c6746ea581d036ce488ab013aedd37a602364075716cddbfd1b85439e
                        • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                        • Instruction Fuzzy Hash: A5112E72604504ABCB40DEA9D8C4D9B7BECEF8D324B6441AAF908DB242D674ED408B68
                        APIs
                        • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
                        • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
                        • RegisterClassA.USER32(00499598), ref: 0041F4D4
                        • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Class$InfoLongRegisterUnregisterWindow
                        • String ID:
                        • API String ID: 4025006896-0
                        • Opcode ID: 2789f09181fedf2aa8f29be774d1bfe7920984f559ea6f8e8637ed1726722249
                        • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
                        • Opcode Fuzzy Hash: 2789f09181fedf2aa8f29be774d1bfe7920984f559ea6f8e8637ed1726722249
                        • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
                        APIs
                        • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
                        • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58,0000000A,00000000), ref: 0040D041
                        • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58), ref: 0040D05B
                        • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeof
                        • String ID:
                        • API String ID: 3473537107-0
                        • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                        • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
                        • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                        • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
                        APIs
                        • GetLastError.KERNEL32(?,00000000), ref: 004705F1
                        Strings
                        • Failed to set NTFS compression state (%d)., xrefs: 00470602
                        • Setting NTFS compression on file: %s, xrefs: 004705BF
                        • Unsetting NTFS compression on file: %s, xrefs: 004705D7
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                        • API String ID: 1452528299-3038984924
                        • Opcode ID: e534bd073bd99d1ffd8d8a7551bf23dca8ffa9a0f38022b87dc0121eb45f3a98
                        • Instruction ID: 452327faed6fd823952186a677ff1a78a18aba12ee86070aec797b5412e08bdc
                        • Opcode Fuzzy Hash: e534bd073bd99d1ffd8d8a7551bf23dca8ffa9a0f38022b87dc0121eb45f3a98
                        • Instruction Fuzzy Hash: A5018B71D09248A6CB04D7AD94512DDBBE49F4D314F44C5FFE459D7342DB780A088B9E
                        APIs
                        • GetLastError.KERNEL32(00000000,00000000), ref: 0046FE45
                        Strings
                        • Setting NTFS compression on directory: %s, xrefs: 0046FE13
                        • Failed to set NTFS compression state (%d)., xrefs: 0046FE56
                        • Unsetting NTFS compression on directory: %s, xrefs: 0046FE2B
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                        • API String ID: 1452528299-1392080489
                        • Opcode ID: f57c8121f87b7cbe45d24f1443a8c943819022774a47ae68e03ba31a404fe09e
                        • Instruction ID: 6c3eba688a3488f6cff2036d9eec8e6f632fba0cce39d579df3f4bd3b957a0ce
                        • Opcode Fuzzy Hash: f57c8121f87b7cbe45d24f1443a8c943819022774a47ae68e03ba31a404fe09e
                        • Instruction Fuzzy Hash: E5014421E0824856CB04D7ADE44129DBBA49F49304F4485BBA495E7253EB790A09879B
                        APIs
                          • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                        • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
                        • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
                        • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
                        • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                        • String ID:
                        • API String ID: 4283692357-0
                        • Opcode ID: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                        • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
                        • Opcode Fuzzy Hash: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                        • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
                        APIs
                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB,00000000), ref: 0047820D
                        • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB), ref: 00478213
                        • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478235
                        • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478246
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                        • String ID:
                        • API String ID: 215268677-0
                        • Opcode ID: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                        • Instruction ID: 91f0679cb69370e855683a510bc75a037ced8834772831ea40795c83ba0b1c60
                        • Opcode Fuzzy Hash: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                        • Instruction Fuzzy Hash: D8F037716447007BD600E6B58C81E5B73DCEB44354F04493E7E98C71C1DA78DC089776
                        APIs
                        • GetLastActivePopup.USER32(?), ref: 0042424C
                        • IsWindowVisible.USER32(?), ref: 0042425D
                        • IsWindowEnabled.USER32(?), ref: 00424267
                        • SetForegroundWindow.USER32(?), ref: 00424271
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                        • String ID:
                        • API String ID: 2280970139-0
                        • Opcode ID: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                        • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
                        • Opcode Fuzzy Hash: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                        • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
