Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe

Overview

General Information

Sample name:SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
Analysis ID:1447596
MD5:3ea7144962bfbe89e0145695fd039655
SHA1:38e4c4c1f1d104da067f12c1d06734d354ce0ce1
SHA256:b0c1e15f1b660f639ea88e6999bbe4bab7b35e84337b92b1059638e0c7fa947f
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeReversingLabs: Detection: 21%
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeVirustotal: Detection: 31%Perma Link
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00478B6C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00478B6C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00490094 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00490094
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00476A70 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00476A70
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0046F16C FindFirstFileA,FindNextFileA,FindClose,1_2_0046F16C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004511DC FindFirstFileA,GetLastError,1_2_004511DC
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045F3A4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045F3A4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045F820 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045F820
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045DE20 FindFirstFileA,FindNextFileA,FindClose,1_2_0045DE20
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1665732024.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000002.2922256093.00000000020F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1664682629.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000002.2922277470.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1668682583.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1669698962.00000000021A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922656836.00000000021A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cyworld.nate.com/nuclear_mine
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1665732024.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1664682629.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000002.2922277470.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1668682583.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1669698962.00000000021A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922656836.00000000021A4000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922580890.0000000002195000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ispp.sourceforge.net/
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922580890.0000000002195000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ispp.sourceforge.net/Des
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drString found in binary or memory: http://www.innosetup.com/
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666089570.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666996465.0000000002108000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drString found in binary or memory: http://www.remobjects.com/?ps
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666089570.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666996465.0000000002108000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drString found in binary or memory: http://www.remobjects.com/?psU
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00423B2C NtdllDefWindowProc_A,1_2_00423B2C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004722D4 NtdllDefWindowProc_A,1_2_004722D4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00412580 NtdllDefWindowProc_A,1_2_00412580
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0042ED38 NtdllDefWindowProc_A,1_2_0042ED38
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004551F4 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004551F4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0042E6CC: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E6CC
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_004092A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_004092A0
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00453AF8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00453AF8
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_004082E80_2_004082E8
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004629941_2_00462994
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004797C11_2_004797C1
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00485FE01_2_00485FE0
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004800E81_2_004800E8
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0044416C1_2_0044416C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004305D01_2_004305D0
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004448641_2_00444864
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004588EC1_2_004588EC
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0046498C1_2_0046498C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00434A2C1_2_00434A2C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00444C701_2_00444C70
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0046AC901_2_0046AC90
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0047F2381_2_0047F238
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0043D44C1_2_0043D44C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045B6941_2_0045B694
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0042FB741_2_0042FB74
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00443BC41_2_00443BC4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00433D281_2_00433D28
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00405964 appears 100 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00406A2C appears 38 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00403400 appears 59 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 004454D0 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00407894 appears 40 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00433C40 appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00455970 appears 95 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00451AC0 appears 72 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00403494 appears 83 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00455B70 appears 65 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 004457A0 appears 59 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00403684 appears 204 times
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: String function: 00408BAC appears 44 times
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666089570.0000000002360000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666996465.0000000002108000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal48.winEXE@3/4@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_004092A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_004092A0
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00453AF8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_00453AF8
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00454320 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00454320
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00409A04 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409A04
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeFile created: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeReversingLabs: Detection: 21%
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeVirustotal: Detection: 31%
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe "C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeProcess created: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp "C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp" /SL5="$1043A,2318969,53248,C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeProcess created: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp "C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp" /SL5="$1043A,2318969,53248,C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeStatic file information: File size 2596914 > 1048576
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0044AD34 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0044AD34
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00406518 push 00406555h; ret 0_2_0040654D
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00408D90 push 00408DC3h; ret 0_2_00408DBB
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00407FE0 push ecx; mov dword ptr [esp], eax0_2_00407FE5
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004098EC push 00409929h; ret 1_2_00409921
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004305D0 push ecx; mov dword ptr [esp], eax1_2_004305D5
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00410678 push ecx; mov dword ptr [esp], edx1_2_0041067D
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004128D0 push 00412933h; ret 1_2_0041292B
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0047C88C push 0047C96Ah; ret 1_2_0047C962
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00450A78 push 00450AABh; ret 1_2_00450AA3
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00442B3C push ecx; mov dword ptr [esp], ecx1_2_00442B40
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0040CFD0 push ecx; mov dword ptr [esp], edx1_2_0040CFD2
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004573DC push 00457420h; ret 1_2_00457418
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045B38C push ecx; mov dword ptr [esp], eax1_2_0045B391
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0040F530 push ecx; mov dword ptr [esp], edx1_2_0040F532
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004715E8 push ecx; mov dword ptr [esp], edx1_2_004715E9
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00419BD0 push ecx; mov dword ptr [esp], ecx1_2_00419BD5
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00455C0C push 00455C44h; ret 1_2_00455C3C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0047DEE0 push ecx; mov dword ptr [esp], ecx1_2_0047DEE5
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00409FE7 push ds; ret 1_2_00409FE8
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeFile created: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpFile created: C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00422804 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_00422804
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00423BB4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423BB4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00423BB4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423BB4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0042413C IsIconic,SetActiveWindow,1_2_0042413C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00424184 IsIconic,SetActiveWindow,SetFocus,1_2_00424184
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0047C25C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0047C25C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0041832C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_0041832C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00417540 IsIconic,GetCapture,1_2_00417540
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00417C76 IsIconic,SetWindowPos,1_2_00417C76
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00417C78 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417C78
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0044AD34 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0044AD34
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5350
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-51196
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00478B6C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00478B6C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00490094 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00490094
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00476A70 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,1_2_00476A70
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0046F16C FindFirstFileA,FindNextFileA,FindClose,1_2_0046F16C
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004511DC FindFirstFileA,GetLastError,1_2_004511DC
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045F3A4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045F3A4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045F820 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_0045F820
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045DE20 FindFirstFileA,FindNextFileA,FindClose,1_2_0045DE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00409948 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409948
Source: SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922275657.00000000005CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeAPI call chain: ExitProcess graph end nodegraph_0-6724
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0044AD34 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0044AD34
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00471D70 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00471D70
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_0045A0E8 GetVersion,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,GetLastError,LocalFree,1_2_0045A0E8
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: GetLocaleInfoA,0_2_0040515C
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: GetLocaleInfoA,0_2_004051A8
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: GetLocaleInfoA,1_2_00408508
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: GetLocaleInfoA,1_2_00408554
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_004566B8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004566B8
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpCode function: 1_2_00453AB0 GetUserNameA,1_2_00453AB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exeCode function: 0_2_00405C44 GetVersionExA,0_2_00405C44
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Access Token Manipulation
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Access Token Manipulation
2
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Process Injection
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
2
Obfuscated Files or Information
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets3
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync15
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe21%ReversingLabs
SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe31%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp4%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_RegDLL.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_shfoldr.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.innosetup.com/0%URL Reputationsafe
http://www.remobjects.com/?ps0%URL Reputationsafe
http://www.remobjects.com/?psU0%URL Reputationsafe
http://cyworld.nate.com/nuclear_mine0%Avira URL Cloudsafe
http://ispp.sourceforge.net/Des0%Avira URL Cloudsafe
http://ispp.sourceforge.net/0%Avira URL Cloudsafe
http://ispp.sourceforge.net/0%VirustotalBrowse
http://cyworld.nate.com/nuclear_mine0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://cyworld.nate.com/nuclear_mineSecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1665732024.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000002.2922256093.00000000020F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1664682629.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000002.2922277470.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1668682583.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1669698962.00000000021A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922656836.00000000021A4000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.innosetup.com/SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.remobjects.com/?psSecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666089570.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666996465.0000000002108000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://ispp.sourceforge.net/SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1665732024.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1664682629.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000002.2922277470.0000000002101000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1668682583.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000003.1669698962.00000000021A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922656836.00000000021A4000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922580890.0000000002195000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://ispp.sourceforge.net/DesSecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922580890.0000000002195000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.remobjects.com/?psUSecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666089570.0000000002360000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe, 00000000.00000003.1666996465.0000000002108000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp, 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp.0.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447596
Start date and time:2024-05-26 02:24:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
Detection:MAL
Classification:mal48.winEXE@3/4@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 91
  • Number of non-executed functions: 182
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, 6.d.a.8.b.e.f.b.0.0.0.0.0.0.0.0.4.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\is-V44NQ.tmp\_isetup\_RegDLL.tmp957URl9ErB.exeGet hashmaliciousSocks5SystemzBrowse
    C0eD7SKCnN.exeGet hashmaliciousUnknownBrowse
      SW_PC_Interact2.3.5_Build6.exeGet hashmaliciousDBatLoaderBrowse
        SW_PC_Interact2.3.5_Build6.exeGet hashmaliciousDBatLoaderBrowse
          c56wcjIguT.exeGet hashmaliciousUnknownBrowse
            c56wcjIguT.exeGet hashmaliciousUnknownBrowse
              hw-vsp3-single_3-1-2.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Trojan.VbCrypt.150.26922.11894.exeGet hashmaliciousUnknownBrowse
                  jcreator_6i-6JJ1.exeGet hashmaliciousUnknownBrowse
                    jcreator_6i-6JJ1.exeGet hashmaliciousUnknownBrowse
                      C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmpC0eD7SKCnN.exeGet hashmaliciousUnknownBrowse
                        SW_PC_Interact2.3.5_Build6.exeGet hashmaliciousDBatLoaderBrowse
                          SW_PC_Interact2.3.5_Build6.exeGet hashmaliciousDBatLoaderBrowse
                            VPNConnect.exeGet hashmaliciousUnknownBrowse
                              LGCMAIL_TW_XXXXX7292.exeGet hashmaliciousUnknownBrowse
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):685056
                                Entropy (8bit):6.469782512324722
                                Encrypted:false
                                SSDEEP:12288:L/vksLWtSNrPi37NzHDA6Y1gbl5d7Ifoz4mrNNpRpzqjxy:jvksLWtkrPi37NzHDA6Yg5dsfoTzsxy
                                MD5:52950AC9E2B481453082F096120E355A
                                SHA1:159C09DB1ABCEE9114B4F792FFBA255C78A6E6C3
                                SHA-256:25FBC88C7C967266F041AE4D47C2EAE0B96086F9E440CCA10729103AEE7EF6CD
                                SHA-512:5B61C28BBCAEDADB3B6CD3BB8A392D18016C354C4C16E01395930666ADDC95994333DFC45BEA1A1844F6F1585E79C729136D3714AC118B5848BECDE0BDB182BA
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 4%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Joe Sandbox View:
                                • Filename: C0eD7SKCnN.exe, Detection: malicious, Browse
                                • Filename: SW_PC_Interact2.3.5_Build6.exe, Detection: malicious, Browse
                                • Filename: SW_PC_Interact2.3.5_Build6.exe, Detection: malicious, Browse
                                • Filename: VPNConnect.exe, Detection: malicious, Browse
                                • Filename: LGCMAIL_TW_XXXXX7292.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................`...................@...........................@...%... ...:..........................................................................................................CODE....4........................... ..`DATA....p...........................@...BSS.......... ...........................idata...%...@...&..................@....tls.........p.......8...................rdata...............8..............@..P.reloc...............:..............@..P.rsrc....:... ...:...:..............@..P.............`......................@..P........................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3584
                                Entropy (8bit):4.012434743866195
                                Encrypted:false
                                SSDEEP:48:iAnz1hEU3FR/pmqBl8/QMCBaquEMx5BCwSS4k+bkguj0K:pz1eEFNcqBC/Qrex5MSKD
                                MD5:C594B792B9C556EA62A30DE541D2FB03
                                SHA1:69E0207515E913243B94C2D3A116D232FF79AF5F
                                SHA-256:5DCC1E0A197922907BCA2C4369F778BD07EE4B1BBBDF633E987A028A314D548E
                                SHA-512:387BD07857B0DE67C04E0ABF89B754691683F30515726045FF382DA9B6B7F36570E38FAE9ECA5C4F0110CE9BB421D8045A5EC273C4C47B5831948564763ED144
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 1%, Browse
                                Joe Sandbox View:
                                • Filename: 957URl9ErB.exe, Detection: malicious, Browse
                                • Filename: C0eD7SKCnN.exe, Detection: malicious, Browse
                                • Filename: SW_PC_Interact2.3.5_Build6.exe, Detection: malicious, Browse
                                • Filename: SW_PC_Interact2.3.5_Build6.exe, Detection: malicious, Browse
                                • Filename: c56wcjIguT.exe, Detection: malicious, Browse
                                • Filename: c56wcjIguT.exe, Detection: malicious, Browse
                                • Filename: hw-vsp3-single_3-1-2.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Trojan.VbCrypt.150.26922.11894.exe, Detection: malicious, Browse
                                • Filename: jcreator_6i-6JJ1.exe, Detection: malicious, Browse
                                • Filename: jcreator_6i-6JJ1.exe, Detection: malicious, Browse
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L.....%E..................................... ....@..........................@..............................................l ..P....0..8............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...8....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp
                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):5632
                                Entropy (8bit):4.203889009972449
                                Encrypted:false
                                SSDEEP:48:SvTmfWvPcXegCWUo1vlZwrAxoONfHFZONfH3d1xCWMBgW2p3SS4k+bkg6j0K:nfkcXegjJ/ZgYNzcld1xamW2pCSKv
                                MD5:B4604F8CD050D7933012AE4AA98E1796
                                SHA1:36B7D966C7F87860CD6C46096B397AA23933DF8E
                                SHA-256:B50B7AC03EC6DA865BF4504C7AC1E52D9F5B67C7BCB3EC0DB59FAB24F1B471C5
                                SHA-512:3057AA4810245DA0B340E1C70201E5CE528CFDC5A164915E7B11855E3A5B9BA0ED77FBC542F5E4EB296EA65AF88F263647B577151068636BA188D8C4FD44E431
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d......E..........#............................@.............................`..............................................................<!.......P..8....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...8....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp
                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):23312
                                Entropy (8bit):4.596242908851566
                                Encrypted:false
                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.996401190961517
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 98.86%
                                • Inno Setup installer (109748/4) 1.08%
                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                File name:SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
                                File size:2'596'914 bytes
                                MD5:3ea7144962bfbe89e0145695fd039655
                                SHA1:38e4c4c1f1d104da067f12c1d06734d354ce0ce1
                                SHA256:b0c1e15f1b660f639ea88e6999bbe4bab7b35e84337b92b1059638e0c7fa947f
                                SHA512:eace33f7981f50db457a504ba6f08d909de47548e5f1daeb4d66c586cb4160e7bc47bb408e83c5fea7d80d05b869e05b31ca26b061b602a8aa42292b073eacaf
                                SSDEEP:49152:v2FHdDBI88HSk1769bp27F7I8qMcs2THzTpeKrGmVXJq10SBWX7NcH6swr:uF9VI8ESK769bpnMl0NJXg1rWrNcH52
                                TLSH:80C53302FD52A8F5C179ABF10E1EE9308E73BE6035292971563D944EAE63C73C01A767
                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                Icon Hash:2d2e3797b32b2b99
                                Entrypoint:0x409a58
                                Entrypoint Section:CODE
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:1
                                OS Version Minor:0
                                File Version Major:1
                                File Version Minor:0
                                Subsystem Version Major:1
                                Subsystem Version Minor:0
                                Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                Instruction
                                push ebp
                                mov ebp, esp
                                add esp, FFFFFFC4h
                                push ebx
                                push esi
                                push edi
                                xor eax, eax
                                mov dword ptr [ebp-10h], eax
                                mov dword ptr [ebp-24h], eax
                                call 00007F09F8B97633h
                                call 00007F09F8B9883Ah
                                call 00007F09F8B9AA65h
                                call 00007F09F8B9AAACh
                                call 00007F09F8B9D2D3h
                                call 00007F09F8B9D43Ah
                                xor eax, eax
                                push ebp
                                push 0040A10Bh
                                push dword ptr fs:[eax]
                                mov dword ptr fs:[eax], esp
                                xor edx, edx
                                push ebp
                                push 0040A0D4h
                                push dword ptr fs:[edx]
                                mov dword ptr fs:[edx], esp
                                mov eax, dword ptr [0040C014h]
                                call 00007F09F8B9DE60h
                                call 00007F09F8B9D9C7h
                                lea edx, dword ptr [ebp-10h]
                                xor eax, eax
                                call 00007F09F8B9B071h
                                mov edx, dword ptr [ebp-10h]
                                mov eax, 0040CDE4h
                                call 00007F09F8B976E4h
                                push 00000002h
                                push 00000000h
                                push 00000001h
                                mov ecx, dword ptr [0040CDE4h]
                                mov dl, 01h
                                mov eax, 004072A4h
                                call 00007F09F8B9B8DCh
                                mov dword ptr [0040CDE8h], eax
                                xor edx, edx
                                push ebp
                                push 0040A08Ch
                                push dword ptr fs:[edx]
                                mov dword ptr fs:[edx], esp
                                call 00007F09F8B9DED0h
                                mov dword ptr [0040CDF0h], eax
                                mov eax, dword ptr [0040CDF0h]
                                cmp dword ptr [eax+0Ch], 01h
                                jne 00007F09F8B9E00Ah
                                mov eax, dword ptr [0040CDF0h]
                                mov edx, 00000028h
                                call 00007F09F8B9BCDDh
                                mov edx, dword ptr [0040CDF0h]
                                cmp eax, dword ptr [edx+00h]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2a00.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                CODE0x10000x91740x9200ea92e1415bc80e2738e334267ebbb921False0.614699272260274data6.566253815683607IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                DATA0xb0000x24c0x400f96da19d2571a42bdff1b9e8bd62ec99False0.3076171875data2.7350839451932765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                BSS0xc0000xe480x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                .rsrc0x110000x2a000x2a00d518cbb35132ce608adcf8c073865213False0.32719494047619047data4.487301679813622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                RT_STRING0x125740x2f2data0.35543766578249336
                                RT_STRING0x128680x30cdata0.3871794871794872
                                RT_STRING0x12b740x2cedata0.42618384401114207
                                RT_STRING0x12e440x68data0.75
                                RT_STRING0x12eac0xb4data0.6277777777777778
                                RT_STRING0x12f600xaedata0.5344827586206896
                                RT_RCDATA0x130100x2cdata1.2045454545454546
                                RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2740066225165563
                                RT_MANIFEST0x135340x47eXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4330434782608696
                                DLLImport
                                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                user32.dllMessageBoxA
                                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                comctl32.dllInitCommonControls
                                advapi32.dllAdjustTokenPrivileges
                                Language of compilation systemCountry where language is spokenMap
                                DutchNetherlands
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                May 26, 2024 02:25:48.519448996 CEST5352072162.159.36.2192.168.2.4
                                May 26, 2024 02:25:49.415170908 CEST53640071.1.1.1192.168.2.4

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:20:25:00
                                Start date:25/05/2024
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe"
                                Imagebase:0x400000
                                File size:2'596'914 bytes
                                MD5 hash:3EA7144962BFBE89E0145695FD039655
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:20:25:01
                                Start date:25/05/2024
                                Path:C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\is-K0O4V.tmp\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.tmp" /SL5="$1043A,2318969,53248,C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.CmjSpy.326.14545.25032.exe"
                                Imagebase:0x400000
                                File size:685'056 bytes
                                MD5 hash:52950AC9E2B481453082F096120E355A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 4%, ReversingLabs
                                • Detection: 0%, Virustotal, Browse
                                Reputation:moderate
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:21.2%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:2.3%
                                  Total number of Nodes:1534
                                  Total number of Limit Nodes:18
                                  execution_graph 5787 407544 ReadFile 5788 407564 5787->5788 5789 40757b 5787->5789 5790 407574 5788->5790 5791 40756a GetLastError 5788->5791 5792 4073a4 21 API calls 5790->5792 5791->5789 5791->5790 5792->5789 6641 402b48 RaiseException 6642 40294a 6643 402952 6642->6643 6644 403554 4 API calls 6643->6644 6645 402967 6643->6645 6644->6643 6646 403f4a 6647 403f53 6646->6647 6648 403f5c 6646->6648 6650 403f07 6647->6650 6651 403f09 6650->6651 6655 403e9c 6651->6655 6656 403154 4 API calls 6651->6656 6662 403f3d 6651->6662 6673 403e9c 6651->6673 6652 403f3c 6652->6648 6654 403ef2 6657 402674 4 API calls 6654->6657 6655->6652 6655->6654 6660 403ea9 6655->6660 6664 403e8e 6655->6664 6656->6651 6658 403ecf 6657->6658 6658->6648 6660->6658 6663 402674 4 API calls 6660->6663 6662->6648 6663->6658 6665 403e4c 6664->6665 6666 403e67 6665->6666 6667 403e62 6665->6667 6668 403e7b 6665->6668 6671 403e78 6666->6671 6672 402674 4 API calls 6666->6672 6669 403cc8 4 API calls 6667->6669 6670 402674 4 API calls 6668->6670 6669->6666 6670->6671 6671->6654 6671->6660 6672->6671 6674 403ed7 6673->6674 6680 403ea9 6673->6680 6676 403ef2 6674->6676 6678 403e8e 4 API calls 6674->6678 6675 403ecf 6675->6651 6677 402674 4 API calls 6676->6677 6677->6675 6679 403ee6 6678->6679 6679->6676 6679->6680 6680->6675 6681 402674 4 API calls 6680->6681 6681->6675 6149 407052 6150 40703c 6149->6150 6151 403198 4 API calls 6150->6151 6152 407044 6151->6152 6153 403198 4 API calls 6152->6153 6154 40704c 6153->6154 6155 403a52 6156 403a5a WriteFile 6155->6156 6158 403a74 6155->6158 6157 403a78 GetLastError 6156->6157 6156->6158 6157->6158 6159 402654 6160 403154 4 API calls 6159->6160 6161 402614 6160->6161 6162 402632 6161->6162 6163 403154 4 API calls 6161->6163 6163->6162 6164 409c56 6165 409c7b 6164->6165 6166 40961c 15 API calls 6165->6166 6170 409c80 6166->6170 6167 409cd3 6198 4026c4 GetSystemTime 6167->6198 6169 409cd8 6171 409188 33 API calls 6169->6171 6170->6167 6173 408c34 4 API calls 6170->6173 6172 409ce0 6171->6172 6174 4031e8 4 API calls 6172->6174 6175 409caf 6173->6175 6176 409ced 6174->6176 6178 409cb7 MessageBoxA 6175->6178 6177 40686c 5 API calls 6176->6177 6180 409cfa 6177->6180 6178->6167 6179 409cc4 6178->6179 6181 4057b4 5 API calls 6179->6181 6182 406608 5 API calls 6180->6182 6181->6167 6183 409d0a 6182->6183 6184 406594 5 API calls 6183->6184 6185 409d1b 6184->6185 6186 403340 4 API calls 6185->6186 6187 409d29 6186->6187 6188 4031e8 4 API calls 6187->6188 6189 409d39 6188->6189 6190 4073f8 23 API calls 6189->6190 6191 409d78 6190->6191 6192 402594 4 API calls 6191->6192 6193 409d98 6192->6193 6194 407904 5 API calls 6193->6194 6195 409dda 6194->6195 6196 407b94 23 API calls 6195->6196 6197 409e01 6196->6197 6198->6169 5802 409a58 5841 4030dc 5802->5841 5804 409a6e 5844 4042e8 5804->5844 5806 409a73 5847 406518 5806->5847 5810 409a7d 5857 408efc GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5810->5857 5819 4031e8 4 API calls 5820 409ac9 5819->5820 5821 4073f8 23 API calls 5820->5821 5822 409ae1 5821->5822 5893 409a04 FindResourceA 5822->5893 5825 407830 InterlockedExchange 5829 409b18 5825->5829 5826 4098b8 4 API calls 5827 409b56 5826->5827 5828 4073b8 20 API calls 5827->5828 5830 409b7c 5828->5830 5829->5826 5829->5827 5831 409b97 5830->5831 5832 4098b8 4 API calls 5830->5832 5833 407904 5 API calls 5831->5833 5832->5831 5834 409bbc 5833->5834 5906 4089e4 5834->5906 5838 409c00 5839 4089e4 23 API calls 5838->5839 5840 409c37 5838->5840 5839->5838 5920 403094 5841->5920 5843 4030e1 GetModuleHandleA GetCommandLineA 5843->5804 5845 403154 4 API calls 5844->5845 5846 404323 5844->5846 5845->5846 5846->5806 5921 405bf8 5847->5921 5856 406564 6F571CD0 5856->5810 5858 408f4f 5857->5858 6001 406ec4 SetErrorMode 5858->6001 5861 4071a8 5 API calls 5862 408f7f 5861->5862 5863 403198 4 API calls 5862->5863 5864 408f94 5863->5864 5865 409948 GetSystemInfo VirtualQuery 5864->5865 5866 4099fc 5865->5866 5869 409972 5865->5869 5871 4094b4 5866->5871 5867 4099dd VirtualQuery 5867->5866 5867->5869 5868 40999c VirtualProtect 5868->5869 5869->5866 5869->5867 5869->5868 5870 4099cb VirtualProtect 5869->5870 5870->5867 6005 406b0c GetCommandLineA 5871->6005 5873 409571 5875 4031b8 4 API calls 5873->5875 5874 406b68 6 API calls 5876 4094d1 5874->5876 5877 40958b 5875->5877 5876->5873 5876->5874 5878 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5876->5878 5879 406b68 5877->5879 5878->5876 5880 406bb3 GetCommandLineA 5879->5880 5881 406b8f GetModuleFileNameA 5879->5881 5888 406bb8 5880->5888 5882 403278 4 API calls 5881->5882 5884 406bb1 5882->5884 5883 406bbd 5885 403198 4 API calls 5883->5885 5889 406be0 5884->5889 5887 406bc5 5885->5887 5886 406a2c 4 API calls 5886->5888 5891 40322c 4 API calls 5887->5891 5888->5883 5888->5886 5888->5887 5890 403198 4 API calls 5889->5890 5892 406bf5 5890->5892 5891->5889 5892->5819 5894 409a19 5893->5894 5895 409a1e SizeofResource 5893->5895 5896 4098b8 4 API calls 5894->5896 5897 409a30 LoadResource 5895->5897 5898 409a2b 5895->5898 5896->5895 5900 409a43 LockResource 5897->5900 5901 409a3e 5897->5901 5899 4098b8 4 API calls 5898->5899 5899->5897 5903 409a54 5900->5903 5904 409a4f 5900->5904 5902 4098b8 4 API calls 5901->5902 5902->5900 5903->5825 5903->5829 5905 4098b8 4 API calls 5904->5905 5905->5903 5907 408a12 5906->5907 5908 408a58 5906->5908 5907->5908 5911 403278 4 API calls 5907->5911 5914 403420 4 API calls 5907->5914 5915 4031e8 4 API calls 5907->5915 5916 407b94 23 API calls 5907->5916 5909 407b94 23 API calls 5908->5909 5910 408a6c 5909->5910 5912 403198 4 API calls 5910->5912 5911->5907 5913 408a81 5912->5913 5917 404b70 5913->5917 5914->5907 5915->5907 5916->5907 5918 402594 4 API calls 5917->5918 5919 404b7b 5918->5919 5919->5838 5920->5843 5922 405890 5 API calls 5921->5922 5923 405c09 5922->5923 5924 4051d0 GetSystemDefaultLCID 5923->5924 5926 405206 5924->5926 5925 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5925->5926 5926->5925 5927 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5926->5927 5928 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5926->5928 5930 405268 5926->5930 5927->5926 5928->5926 5929 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5929->5930 5930->5929 5931 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5930->5931 5932 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5930->5932 5933 4052eb 5930->5933 5931->5930 5932->5930 5934 4031b8 4 API calls 5933->5934 5935 405305 5934->5935 5936 405314 GetSystemDefaultLCID 5935->5936 5993 40515c GetLocaleInfoA 5936->5993 5939 4031e8 4 API calls 5940 405354 5939->5940 5941 40515c 5 API calls 5940->5941 5942 405369 5941->5942 5943 40515c 5 API calls 5942->5943 5944 40538d 5943->5944 5999 4051a8 GetLocaleInfoA 5944->5999 5947 4051a8 GetLocaleInfoA 5948 4053bd 5947->5948 5949 40515c 5 API calls 5948->5949 5950 4053d7 5949->5950 5951 4051a8 GetLocaleInfoA 5950->5951 5952 4053f4 5951->5952 5953 40515c 5 API calls 5952->5953 5954 40540e 5953->5954 5955 4031e8 4 API calls 5954->5955 5956 40541b 5955->5956 5957 40515c 5 API calls 5956->5957 5958 405430 5957->5958 5959 4031e8 4 API calls 5958->5959 5960 40543d 5959->5960 5961 4051a8 GetLocaleInfoA 5960->5961 5962 40544b 5961->5962 5963 40515c 5 API calls 5962->5963 5964 405465 5963->5964 5965 4031e8 4 API calls 5964->5965 5966 405472 5965->5966 5967 40515c 5 API calls 5966->5967 5968 405487 5967->5968 5969 4031e8 4 API calls 5968->5969 5970 405494 5969->5970 5971 40515c 5 API calls 5970->5971 5972 4054a9 5971->5972 5973 4054c6 5972->5973 5974 4054b7 5972->5974 5976 40322c 4 API calls 5973->5976 5975 40322c 4 API calls 5974->5975 5977 4054c4 5975->5977 5976->5977 5978 40515c 5 API calls 5977->5978 5979 4054e8 5978->5979 5980 405505 5979->5980 5981 4054f6 5979->5981 5983 403198 4 API calls 5980->5983 5982 40322c 4 API calls 5981->5982 5984 405503 5982->5984 5983->5984 5985 4033b4 4 API calls 5984->5985 5986 405527 5985->5986 5987 4033b4 4 API calls 5986->5987 5988 405541 5987->5988 5989 4031b8 4 API calls 5988->5989 5990 40555b 5989->5990 5991 405c44 GetVersionExA 5990->5991 5992 405c5b 5991->5992 5992->5856 5994 405183 5993->5994 5995 405195 5993->5995 5996 403278 4 API calls 5994->5996 5997 40322c 4 API calls 5995->5997 5998 405193 5996->5998 5997->5998 5998->5939 6000 4051c4 5999->6000 6000->5947 6002 403414 6001->6002 6003 406efc LoadLibraryA 6002->6003 6004 406f12 6003->6004 6004->5861 6012 406a2c 6005->6012 6007 406b2f 6008 406b41 6007->6008 6009 406a2c 4 API calls 6007->6009 6010 403198 4 API calls 6008->6010 6009->6007 6011 406b56 6010->6011 6011->5876 6013 406a58 6012->6013 6014 403278 4 API calls 6013->6014 6015 406a65 6014->6015 6016 403420 4 API calls 6015->6016 6017 406a6d 6016->6017 6018 4031e8 4 API calls 6017->6018 6019 406a85 6018->6019 6020 403198 4 API calls 6019->6020 6021 406aa4 6020->6021 6021->6007 4899 407460 4900 40746c CloseHandle 4899->4900 4901 407475 4899->4901 4900->4901 6199 402e64 6200 402e69 6199->6200 6201 402e7a RtlUnwind 6200->6201 6202 402e5e 6200->6202 6203 402e9d 6201->6203 5285 409c71 5322 4098b8 5285->5322 5287 409c76 5288 409c7b 5287->5288 5428 402f24 5287->5428 5329 40961c 5288->5329 5291 409cd3 5350 4026c4 GetSystemTime 5291->5350 5293 409cd8 5351 409188 5293->5351 5294 409c80 5294->5291 5433 408c34 5294->5433 5298 4031e8 4 API calls 5299 409ced 5298->5299 5369 40686c 5299->5369 5300 409caf 5302 409cb7 MessageBoxA 5300->5302 5302->5291 5303 409cc4 5302->5303 5436 4057b4 5303->5436 5309 409d1b 5396 403340 5309->5396 5311 409d29 5312 4031e8 4 API calls 5311->5312 5313 409d39 5312->5313 5411 4073f8 5313->5411 5316 402594 4 API calls 5317 409d98 5316->5317 5418 407904 5317->5418 5319 409dda 5440 407b94 5319->5440 5321 409e01 5323 4098c1 5322->5323 5324 4098d9 5322->5324 5325 4057e0 4 API calls 5323->5325 5326 4057e0 4 API calls 5324->5326 5327 4098d3 5325->5327 5328 4098ea 5326->5328 5327->5287 5328->5287 5330 409665 5329->5330 5338 409629 5329->5338 5331 409672 5330->5331 5332 40966e 5330->5332 5454 406f48 GetModuleHandleA GetProcAddress 5331->5454 5334 40967b GetUserDefaultLangID 5332->5334 5341 409670 5332->5341 5334->5341 5336 409723 5337 4095d0 5 API calls 5336->5337 5342 40965c 5337->5342 5338->5330 5339 409655 5338->5339 5448 4095d0 5339->5448 5340 4096d2 5340->5336 5346 409716 5340->5346 5347 40970c GetACP 5340->5347 5341->5336 5341->5340 5344 4096c5 5341->5344 5345 4096bb GetACP 5341->5345 5342->5294 5348 4095d0 5 API calls 5344->5348 5345->5341 5345->5344 5349 4095d0 5 API calls 5346->5349 5347->5340 5347->5346 5348->5342 5349->5342 5350->5293 5354 4091a8 5351->5354 5355 4091cd CreateDirectoryA 5354->5355 5360 408c34 4 API calls 5354->5360 5365 4071a8 5 API calls 5354->5365 5368 4057e0 4 API calls 5354->5368 5556 406c30 5354->5556 5579 40907c 5354->5579 5598 404be4 5354->5598 5601 408c04 5354->5601 5356 409245 5355->5356 5357 4091d7 GetLastError 5355->5357 5358 40322c 4 API calls 5356->5358 5357->5354 5359 40924f 5358->5359 5361 4031b8 4 API calls 5359->5361 5360->5354 5363 409269 5361->5363 5364 4031b8 4 API calls 5363->5364 5366 409276 5364->5366 5365->5354 5366->5298 5368->5354 5718 406764 5369->5718 5372 403454 4 API calls 5373 40688e 5372->5373 5374 406608 5373->5374 5723 406828 5374->5723 5377 406646 5379 403454 4 API calls 5377->5379 5378 406638 5380 403340 4 API calls 5378->5380 5381 406659 5379->5381 5382 406644 5380->5382 5383 403340 4 API calls 5381->5383 5384 403198 4 API calls 5382->5384 5383->5382 5385 40667b 5384->5385 5386 406594 5385->5386 5387 4065c0 5386->5387 5388 40659e 5386->5388 5390 40322c 4 API calls 5387->5390 5729 406894 5388->5729 5392 4065c9 5390->5392 5391 4065a5 5391->5387 5393 4065af 5391->5393 5392->5309 5394 403340 4 API calls 5393->5394 5395 4065bd 5394->5395 5395->5309 5397 403344 5396->5397 5398 4033a5 5396->5398 5399 4031e8 5397->5399 5400 40334c 5397->5400 5401 4031fc 5399->5401 5403 403254 4 API calls 5399->5403 5400->5398 5404 4031e8 4 API calls 5400->5404 5406 40335b 5400->5406 5402 403228 5401->5402 5407 4025ac 4 API calls 5401->5407 5402->5311 5403->5401 5404->5406 5405 403254 4 API calls 5408 403375 5405->5408 5406->5405 5407->5402 5409 4031e8 4 API calls 5408->5409 5410 4033a1 5409->5410 5410->5311 5412 407402 5411->5412 5733 407490 5412->5733 5736 40748e 5412->5736 5413 40742e 5414 407442 5413->5414 5415 4073a4 21 API calls 5413->5415 5414->5316 5415->5414 5420 407911 5418->5420 5419 4057e0 4 API calls 5421 407965 5419->5421 5420->5419 5420->5421 5422 407830 InterlockedExchange 5421->5422 5423 407977 5422->5423 5424 4057e0 4 API calls 5423->5424 5425 40798d 5423->5425 5424->5425 5426 4079d0 5425->5426 5427 4057e0 4 API calls 5425->5427 5426->5319 5427->5426 5429 403154 4 API calls 5428->5429 5430 402f29 5429->5430 5739 402bcc 5430->5739 5432 402f51 5432->5432 5434 408c04 4 API calls 5433->5434 5435 408c50 5434->5435 5435->5300 5437 4057b9 5436->5437 5438 405890 5 API calls 5437->5438 5439 4057cb 5438->5439 5439->5439 5441 407ba4 5440->5441 5442 407baf 5440->5442 5742 407db4 5441->5742 5753 407b38 5442->5753 5445 4057e0 4 API calls 5446 407bad 5445->5446 5446->5321 5449 4095d8 5448->5449 5453 409612 5448->5453 5449->5453 5475 403420 5449->5475 5451 40960c 5479 408cdc 5451->5479 5453->5342 5455 406f82 5454->5455 5456 406f8b 5454->5456 5465 403198 4 API calls 5455->5465 5457 406f94 5456->5457 5458 406fcc 5456->5458 5502 406e8c 5457->5502 5460 406e8c RegOpenKeyExA 5458->5460 5463 406fe5 5460->5463 5461 406fad 5462 407002 5461->5462 5505 406e80 5461->5505 5508 40322c 5462->5508 5463->5462 5466 406e80 6 API calls 5463->5466 5470 407044 5465->5470 5471 406ff9 RegCloseKey 5466->5471 5473 403198 4 API calls 5470->5473 5471->5462 5474 40704c 5473->5474 5474->5341 5476 403426 5475->5476 5478 403437 5475->5478 5477 403254 4 API calls 5476->5477 5476->5478 5477->5478 5478->5451 5480 408cea 5479->5480 5482 408d02 5480->5482 5492 408c74 5480->5492 5483 408c74 4 API calls 5482->5483 5484 408d26 5482->5484 5483->5484 5495 407830 5484->5495 5487 408c74 4 API calls 5489 408d52 5487->5489 5488 408c74 4 API calls 5488->5489 5489->5488 5490 403278 4 API calls 5489->5490 5491 408d81 5489->5491 5490->5489 5491->5453 5493 4057e0 4 API calls 5492->5493 5494 408c85 5493->5494 5494->5482 5498 4077dc 5495->5498 5499 4077ee 5498->5499 5500 4077ff 5498->5500 5501 4077f3 InterlockedExchange 5499->5501 5500->5487 5500->5489 5501->5500 5503 406e97 5502->5503 5504 406e9d RegOpenKeyExA 5502->5504 5503->5504 5504->5461 5526 406d4c 5505->5526 5510 403230 5508->5510 5509 403252 5512 4032fc 5509->5512 5510->5509 5511 4025ac 4 API calls 5510->5511 5511->5509 5513 403300 5512->5513 5514 40333f 5512->5514 5515 4031e8 5513->5515 5516 40330a 5513->5516 5514->5455 5523 403254 4 API calls 5515->5523 5524 4031fc 5515->5524 5517 403334 5516->5517 5518 40331d 5516->5518 5520 4034f0 4 API calls 5517->5520 5519 4034f0 4 API calls 5518->5519 5522 403322 5519->5522 5520->5522 5521 403228 5521->5455 5522->5455 5523->5524 5524->5521 5525 4025ac 4 API calls 5524->5525 5525->5521 5527 406d71 RegQueryValueExA 5526->5527 5533 406d91 5527->5533 5541 406db3 5527->5541 5528 403198 4 API calls 5530 406e6c RegCloseKey 5528->5530 5529 406dab 5531 403198 4 API calls 5529->5531 5530->5462 5531->5541 5532 403278 4 API calls 5532->5533 5533->5529 5533->5532 5534 403420 4 API calls 5533->5534 5533->5541 5535 406dd3 RegQueryValueExA 5534->5535 5535->5527 5536 406de8 5535->5536 5536->5541 5543 4034f0 5536->5543 5539 406e42 5540 4031e8 4 API calls 5539->5540 5540->5541 5541->5528 5542 403420 4 API calls 5542->5539 5544 4034fd 5543->5544 5551 40352d 5543->5551 5545 403526 5544->5545 5547 403509 5544->5547 5548 403254 4 API calls 5545->5548 5546 403198 4 API calls 5549 403517 5546->5549 5552 4025c4 5547->5552 5548->5551 5549->5539 5549->5542 5551->5546 5554 4025ca 5552->5554 5553 4025dc 5553->5549 5554->5553 5555 403154 4 API calls 5554->5555 5555->5553 5605 406994 5556->5605 5559 406c62 5561 406994 5 API calls 5559->5561 5563 406cae 5559->5563 5562 406c72 5561->5562 5564 406c7e 5562->5564 5566 406970 7 API calls 5562->5566 5613 4067cc 5563->5613 5564->5563 5567 406994 5 API calls 5564->5567 5576 406ca3 5564->5576 5566->5564 5570 406c97 5567->5570 5573 406970 7 API calls 5570->5573 5570->5576 5571 406594 5 API calls 5572 406cc3 5571->5572 5574 40322c 4 API calls 5572->5574 5573->5576 5575 406ccd 5574->5575 5577 4031b8 4 API calls 5575->5577 5576->5563 5625 406c04 GetWindowsDirectoryA 5576->5625 5578 406ce7 5577->5578 5578->5354 5580 40909c 5579->5580 5581 406594 5 API calls 5580->5581 5582 4090b5 5581->5582 5583 40322c 4 API calls 5582->5583 5584 4090c0 5583->5584 5586 4068b4 6 API calls 5584->5586 5588 408c34 4 API calls 5584->5588 5590 4057e0 4 API calls 5584->5590 5591 40913c 5584->5591 5666 409008 5584->5666 5674 4033b4 5584->5674 5680 408e8c 5584->5680 5586->5584 5588->5584 5590->5584 5592 40322c 4 API calls 5591->5592 5593 409147 5592->5593 5594 4031b8 4 API calls 5593->5594 5595 409161 5594->5595 5596 403198 4 API calls 5595->5596 5597 409169 5596->5597 5597->5354 5599 4050f8 19 API calls 5598->5599 5600 404c02 5599->5600 5600->5354 5602 408c24 5601->5602 5708 408b04 5602->5708 5606 4034f0 4 API calls 5605->5606 5608 4069a7 5606->5608 5607 4069be GetEnvironmentVariableA 5607->5608 5609 4069ca 5607->5609 5608->5607 5612 4069d1 5608->5612 5627 406d28 5608->5627 5611 403198 4 API calls 5609->5611 5611->5612 5612->5559 5622 406970 5612->5622 5631 403414 5613->5631 5616 406812 5619 40322c 4 API calls 5616->5619 5617 4067fb 5617->5616 5618 406803 5617->5618 5620 403278 4 API calls 5618->5620 5621 406810 5619->5621 5620->5621 5621->5571 5633 406918 5622->5633 5626 406c25 5625->5626 5626->5563 5628 406d36 5627->5628 5629 4034f0 4 API calls 5628->5629 5630 406d44 5629->5630 5630->5608 5632 403418 GetFullPathNameA 5631->5632 5632->5616 5632->5617 5640 4068b4 5633->5640 5635 40693a 5636 406942 GetFileAttributesA 5635->5636 5637 406957 5636->5637 5638 403198 4 API calls 5637->5638 5639 40695f 5638->5639 5639->5559 5650 40668c 5640->5650 5642 4068c5 5643 4068d7 CharPrevA 5642->5643 5644 4068eb 5642->5644 5643->5642 5645 406901 5644->5645 5646 4068f6 5644->5646 5657 403454 5645->5657 5648 40322c 4 API calls 5646->5648 5649 4068ff 5648->5649 5649->5635 5652 40669d 5650->5652 5651 4066fd 5653 4065d8 IsDBCSLeadByte 5651->5653 5656 4066f8 5651->5656 5652->5651 5654 4066b9 5652->5654 5653->5656 5654->5656 5664 4065d8 IsDBCSLeadByte 5654->5664 5656->5642 5658 403486 5657->5658 5659 403459 5657->5659 5660 403198 4 API calls 5658->5660 5659->5658 5661 40346d 5659->5661 5663 40347c 5660->5663 5662 403278 4 API calls 5661->5662 5662->5663 5663->5649 5665 4065ec 5664->5665 5665->5654 5667 403198 4 API calls 5666->5667 5669 409029 5667->5669 5671 409056 5669->5671 5689 4032a8 5669->5689 5692 403494 5669->5692 5672 403198 4 API calls 5671->5672 5673 40906b 5672->5673 5673->5584 5675 4033bc 5674->5675 5676 403254 4 API calls 5675->5676 5677 4033cf 5676->5677 5678 4031e8 4 API calls 5677->5678 5679 4033f7 5678->5679 5696 408dc8 5680->5696 5682 408ea2 5683 408ea6 5682->5683 5702 406984 5682->5702 5683->5584 5686 408ed9 5705 408e04 5686->5705 5690 403278 4 API calls 5689->5690 5691 4032b5 5690->5691 5691->5669 5693 403498 5692->5693 5695 4034c3 5692->5695 5694 4034f0 4 API calls 5693->5694 5694->5695 5695->5669 5697 408dd2 5696->5697 5698 408dd6 5696->5698 5697->5682 5699 408df8 SetLastError 5698->5699 5700 408ddf Wow64DisableWow64FsRedirection 5698->5700 5701 408df3 5699->5701 5700->5701 5701->5682 5703 406918 7 API calls 5702->5703 5704 40698e GetLastError 5703->5704 5704->5686 5706 408e13 5705->5706 5707 408e09 Wow64RevertWow64FsRedirection 5705->5707 5706->5584 5707->5706 5709 403198 4 API calls 5708->5709 5710 408b35 5708->5710 5709->5710 5712 408b4c 5710->5712 5714 403278 4 API calls 5710->5714 5716 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5710->5716 5717 408b60 5710->5717 5711 4031b8 4 API calls 5713 408be5 5711->5713 5715 4032fc 4 API calls 5712->5715 5713->5354 5714->5710 5715->5717 5716->5710 5717->5711 5719 40668c IsDBCSLeadByte 5718->5719 5721 406779 5719->5721 5720 4067c2 5720->5372 5721->5720 5722 4065d8 IsDBCSLeadByte 5721->5722 5722->5721 5724 406837 5723->5724 5725 406764 IsDBCSLeadByte 5724->5725 5728 406842 5725->5728 5726 406632 5726->5377 5726->5378 5727 4065d8 IsDBCSLeadByte 5727->5728 5728->5726 5728->5727 5730 40689b 5729->5730 5731 40689f 5729->5731 5730->5391 5732 4068a6 CharPrevA 5731->5732 5732->5391 5734 403414 5733->5734 5735 4074cf CreateFileA 5734->5735 5735->5413 5737 407490 5736->5737 5738 4074cf CreateFileA 5737->5738 5738->5413 5740 402bd5 RaiseException 5739->5740 5741 402be6 5739->5741 5740->5741 5741->5432 5743 407dc9 5742->5743 5745 407dd8 5743->5745 5760 407ccc 5743->5760 5746 407e12 5745->5746 5748 407ccc 19 API calls 5745->5748 5747 407e26 5746->5747 5749 407ccc 19 API calls 5746->5749 5752 407e52 5747->5752 5757 407d5c 5747->5757 5748->5746 5749->5747 5752->5446 5754 407b8b 5753->5754 5755 407b4c 5753->5755 5754->5445 5754->5446 5755->5754 5771 407a88 5755->5771 5758 407d6b VirtualFree 5757->5758 5759 407d7d VirtualAlloc 5757->5759 5758->5759 5759->5752 5763 405814 5760->5763 5762 407cee 5762->5745 5764 405820 5763->5764 5765 4050e4 19 API calls 5764->5765 5766 40584d 5765->5766 5767 4031e8 4 API calls 5766->5767 5768 405858 5767->5768 5769 403198 4 API calls 5768->5769 5770 40586d 5769->5770 5770->5762 5772 407a93 5771->5772 5773 407aa4 5771->5773 5774 4057e0 4 API calls 5772->5774 5783 4073b8 5773->5783 5774->5773 5777 4073b8 20 API calls 5778 407ad9 5777->5778 5779 407830 InterlockedExchange 5778->5779 5780 407aee 5779->5780 5781 407b04 5780->5781 5782 4057e0 4 API calls 5780->5782 5781->5755 5782->5781 5784 4073cc 5783->5784 5785 4073dc 5784->5785 5786 407304 20 API calls 5784->5786 5785->5777 5786->5785 6216 408e76 6217 408e68 6216->6217 6218 408e04 Wow64RevertWow64FsRedirection 6217->6218 6219 408e70 6218->6219 6220 407e78 6221 407ea0 6220->6221 6223 407ea7 6220->6223 6222 407db4 21 API calls 6221->6222 6222->6223 6224 407eda 6223->6224 6226 407ed0 6223->6226 6227 407ece 6223->6227 6225 407f0f 6224->6225 6228 407ccc 19 API calls 6224->6228 6230 403198 4 API calls 6225->6230 6229 407ccc 19 API calls 6226->6229 6231 4050e4 19 API calls 6227->6231 6228->6225 6229->6224 6233 407f24 6230->6233 6232 407ef6 6231->6232 6235 407c54 6232->6235 6236 407c57 6235->6236 6237 40322c 4 API calls 6236->6237 6238 407c79 6237->6238 6239 4032fc 4 API calls 6238->6239 6240 407c83 6239->6240 6241 4057e0 4 API calls 6240->6241 6242 407c92 6241->6242 6243 403198 4 API calls 6242->6243 6244 407cac 6243->6244 6244->6224 6245 408e78 SetLastError 6246 408e81 6245->6246 6708 403f7d 6709 403fa2 6708->6709 6712 403f84 6708->6712 6711 403e8e 4 API calls 6709->6711 6709->6712 6710 403f8c 6711->6712 6712->6710 6713 402674 4 API calls 6712->6713 6714 403fca 6713->6714 6723 403d02 6730 403d12 6723->6730 6724 403ddf ExitProcess 6725 403db8 6727 403cc8 4 API calls 6725->6727 6726 403dea 6728 403dc2 6727->6728 6729 403cc8 4 API calls 6728->6729 6731 403dcc 6729->6731 6730->6724 6730->6725 6730->6726 6730->6730 6733 403da4 6730->6733 6734 403d8f MessageBoxA 6730->6734 6743 4019dc 6731->6743 6739 403fe4 6733->6739 6734->6725 6736 403dd1 6736->6724 6736->6726 6740 403fe8 6739->6740 6741 403f07 4 API calls 6740->6741 6742 404006 6741->6742 6744 401abb 6743->6744 6745 4019ed 6743->6745 6744->6736 6746 401a04 RtlEnterCriticalSection 6745->6746 6747 401a0e LocalFree 6745->6747 6746->6747 6748 401a41 6747->6748 6749 401a2f VirtualFree 6748->6749 6750 401a49 6748->6750 6749->6748 6751 401a70 LocalFree 6750->6751 6752 401a87 6750->6752 6751->6751 6751->6752 6753 401aa9 RtlDeleteCriticalSection 6752->6753 6754 401a9f RtlLeaveCriticalSection 6752->6754 6753->6736 6754->6753 6257 404206 6258 4041cc 6257->6258 6261 40420a 6257->6261 6259 403154 4 API calls 6262 404323 6259->6262 6260 404282 6261->6259 6261->6260 6022 409f08 6053 409394 GetLastError 6022->6053 6025 409f14 6027 409f1e CreateWindowExA SetWindowLongA 6025->6027 6026 402f24 5 API calls 6026->6025 6028 4050e4 19 API calls 6027->6028 6029 409fa1 6028->6029 6030 4032fc 4 API calls 6029->6030 6031 409faf 6030->6031 6032 4032fc 4 API calls 6031->6032 6033 409fbc 6032->6033 6066 406ab8 GetCommandLineA 6033->6066 6036 4032fc 4 API calls 6037 409fd1 6036->6037 6071 4097bc 6037->6071 6040 4095d0 5 API calls 6041 409ff6 6040->6041 6042 40a016 6041->6042 6043 40a02f 6041->6043 6087 409330 6042->6087 6045 40a048 6043->6045 6048 40a042 RemoveDirectoryA 6043->6048 6046 40a051 73A25CF0 6045->6046 6047 40a05c 6045->6047 6046->6047 6049 40a084 6047->6049 6095 40357c 6047->6095 6048->6045 6051 40a07a 6052 4025ac 4 API calls 6051->6052 6052->6049 6054 404be4 19 API calls 6053->6054 6055 4093db 6054->6055 6056 4071a8 5 API calls 6055->6056 6057 4093eb 6056->6057 6058 408c04 4 API calls 6057->6058 6059 409400 6058->6059 6060 4057e0 4 API calls 6059->6060 6061 40940f 6060->6061 6062 4031b8 4 API calls 6061->6062 6063 40942e 6062->6063 6064 403198 4 API calls 6063->6064 6065 409436 6064->6065 6065->6025 6065->6026 6067 406a2c 4 API calls 6066->6067 6068 406add 6067->6068 6069 403198 4 API calls 6068->6069 6070 406afb 6069->6070 6070->6036 6072 4033b4 4 API calls 6071->6072 6073 4097f7 6072->6073 6074 409829 CreateProcessA 6073->6074 6075 409835 6074->6075 6076 40983c CloseHandle 6074->6076 6078 409394 21 API calls 6075->6078 6077 409845 6076->6077 6108 409790 6077->6108 6078->6076 6081 409861 6082 409790 3 API calls 6081->6082 6083 409866 GetExitCodeProcess CloseHandle 6082->6083 6084 409886 6083->6084 6085 403198 4 API calls 6084->6085 6086 40988e 6085->6086 6086->6040 6086->6041 6088 409343 6087->6088 6089 40938a 6087->6089 6088->6089 6090 40934b Sleep 6088->6090 6091 40935b Sleep 6088->6091 6093 409372 GetLastError 6088->6093 6112 408e14 6088->6112 6089->6043 6090->6088 6091->6088 6093->6089 6094 40937c GetLastError 6093->6094 6094->6088 6094->6089 6096 403591 6095->6096 6097 4035a0 6095->6097 6100 4035b6 6096->6100 6101 40359b 6096->6101 6105 4035d0 6096->6105 6098 4035b1 6097->6098 6099 4035b8 6097->6099 6102 403198 4 API calls 6098->6102 6103 4031b8 4 API calls 6099->6103 6100->6051 6101->6097 6107 4035ec 6101->6107 6102->6100 6103->6100 6104 40357c 4 API calls 6104->6105 6105->6100 6105->6104 6107->6100 6120 403554 6107->6120 6109 4097a4 PeekMessageA 6108->6109 6110 4097b6 MsgWaitForMultipleObjects 6109->6110 6111 409798 TranslateMessage DispatchMessageA 6109->6111 6110->6077 6110->6081 6111->6109 6113 408dc8 2 API calls 6112->6113 6114 408e2a 6113->6114 6115 408e2e 6114->6115 6116 408e4a DeleteFileA GetLastError 6114->6116 6115->6088 6117 408e68 6116->6117 6118 408e04 Wow64RevertWow64FsRedirection 6117->6118 6119 408e70 6118->6119 6119->6088 6121 403566 6120->6121 6123 403578 6121->6123 6124 403604 6121->6124 6123->6107 6125 40357c 6124->6125 6126 4035a0 6125->6126 6129 40359b 6125->6129 6132 4035b6 6125->6132 6133 4035d0 6125->6133 6127 4035b1 6126->6127 6128 4035b8 6126->6128 6130 403198 4 API calls 6127->6130 6131 4031b8 4 API calls 6128->6131 6129->6126 6135 4035ec 6129->6135 6130->6132 6131->6132 6132->6121 6133->6132 6134 40357c 4 API calls 6133->6134 6134->6133 6135->6132 6136 403554 4 API calls 6135->6136 6136->6135 6263 402c08 6264 402c82 6263->6264 6267 402c19 6263->6267 6265 402c56 RtlUnwind 6266 403154 4 API calls 6265->6266 6266->6264 6267->6264 6267->6265 6270 402b28 6267->6270 6271 402b31 RaiseException 6270->6271 6272 402b47 6270->6272 6271->6272 6272->6265 6765 407512 GetFileSize 6766 40753e 6765->6766 6767 40752e GetLastError 6765->6767 6767->6766 6768 407537 6767->6768 6769 4073a4 21 API calls 6768->6769 6769->6766 6273 403018 6274 403070 6273->6274 6275 403025 6273->6275 6276 40302a RtlUnwind 6275->6276 6278 40304e 6276->6278 6277 402f78 6278->6277 6280 402be8 6278->6280 6281 402bf1 RaiseException 6280->6281 6282 402c04 6280->6282 6281->6282 6282->6274 6770 406f1f 6771 406f2c SetErrorMode 6770->6771 6283 409e20 6284 409e45 6283->6284 6285 407830 InterlockedExchange 6284->6285 6286 409e6f 6285->6286 6287 409e7f 6286->6287 6288 4098b8 4 API calls 6286->6288 6293 4075c4 SetEndOfFile 6287->6293 6288->6287 6290 409e9b 6291 4025ac 4 API calls 6290->6291 6292 409ed2 6291->6292 6294 4075d4 6293->6294 6295 4075db 6293->6295 6296 4073a4 21 API calls 6294->6296 6295->6290 6296->6295 6297 405a24 6298 405a34 6297->6298 6299 405a2c 6297->6299 6300 405a32 6299->6300 6301 405a3b 6299->6301 6304 40599c 6300->6304 6302 405890 5 API calls 6301->6302 6302->6298 6305 4059a4 6304->6305 6306 4059be 6305->6306 6307 403154 4 API calls 6305->6307 6308 4059c3 6306->6308 6309 4059da 6306->6309 6307->6305 6310 405890 5 API calls 6308->6310 6311 403154 4 API calls 6309->6311 6312 4059d6 6310->6312 6313 4059df 6311->6313 6315 403154 4 API calls 6312->6315 6314 405900 19 API calls 6313->6314 6314->6312 6316 405a08 6315->6316 6317 403154 4 API calls 6316->6317 6318 405a16 6317->6318 6318->6298 6319 403a28 ReadFile 6320 403a46 6319->6320 6321 403a49 GetLastError 6319->6321 6776 409730 6777 409749 6776->6777 6778 40973f 6776->6778 6778->6777 6779 40976e CallWindowProcA 6778->6779 6779->6777 6780 403932 6781 403924 6780->6781 6782 40374c VariantClear 6781->6782 6783 40392c 6782->6783 6137 406f3b 6138 406f2c SetErrorMode 6137->6138 6322 409e3b 6323 4098b8 4 API calls 6322->6323 6324 409e40 6323->6324 6325 402f24 5 API calls 6324->6325 6326 409e45 6324->6326 6325->6326 6327 407830 InterlockedExchange 6326->6327 6328 409e6f 6327->6328 6329 409e7f 6328->6329 6330 4098b8 4 API calls 6328->6330 6331 4075c4 22 API calls 6329->6331 6330->6329 6332 409e9b 6331->6332 6333 4025ac 4 API calls 6332->6333 6334 409ed2 6333->6334 5793 4075c4 SetEndOfFile 5794 4075d4 5793->5794 5795 4075db 5793->5795 5796 4073a4 21 API calls 5794->5796 5796->5795 6341 402ccc 6344 402cfe 6341->6344 6345 402cdd 6341->6345 6342 402d88 RtlUnwind 6343 403154 4 API calls 6342->6343 6343->6344 6345->6342 6345->6344 6346 402b28 RaiseException 6345->6346 6347 402d7f 6346->6347 6347->6342 6784 403fcd 6785 403f07 4 API calls 6784->6785 6786 403fd6 6785->6786 6787 403e9c 4 API calls 6786->6787 6788 403fe2 6787->6788 4902 4024d0 4903 4024e4 4902->4903 4904 4024f7 4902->4904 4941 401918 RtlInitializeCriticalSection 4903->4941 4905 402518 4904->4905 4906 40250e RtlEnterCriticalSection 4904->4906 4918 402300 4905->4918 4906->4905 4910 4024ed 4912 402525 4914 402581 4912->4914 4915 402577 RtlLeaveCriticalSection 4912->4915 4915->4914 4916 402531 4916->4912 4948 40215c 4916->4948 4919 402314 4918->4919 4920 402335 4919->4920 4925 4023b8 4919->4925 4922 402344 4920->4922 4962 401b74 4920->4962 4922->4912 4928 401fd4 4922->4928 4925->4922 4926 402455 4925->4926 4965 401d80 4925->4965 4973 401e84 4925->4973 4926->4922 4969 401d00 4926->4969 4929 401fe8 4928->4929 4930 401ffb 4928->4930 4931 401918 4 API calls 4929->4931 4932 402012 RtlEnterCriticalSection 4930->4932 4935 40201c 4930->4935 4933 401fed 4931->4933 4932->4935 4933->4930 4934 401ff1 4933->4934 4938 402052 4934->4938 4935->4938 5055 401ee0 4935->5055 4938->4916 4939 402147 4939->4916 4940 40213d RtlLeaveCriticalSection 4940->4939 4942 40193c RtlEnterCriticalSection 4941->4942 4943 401946 4941->4943 4942->4943 4944 401964 LocalAlloc 4943->4944 4945 40197e 4944->4945 4946 4019c3 RtlLeaveCriticalSection 4945->4946 4947 4019cd 4945->4947 4946->4947 4947->4904 4947->4910 4949 40217a 4948->4949 4950 402175 4948->4950 4951 4021ab RtlEnterCriticalSection 4949->4951 4954 4021b5 4949->4954 4958 40217e 4949->4958 4952 401918 4 API calls 4950->4952 4951->4954 4952->4949 4953 4021c1 4956 4022e3 RtlLeaveCriticalSection 4953->4956 4957 4022ed 4953->4957 4954->4953 4955 402244 4954->4955 4960 402270 4954->4960 4955->4958 4959 401d80 7 API calls 4955->4959 4956->4957 4957->4912 4958->4912 4959->4958 4960->4953 4961 401d00 7 API calls 4960->4961 4961->4953 4963 40215c 9 API calls 4962->4963 4964 401b95 4963->4964 4964->4922 4966 401d92 4965->4966 4967 401d89 4965->4967 4966->4925 4967->4966 4968 401b74 9 API calls 4967->4968 4968->4966 4970 401d4e 4969->4970 4971 401d1e 4969->4971 4970->4971 4978 401c68 4970->4978 4971->4922 5033 401768 4973->5033 4975 401e99 4977 401ea6 4975->4977 5044 401dcc 4975->5044 4977->4925 4979 401c7a 4978->4979 4980 401c9d 4979->4980 4981 401caf 4979->4981 4991 40188c 4980->4991 4983 40188c 3 API calls 4981->4983 4984 401cad 4983->4984 4985 401cc5 4984->4985 5001 401b44 4984->5001 4985->4971 4987 401cd4 4988 401cee 4987->4988 5006 401b98 4987->5006 5011 4013a0 4988->5011 4992 4018b2 4991->4992 4993 40190b 4991->4993 5015 401658 4992->5015 4993->4984 4998 4018e6 4998->4993 5000 4013a0 LocalAlloc 4998->5000 5000->4993 5002 401b61 5001->5002 5003 401b52 5001->5003 5002->4987 5004 401d00 9 API calls 5003->5004 5005 401b5f 5004->5005 5005->4987 5007 401b9d 5006->5007 5009 401bab 5006->5009 5008 401b74 9 API calls 5007->5008 5010 401baa 5008->5010 5009->4988 5010->4988 5012 4013ab 5011->5012 5013 4013c6 5012->5013 5014 4012e4 LocalAlloc 5012->5014 5013->4985 5014->5013 5017 40168f 5015->5017 5016 4016cf 5019 40132c 5016->5019 5017->5016 5018 4016a9 VirtualFree 5017->5018 5018->5017 5020 401348 5019->5020 5027 4012e4 5020->5027 5023 40150c 5026 40153b 5023->5026 5024 401594 5024->4998 5025 401568 VirtualFree 5025->5026 5026->5024 5026->5025 5030 40128c 5027->5030 5031 401298 LocalAlloc 5030->5031 5032 4012aa 5030->5032 5031->5032 5032->4998 5032->5023 5035 401787 5033->5035 5034 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5034->5035 5035->5034 5036 40183b 5035->5036 5037 40132c LocalAlloc 5035->5037 5039 401821 5035->5039 5041 4017d6 5035->5041 5042 4017e7 5036->5042 5051 4015c4 5036->5051 5037->5035 5040 40150c VirtualFree 5039->5040 5040->5042 5043 40150c VirtualFree 5041->5043 5042->4975 5043->5042 5045 401d80 9 API calls 5044->5045 5046 401de0 5045->5046 5047 40132c LocalAlloc 5046->5047 5048 401df0 5047->5048 5049 401df8 5048->5049 5050 401b44 9 API calls 5048->5050 5049->4977 5050->5049 5053 40160a 5051->5053 5052 40163a 5052->5042 5053->5052 5054 401626 VirtualAlloc 5053->5054 5054->5052 5054->5053 5056 401ef0 5055->5056 5057 401f1c 5056->5057 5060 401f40 5056->5060 5061 401e58 5056->5061 5058 401d00 9 API calls 5057->5058 5057->5060 5058->5060 5060->4939 5060->4940 5066 4016d8 5061->5066 5064 401dcc 9 API calls 5065 401e75 5064->5065 5065->5056 5072 4016f4 5066->5072 5068 4016fe 5069 4015c4 VirtualAlloc 5068->5069 5073 40170a 5069->5073 5070 40175b 5070->5064 5070->5065 5071 40132c LocalAlloc 5071->5072 5072->5068 5072->5070 5072->5071 5074 40174f 5072->5074 5076 401430 5072->5076 5073->5070 5075 40150c VirtualFree 5074->5075 5075->5070 5077 40143f VirtualAlloc 5076->5077 5079 40146c 5077->5079 5080 40148f 5077->5080 5081 4012e4 LocalAlloc 5079->5081 5080->5072 5082 401478 5081->5082 5082->5080 5083 40147c VirtualFree 5082->5083 5083->5080 6348 4028d2 6349 4028da 6348->6349 6350 403554 4 API calls 6349->6350 6351 4028ef 6349->6351 6350->6349 6352 4025ac 4 API calls 6351->6352 6353 4028f4 6352->6353 6789 4019d3 6790 4019ba 6789->6790 6791 4019c3 RtlLeaveCriticalSection 6790->6791 6792 4019cd 6790->6792 6791->6792 6793 4065d4 IsDBCSLeadByte 6794 4065ec 6793->6794 6354 40a0d9 6363 409448 6354->6363 6357 402f24 5 API calls 6358 40a0e3 6357->6358 6359 403198 4 API calls 6358->6359 6360 40a102 6359->6360 6361 403198 4 API calls 6360->6361 6362 40a10a 6361->6362 6372 4055fc 6363->6372 6365 409463 6366 409491 6365->6366 6378 407130 6365->6378 6369 403198 4 API calls 6366->6369 6368 409481 6371 409489 MessageBoxA 6368->6371 6370 4094a6 6369->6370 6370->6357 6371->6366 6373 403154 4 API calls 6372->6373 6374 405601 6373->6374 6375 405619 6374->6375 6376 403154 4 API calls 6374->6376 6375->6365 6377 40560f 6376->6377 6377->6365 6379 4055fc 4 API calls 6378->6379 6380 40713f 6379->6380 6381 407145 6380->6381 6383 407153 6380->6383 6382 40322c 4 API calls 6381->6382 6384 407151 6382->6384 6385 407163 6383->6385 6386 40716f 6383->6386 6384->6368 6389 4070f4 6385->6389 6396 4032b8 6386->6396 6390 40322c 4 API calls 6389->6390 6391 407103 6390->6391 6392 407120 6391->6392 6393 406894 CharPrevA 6391->6393 6392->6384 6394 40710f 6393->6394 6394->6392 6395 4032fc 4 API calls 6394->6395 6395->6392 6397 403278 4 API calls 6396->6397 6398 4032c2 6397->6398 6398->6384 6798 407bdb 6799 407be1 6798->6799 6800 40322c 4 API calls 6799->6800 6801 407c79 6800->6801 6802 4032fc 4 API calls 6801->6802 6803 407c83 6802->6803 6804 4057e0 4 API calls 6803->6804 6805 407c92 6804->6805 6806 403198 4 API calls 6805->6806 6807 407cac 6806->6807 6139 4074dc SetFilePointer 6140 40750f 6139->6140 6141 4074ff GetLastError 6139->6141 6141->6140 6142 407508 6141->6142 6143 4073a4 21 API calls 6142->6143 6143->6140 5084 4075e0 WriteFile 5085 407600 5084->5085 5086 407607 5084->5086 5090 4073a4 GetLastError 5085->5090 5088 407618 5086->5088 5093 407304 5086->5093 5091 407304 20 API calls 5090->5091 5092 4073b5 5091->5092 5092->5086 5102 4071a8 FormatMessageA 5093->5102 5096 40734c 5109 4057e0 5096->5109 5099 40735b 5113 403198 5099->5113 5103 4071ce 5102->5103 5117 403278 5103->5117 5106 4050e4 5144 4050f8 5106->5144 5110 4057e7 5109->5110 5111 4031e8 4 API calls 5110->5111 5112 4057ff 5111->5112 5112->5099 5114 4031b7 5113->5114 5115 40319e 5113->5115 5114->5088 5115->5114 5116 4025ac 4 API calls 5115->5116 5116->5114 5122 403254 5117->5122 5119 403288 5120 403198 4 API calls 5119->5120 5121 4032a0 5120->5121 5121->5096 5121->5106 5123 403274 5122->5123 5124 403258 5122->5124 5123->5119 5127 402594 5124->5127 5126 403261 5126->5119 5128 402598 5127->5128 5129 4025a2 5127->5129 5128->5129 5131 403154 5128->5131 5129->5126 5129->5129 5132 403164 5131->5132 5133 40318c TlsGetValue 5131->5133 5132->5129 5134 403196 5133->5134 5135 40316f 5133->5135 5134->5129 5139 40310c 5135->5139 5137 403174 TlsGetValue 5138 403184 5137->5138 5138->5129 5140 403120 LocalAlloc 5139->5140 5141 403116 5139->5141 5142 40313e TlsSetValue 5140->5142 5143 403132 5140->5143 5141->5140 5142->5143 5143->5137 5145 405115 5144->5145 5152 404da8 5145->5152 5148 405141 5149 403278 4 API calls 5148->5149 5151 4050f3 5149->5151 5151->5096 5155 404dc3 5152->5155 5153 404dd5 5153->5148 5157 404b34 5153->5157 5155->5153 5160 404eca 5155->5160 5167 404d9c 5155->5167 5277 405890 5157->5277 5159 404b45 5159->5148 5161 404edb 5160->5161 5163 404f29 5160->5163 5161->5163 5164 404faf 5161->5164 5165 404f47 5163->5165 5170 404d44 5163->5170 5164->5165 5174 404d88 5164->5174 5165->5155 5168 403198 4 API calls 5167->5168 5169 404da6 5168->5169 5169->5155 5171 404d52 5170->5171 5177 404b4c 5171->5177 5173 404d80 5173->5163 5207 4039a4 5174->5207 5180 405900 5177->5180 5179 404b65 5179->5173 5181 40590e 5180->5181 5190 404c2c LoadStringA 5181->5190 5184 4050e4 19 API calls 5185 405946 5184->5185 5193 4031e8 5185->5193 5191 403278 4 API calls 5190->5191 5192 404c59 5191->5192 5192->5184 5194 4031ec 5193->5194 5197 4031fc 5193->5197 5196 403254 4 API calls 5194->5196 5194->5197 5195 403228 5199 4031b8 5195->5199 5196->5197 5197->5195 5203 4025ac 5197->5203 5201 4031be 5199->5201 5200 4031e3 5200->5179 5201->5200 5202 4025ac 4 API calls 5201->5202 5202->5201 5204 4025b0 5203->5204 5206 4025ba 5203->5206 5205 403154 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5204->5205 5204->5206 5205->5206 5206->5195 5208 4039ab 5207->5208 5213 4038b4 5208->5213 5210 4039cb 5211 403198 4 API calls 5210->5211 5212 4039d2 5211->5212 5212->5165 5214 4038d5 5213->5214 5215 4038c8 5213->5215 5217 403934 5214->5217 5218 4038db 5214->5218 5241 403780 5215->5241 5219 403993 5217->5219 5220 40393b 5217->5220 5221 4038e1 5218->5221 5222 4038ee 5218->5222 5224 4037f4 3 API calls 5219->5224 5225 403941 5220->5225 5226 40394b 5220->5226 5248 403894 5221->5248 5223 403894 6 API calls 5222->5223 5229 4038fc 5223->5229 5227 4038d0 5224->5227 5263 403864 5225->5263 5231 4037f4 3 API calls 5226->5231 5227->5210 5253 4037f4 5229->5253 5233 40395d 5231->5233 5234 403864 9 API calls 5233->5234 5236 403976 5234->5236 5235 403917 5259 40374c 5235->5259 5238 40374c VariantClear 5236->5238 5240 40398b 5238->5240 5239 40392c 5239->5210 5240->5210 5242 4037f0 5241->5242 5243 403744 5241->5243 5242->5227 5243->5241 5244 403793 VariantClear 5243->5244 5245 4037ab 5243->5245 5246 4037dc VariantCopyInd 5243->5246 5247 403198 4 API calls 5243->5247 5244->5243 5245->5227 5246->5242 5246->5243 5247->5243 5268 4036b8 5248->5268 5251 40374c VariantClear 5252 4038a9 5251->5252 5252->5227 5254 403845 VariantChangeTypeEx 5253->5254 5255 40380a VariantChangeTypeEx 5253->5255 5258 403832 5254->5258 5256 403826 5255->5256 5257 40374c VariantClear 5256->5257 5257->5258 5258->5235 5260 403759 5259->5260 5261 403766 5259->5261 5260->5261 5262 403779 VariantClear 5260->5262 5261->5239 5262->5239 5274 40369c SysStringLen 5263->5274 5266 40374c VariantClear 5267 403882 5266->5267 5267->5227 5269 4036cb 5268->5269 5270 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5269->5270 5271 4036db 5269->5271 5272 40372e 5270->5272 5273 4036ed MultiByteToWideChar SysAllocStringLen 5271->5273 5272->5251 5273->5272 5275 403610 7 API calls 5274->5275 5276 4036b3 5275->5276 5276->5266 5278 40589c 5277->5278 5279 404c2c 5 API calls 5278->5279 5280 4058c2 5279->5280 5281 4031e8 4 API calls 5280->5281 5282 4058cd 5281->5282 5283 403198 4 API calls 5282->5283 5284 4058e2 5283->5284 5284->5159 6403 409ee4 6404 409f14 6403->6404 6405 409f1e CreateWindowExA SetWindowLongA 6404->6405 6406 4050e4 19 API calls 6405->6406 6407 409fa1 6406->6407 6408 4032fc 4 API calls 6407->6408 6409 409faf 6408->6409 6410 4032fc 4 API calls 6409->6410 6411 409fbc 6410->6411 6412 406ab8 5 API calls 6411->6412 6413 409fc8 6412->6413 6414 4032fc 4 API calls 6413->6414 6415 409fd1 6414->6415 6416 4097bc 29 API calls 6415->6416 6417 409fe3 6416->6417 6418 4095d0 5 API calls 6417->6418 6419 409ff6 6417->6419 6418->6419 6420 40a02f 6419->6420 6421 409330 9 API calls 6419->6421 6422 40a048 6420->6422 6425 40a042 RemoveDirectoryA 6420->6425 6421->6420 6423 40a051 73A25CF0 6422->6423 6424 40a05c 6422->6424 6423->6424 6426 40357c 4 API calls 6424->6426 6429 40a084 6424->6429 6425->6422 6427 40a07a 6426->6427 6428 4025ac 4 API calls 6427->6428 6428->6429 6812 402be9 RaiseException 6813 402c04 6812->6813 6444 402af2 6445 402afe 6444->6445 6448 402ed0 6445->6448 6449 403154 4 API calls 6448->6449 6451 402ee0 6449->6451 6450 402b03 6451->6450 6453 402b0c 6451->6453 6454 402b25 6453->6454 6455 402b15 RaiseException 6453->6455 6454->6450 6455->6454 6456 405af2 6457 405af4 6456->6457 6458 405b30 6457->6458 6459 405b47 6457->6459 6460 405b2a 6457->6460 6461 405890 5 API calls 6458->6461 6465 404c2c 5 API calls 6459->6465 6460->6458 6462 405b9c 6460->6462 6463 405b43 6461->6463 6464 405900 19 API calls 6462->6464 6466 403198 4 API calls 6463->6466 6464->6463 6467 405b70 6465->6467 6468 405bd6 6466->6468 6469 405900 19 API calls 6467->6469 6469->6463 6488 409ef6 6489 409f3a CreateWindowExA SetWindowLongA 6488->6489 6490 409efa 6488->6490 6491 409fa1 6489->6491 6492 4050e4 19 API calls 6489->6492 6490->6489 6493 4032fc 4 API calls 6491->6493 6492->6491 6494 409faf 6493->6494 6495 4032fc 4 API calls 6494->6495 6496 409fbc 6495->6496 6497 406ab8 5 API calls 6496->6497 6498 409fc8 6497->6498 6499 4032fc 4 API calls 6498->6499 6500 409fd1 6499->6500 6501 4097bc 29 API calls 6500->6501 6502 409fe3 6501->6502 6503 4095d0 5 API calls 6502->6503 6504 409ff6 6502->6504 6503->6504 6505 40a02f 6504->6505 6506 409330 9 API calls 6504->6506 6507 40a048 6505->6507 6510 40a042 RemoveDirectoryA 6505->6510 6506->6505 6508 40a051 73A25CF0 6507->6508 6509 40a05c 6507->6509 6508->6509 6511 40a084 6509->6511 6512 40357c 4 API calls 6509->6512 6510->6507 6513 40a07a 6512->6513 6514 4025ac 4 API calls 6513->6514 6514->6511 6818 402dfa 6819 402e0d 6818->6819 6821 402e26 6818->6821 6822 402ba4 6819->6822 6823 402bc9 6822->6823 6824 402bad 6822->6824 6823->6821 6825 402bb5 RaiseException 6824->6825 6825->6823 6515 403a80 CloseHandle 6516 403a90 6515->6516 6517 403a91 GetLastError 6515->6517 6522 404283 6523 4042c3 6522->6523 6524 403154 4 API calls 6523->6524 6525 404323 6524->6525 6830 404185 6831 4041ff 6830->6831 6832 403154 4 API calls 6831->6832 6833 4041cc 6831->6833 6834 404323 6832->6834 6530 403e87 6531 403e4c 6530->6531 6532 403e67 6531->6532 6533 403e62 6531->6533 6534 403e7b 6531->6534 6537 403e78 6532->6537 6543 402674 6532->6543 6539 403cc8 6533->6539 6536 402674 4 API calls 6534->6536 6536->6537 6540 403cd6 6539->6540 6541 403ceb 6540->6541 6542 402674 4 API calls 6540->6542 6541->6532 6542->6541 6544 403154 4 API calls 6543->6544 6545 40267a 6544->6545 6545->6537 6839 408d88 6842 408c58 6839->6842 6843 408c61 6842->6843 6844 403198 4 API calls 6843->6844 6845 408c6f 6843->6845 6844->6843 6546 40a091 6547 40a003 6546->6547 6548 40a02f 6547->6548 6549 409330 9 API calls 6547->6549 6550 40a048 6548->6550 6553 40a042 RemoveDirectoryA 6548->6553 6549->6548 6551 40a051 73A25CF0 6550->6551 6552 40a05c 6550->6552 6551->6552 6554 40a084 6552->6554 6555 40357c 4 API calls 6552->6555 6553->6550 6556 40a07a 6555->6556 6557 4025ac 4 API calls 6556->6557 6557->6554 6558 408a92 6559 408a9b 6558->6559 6560 403198 4 API calls 6559->6560 6567 408b35 6560->6567 6561 408b60 6562 4031b8 4 API calls 6561->6562 6564 408be5 6562->6564 6563 408b4c 6566 4032fc 4 API calls 6563->6566 6565 403278 4 API calls 6565->6567 6566->6561 6567->6561 6567->6563 6567->6565 6568 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6567->6568 6568->6567 6573 403e95 6574 403e4c 6573->6574 6575 403e67 6574->6575 6576 403e62 6574->6576 6577 403e7b 6574->6577 6580 403e78 6575->6580 6581 402674 4 API calls 6575->6581 6578 403cc8 4 API calls 6576->6578 6579 402674 4 API calls 6577->6579 6578->6575 6579->6580 6581->6580 6582 40a096 6583 40a09f 6582->6583 6585 40a0ca 6582->6585 6592 4092a0 6583->6592 6587 403198 4 API calls 6585->6587 6586 40a0a4 6586->6585 6589 40a0c2 MessageBoxA 6586->6589 6588 40a102 6587->6588 6590 403198 4 API calls 6588->6590 6589->6585 6591 40a10a 6590->6591 6593 409307 ExitWindowsEx 6592->6593 6594 4092ac GetCurrentProcess OpenProcessToken 6592->6594 6596 4092be 6593->6596 6595 4092c2 LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6594->6595 6594->6596 6595->6593 6595->6596 6596->6586 6597 403a97 6598 403aac 6597->6598 6599 403bbc GetStdHandle 6598->6599 6600 403b0e CreateFileA 6598->6600 6610 403ab2 6598->6610 6601 403c17 GetLastError 6599->6601 6605 403bba 6599->6605 6600->6601 6602 403b2c 6600->6602 6601->6610 6604 403b3b GetFileSize 6602->6604 6602->6605 6604->6601 6606 403b4e SetFilePointer 6604->6606 6607 403be7 GetFileType 6605->6607 6605->6610 6606->6601 6611 403b6a ReadFile 6606->6611 6609 403c02 CloseHandle 6607->6609 6607->6610 6609->6610 6611->6601 6612 403b8c 6611->6612 6612->6605 6613 403b9f SetFilePointer 6612->6613 6613->6601 6614 403bb0 SetEndOfFile 6613->6614 6614->6601 6614->6605 6858 4011aa 6859 4011ac GetStdHandle 6858->6859 6622 4028ac 6623 402594 4 API calls 6622->6623 6624 4028b6 6623->6624 6629 4050b0 6630 4050c3 6629->6630 6631 404da8 19 API calls 6630->6631 6632 4050d7 6631->6632 6637 401ab9 6638 401a96 6637->6638 6639 401aa9 RtlDeleteCriticalSection 6638->6639 6640 401a9f RtlLeaveCriticalSection 6638->6640 6640->6639

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 144 409948-40996c GetSystemInfo VirtualQuery 145 409972 144->145 146 4099fc-409a03 144->146 147 4099f1-4099f6 145->147 147->146 148 409974-40997b 147->148 149 4099dd-4099ef VirtualQuery 148->149 150 40997d-409981 148->150 149->146 149->147 150->149 151 409983-40998b 150->151 152 40999c-4099ad VirtualProtect 151->152 153 40998d-409990 151->153 155 4099b1-4099b3 152->155 156 4099af 152->156 153->152 154 409992-409995 153->154 154->152 158 409997-40999a 154->158 157 4099c2-4099c5 155->157 156->155 159 4099b5-4099be call 409940 157->159 160 4099c7-4099c9 157->160 158->152 158->155 159->157 160->149 162 4099cb-4099d8 VirtualProtect 160->162 162->149
                                  APIs
                                  • GetSystemInfo.KERNEL32(?), ref: 0040995A
                                  • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409965
                                  • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 004099A6
                                  • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 004099D8
                                  • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 004099E8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Virtual$ProtectQuery$InfoSystem
                                  • String ID:
                                  • API String ID: 2441996862-0
                                  • Opcode ID: 2c2c90e72dc40e46b51dc553d84ebc029875cc2798a18ec57c7a7b28b8fc0619
                                  • Instruction ID: c51dc94dc7e70e4f078c95023904a162ea503a2a47d9e89981edb447ffe3f24e
                                  • Opcode Fuzzy Hash: 2c2c90e72dc40e46b51dc553d84ebc029875cc2798a18ec57c7a7b28b8fc0619
                                  • Instruction Fuzzy Hash: 5F216DF12002046BDA309A598D85E6BB7D89B45360F08492FFA89E37C3D738ED40D669
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                  • Instruction ID: b78bf48cff894a3999656c5243e329942f020ab22272e2e872fdbeeaebf0035e
                                  • Opcode Fuzzy Hash: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                  • Instruction Fuzzy Hash: EDE09271B0021426D711A9699C86AEB735DDB58310F0006BFB904EB3C6EDB49E8046ED

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00408F95,?,?,?,?,00000000,?,00409A87), ref: 00408F1C
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408F22
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00408F95,?,?,?,?,00000000,?,00409A87), ref: 00408F36
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408F3C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                  • API String ID: 1646373207-2130885113
                                  • Opcode ID: 8f04cc14bccfcdb17213992c023d8f7c3ecead8bf0913e3ac44b7e7d270b511d
                                  • Instruction ID: ef4badd54955bda93fd7c631ce084268f05c1d5093e10ec72b10b69b713a5d4b
                                  • Opcode Fuzzy Hash: 8f04cc14bccfcdb17213992c023d8f7c3ecead8bf0913e3ac44b7e7d270b511d
                                  • Instruction Fuzzy Hash: D701F770108301EEE700BB72DE57B163A59D745718F60443FF248761C2CE7C4904CA2D

                                  Control-flow Graph

                                  APIs
                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409F40
                                  • SetWindowLongA.USER32(0001043A,000000FC,00409730), ref: 00409F57
                                    • Part of subcall function 00406AB8: GetCommandLineA.KERNEL32(00000000,00406AFC,?,?,?,?,00000000,?,00409FC8,?), ref: 00406AD0
                                    • Part of subcall function 004097BC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8,00000000,0040988F), ref: 0040982C
                                    • Part of subcall function 004097BC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8,00000000), ref: 00409840
                                    • Part of subcall function 004097BC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409859
                                    • Part of subcall function 004097BC: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 0040986B
                                    • Part of subcall function 004097BC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8), ref: 00409874
                                  • RemoveDirectoryA.KERNEL32(00000000,0040A096,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A043
                                  • 73A25CF0.USER32(0001043A,0040A096,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A057
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                  • API String ID: 978128352-3001827809
                                  • Opcode ID: 236cca2b7f0ad913bc20f36f3a7df695144f04c2335042181becfcebe84b62ef
                                  • Instruction ID: 4f29ae81ace6c5531c846cbde0b22070d88524e95894dc47e3de1b2ea254153d
                                  • Opcode Fuzzy Hash: 236cca2b7f0ad913bc20f36f3a7df695144f04c2335042181becfcebe84b62ef
                                  • Instruction Fuzzy Hash: 19412A70600205DFD711EBA9EE85B9E7BA5EB88304F10427BF510B72E2DB789805DB5D

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00409394: GetLastError.KERNEL32(00000000,00409437,?,0040B240,?,020F1AA0), ref: 004093B8
                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409F40
                                  • SetWindowLongA.USER32(0001043A,000000FC,00409730), ref: 00409F57
                                    • Part of subcall function 00406AB8: GetCommandLineA.KERNEL32(00000000,00406AFC,?,?,?,?,00000000,?,00409FC8,?), ref: 00406AD0
                                    • Part of subcall function 004097BC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8,00000000,0040988F), ref: 0040982C
                                    • Part of subcall function 004097BC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8,00000000), ref: 00409840
                                    • Part of subcall function 004097BC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409859
                                    • Part of subcall function 004097BC: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 0040986B
                                    • Part of subcall function 004097BC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8), ref: 00409874
                                  • RemoveDirectoryA.KERNEL32(00000000,0040A096,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A043
                                  • 73A25CF0.USER32(0001043A,0040A096,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A057
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryErrorExitLastLineLongMultipleObjectsRemoveWait
                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                  • API String ID: 240127915-3001827809
                                  • Opcode ID: cecf565c0961afba62185dae83a1111a0a24350c08567557d89fa88e41d9bdcc
                                  • Instruction ID: 8d10768f6f352a97fd7f45d9d75da35781c42c574274e542ef9de71c66c7d0f2
                                  • Opcode Fuzzy Hash: cecf565c0961afba62185dae83a1111a0a24350c08567557d89fa88e41d9bdcc
                                  • Instruction Fuzzy Hash: 26410B70A00205DBD711EBA9EE86B9E7BA5EB48304F10427BF510B73E2DB789805DB5D

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8,00000000,0040988F), ref: 0040982C
                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8,00000000), ref: 00409840
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409859
                                  • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 0040986B
                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004098B4,020F1AA0,004098A8), ref: 00409874
                                    • Part of subcall function 00409394: GetLastError.KERNEL32(00000000,00409437,?,0040B240,?,020F1AA0), ref: 004093B8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                  • String ID: D
                                  • API String ID: 3356880605-2746444292
                                  • Opcode ID: c5e523d568ed87ab69b8de1fa4de2ba8e9d12516204b82cc72ca68b77ef72ee6
                                  • Instruction ID: 4b44df64f6e4367ebc453b3e314358db19e806afbd12f45635a8daf6f5489de3
                                  • Opcode Fuzzy Hash: c5e523d568ed87ab69b8de1fa4de2ba8e9d12516204b82cc72ca68b77ef72ee6
                                  • Instruction Fuzzy Hash: F71145716102086EDB10FBE6CC52F9E77ACDF49714F50413BBA04F72C6DA785D048669

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 108 409ef6-409ef8 109 409f3a-409f97 CreateWindowExA SetWindowLongA 108->109 110 409efa-409f04 108->110 111 409fa1-409fcc call 4032fc * 2 call 406ab8 call 4032fc 109->111 112 409f9c call 4050e4 109->112 110->109 120 409fd1-409fde call 4097bc 111->120 112->111 122 409fe3-409fea 120->122 123 409ff6-40a014 call 402924 122->123 124 409fec-409ff1 call 4095d0 122->124 129 40a016-40a028 123->129 130 40a02f-40a036 123->130 124->123 131 40a02a call 409330 129->131 132 40a048-40a04f 130->132 133 40a038-40a043 call 403414 RemoveDirectoryA 130->133 131->130 135 40a051-40a057 73A25CF0 132->135 136 40a05c-40a063 132->136 133->132 135->136 138 40a065-40a086 call 40357c call 4025ac 136->138 139 40a08b 136->139 138->139
                                  APIs
                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00409F40
                                  • SetWindowLongA.USER32(0001043A,000000FC,00409730), ref: 00409F57
                                  • RemoveDirectoryA.KERNEL32(00000000,0040A096,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A043
                                  • 73A25CF0.USER32(0001043A,0040A096,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A057
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$CreateDirectoryLongRemove
                                  • String ID: /SL5="$%x,%d,%d,
                                  • API String ID: 3138356250-3932573195
                                  • Opcode ID: b613a7ce4edcb41dc67f34e270572c8bd45005561bf10fdcf5b8ae4482e344bf
                                  • Instruction ID: 92da378220fa86c3d7769582b63b95c30d1cbd5b696cf01c1bf744cbf4438da8
                                  • Opcode Fuzzy Hash: b613a7ce4edcb41dc67f34e270572c8bd45005561bf10fdcf5b8ae4482e344bf
                                  • Instruction Fuzzy Hash: B6313870A00205DFC715EBA9EE85B9E3BA5EB48304F10427BE450B73E2DB789805DB9D

                                  Control-flow Graph

                                  APIs
                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00409277,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004091CE
                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,00409277,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004091D7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: .tmp
                                  • API String ID: 1375471231-2986845003
                                  • Opcode ID: 2a9b5b531dfd0466f51cddb5784c326d8b9171bad11d05e807471eb9e268ae76
                                  • Instruction ID: b3c939f821d6d3b02d73a6ffc60c10d65ff6e2c1a1ef0f9f166dc2fc0ea9728e
                                  • Opcode Fuzzy Hash: 2a9b5b531dfd0466f51cddb5784c326d8b9171bad11d05e807471eb9e268ae76
                                  • Instruction Fuzzy Hash: 16214774A00209ABDB01EFA1C9429DFB7B9EB88304F50457FE501B73C2DA7C9E058BA5

                                  Control-flow Graph

                                  APIs
                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409CBA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: .tmp
                                  • API String ID: 2030045667-2986845003
                                  • Opcode ID: e37c67d54dac57feaabedb1cd41a5786e804cc8be819c9315e680249df306dc9
                                  • Instruction ID: 59ccd3a8e5ff0a6346b3f4a7db234678dac937939a17de0d6313a761c5d443a3
                                  • Opcode Fuzzy Hash: e37c67d54dac57feaabedb1cd41a5786e804cc8be819c9315e680249df306dc9
                                  • Instruction Fuzzy Hash: B141C130604241DFD715EF29DE92A5A7BA6FB49308B11457AF800B73E2CB79AC01DB9D

                                  Control-flow Graph

                                  APIs
                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409CBA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: .tmp
                                  • API String ID: 2030045667-2986845003
                                  • Opcode ID: f91dc667a2d24a60a81ae003db88dd446dde78fb0bef1b00c0f9948de59b2fab
                                  • Instruction ID: 097be32f3f4cb42389ad5c0a501b1885a0adcc09f85d4dbd7a75a59d9c7c1898
                                  • Opcode Fuzzy Hash: f91dc667a2d24a60a81ae003db88dd446dde78fb0bef1b00c0f9948de59b2fab
                                  • Instruction Fuzzy Hash: 6A41AF30600245DFD715EF29DE92A5A7BA6FB49308B10457AF800B73E2CB79AC01DB9D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 289 406ec4-406f17 SetErrorMode call 403414 LoadLibraryA
                                  APIs
                                  • SetErrorMode.KERNEL32(00008000), ref: 00406ECE
                                  • LoadLibraryA.KERNEL32(00000000,00000000,00406F18,?,00000000,00406F36,?,00008000), ref: 00406EFD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLibraryLoadMode
                                  • String ID:
                                  • API String ID: 2987862817-0
                                  • Opcode ID: 730de3fdc093f184fd2de9ac27439434a3bd3e782f0b7281efe78e7bb3385372
                                  • Instruction ID: 5e20ffdb52ff7e8261d23daca573ea8644dcd49689b218f11c6781c5bce8f48d
                                  • Opcode Fuzzy Hash: 730de3fdc093f184fd2de9ac27439434a3bd3e782f0b7281efe78e7bb3385372
                                  • Instruction Fuzzy Hash: D7F089705147047EDB119F769C6241ABBECD749B047534875F910A26D2E53C4C208568

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 293 407544-407562 ReadFile 294 407564-407568 293->294 295 40757b-407582 293->295 296 407574-407576 call 4073a4 294->296 297 40756a-407572 GetLastError 294->297 296->295 297->295 297->296
                                  APIs
                                  • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0040755B
                                  • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 0040756A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead
                                  • String ID:
                                  • API String ID: 1948546556-0
                                  • Opcode ID: 92944724dee91b38b7ee5b374f910e74d6c8544434624f4b14ecda59d71e3572
                                  • Instruction ID: 34e576fd7e6559e3ef6c853e67441063c40c11266019ec046b6cc2e4d5471cd5
                                  • Opcode Fuzzy Hash: 92944724dee91b38b7ee5b374f910e74d6c8544434624f4b14ecda59d71e3572
                                  • Instruction Fuzzy Hash: ABE06DA1A081507AEB20965AAC85FAB66DC8BC5314F04417BF904DB282C678DC00C27A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 299 407584-4075a9 SetFilePointer 300 4075bb-4075c0 299->300 301 4075ab-4075b2 GetLastError 299->301 301->300 302 4075b4-4075b6 call 4073a4 301->302 302->300
                                  APIs
                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004075A3
                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 004075AB
                                    • Part of subcall function 004073A4: GetLastError.KERNEL32(004072A4,00407442,?,?,020F03AC,?,00409AE1,00000001,00000000,00000002,00000000,0040A0D4,?,00000000,0040A10B), ref: 004073A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$FilePointer
                                  • String ID:
                                  • API String ID: 1156039329-0
                                  • Opcode ID: 64234936368745cadff0884a95fa07edb9d6d799bdb4626fca8da24a174aceff
                                  • Instruction ID: 1215520e40270bbf1c42edbfe5ddbfad2f0444ede1f1e4d22e24bec04403dad1
                                  • Opcode Fuzzy Hash: 64234936368745cadff0884a95fa07edb9d6d799bdb4626fca8da24a174aceff
                                  • Instruction Fuzzy Hash: 6FE092B66081006BD700D55DC881A9B33DCDFC5364F044136BA54EB2C1D6B5EC008376

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 304 4074dc-4074fd SetFilePointer 305 40750f-407511 304->305 306 4074ff-407506 GetLastError 304->306 306->305 307 407508-40750a call 4073a4 306->307 307->305
                                  APIs
                                  • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004074F3
                                  • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004074FF
                                    • Part of subcall function 004073A4: GetLastError.KERNEL32(004072A4,00407442,?,?,020F03AC,?,00409AE1,00000001,00000000,00000002,00000000,0040A0D4,?,00000000,0040A10B), ref: 004073A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$FilePointer
                                  • String ID:
                                  • API String ID: 1156039329-0
                                  • Opcode ID: 7dcdc125b41699120aae8acb46450914bebfaac92dc1c1f3d4146a6219e6b847
                                  • Instruction ID: 3a188f8a391a656106576682ef5fc0e36605e971047c99b326a67709d18e7f8b
                                  • Opcode Fuzzy Hash: 7dcdc125b41699120aae8acb46450914bebfaac92dc1c1f3d4146a6219e6b847
                                  • Instruction Fuzzy Hash: B4E04FB1600210AFEB20EEB98981B9272D89F44364F0485B6EA14DF2C6D274DC00C766

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 367 401430-40143d 368 401446-40144c 367->368 369 40143f-401444 367->369 370 401452-40146a VirtualAlloc 368->370 369->370 371 40146c-40147a call 4012e4 370->371 372 40148f-401492 370->372 371->372 375 40147c-40148d VirtualFree 371->375 375->372
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: 131490d6f48dacc0ee8608d3ef2a2ee0f0ac383d87a6c057b82cac812cab049b
                                  • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                  • Opcode Fuzzy Hash: 131490d6f48dacc0ee8608d3ef2a2ee0f0ac383d87a6c057b82cac812cab049b
                                  • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,00405306), ref: 004051EF
                                    • Part of subcall function 00404C2C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404C49
                                    • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                  • String ID:
                                  • API String ID: 1658689577-0
                                  • Opcode ID: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                  • Instruction ID: c760dbbb10683706500036a577470844d35ac6ab0c013c9c95042e4326961867
                                  • Opcode Fuzzy Hash: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                  • Instruction Fuzzy Hash: 3B313D75E00119ABCB00EF95C8C19EEB779FF84304F158977E815BB285E739AE058B98
                                  APIs
                                  • CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0040693A,00000000,00406960,?,?,?,?,00000000,?,00406975), ref: 004068DC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CharPrev
                                  • String ID:
                                  • API String ID: 122130370-0
                                  • Opcode ID: 71189d5fdb67734adcc989176e972d73cabe0a8508cd7dda32cb2fd1e54b45a1
                                  • Instruction ID: 028ce23b60034aad2079abf39c8673be77ca980571763ae766079fdae63e366f
                                  • Opcode Fuzzy Hash: 71189d5fdb67734adcc989176e972d73cabe0a8508cd7dda32cb2fd1e54b45a1
                                  • Instruction Fuzzy Hash: 59F0BE523019341BC6117A7F18815AFA7888B86709752417FF506FB382DE3EAE6352AE
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004074D0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 15eb5b8bcf830c4b195572af03a6c999168ba8d47e453751ce572d84692466fb
                                  • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                  • Opcode Fuzzy Hash: 15eb5b8bcf830c4b195572af03a6c999168ba8d47e453751ce572d84692466fb
                                  • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004074D0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 460f9172ef9680e9bf065e809d42603cad769bb4ead04fe75bdd308fccde6f1f
                                  • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                  • Opcode Fuzzy Hash: 460f9172ef9680e9bf065e809d42603cad769bb4ead04fe75bdd308fccde6f1f
                                  • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                  APIs
                                    • Part of subcall function 004068B4: CharPrevA.USER32(00000000,00000000,?,?,?,00000000,0040693A,00000000,00406960,?,?,?,?,00000000,?,00406975), ref: 004068DC
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00406960,?,?,?,?,00000000,?,00406975,00406CA3,00000000,00406CE8,?,?,?), ref: 00406943
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AttributesCharFilePrev
                                  • String ID:
                                  • API String ID: 4082512850-0
                                  • Opcode ID: ce07a51bfea017e2e55e9614cb9ba507b4cfa1873d9ff840f51688b3279052b8
                                  • Instruction ID: 89044d1ea86e4fdb03922753e0a58770fdf95516ab6f2bcb8662fa4781c06fed
                                  • Opcode Fuzzy Hash: ce07a51bfea017e2e55e9614cb9ba507b4cfa1873d9ff840f51688b3279052b8
                                  • Instruction Fuzzy Hash: 04E09B713043047FD701EFB2DD53E59B7ECD789704B524476B501F7682D5785E108468
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004075F7
                                    • Part of subcall function 004073A4: GetLastError.KERNEL32(004072A4,00407442,?,?,020F03AC,?,00409AE1,00000001,00000000,00000002,00000000,0040A0D4,?,00000000,0040A10B), ref: 004073A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID:
                                  • API String ID: 442123175-0
                                  • Opcode ID: 40637416ea930bd2570c4396363680a61cc257afb866cc0a67376a26f5c88c76
                                  • Instruction ID: cd18fb99e22355188e9d2f817127a110343b64b119c62ac1cd4bac3fbb067e43
                                  • Opcode Fuzzy Hash: 40637416ea930bd2570c4396363680a61cc257afb866cc0a67376a26f5c88c76
                                  • Instruction Fuzzy Hash: 66E06D726081106BEB10A65ED880E6B67DCCFC6364F04447BBA04EB241C575AC0096B6
                                  APIs
                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00408F7F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00408F95), ref: 004071C7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FormatMessage
                                  • String ID:
                                  • API String ID: 1306739567-0
                                  • Opcode ID: b5d7a52e02d208d464bf7f6ecdaab9899475a573c382e68083ca8db3329c0493
                                  • Instruction ID: 5be2c53bb0bc0b7205463fa080de9070734fc39b970025fcf129f6524892d52e
                                  • Opcode Fuzzy Hash: b5d7a52e02d208d464bf7f6ecdaab9899475a573c382e68083ca8db3329c0493
                                  • Instruction Fuzzy Hash: F8E0D8B179830135F22500A44C87B76160E4780700F20403A3B10EE3D2D9BEA50A415F
                                  APIs
                                  • SetEndOfFile.KERNEL32(?,02108000,00409E9B,00000000), ref: 004075CB
                                    • Part of subcall function 004073A4: GetLastError.KERNEL32(004072A4,00407442,?,?,020F03AC,?,00409AE1,00000001,00000000,00000002,00000000,0040A0D4,?,00000000,0040A10B), ref: 004073A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast
                                  • String ID:
                                  • API String ID: 734332943-0
                                  • Opcode ID: db8739a5fd2cf61c38ac8d555984da3fa994a5017d3c1d655494e9af8eb405ba
                                  • Instruction ID: 3dced8f94abca6fd64a7c9696b134c452ef52fe1396460a469a389ba9e9200de
                                  • Opcode Fuzzy Hash: db8739a5fd2cf61c38ac8d555984da3fa994a5017d3c1d655494e9af8eb405ba
                                  • Instruction Fuzzy Hash: 78C04CA160410057DB50A7BE8AC2A0672D85F5820430441B6B908DB287D678EC009615
                                  APIs
                                  • SetErrorMode.KERNEL32(?,00406F3D), ref: 00406F30
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 3473aa6fdb671349066f074fc3b2aebd5c1d3b8cb352d1e979c386aa55b3b604
                                  • Instruction ID: f94a5d2238f2ee5303b4d558b5d93000027bb0092eeb8c65c9d9a83f01a259cd
                                  • Opcode Fuzzy Hash: 3473aa6fdb671349066f074fc3b2aebd5c1d3b8cb352d1e979c386aa55b3b604
                                  • Instruction Fuzzy Hash: A4B09BB661C2015DE705DAD5745153863D4D7C47103E14577F114D25C0D53C94154518
                                  APIs
                                  • SetErrorMode.KERNEL32(?,00406F3D), ref: 00406F30
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 5557acf2148e23312bf2bdc7768f633380236e382c485dac7de260305449c299
                                  • Instruction ID: 8ce709a7dcc0858879a49907ae7d49f16bd3fabbd46d8b550b3201db24fc95e8
                                  • Opcode Fuzzy Hash: 5557acf2148e23312bf2bdc7768f633380236e382c485dac7de260305449c299
                                  • Instruction Fuzzy Hash: 46A022B8C00003B2CE80E2F08080A3C23282A883003C00AA2320EB2080C23EC0000A0A
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407E44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 4b604b7c04c55a97cf12a425da2613599e639526dade8246110179d0dcd9af86
                                  • Instruction ID: e346e479d4e19dc6fbf4ec70e04c611644565a823529d475df5ed673f567dbda
                                  • Opcode Fuzzy Hash: 4b604b7c04c55a97cf12a425da2613599e639526dade8246110179d0dcd9af86
                                  • Instruction Fuzzy Hash: 521172716082059BDB10FF19C881B5B3794AF84359F04847AF958AB3C6DA38EC008B6B
                                  APIs
                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,004018BF), ref: 004016B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                  • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                  • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                  • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: 57bb830fb3630d9a83ec57f7eac22a277ae175c199a92d969abe11a9c095749b
                                  • Instruction ID: 0a303eee8e17872e34e3f08f3f74197a254d67d3e0467507f6d8b9a4d6bdce8a
                                  • Opcode Fuzzy Hash: 57bb830fb3630d9a83ec57f7eac22a277ae175c199a92d969abe11a9c095749b
                                  • Instruction Fuzzy Hash: 9FD0A7C1B00A6017D315F6BF498865B96C85F88685F08843BF684E73D1D67CAC00C3CD
                                  APIs
                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E3A), ref: 00407D73
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: f18d662fc38f0284a7c8bdb2170b2a8644905928442529ab0c2341243e9dd2c5
                                  • Instruction ID: 987a95dec6bedafdacc6f30d71d69a0298e18a8a9a30f6cccb61f0e346f0d057
                                  • Opcode Fuzzy Hash: f18d662fc38f0284a7c8bdb2170b2a8644905928442529ab0c2341243e9dd2c5
                                  • Instruction Fuzzy Hash: 6FD0E9B17557045BDB90EEB94CC1B1237D97F48600F5044B66904EB296E674E800D614
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028), ref: 004092AF
                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004092B5
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004092CE
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004092F5
                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004092FA
                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 0040930B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 107509674-3733053543
                                  • Opcode ID: 2a0162333a77e08806ee048c8adb2592b0adbd8e17023ac1d43b711a23017a7c
                                  • Instruction ID: 46e638963846eb8b1a8eef1e5041d40b59806408d3aca7422040dec9ba119927
                                  • Opcode Fuzzy Hash: 2a0162333a77e08806ee048c8adb2592b0adbd8e17023ac1d43b711a23017a7c
                                  • Instruction Fuzzy Hash: 3FF012B079430276E620AAB58D07F6B62885BC5B48F50493EBA51FA1D3D7BCD8044A6E
                                  APIs
                                  • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409A0E
                                  • SizeofResource.KERNEL32(00000000,00000000,?,00409AF9,00000000,0040A08C,?,00000001,00000000,00000002,00000000,0040A0D4,?,00000000,0040A10B), ref: 00409A21
                                  • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409AF9,00000000,0040A08C,?,00000001,00000000,00000002,00000000,0040A0D4,?,00000000), ref: 00409A33
                                  • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409AF9,00000000,0040A08C,?,00000001,00000000,00000002,00000000,0040A0D4), ref: 00409A44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID:
                                  • API String ID: 3473537107-0
                                  • Opcode ID: 13ffe1952f0d95e29d084444e35be522072a07585fb49b2685a126b429e6487b
                                  • Instruction ID: d67f3324bf52c58dde7a17cbdb2efc6a036c8c105ddb558a6a56d7c7a7ea3d45
                                  • Opcode Fuzzy Hash: 13ffe1952f0d95e29d084444e35be522072a07585fb49b2685a126b429e6487b
                                  • Instruction Fuzzy Hash: 30E07E913A434225FA6036F708C3B6A014C8BA670EF04503BBB00792C3DEBC8C04452E
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                  • Instruction ID: dec8dcb9893e8432c944e1b70884c8cc40709e939aac0c2d0d2241257bb7fc31
                                  • Opcode Fuzzy Hash: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                  • Instruction Fuzzy Hash: D3D05EB631E6502AE210519B2D85EBB4EACCAC57A4F14443BF648DB242D2248C069776
                                  APIs
                                  • GetSystemTime.KERNEL32(?), ref: 004026CE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: SystemTime
                                  • String ID:
                                  • API String ID: 2656138-0
                                  • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                  • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                  • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                  • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                  APIs
                                  • GetVersionExA.KERNEL32(?,00406540,00000000,0040654E,?,?,?,?,?,00409A78), ref: 00405C52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Version
                                  • String ID:
                                  • API String ID: 1889659487-0
                                  • Opcode ID: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                  • Instruction ID: 6a84e84a5bdb2c7c5b206d002f2a3fc227ad50a79849cf1aa773f1ea3c1cbc6a
                                  • Opcode Fuzzy Hash: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                  • Instruction Fuzzy Hash: 5AC0126040470186E7109B319C42B1672D4A744310F4805396DA4953C2E73C81018A5A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                  • Instruction ID: bf64fe3dbf7489daa5b396f442bfdc43c732794851cc1dd68f6a4bedb61b4a1f
                                  • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                  • Instruction Fuzzy Hash: 7F32E875E00219DFCB14CF99CA80A9DB7B2BF88314F24816AD855B7395DB34AE42CF54
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0040704D), ref: 00406F71
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406F77
                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0040704D), ref: 00406FC5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressCloseHandleModuleProc
                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                  • API String ID: 4190037839-2401316094
                                  • Opcode ID: f607686cc0d7273f9df9d94dd6e76e9aefdf0fdd96e28e4fed3be5d0e4603d73
                                  • Instruction ID: 82a514a35929d101a3f87db01d263b67a2005a07a92a8f1bbb0e3c876c3699bd
                                  • Opcode Fuzzy Hash: f607686cc0d7273f9df9d94dd6e76e9aefdf0fdd96e28e4fed3be5d0e4603d73
                                  • Instruction Fuzzy Hash: F3214130E44209AFDB10EAA1CC56B9F77B8AB44304F60857BA605F72C1D77CAA05C79E
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                  • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                  • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                  • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                  • String ID:
                                  • API String ID: 1694776339-0
                                  • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                  • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                  • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                  • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040555C,?,?,?,?,00000000,00000000,00000000,?,0040653B,00000000,0040654E), ref: 0040532E
                                    • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                    • Part of subcall function 004051A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoLocale$DefaultSystem
                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                  • API String ID: 1044490935-665933166
                                  • Opcode ID: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                  • Instruction ID: f22f4b18e1885e1925b87b286fa486de3d96a381b4aec2b7527aff107c54c5fa
                                  • Opcode Fuzzy Hash: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                  • Instruction Fuzzy Hash: 8E514234B00648ABDB00EBA59C91B9F776ADB89304F50957BB514BB3C6CA3DCA058B5C
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                  • LocalFree.KERNEL32(0066EE90,00000000,00401AB4), ref: 00401A1B
                                  • VirtualFree.KERNEL32(?,00000000,00008000,0066EE90,00000000,00401AB4), ref: 00401A3A
                                  • LocalFree.KERNEL32(0066D338,?,00000000,00008000,0066EE90,00000000,00401AB4), ref: 00401A79
                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                  • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                  • String ID:
                                  • API String ID: 3782394904-0
                                  • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                  • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                  • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                  • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                  APIs
                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                  • ExitProcess.KERNEL32 ref: 00403DE5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ExitMessageProcess
                                  • String ID: Error$Runtime error at 00000000$9@
                                  • API String ID: 1220098344-1503883590
                                  • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                  • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                  • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                  • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocString
                                  • String ID:
                                  • API String ID: 262959230-0
                                  • Opcode ID: daf431a3c2bb6397145c0312c95092c7dd6e0c4ca2be07fc82856b41fd6094de
                                  • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                  • Opcode Fuzzy Hash: daf431a3c2bb6397145c0312c95092c7dd6e0c4ca2be07fc82856b41fd6094de
                                  • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                  APIs
                                  • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,020F1C58,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040192E
                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,020F1C58,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 00401941
                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,020F1C58,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 0040196B
                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,020F1C58,?,00000000,?,?,00401B95,00401BAA,00401CEE), ref: 004019C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                  • String ID:
                                  • API String ID: 730355536-0
                                  • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                  • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                  • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                  • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,00409A6E), ref: 004030E3
                                  • GetCommandLineA.KERNEL32(00000000,00409A6E), ref: 004030EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CommandHandleLineModule
                                  • String ID: U1hd.@
                                  • API String ID: 2123368496-2904493091
                                  • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                  • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                  • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                  • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                  APIs
                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A02F,000000FA,00000032,0040A096), ref: 0040934F
                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A02F,000000FA,00000032,0040A096), ref: 0040935F
                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A02F,000000FA,00000032,0040A096), ref: 00409372
                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A02F,000000FA,00000032,0040A096), ref: 0040937C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2922048505.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2922029032.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922072495.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2922094483.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLastSleep
                                  • String ID:
                                  • API String ID: 1458359878-0
                                  • Opcode ID: 3a4a69ca31a42f451232f6dfa0c76d71d3bd0a4d90442bfbcbe60d550a1314de
                                  • Instruction ID: e54841d902c556b0a825a3a9b48dc11fcb5fd53647a295a33fe7abc41a02d5de
                                  • Opcode Fuzzy Hash: 3a4a69ca31a42f451232f6dfa0c76d71d3bd0a4d90442bfbcbe60d550a1314de
                                  • Instruction Fuzzy Hash: C6F0B472A0031497CB34A5EF9986A6F628DEADA768710403BFD04F73C3D538DD014AAD

                                  Execution Graph

                                  Execution Coverage:11.3%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:5.7%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:58
                                  execution_graph 47248 479727 47253 4502b0 47248->47253 47250 47973b 47263 47889c 47250->47263 47252 47975f 47254 4502bd 47253->47254 47256 450311 47254->47256 47272 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47254->47272 47269 450170 47256->47269 47260 450339 47261 45037c 47260->47261 47274 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47260->47274 47261->47250 47279 40b560 47263->47279 47265 4788fd 47265->47252 47268 4788bc 47268->47265 47283 406944 47268->47283 47286 470618 47268->47286 47275 45011c 47269->47275 47272->47256 47273 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47273->47260 47274->47261 47276 45013f 47275->47276 47277 45012e 47275->47277 47276->47260 47276->47273 47278 450133 InterlockedExchange 47277->47278 47278->47276 47280 40b56b 47279->47280 47281 40b58b 47280->47281 47297 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47280->47297 47281->47268 47298 402648 47283->47298 47285 40694f 47285->47268 47287 47068c 47286->47287 47294 470646 47286->47294 47303 450540 47287->47303 47289 450540 23 API calls 47289->47294 47290 4706a0 47311 403400 47290->47311 47294->47287 47294->47289 47315 4034e0 47294->47315 47320 403744 47294->47320 47324 403450 47294->47324 47297->47281 47299 40264c 47298->47299 47300 402656 47298->47300 47299->47300 47302 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47299->47302 47300->47285 47300->47300 47302->47300 47304 450550 47303->47304 47305 45055b 47303->47305 47330 45b160 47304->47330 47341 4504e4 21 API calls 47305->47341 47307 450566 47308 450559 47307->47308 47342 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47307->47342 47308->47290 47312 40341f 47311->47312 47313 403406 47311->47313 47312->47268 47313->47312 47349 402660 47313->47349 47354 4034bc 47315->47354 47317 4034f0 47318 403400 4 API calls 47317->47318 47319 403508 47318->47319 47319->47294 47321 40374a 47320->47321 47323 40375b 47320->47323 47322 4034bc 4 API calls 47321->47322 47321->47323 47322->47323 47323->47294 47325 403454 47324->47325 47328 403464 47324->47328 47327 4034bc 4 API calls 47325->47327 47325->47328 47326 403490 47326->47294 47327->47328 47328->47326 47329 402660 4 API calls 47328->47329 47329->47326 47331 45b175 47330->47331 47333 45b184 47331->47333 47346 45b078 19 API calls 47331->47346 47334 45b1be 47333->47334 47347 45b078 19 API calls 47333->47347 47336 45b1d2 47334->47336 47348 45b078 19 API calls 47334->47348 47340 45b1fe 47336->47340 47343 45b108 47336->47343 47340->47308 47341->47307 47342->47308 47344 45b117 VirtualFree 47343->47344 47345 45b129 VirtualAlloc 47343->47345 47344->47345 47345->47340 47346->47333 47347->47334 47348->47336 47350 402664 47349->47350 47351 40266e 47349->47351 47350->47351 47353 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47350->47353 47351->47312 47351->47351 47353->47351 47355 4034c0 47354->47355 47356 4034dc 47354->47356 47357 402648 4 API calls 47355->47357 47356->47317 47358 4034c9 47357->47358 47358->47317 47359 44ab84 47360 44ab92 47359->47360 47362 44abb1 47359->47362 47360->47362 47363 44aa68 47360->47363 47364 44aa9b 47363->47364 47374 414a90 47364->47374 47366 44aaae 47367 44aadb 73A1A570 47366->47367 47397 40357c 47366->47397 47378 41a190 47367->47378 47371 44ab0c 47386 44a79c 47371->47386 47373 44ab20 73A1A480 47373->47362 47375 414a9e 47374->47375 47376 4034e0 4 API calls 47375->47376 47377 414aab 47376->47377 47377->47366 47379 41a257 47378->47379 47380 41a1bb 47378->47380 47381 403400 4 API calls 47379->47381 47411 403520 47380->47411 47382 41a26f SelectObject 47381->47382 47382->47371 47384 41a213 47385 41a24b CreateFontIndirectA 47384->47385 47385->47379 47387 44a7b3 47386->47387 47388 44a846 47387->47388 47389 44a82f 47387->47389 47390 44a7c6 47387->47390 47388->47373 47392 44a83f DrawTextA 47389->47392 47390->47388 47391 402648 4 API calls 47390->47391 47393 44a7d7 47391->47393 47392->47388 47394 44a7f5 MultiByteToWideChar DrawTextW 47393->47394 47395 402660 4 API calls 47394->47395 47396 44a827 47395->47396 47396->47373 47398 403580 47397->47398 47399 4035bf 47397->47399 47400 40358a 47398->47400 47404 403450 47398->47404 47399->47367 47401 4035b4 47400->47401 47402 40359d 47400->47402 47405 4038a4 4 API calls 47401->47405 47414 4038a4 47402->47414 47407 4034bc 4 API calls 47404->47407 47408 403464 47404->47408 47410 4035a2 47405->47410 47406 403490 47406->47367 47407->47408 47408->47406 47409 402660 4 API calls 47408->47409 47409->47406 47410->47367 47412 4034e0 4 API calls 47411->47412 47413 40352a 47412->47413 47413->47384 47415 4038b1 47414->47415 47420 4038e1 47414->47420 47417 4038da 47415->47417 47418 4038bd 47415->47418 47416 403400 4 API calls 47421 4038cb 47416->47421 47419 4034bc 4 API calls 47417->47419 47423 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 47418->47423 47419->47420 47420->47416 47421->47410 47423->47421 47424 41fb00 47425 41fb09 47424->47425 47428 41fda4 47425->47428 47427 41fb16 47429 41fe96 47428->47429 47430 41fdbb 47428->47430 47429->47427 47430->47429 47449 41f964 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 47430->47449 47432 41fdf1 47433 41fdf5 47432->47433 47434 41fe1b 47432->47434 47450 41fb44 47433->47450 47459 41f964 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 47434->47459 47437 41fe29 47439 41fe53 47437->47439 47440 41fe2d 47437->47440 47443 41fb44 10 API calls 47439->47443 47442 41fb44 10 API calls 47440->47442 47441 41fb44 10 API calls 47444 41fe19 47441->47444 47445 41fe3f 47442->47445 47446 41fe65 47443->47446 47444->47427 47447 41fb44 10 API calls 47445->47447 47448 41fb44 10 API calls 47446->47448 47447->47444 47448->47444 47449->47432 47451 41fb5f 47450->47451 47452 41f8e4 4 API calls 47451->47452 47453 41fb75 47451->47453 47452->47453 47460 41f8e4 47453->47460 47455 41fbbd 47456 41fbe0 SetScrollInfo 47455->47456 47468 41fa44 47456->47468 47459->47437 47479 418188 47460->47479 47462 41f901 GetWindowLongA 47463 41f93e 47462->47463 47464 41f91e 47462->47464 47482 41f870 GetWindowLongA GetSystemMetrics GetSystemMetrics 47463->47482 47481 41f870 GetWindowLongA GetSystemMetrics GetSystemMetrics 47464->47481 47467 41f92a 47467->47455 47469 41fa52 47468->47469 47470 41fa5a 47468->47470 47469->47441 47471 41fa99 47470->47471 47472 41fa89 47470->47472 47476 41fa97 47470->47476 47484 417df0 IsWindowVisible ScrollWindow SetWindowPos 47471->47484 47483 417df0 IsWindowVisible ScrollWindow SetWindowPos 47472->47483 47474 41fad9 GetScrollPos 47474->47469 47477 41fae4 47474->47477 47476->47474 47478 41faf3 SetScrollPos 47477->47478 47478->47469 47480 418192 47479->47480 47480->47462 47481->47467 47482->47467 47483->47476 47484->47476 47485 420540 47486 420553 47485->47486 47506 415ad8 47486->47506 47488 42069a 47489 4206b1 47488->47489 47513 41467c KiUserCallbackDispatcher 47488->47513 47490 4206c8 47489->47490 47514 4146c0 KiUserCallbackDispatcher 47489->47514 47496 4206ea 47490->47496 47515 420008 12 API calls 47490->47515 47491 42058e 47491->47488 47492 4205f9 47491->47492 47499 4205ea MulDiv 47491->47499 47511 4207f0 20 API calls 47492->47511 47497 420612 47497->47488 47512 420008 12 API calls 47497->47512 47510 41a2ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 47499->47510 47502 42062f 47503 42064b MulDiv 47502->47503 47504 42066e 47502->47504 47503->47504 47504->47488 47505 420677 MulDiv 47504->47505 47505->47488 47507 415aea 47506->47507 47516 414418 47507->47516 47509 415b02 47509->47491 47510->47492 47511->47497 47512->47502 47513->47489 47514->47490 47515->47496 47517 414432 47516->47517 47520 4105f0 47517->47520 47519 414448 47519->47509 47523 40de3c 47520->47523 47522 4105f6 47522->47519 47524 40de9e 47523->47524 47525 40de4f 47523->47525 47530 40deac 47524->47530 47528 40deac 19 API calls 47525->47528 47529 40de79 47528->47529 47529->47522 47531 40debc 47530->47531 47533 40ded2 47531->47533 47542 40d778 47531->47542 47562 40e234 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47531->47562 47545 40e0e4 47533->47545 47536 40d778 5 API calls 47537 40deda 47536->47537 47537->47536 47538 40df46 47537->47538 47548 40dcf8 47537->47548 47540 40e0e4 5 API calls 47538->47540 47541 40dea8 47540->47541 47541->47522 47563 40eba0 47542->47563 47571 40d654 47545->47571 47580 40e0ec 47548->47580 47553 40eb04 5 API calls 47554 40dd41 47553->47554 47555 40dd53 47554->47555 47556 40dd5c 47554->47556 47561 40dd59 47554->47561 47599 40dc60 19 API calls 47555->47599 47596 40db70 47556->47596 47600 403420 47561->47600 47562->47531 47566 40d918 47563->47566 47568 40d923 47566->47568 47567 40d782 47567->47531 47568->47567 47570 40d964 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47568->47570 47570->47568 47572 40eba0 5 API calls 47571->47572 47573 40d661 47572->47573 47574 40d674 47573->47574 47578 40eca4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47573->47578 47574->47537 47576 40d66f 47579 40d5f0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47576->47579 47578->47576 47579->47574 47604 40d8fc 47580->47604 47582 40dd2b 47587 40eb04 47582->47587 47584 40eba0 5 API calls 47585 40e110 47584->47585 47585->47582 47607 40e070 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47585->47607 47588 40d918 5 API calls 47587->47588 47589 40eb19 47588->47589 47590 4034e0 4 API calls 47589->47590 47591 40eb27 47590->47591 47592 403744 4 API calls 47591->47592 47593 40eb2e 47592->47593 47594 40d918 5 API calls 47593->47594 47595 40dd36 47594->47595 47595->47553 47608 40ad14 19 API calls 47596->47608 47598 40db98 47598->47561 47599->47561 47601 403426 47600->47601 47602 40344b 47601->47602 47603 402660 4 API calls 47601->47603 47602->47537 47603->47601 47605 40eba0 5 API calls 47604->47605 47606 40d906 47605->47606 47606->47582 47606->47584 47607->47582 47608->47598 47609 402584 47610 402598 47609->47610 47611 4025ab 47609->47611 47639 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 47610->47639 47613 4025c2 RtlEnterCriticalSection 47611->47613 47614 4025cc 47611->47614 47613->47614 47625 4023b4 13 API calls 47614->47625 47615 40259d 47615->47611 47617 4025a1 47615->47617 47618 4025d5 47619 4025d9 47618->47619 47626 402088 47618->47626 47621 402635 47619->47621 47622 40262b RtlLeaveCriticalSection 47619->47622 47622->47621 47623 4025e5 47623->47619 47640 402210 9 API calls 47623->47640 47625->47618 47627 40209c 47626->47627 47628 4020af 47626->47628 47647 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 47627->47647 47630 4020c6 RtlEnterCriticalSection 47628->47630 47633 4020d0 47628->47633 47630->47633 47631 4020a1 47631->47628 47632 4020a5 47631->47632 47636 402106 47632->47636 47633->47636 47641 401f94 47633->47641 47636->47623 47637 4021f1 RtlLeaveCriticalSection 47638 4021fb 47637->47638 47638->47623 47639->47615 47640->47619 47645 401fa4 47641->47645 47642 401fd0 47646 401ff4 47642->47646 47653 401db4 47642->47653 47645->47642 47645->47646 47648 401f0c 47645->47648 47646->47637 47646->47638 47647->47631 47657 40178c 47648->47657 47651 401f29 47651->47645 47654 401e02 47653->47654 47655 401dd2 47653->47655 47654->47655 47680 401d1c 47654->47680 47655->47646 47660 4017a8 47657->47660 47659 4017b2 47676 401678 VirtualAlloc 47659->47676 47660->47659 47662 40180f 47660->47662 47665 401803 47660->47665 47668 4014e4 47660->47668 47677 4013e0 LocalAlloc 47660->47677 47662->47651 47667 401e80 9 API calls 47662->47667 47664 4017be 47664->47662 47678 4015c0 VirtualFree 47665->47678 47667->47651 47669 4014f3 VirtualAlloc 47668->47669 47671 401520 47669->47671 47672 401543 47669->47672 47679 401398 LocalAlloc 47671->47679 47672->47660 47674 40152c 47674->47672 47675 401530 VirtualFree 47674->47675 47675->47672 47676->47664 47677->47660 47678->47662 47679->47674 47681 401d2e 47680->47681 47682 401d51 47681->47682 47683 401d63 47681->47683 47693 401940 47682->47693 47685 401940 3 API calls 47683->47685 47686 401d61 47685->47686 47687 401d79 47686->47687 47703 401bf8 9 API calls 47686->47703 47687->47655 47689 401d88 47690 401da2 47689->47690 47704 401c4c 9 API calls 47689->47704 47705 401454 LocalAlloc 47690->47705 47694 401966 47693->47694 47702 4019bf 47693->47702 47706 40170c 47694->47706 47698 40199a 47698->47702 47712 401454 LocalAlloc 47698->47712 47699 401983 47699->47698 47711 4015c0 VirtualFree 47699->47711 47702->47686 47703->47689 47704->47690 47705->47687 47708 401743 47706->47708 47707 401783 47710 4013e0 LocalAlloc 47707->47710 47708->47707 47709 40175d VirtualFree 47708->47709 47709->47708 47710->47699 47711->47698 47712->47702 47713 4135e4 SetWindowLongA GetWindowLongA 47714 413641 SetPropA SetPropA 47713->47714 47715 413623 GetWindowLongA 47713->47715 47719 41f344 47714->47719 47715->47714 47716 413632 SetWindowLongA 47715->47716 47716->47714 47724 423bb4 47719->47724 47818 423a2c 47719->47818 47825 415218 47719->47825 47720 413691 47729 423bea 47724->47729 47727 423c94 47730 423c9b 47727->47730 47731 423ccf 47727->47731 47728 423c35 47732 423c3b 47728->47732 47733 423cf8 47728->47733 47745 423c0b 47729->47745 47832 423b10 47729->47832 47734 423ca1 47730->47734 47778 423f59 47730->47778 47737 424042 IsIconic 47731->47737 47738 423cda 47731->47738 47735 423c40 47732->47735 47736 423c6d 47732->47736 47739 423d13 47733->47739 47740 423d0a 47733->47740 47742 423ebb SendMessageA 47734->47742 47743 423caf 47734->47743 47746 423c46 47735->47746 47747 423d9e 47735->47747 47736->47745 47767 423c86 47736->47767 47768 423de7 47736->47768 47744 424056 GetFocus 47737->47744 47737->47745 47748 423ce3 47738->47748 47749 42407e 47738->47749 47838 42413c 11 API calls 47739->47838 47750 423d20 47740->47750 47751 423d11 47740->47751 47742->47745 47743->47745 47770 423c68 47743->47770 47798 423efe 47743->47798 47744->47745 47755 424067 47744->47755 47745->47720 47756 423dc6 PostMessageA 47746->47756 47757 423c4f 47746->47757 47844 423b2c NtdllDefWindowProc_A 47747->47844 47753 424095 47748->47753 47748->47770 47861 4247f8 WinHelpA PostMessageA 47749->47861 47839 424184 11 API calls 47750->47839 47840 423b2c NtdllDefWindowProc_A 47751->47840 47765 4240b3 47753->47765 47766 42409e 47753->47766 47860 41ef9c GetCurrentThreadId 73A25940 47755->47860 47850 423b2c NtdllDefWindowProc_A 47756->47850 47762 423c58 47757->47762 47763 423e4d 47757->47763 47773 423c61 47762->47773 47774 423d76 IsIconic 47762->47774 47775 423e56 47763->47775 47776 423e87 47763->47776 47764 423de1 47764->47745 47868 4244d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 47765->47868 47862 42447c 47766->47862 47767->47770 47779 423db3 47767->47779 47836 423b2c NtdllDefWindowProc_A 47768->47836 47770->47745 47837 423b2c NtdllDefWindowProc_A 47770->47837 47772 42406e 47772->47745 47786 424076 SetFocus 47772->47786 47773->47770 47787 423d39 47773->47787 47780 423d92 47774->47780 47781 423d86 47774->47781 47852 423abc LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 47775->47852 47855 423b2c NtdllDefWindowProc_A 47776->47855 47778->47745 47789 423f7f IsWindowEnabled 47778->47789 47845 424120 47779->47845 47843 423b2c NtdllDefWindowProc_A 47780->47843 47842 423b68 15 API calls 47781->47842 47785 423ded 47793 423e2b 47785->47793 47794 423e09 47785->47794 47786->47745 47787->47745 47841 422bf4 ShowWindow PostMessageA PostQuitMessage 47787->47841 47789->47745 47796 423f8d 47789->47796 47792 423e8d 47797 423ea5 47792->47797 47856 41ee4c GetCurrentThreadId 73A25940 47792->47856 47800 423a2c 6 API calls 47793->47800 47851 423abc LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 47794->47851 47795 423e5e 47802 423e70 47795->47802 47853 41ef00 6 API calls 47795->47853 47810 423f94 IsWindowVisible 47796->47810 47805 423a2c 6 API calls 47797->47805 47798->47745 47806 423f20 IsWindowEnabled 47798->47806 47808 423e33 PostMessageA 47800->47808 47854 423b2c NtdllDefWindowProc_A 47802->47854 47805->47745 47806->47745 47811 423f2e 47806->47811 47807 423e11 PostMessageA 47807->47745 47808->47745 47810->47745 47812 423fa2 GetFocus 47810->47812 47857 4122b8 7 API calls 47811->47857 47814 418188 47812->47814 47815 423fb7 SetFocus 47814->47815 47858 4151e8 47815->47858 47819 423ab5 47818->47819 47820 423a3c 47818->47820 47819->47720 47820->47819 47821 423a42 EnumWindows 47820->47821 47821->47819 47822 423a5e GetWindow GetWindowLongA 47821->47822 47957 4239c4 GetWindow 47821->47957 47823 423a7d 47822->47823 47823->47819 47824 423aa9 SetWindowPos 47823->47824 47824->47819 47824->47823 47826 415225 47825->47826 47827 415280 47826->47827 47828 41528b 47826->47828 47831 415289 47826->47831 47827->47831 47961 415004 46 API calls 47827->47961 47960 424b34 13 API calls 47828->47960 47831->47720 47833 423b25 47832->47833 47834 423b1a 47832->47834 47833->47727 47833->47728 47834->47833 47869 4086c0 GetSystemDefaultLCID 47834->47869 47836->47785 47837->47745 47838->47745 47839->47745 47840->47745 47841->47745 47842->47745 47843->47745 47844->47745 47942 41dad8 47845->47942 47848 424138 47848->47745 47849 42412c LoadIconA 47849->47848 47850->47764 47851->47807 47852->47795 47853->47802 47854->47745 47855->47792 47856->47797 47857->47745 47859 415203 SetFocus 47858->47859 47859->47745 47860->47772 47861->47764 47863 424488 47862->47863 47866 4244a2 47862->47866 47864 4244b7 47863->47864 47865 42448f SendMessageA 47863->47865 47864->47745 47865->47864 47867 402648 4 API calls 47866->47867 47867->47864 47868->47764 47924 408508 GetLocaleInfoA 47869->47924 47872 403450 4 API calls 47873 408700 47872->47873 47874 408508 5 API calls 47873->47874 47875 408715 47874->47875 47876 408508 5 API calls 47875->47876 47877 408739 47876->47877 47930 408554 GetLocaleInfoA 47877->47930 47880 408554 GetLocaleInfoA 47881 408769 47880->47881 47882 408508 5 API calls 47881->47882 47883 408783 47882->47883 47884 408554 GetLocaleInfoA 47883->47884 47885 4087a0 47884->47885 47886 408508 5 API calls 47885->47886 47887 4087ba 47886->47887 47888 403450 4 API calls 47887->47888 47889 4087c7 47888->47889 47890 408508 5 API calls 47889->47890 47891 4087dc 47890->47891 47892 403450 4 API calls 47891->47892 47893 4087e9 47892->47893 47894 408554 GetLocaleInfoA 47893->47894 47895 4087f7 47894->47895 47896 408508 5 API calls 47895->47896 47897 408811 47896->47897 47898 403450 4 API calls 47897->47898 47899 40881e 47898->47899 47900 408508 5 API calls 47899->47900 47901 408833 47900->47901 47902 403450 4 API calls 47901->47902 47903 408840 47902->47903 47904 408508 5 API calls 47903->47904 47905 408855 47904->47905 47906 408872 47905->47906 47907 408863 47905->47907 47908 403494 4 API calls 47906->47908 47938 403494 47907->47938 47910 408870 47908->47910 47911 408508 5 API calls 47910->47911 47912 408894 47911->47912 47913 4088b1 47912->47913 47914 4088a2 47912->47914 47916 403400 4 API calls 47913->47916 47915 403494 4 API calls 47914->47915 47917 4088af 47915->47917 47916->47917 47932 403634 47917->47932 47925 408541 47924->47925 47926 40852f 47924->47926 47927 403494 4 API calls 47925->47927 47928 4034e0 4 API calls 47926->47928 47929 40853f 47927->47929 47928->47929 47929->47872 47931 408570 47930->47931 47931->47880 47933 40363c 47932->47933 47934 4034bc 4 API calls 47933->47934 47935 40364f 47934->47935 47936 403450 4 API calls 47935->47936 47937 403677 47936->47937 47940 403498 47938->47940 47939 4034ba 47939->47910 47940->47939 47941 402660 4 API calls 47940->47941 47941->47939 47945 41dafc 47942->47945 47946 41dae2 47945->47946 47947 41db09 47945->47947 47946->47848 47946->47849 47947->47946 47954 40cc18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47947->47954 47949 41db26 47949->47946 47950 41db40 47949->47950 47951 41db33 47949->47951 47955 41bd34 11 API calls 47950->47955 47956 41b330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 47951->47956 47954->47949 47955->47946 47956->47946 47958 4239e5 GetWindowLongA 47957->47958 47959 4239f1 47957->47959 47958->47959 47960->47831 47961->47831 47962 422804 47963 422817 47962->47963 47965 422834 47962->47965 47963->47965 48002 408c5c 47963->48002 47964 422aa7 47965->47964 47967 422a49 47965->47967 47970 42286e 47965->47970 47968 422a91 47967->47968 47969 422a9b 47967->47969 48013 421dd4 11 API calls 47968->48013 47969->47964 47974 422ac0 47969->47974 47975 422adf 47969->47975 47991 4228c5 47970->47991 48010 423150 GetSystemMetrics 47970->48010 47972 422971 47976 4229b3 47972->47976 47977 42297d 47972->47977 47973 422a24 47980 422a3e ShowWindow 47973->47980 47983 422ad7 SetWindowPos 47974->47983 47984 422ae9 GetActiveWindow 47975->47984 47982 4229cd ShowWindow 47976->47982 47981 422987 SendMessageA 47977->47981 47979 422909 48011 423148 GetSystemMetrics 47979->48011 47980->47964 47985 418188 47981->47985 47987 418188 47982->47987 47983->47964 47988 422af4 47984->47988 47989 422b13 47984->47989 47990 4229ab ShowWindow 47985->47990 47992 4229ef CallWindowProcA 47987->47992 47995 422afc IsIconic 47988->47995 47993 422b19 47989->47993 47994 422b3e 47989->47994 47996 422a02 SendMessageA 47990->47996 47991->47972 47991->47973 48012 414c6c 47992->48012 47999 422b30 SetWindowPos SetActiveWindow 47993->47999 48000 422b48 ShowWindow 47994->48000 47995->47989 47998 422b06 47995->47998 47996->47964 48014 41ef9c GetCurrentThreadId 73A25940 47998->48014 47999->47964 48000->47964 48003 408c68 48002->48003 48015 406d8c LoadStringA 48003->48015 48006 403450 4 API calls 48007 408c99 48006->48007 48008 403400 4 API calls 48007->48008 48009 408cae 48008->48009 48009->47965 48010->47979 48011->47991 48012->47996 48013->47969 48014->47989 48016 4034e0 4 API calls 48015->48016 48017 406db9 48016->48017 48017->48006 48018 4797c1 48019 4797ca 48018->48019 48022 4797f5 48018->48022 48021 4797e7 48019->48021 48019->48022 48020 479834 48023 479847 48020->48023 48024 479854 48020->48024 48385 47087c 162 API calls 48021->48385 48022->48020 48387 4781e4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48022->48387 48027 47984b 48023->48027 48028 479889 48023->48028 48030 47986e 48024->48030 48031 47985d 48024->48031 48033 47984f 48027->48033 48040 4798e7 48027->48040 48041 4798cc 48027->48041 48036 479892 48028->48036 48037 4798ad 48028->48037 48029 4797ec 48029->48022 48386 408b80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 48029->48386 48390 478420 36 API calls 48030->48390 48389 4783b0 36 API calls 48031->48389 48032 479827 48388 4783b0 36 API calls 48032->48388 48046 479910 48033->48046 48047 47992e 48033->48047 48391 478420 36 API calls 48036->48391 48392 478420 36 API calls 48037->48392 48394 478420 36 API calls 48040->48394 48393 478420 36 API calls 48041->48393 48049 479925 48046->48049 48395 4783b0 36 API calls 48046->48395 48397 47807c 23 API calls 48047->48397 48396 47807c 23 API calls 48049->48396 48051 47992c 48053 479944 48051->48053 48054 47993e 48051->48054 48055 479942 48053->48055 48057 47838c 36 API calls 48053->48057 48054->48055 48134 47838c 48054->48134 48139 475968 48055->48139 48057->48055 48438 477d10 36 API calls 48134->48438 48136 4783a7 48439 408b80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 48136->48439 48440 42d77c GetWindowsDirectoryA 48139->48440 48141 475986 48142 403450 4 API calls 48141->48142 48143 475993 48142->48143 48442 42d7a8 GetSystemDirectoryA 48143->48442 48145 47599b 48146 403450 4 API calls 48145->48146 48147 4759a8 48146->48147 48444 42d7d4 48147->48444 48149 4759b0 48150 403450 4 API calls 48149->48150 48151 4759bd 48150->48151 48152 4759c6 48151->48152 48153 4759e2 48151->48153 48500 42d0ec 48152->48500 48155 403400 4 API calls 48153->48155 48157 4759e0 48155->48157 48159 475a27 48157->48159 48508 42c7c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 48157->48508 48158 403450 4 API calls 48158->48157 48448 4757f0 48159->48448 48163 475a02 48165 403450 4 API calls 48163->48165 48164 403450 4 API calls 48166 475a43 48164->48166 48167 475a0f 48165->48167 48168 475a61 48166->48168 48169 4035c0 4 API calls 48166->48169 48167->48159 48171 403450 4 API calls 48167->48171 48170 4757f0 8 API calls 48168->48170 48169->48168 48172 475a70 48170->48172 48171->48159 48173 403450 4 API calls 48172->48173 48174 475a7d 48173->48174 48175 475aa5 48174->48175 48176 42c3a4 5 API calls 48174->48176 48177 475b0c 48175->48177 48178 4757f0 8 API calls 48175->48178 48179 475a93 48176->48179 48180 475b36 48177->48180 48181 475b15 48177->48181 48182 475abd 48178->48182 48184 4035c0 4 API calls 48179->48184 48459 42c3a4 48180->48459 48185 42c3a4 5 API calls 48181->48185 48187 403450 4 API calls 48182->48187 48184->48175 48186 475b22 48185->48186 48189 4035c0 4 API calls 48186->48189 48190 475aca 48187->48190 48188 475b43 48469 4035c0 48188->48469 48192 475b34 48189->48192 48193 475add 48190->48193 48509 451ac0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48190->48509 48491 4758d4 48192->48491 48195 4757f0 8 API calls 48193->48195 48197 475aec 48195->48197 48199 403450 4 API calls 48197->48199 48201 475af9 48199->48201 48200 403400 4 API calls 48202 475b6f 48200->48202 48201->48177 48510 451ac0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48201->48510 48204 475dc4 48202->48204 48205 475dcc 48204->48205 48205->48205 48536 4521a0 48205->48536 48208 403450 4 API calls 48209 475df9 48208->48209 48210 403494 4 API calls 48209->48210 48211 475e06 48210->48211 48212 40357c 4 API calls 48211->48212 48213 475e14 48212->48213 48214 455970 23 API calls 48213->48214 48215 475e1c 48214->48215 48216 475e2f 48215->48216 48570 455168 6 API calls 48215->48570 48218 42c3a4 5 API calls 48216->48218 48219 475e3c 48218->48219 48220 4035c0 4 API calls 48219->48220 48221 475e4c 48220->48221 48222 475e56 CreateDirectoryA 48221->48222 48223 475ebc 48222->48223 48224 475e60 GetLastError 48222->48224 48225 4035c0 4 API calls 48223->48225 48226 4506dc 4 API calls 48224->48226 48227 475ed1 48225->48227 48228 475e78 48226->48228 48554 475d6c 48227->48554 48571 406d08 19 API calls 48228->48571 48232 475e88 48572 42e660 FormatMessageA 48232->48572 48385->48029 48387->48032 48388->48020 48389->48033 48390->48033 48391->48033 48392->48033 48393->48033 48394->48033 48395->48049 48396->48051 48397->48051 48438->48136 48441 42d79d 48440->48441 48441->48141 48443 42d7c9 48442->48443 48443->48145 48445 403400 4 API calls 48444->48445 48446 42d7e4 GetModuleHandleA GetProcAddress 48445->48446 48447 42d7fd 48446->48447 48447->48149 48511 42dc44 48448->48511 48450 475816 48451 47583c 48450->48451 48452 47581a 48450->48452 48453 403400 4 API calls 48451->48453 48514 42db74 48452->48514 48455 475843 48453->48455 48455->48164 48457 475831 RegCloseKey 48457->48455 48458 403400 4 API calls 48458->48457 48460 42c3d0 48459->48460 48461 42c3ae 48459->48461 48463 403494 4 API calls 48460->48463 48534 42c874 CharPrevA 48461->48534 48465 42c3d9 48463->48465 48464 42c3b5 48464->48460 48466 42c3bf 48464->48466 48465->48188 48467 4035c0 4 API calls 48466->48467 48468 42c3cd 48467->48468 48468->48188 48470 4035c4 48469->48470 48471 40357c 48469->48471 48470->48471 48472 403450 48470->48472 48473 4035e2 48470->48473 48474 4035d4 48470->48474 48471->48472 48477 4035bf 48471->48477 48481 40358a 48471->48481 48475 403464 48472->48475 48480 4034bc 4 API calls 48472->48480 48479 4034bc 4 API calls 48473->48479 48478 403450 4 API calls 48474->48478 48476 403490 48475->48476 48482 402660 4 API calls 48475->48482 48476->48192 48477->48192 48478->48471 48487 4035f5 48479->48487 48480->48475 48483 4035b4 48481->48483 48484 40359d 48481->48484 48482->48476 48486 4038a4 4 API calls 48483->48486 48485 4038a4 4 API calls 48484->48485 48489 4035a2 48485->48489 48486->48489 48488 403450 4 API calls 48487->48488 48490 403621 48488->48490 48489->48192 48490->48192 48492 4758e2 48491->48492 48493 42dc44 RegOpenKeyExA 48492->48493 48494 47590a 48493->48494 48495 47593b 48494->48495 48496 42db74 6 API calls 48494->48496 48495->48200 48497 475920 48496->48497 48498 42db74 6 API calls 48497->48498 48499 475932 RegCloseKey 48498->48499 48499->48495 48501 4038a4 4 API calls 48500->48501 48502 42d0ff 48501->48502 48503 42d116 GetEnvironmentVariableA 48502->48503 48507 42d129 48502->48507 48535 42da10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48502->48535 48503->48502 48504 42d122 48503->48504 48506 403400 4 API calls 48504->48506 48506->48507 48507->48158 48508->48163 48509->48193 48510->48177 48512 42dc55 RegOpenKeyExA 48511->48512 48513 42dc4f 48511->48513 48512->48450 48513->48512 48517 42da40 48514->48517 48518 42da65 RegQueryValueExA 48517->48518 48524 42daa7 48518->48524 48525 42da85 48518->48525 48519 403400 4 API calls 48520 42db60 48519->48520 48520->48457 48520->48458 48521 42da9f 48522 403400 4 API calls 48521->48522 48522->48524 48523 4034e0 4 API calls 48523->48525 48524->48519 48525->48521 48525->48523 48525->48524 48526 403744 4 API calls 48525->48526 48527 42dac7 RegQueryValueExA 48526->48527 48527->48518 48528 42dadc 48527->48528 48528->48524 48529 4038a4 4 API calls 48528->48529 48530 42db22 48529->48530 48531 42db36 48530->48531 48533 403744 4 API calls 48530->48533 48532 403450 4 API calls 48531->48532 48532->48524 48533->48531 48534->48464 48535->48502 48543 4521c0 48536->48543 48539 4521e5 CreateDirectoryA 48540 45225d 48539->48540 48541 4521ef GetLastError 48539->48541 48542 403494 4 API calls 48540->48542 48541->48543 48544 452267 48542->48544 48543->48539 48545 4506dc 4 API calls 48543->48545 48551 42e660 5 API calls 48543->48551 48552 4506ac 4 API calls 48543->48552 48582 42d858 48543->48582 48605 451f2c 48543->48605 48624 406d08 19 API calls 48543->48624 48625 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48543->48625 48546 403420 4 API calls 48544->48546 48545->48543 48547 452281 48546->48547 48549 403420 4 API calls 48547->48549 48550 45228e 48549->48550 48550->48208 48551->48543 48552->48543 48701 40d0e4 48554->48701 48570->48216 48571->48232 48573 42e686 48572->48573 48583 42d0ec 5 API calls 48582->48583 48584 42d87e 48583->48584 48585 42d88a 48584->48585 48635 42cc2c 48584->48635 48587 42d0ec 5 API calls 48585->48587 48589 42d8d6 48585->48589 48588 42d89a 48587->48588 48590 42d8a6 48588->48590 48591 42cc2c 7 API calls 48588->48591 48626 42c6fc 48589->48626 48590->48589 48592 42d8cb 48590->48592 48594 42d0ec 5 API calls 48590->48594 48591->48590 48592->48589 48595 42d77c GetWindowsDirectoryA 48592->48595 48597 42d8bf 48594->48597 48595->48589 48597->48592 48601 42cc2c 7 API calls 48597->48601 48598 42c3a4 5 API calls 48599 42d8eb 48598->48599 48600 403494 4 API calls 48599->48600 48602 42d8f5 48600->48602 48601->48592 48603 403420 4 API calls 48602->48603 48604 42d90f 48603->48604 48604->48543 48606 451f4c 48605->48606 48607 42c3a4 5 API calls 48606->48607 48608 451f65 48607->48608 48609 403494 4 API calls 48608->48609 48616 451f70 48609->48616 48610 42caa4 6 API calls 48610->48616 48612 4506dc 4 API calls 48612->48616 48613 403634 4 API calls 48613->48616 48616->48610 48616->48612 48616->48613 48617 451fec 48616->48617 48672 451eb8 48616->48672 48680 45116c 48616->48680 48688 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 48616->48688 48618 403494 4 API calls 48617->48618 48619 451ff7 48618->48619 48620 403420 4 API calls 48619->48620 48621 452011 48620->48621 48622 403400 4 API calls 48621->48622 48623 452019 48622->48623 48623->48543 48624->48543 48625->48543 48638 403738 48626->48638 48629 42c742 48631 403494 4 API calls 48629->48631 48630 42c72b 48630->48629 48632 42c733 48630->48632 48633 42c740 48631->48633 48634 4034e0 4 API calls 48632->48634 48633->48598 48634->48633 48640 42cbb0 48635->48640 48639 40373c GetFullPathNameA 48638->48639 48639->48629 48639->48630 48646 42caa4 48640->48646 48642 42cbd2 48643 42cbda GetFileAttributesA 48642->48643 48644 403400 4 API calls 48643->48644 48645 42cbf7 48644->48645 48645->48585 48656 42c5bc 48646->48656 48648 42cab5 48649 42cac7 CharPrevA 48648->48649 48650 42cadb 48648->48650 48649->48648 48651 42caf1 48650->48651 48652 42cae6 48650->48652 48663 403778 48651->48663 48653 403494 4 API calls 48652->48653 48655 42caef 48653->48655 48655->48642 48657 42c5cd 48656->48657 48658 42c62d 48657->48658 48660 42c5e9 48657->48660 48662 42c628 48658->48662 48671 42c3e8 IsDBCSLeadByte 48658->48671 48660->48662 48670 42c3e8 IsDBCSLeadByte 48660->48670 48662->48648 48664 4037aa 48663->48664 48667 40377d 48663->48667 48665 403400 4 API calls 48664->48665 48666 4037a0 48665->48666 48666->48655 48667->48664 48668 403791 48667->48668 48669 4034e0 4 API calls 48668->48669 48669->48666 48670->48660 48671->48662 48673 403400 4 API calls 48672->48673 48676 451ed9 48673->48676 48677 451f06 48676->48677 48689 403510 48676->48689 48692 403800 48676->48692 48678 403400 4 API calls 48677->48678 48679 451f1b 48678->48679 48679->48616 48696 450ea0 Wow64DisableWow64FsRedirection SetLastError 48680->48696 48682 451182 48683 451186 48682->48683 48697 42cc40 48682->48697 48683->48616 48687 4511c1 48687->48616 48688->48616 48690 4034e0 4 API calls 48689->48690 48691 40351d 48690->48691 48691->48676 48693 403804 48692->48693 48695 40382f 48692->48695 48694 4038a4 4 API calls 48693->48694 48694->48695 48695->48676 48696->48682 48698 42cbb0 7 API calls 48697->48698 48699 42cc4a GetLastError 48698->48699 48700 450edc Wow64RevertWow64FsRedirection 48699->48700 48700->48687 48702 40d0ee 48701->48702 50266 4243a4 PeekMessageA 50267 4243c7 50266->50267 50268 424448 50266->50268 50267->50268 50278 424374 50267->50278 50277 424432 TranslateMessage DispatchMessageA 50277->50268 50279 424385 50278->50279 50280 42439c 50278->50280 50279->50280 50297 424c60 UnhookWindowsHookEx TerminateThread KillTimer IsWindowVisible ShowWindow 50279->50297 50280->50268 50282 4242c0 50280->50282 50283 4242d0 50282->50283 50284 42430a 50282->50284 50283->50284 50285 4242f7 TranslateMDISysAccel 50283->50285 50284->50268 50286 424310 50284->50286 50285->50284 50287 424325 50286->50287 50288 42436c 50286->50288 50287->50288 50289 42432d GetCapture 50287->50289 50288->50268 50294 42429c 50288->50294 50289->50288 50290 424336 50289->50290 50291 42434f SendMessageA 50290->50291 50293 424348 50290->50293 50291->50288 50292 42436a 50291->50292 50292->50288 50293->50291 50295 4242af IsDialogMessage 50294->50295 50296 4242bc 50294->50296 50295->50296 50296->50268 50296->50277 50297->50280 50298 485fe0 50299 486031 50298->50299 50300 48605d 50299->50300 50301 486033 50299->50301 50304 48606c 50300->50304 50305 486096 50300->50305 50961 4466d4 50301->50961 50307 4466d4 18 API calls 50304->50307 50312 4860cf 50305->50312 50313 4860a5 50305->50313 50309 486079 50307->50309 50973 4510fc 11 API calls 50309->50973 50320 4860de 50312->50320 50321 486143 50312->50321 50315 4466d4 18 API calls 50313->50315 50314 486086 50974 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50314->50974 50316 4860b2 50315->50316 50319 45116c 11 API calls 50316->50319 50317 403420 4 API calls 50322 48761a 50317->50322 50323 4860bf 50319->50323 50324 4466d4 18 API calls 50320->50324 50329 4861c8 50321->50329 50330 486152 50321->50330 50325 403420 4 API calls 50322->50325 50975 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50323->50975 50327 4860ed 50324->50327 50328 487627 50325->50328 50331 4466d4 18 API calls 50327->50331 50332 403400 4 API calls 50328->50332 50339 486233 50329->50339 50340 4861d7 50329->50340 50978 446678 18 API calls 50330->50978 50334 486104 50331->50334 50335 48762f 50332->50335 50337 4466d4 18 API calls 50334->50337 50336 48615e 50979 446678 18 API calls 50336->50979 50341 486117 50337->50341 50349 48628f 50339->50349 50350 486242 50339->50350 50343 4466d4 18 API calls 50340->50343 50344 4466d4 18 API calls 50341->50344 50342 48616b 50346 4466d4 18 API calls 50342->50346 50347 4861e6 50343->50347 50345 486128 50344->50345 50976 42cc78 6 API calls 50345->50976 50351 48617b 50346->50351 50352 4466d4 18 API calls 50347->50352 50363 48629e 50349->50363 50364 4862d7 50349->50364 50355 4466d4 18 API calls 50350->50355 50356 4466d4 18 API calls 50351->50356 50353 4861f9 50352->50353 50358 4466d4 18 API calls 50353->50358 50354 486132 50977 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50354->50977 50360 486251 50355->50360 50357 48618e 50356->50357 50361 4466d4 18 API calls 50357->50361 50362 48620a 50358->50362 50365 4466d4 18 API calls 50360->50365 50367 48619f 50361->50367 50988 44664c 18 API calls 50362->50988 50369 4466d4 18 API calls 50363->50369 50377 486346 50364->50377 50378 4862e6 50364->50378 50366 486264 50365->50366 50370 4466d4 18 API calls 50366->50370 50980 446678 18 API calls 50367->50980 50373 4862ad 50369->50373 50374 486275 50370->50374 50372 48621a 50989 42ce10 6 API calls 50372->50989 50379 4466d4 18 API calls 50373->50379 50991 42cec0 GetPrivateProfileStringA GetProfileStringA lstrcmp 50374->50991 50375 4861af 50981 42cd7c 6 API calls 50375->50981 50392 4863b1 50377->50392 50393 486355 50377->50393 50383 4466d4 18 API calls 50378->50383 50384 4862be 50379->50384 50382 486223 50990 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50382->50990 50388 4862f5 50383->50388 50993 42cf0c GetPrivateProfileStringA GetProfileStringA 50384->50993 50385 48627f 50992 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50385->50992 50386 4861b8 50982 446954 50386->50982 50395 4466d4 18 API calls 50388->50395 50390 4862c7 50994 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50390->50994 50401 48641c 50392->50401 50402 4863c0 50392->50402 50397 4466d4 18 API calls 50393->50397 50398 486308 50395->50398 50399 486364 50397->50399 50400 4466d4 18 API calls 50398->50400 50403 4466d4 18 API calls 50399->50403 50404 48631b 50400->50404 50411 48646a 50401->50411 50412 48642b 50401->50412 50405 4466d4 18 API calls 50402->50405 50406 486377 50403->50406 50407 4466d4 18 API calls 50404->50407 50408 4863cf 50405->50408 50409 4466d4 18 API calls 50406->50409 50410 48632c 50407->50410 50413 4466d4 18 API calls 50408->50413 50414 486388 50409->50414 50995 42cf7c WritePrivateProfileStringA WriteProfileStringA 50410->50995 50424 486479 50411->50424 50425 4864a4 50411->50425 50417 4466d4 18 API calls 50412->50417 50418 4863e2 50413->50418 50997 446678 18 API calls 50414->50997 50416 486336 50996 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50416->50996 50421 48643a 50417->50421 50422 4466d4 18 API calls 50418->50422 50426 4466d4 18 API calls 50421->50426 50427 4863f3 50422->50427 50423 486398 50998 42cfec 21 API calls 50423->50998 50430 4466d4 18 API calls 50424->50430 50438 4864dc 50425->50438 50439 4864b3 50425->50439 50431 48644b 50426->50431 51000 44664c 18 API calls 50427->51000 50429 4863a1 50999 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50429->50999 50434 486486 50430->50434 50435 4466d4 18 API calls 50431->50435 50437 4466d4 18 API calls 50434->50437 50440 48645b 50435->50440 50436 486403 51001 42d04c 21 API calls 50436->51001 50443 486496 50437->50443 50449 4864eb 50438->50449 50450 486504 50438->50450 50444 4466d4 18 API calls 50439->50444 51003 42d064 WritePrivateProfileStringA WriteProfileStringA 50440->51003 50442 48640c 51002 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50442->51002 51004 42d0b0 WritePrivateProfileStringA WriteProfileStringA 50443->51004 50448 4864c0 50444->50448 50451 42d0ec 5 API calls 50448->50451 51006 42d210 GetCommandLineA 50449->51006 50457 486528 50450->50457 50458 486513 50450->50458 50452 4864cb 50451->50452 51005 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50452->51005 50462 48655a 50457->50462 50463 486537 50457->50463 51012 42d2d4 GetCommandLineA 50458->51012 50461 446954 5 API calls 50626 486058 50461->50626 50466 486569 50462->50466 50467 486592 50462->50467 51019 446678 18 API calls 50463->51019 50465 486541 50468 42d330 6 API calls 50465->50468 50469 4466d4 18 API calls 50466->50469 50474 4865ca 50467->50474 50475 4865a1 50467->50475 50470 486549 50468->50470 50471 486576 50469->50471 51020 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50470->51020 50473 42c3a4 5 API calls 50471->50473 50476 486581 50473->50476 50480 4865d9 50474->50480 50481 486602 50474->50481 50477 4466d4 18 API calls 50475->50477 51021 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50476->51021 50479 4865ae 50477->50479 51022 42ca50 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 50479->51022 50483 4466d4 18 API calls 50480->50483 50488 48663a 50481->50488 50489 486611 50481->50489 50485 4865e6 50483->50485 50484 4865b9 51023 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50484->51023 50487 42caa4 6 API calls 50485->50487 50490 4865f1 50487->50490 50495 486649 50488->50495 50496 486672 50488->50496 50491 4466d4 18 API calls 50489->50491 51024 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50490->51024 50492 48661e 50491->50492 51025 42d3cc 6 API calls 50492->51025 50498 4466d4 18 API calls 50495->50498 50501 4866af 50496->50501 50502 486681 50496->50502 50497 486629 51026 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50497->51026 50500 486656 50498->50500 51027 42d424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 50500->51027 50509 4866be 50501->50509 50510 4866d7 50501->50510 50504 4466d4 18 API calls 50502->50504 50506 48668e 50504->50506 50505 486661 51028 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50505->51028 51029 4512d4 8 API calls 50506->51029 50512 42d77c GetWindowsDirectoryA 50509->50512 50515 4866ff 50510->50515 50516 4866e6 50510->50516 50511 48669e 51030 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50511->51030 50514 4866c6 50512->50514 51031 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50514->51031 50521 48670e 50515->50521 50522 486727 50515->50522 50518 42d7a8 GetSystemDirectoryA 50516->50518 50519 4866ee 50518->50519 51032 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50519->51032 50523 42d7d4 6 API calls 50521->50523 50525 48674f 50522->50525 50526 486736 50522->50526 50524 486716 50523->50524 51033 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50524->51033 50531 48675e 50525->50531 50532 4867b6 50525->50532 50528 42d858 11 API calls 50526->50528 50529 48673e 50528->50529 51034 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50529->51034 50533 4466d4 18 API calls 50531->50533 50535 48682a 50532->50535 50536 4867c5 50532->50536 50534 48676b 50533->50534 50537 4466d4 18 API calls 50534->50537 50543 486839 50535->50543 50544 48684e 50535->50544 50539 4466d4 18 API calls 50536->50539 50538 48677a 50537->50538 50540 4466d4 18 API calls 50538->50540 50541 4867d2 50539->50541 50542 48678d 50540->50542 51039 44664c 18 API calls 50541->51039 51035 42da08 50542->51035 51047 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50543->51047 50553 48685d 50544->50553 50554 4868d1 50544->50554 50546 4867de 50548 4466d4 18 API calls 50546->50548 50551 4867ee 50548->50551 50555 4466d4 18 API calls 50551->50555 50552 446954 5 API calls 50556 4867a4 50552->50556 50557 4466d4 18 API calls 50553->50557 50563 4868e0 50554->50563 50564 486912 50554->50564 50558 486801 50555->50558 51038 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50556->51038 50560 48686a 50557->50560 51040 42d950 50558->51040 51048 42c548 8 API calls 50560->51048 50567 4466d4 18 API calls 50563->50567 50573 48698f 50564->50573 50574 486921 50564->50574 50566 486878 50569 48687c 50566->50569 50570 4868c1 50566->50570 50571 4868ed 50567->50571 50568 446954 5 API calls 50575 486818 50568->50575 51049 44664c 18 API calls 50569->51049 51052 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50570->51052 51053 42d47c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50571->51053 50587 486a31 50573->50587 50588 4869a2 50573->50588 51056 446678 18 API calls 50574->51056 51046 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50575->51046 50580 486888 50583 4466d4 18 API calls 50580->50583 50581 4868f5 51054 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50581->51054 50582 48692b 51057 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50582->51057 50589 48689b 50583->50589 50585 486900 51055 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50585->51055 50598 486a8c 50587->50598 50599 486a40 50587->50599 51060 446678 18 API calls 50588->51060 51050 450ffc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection CopyFileA GetLastError 50589->51050 50592 486936 50595 4466d4 18 API calls 50592->50595 50594 4868ab 51051 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50594->51051 50600 486945 50595->50600 50596 4869ac 51061 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50596->51061 50607 486a9b 50598->50607 50608 486ae7 50598->50608 51065 446678 18 API calls 50599->51065 50610 42dc44 RegOpenKeyExA 50600->50610 50603 4869b7 50605 4466d4 18 API calls 50603->50605 50604 486a4a 51066 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50604->51066 50606 4869c6 50605->50606 50619 42dc44 RegOpenKeyExA 50606->50619 51069 446678 18 API calls 50607->51069 50620 486afa 50608->50620 50628 486b8c 50608->50628 50611 486962 50610->50611 50614 48697f 50611->50614 50615 486966 50611->50615 50613 486a55 50617 4466d4 18 API calls 50613->50617 51059 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50614->51059 51058 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50615->51058 50616 486aa5 51070 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50616->51070 50629 486a64 50617->50629 50624 4869e3 50619->50624 51073 446678 18 API calls 50620->51073 50623 486971 RegCloseKey 50623->50626 50630 486a21 50624->50630 50631 4869e7 50624->50631 50626->50317 50627 486ab0 50633 4466d4 18 API calls 50627->50633 50637 486bf9 50628->50637 50638 486b9b 50628->50638 51067 42dce8 10 API calls 50629->51067 51064 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50630->51064 50634 4466d4 18 API calls 50631->50634 50632 486b04 51074 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50632->51074 50636 486abf 50633->50636 50641 4869f6 50634->50641 51071 42de24 6 API calls 50636->51071 50650 486c08 50637->50650 50651 486c66 50637->50651 51077 446678 18 API calls 50638->51077 51062 42db8c RegQueryValueExA RegEnumValueA 50641->51062 50642 486b0f 50645 4466d4 18 API calls 50642->50645 50644 486a79 51068 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50644->51068 50648 486b1e 50645->50648 50646 486ba5 51078 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50646->51078 50663 42dc44 RegOpenKeyExA 50648->50663 51081 446678 18 API calls 50650->51081 50659 486d28 50651->50659 50660 486c79 50651->50660 50654 486ad4 51072 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50654->51072 50656 486c12 51082 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50656->51082 50657 486a08 51063 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50657->51063 50675 486dea 50659->50675 50676 486d3b 50659->50676 51085 446678 18 API calls 50660->51085 50667 486b3b 50663->50667 50665 486bb0 50673 4466d4 18 API calls 50665->50673 50666 486a13 RegCloseKey 50666->50626 50669 486b7c 50667->50669 50670 486b3f 50667->50670 50668 486c83 51086 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50668->51086 51076 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50669->51076 50671 4466d4 18 API calls 50670->50671 50677 486b4e 50671->50677 50680 486bdb 50673->50680 50690 486dfd 50675->50690 50691 486ec7 50675->50691 51090 446678 18 API calls 50676->51090 50686 486b56 RegDeleteValueA 50677->50686 50678 486c8e 50683 4466d4 18 API calls 50678->50683 50679 486c1d 50688 4466d4 18 API calls 50679->50688 51079 485e2c 9 API calls 50680->51079 50682 486d45 51091 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50682->51091 50687 486c9d 50683->50687 51075 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50686->51075 50703 42dc44 RegOpenKeyExA 50687->50703 50694 486c48 50688->50694 50689 486be9 51080 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50689->51080 51096 446678 18 API calls 50690->51096 50705 486eda 50691->50705 50706 486fe6 50691->50706 50692 486d50 50697 4466d4 18 API calls 50692->50697 51083 485e2c 9 API calls 50694->51083 50702 486d5f 50697->50702 50698 486b6e RegCloseKey 50698->50626 50700 4868bc 50700->50626 50701 486e07 51097 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50701->51097 50719 42dc44 RegOpenKeyExA 50702->50719 50709 486cba 50703->50709 50704 486c56 51084 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50704->51084 51101 446678 18 API calls 50705->51101 50717 486ff9 50706->50717 50718 4870fd 50706->50718 50708 486e12 50712 4466d4 18 API calls 50708->50712 50713 486d18 50709->50713 50714 486cbe 50709->50714 50716 486e21 50712->50716 51089 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50713->51089 50721 4466d4 18 API calls 50714->50721 50715 486ee4 51102 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50715->51102 50733 42dc44 RegOpenKeyExA 50716->50733 51108 446678 18 API calls 50717->51108 50737 4871de 50718->50737 50738 487110 50718->50738 50724 486d7c 50719->50724 50725 486ccd 50721->50725 50729 486dda 50724->50729 50730 486d80 50724->50730 50731 4466d4 18 API calls 50725->50731 50726 486eef 50727 4466d4 18 API calls 50726->50727 50732 486efe 50727->50732 50728 487003 51109 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50728->51109 51095 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50729->51095 50736 4466d4 18 API calls 50730->50736 50739 486cde 50731->50739 50750 42dc44 RegOpenKeyExA 50732->50750 50740 486e3e 50733->50740 50742 486d8f 50736->50742 50755 4872e8 50737->50755 50756 4871f1 50737->50756 51114 446678 18 API calls 50738->51114 50749 42db74 6 API calls 50739->50749 50744 486e42 50740->50744 50745 486eb7 50740->50745 50741 48700e 50746 4466d4 18 API calls 50741->50746 50747 4466d4 18 API calls 50742->50747 50752 4466d4 18 API calls 50744->50752 51100 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50745->51100 50753 48701d 50746->50753 50754 486da0 50747->50754 50748 48711a 51115 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50748->51115 50758 486cf3 50749->50758 50759 486f1b 50750->50759 50760 486e51 50752->50760 51110 42dc0c RegCreateKeyExA 50753->51110 51092 42db80 6 API calls 50754->51092 50773 4872fb 50755->50773 50774 4873bc 50755->50774 51120 446678 18 API calls 50756->51120 51087 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50758->51087 50765 486f23 50759->50765 50766 486fd6 50759->50766 50776 486e6e RegQueryValueExA 50760->50776 50762 487125 50763 4466d4 18 API calls 50762->50763 50771 487134 50763->50771 50775 4466d4 18 API calls 50765->50775 51107 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50766->51107 50767 4871fb 51121 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50767->51121 51116 42dc0c RegCreateKeyExA 50771->51116 50772 486cfe 51088 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50772->51088 51126 446678 18 API calls 50773->51126 50797 48749c 50774->50797 50798 4873cf 50774->50798 50782 486f32 50775->50782 50783 486e7c 50776->50783 50784 486e9e 50776->50784 50778 486db5 51093 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50778->51093 50779 487206 50789 4466d4 18 API calls 50779->50789 50803 486f46 RegQueryValueExA 50782->50803 50783->50784 50793 486e82 50783->50793 51099 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50784->51099 50785 487042 50786 48704a 50785->50786 50787 4870ed 50785->50787 50794 4466d4 18 API calls 50786->50794 51113 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50787->51113 50796 487215 50789->50796 50791 486d0a RegCloseKey 50791->50626 50792 487305 51127 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50792->51127 50804 446954 5 API calls 50793->50804 50805 487059 50794->50805 50795 486dc0 51094 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50795->51094 51122 42dc0c RegCreateKeyExA 50796->51122 50824 4874ab 50797->50824 50825 4874c0 50797->50825 51133 446678 18 API calls 50798->51133 50800 486ea9 RegCloseKey 50800->50626 50810 486fbd 50803->50810 50811 486f54 50803->50811 50812 486e91 50804->50812 50814 4466d4 18 API calls 50805->50814 50808 487159 50817 48715d 50808->50817 50818 4871ce 50808->50818 50809 487310 50819 4466d4 18 API calls 50809->50819 51106 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50810->51106 50811->50810 50820 486f5a 50811->50820 51098 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50812->51098 50823 487068 50814->50823 50815 486dcc RegCloseKey 50815->50626 50816 4873d9 51134 485d58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50816->51134 50828 4466d4 18 API calls 50817->50828 51119 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50818->51119 50830 48731f 50819->50830 50831 4038a4 4 API calls 50820->50831 50822 486e9c 50822->50800 50838 48707a RegQueryValueExA 50823->50838 51139 42e0c8 50824->51139 50850 4874cf 50825->50850 50851 4874e4 50825->50851 50836 48716c 50828->50836 51128 42dc0c RegCreateKeyExA 50830->51128 50837 486f65 50831->50837 50832 486fc8 RegCloseKey 50832->50626 50834 48723a 50840 4872d8 50834->50840 50841 487242 50834->50841 50835 4873e4 50842 4466d4 18 API calls 50835->50842 50843 4466d4 18 API calls 50836->50843 50844 403744 4 API calls 50837->50844 50867 48708a 50838->50867 51125 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50840->51125 50848 4466d4 18 API calls 50841->50848 50849 4873f3 50842->50849 50869 48717b 50843->50869 50846 486f71 50844->50846 50858 486f80 RegQueryValueExA 50846->50858 50853 487251 50848->50853 51135 42dc0c RegCreateKeyExA 50849->51135 51143 42e0d4 19 API calls 50850->51143 50865 487518 50851->50865 50866 4874f3 50851->50866 50859 4466d4 18 API