                        APIs
                        • GlobalHandle.KERNEL32 ref: 0040626F
                        • GlobalUnWire.KERNEL32(00000000), ref: 00406276
                        • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                        • GlobalFix.KERNEL32(00000000), ref: 00406281
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Global$AllocHandleWire
                        • String ID:
                        • API String ID: 2210401237-0
                        • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                        • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                        • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                        • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                        APIs
                        • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BB01,?,00000000,00000000,00000001,00000000,0047A4B5,?,00000000), ref: 0047A479
                        Strings
                        • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A2ED
                        • Failed to parse "reg" constant, xrefs: 0047A480
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Close
                        • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                        • API String ID: 3535843008-1938159461
                        • Opcode ID: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                        • Instruction ID: 25f2a786541cb687838a6194ffc4a73185deb9e5551b5ad8c851c0bf1152322b
                        • Opcode Fuzzy Hash: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                        • Instruction Fuzzy Hash: 22817274E00108AFCB10DF95D485ADEBBF9AF88344F50817AE814B7392D739AE05CB99
                        APIs
                        • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764B0
                        • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764C4
                        Strings
                        • Extracting temporary file: , xrefs: 004763EC
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: FileTime$Local
                        • String ID: Extracting temporary file:
                        • API String ID: 791338737-4171118009
                        • Opcode ID: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                        • Instruction ID: 173659db1c42fed311bbc77dc24fc0b62308bfde4479aaaaa113f8cb774a82d8
                        • Opcode Fuzzy Hash: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                        • Instruction Fuzzy Hash: 9541B670E00649AFCB01DFA5C892AAFBBB9EB09704F51847AF814A7291D7789905CB58
                        Strings
                        • Failed to proceed to next wizard page; aborting., xrefs: 0046CD24
                        • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD38
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID:
                        • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                        • API String ID: 0-1974262853
                        • Opcode ID: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                        • Instruction ID: bcb3787111d781b294161d03010f6e791927551fc3c7e501f8e48cd77162cd73
                        • Opcode Fuzzy Hash: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                        • Instruction Fuzzy Hash: A531C430604204DFD711EB59D9C5BA977F5EB06304F5500BBF448AB392D7786E40CB49
                        APIs
                        • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
                        • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ExecuteMessageSendShell
                        • String ID: open
                        • API String ID: 812272486-2758837156
                        • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                        • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
                        • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                        • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
                        APIs
                        • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
                        • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
                          • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: DirectoryErrorExecuteLastShellSystem
                        • String ID: <
                        • API String ID: 893404051-4251816714
                        • Opcode ID: 397510d247cb734b7669861417dbfcfbd251f2c0a68ff4605259e86b5c29478d
                        • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
                        • Opcode Fuzzy Hash: 397510d247cb734b7669861417dbfcfbd251f2c0a68ff4605259e86b5c29478d
                        • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
                        APIs
                        • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                        • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                          • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                          • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                          • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                          • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,0223E240,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                        • String ID: )
                        • API String ID: 2227675388-1084416617
                        • Opcode ID: e007287126da8fa7f668c9e0dd370e3762efe765c6f58c3167b97aa7cf6c64ab
                        • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                        • Opcode Fuzzy Hash: e007287126da8fa7f668c9e0dd370e3762efe765c6f58c3167b97aa7cf6c64ab
                        • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                        APIs
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496B69
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Window
                        • String ID: /INITPROCWND=$%x $@
                        • API String ID: 2353593579-4169826103
                        • Opcode ID: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                        • Instruction ID: 88b10d18150c6b9811cea3f3864e76c9cf3cbfb68c265b437af87b1fefc14b87
                        • Opcode Fuzzy Hash: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                        • Instruction Fuzzy Hash: A3117231A042489FDF01DBA4E855BAEBFE8EB49314F51847BE504E7292EB3CA905C658
                        APIs
                          • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                          • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                        • SysFreeString.OLEAUT32(?), ref: 004474C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: String$AllocByteCharFreeMultiWide
                        • String ID: NIL Interface Exception$Unknown Method
                        • API String ID: 3952431833-1023667238
                        • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                        • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
                        • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                        • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
                        APIs
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000,00496443), ref: 0049640E
                        • CloseHandle.KERNEL32(004964A8,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000), ref: 00496425
                          • Part of subcall function 004962F8: GetLastError.KERNEL32(00000000,00496390,?,?,?,?), ref: 0049631C
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CloseCreateErrorHandleLastProcess
                        • String ID: 0nI
                        • API String ID: 3798668922-794067871
                        • Opcode ID: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                        • Instruction ID: 4379268ebcebee96409867e54b2437a6ba0b21f89d1dc4ba20584320bf55fb87
                        • Opcode Fuzzy Hash: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                        • Instruction Fuzzy Hash: 840182B1644248AFDB00EBD1DC42A9EBBACDF08704F51403AB904E7281D6785E008A2D
                        APIs
                        • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Value$EnumQuery
                        • String ID: Inno Setup: No Icons
                        • API String ID: 1576479698-2016326496
                        • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                        • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
                        • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                        • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
                        APIs
                        • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452EC3
                        • GetLastError.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452ECB
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: AttributesErrorFileLast
                        • String ID: T$H
                        • API String ID: 1799206407-488339322
                        • Opcode ID: 5d86fcf9b6e052d8a24a57bf4ef79df3c2f35f3d819ce0a4394afd1f6d7b89dc
                        • Instruction ID: d2ab7b9b66ca24062e77e49c95e81f13ab46b8af1b1b2eb811bbb53637dcbd2b
                        • Opcode Fuzzy Hash: 5d86fcf9b6e052d8a24a57bf4ef79df3c2f35f3d819ce0a4394afd1f6d7b89dc
                        • Instruction Fuzzy Hash: 86F0F971A04204AB8B01DB7A9D4249EB7ECEB8A32171045BBFC04E3642E7B84E048558
                        APIs
                          • Part of subcall function 0047D0CC: FreeLibrary.KERNEL32(00000000,00481A2F), ref: 0047D0E2
                          • Part of subcall function 0047CD9C: GetTickCount.KERNEL32 ref: 0047CDE6
                          • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
                        • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049895B), ref: 00498059
                        • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049895B), ref: 0049805F
                        Strings
                        • Detected restart. Removing temporary directory., xrefs: 00498013
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                        • String ID: Detected restart. Removing temporary directory.
                        • API String ID: 1717587489-3199836293
                        • Opcode ID: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                        • Instruction ID: bb05712aa7eb36d303e19ffab6eef2c78f2a463723ea7eca767f41585c441369
                        • Opcode Fuzzy Hash: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                        • Instruction Fuzzy Hash: BDE0E532208A406DDA1177BABC1396B7F5CDB46768B22487FF50882552D92D481CC53D
                        APIs
                        • GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                        • GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: CommandHandleLineModule
                        • String ID: P8}
                        • API String ID: 2123368496-2866169560
                        • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                        • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
                        • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                        • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.2467266313.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000001.00000002.2467249735.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467318619.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467331713.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467344319.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000001.00000002.2467357279.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                        Similarity
                        • API ID: ErrorLastSleep
                        • String ID:
                        • API String ID: 1458359878-0
                        • Opcode ID: 124e83ad3764f0425cc9cce0cec047ecc2156a8e27ad070cfe64c44283ad0992
                        • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
                        • Opcode Fuzzy Hash: 124e83ad3764f0425cc9cce0cec047ecc2156a8e27ad070cfe64c44283ad0992
                        • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC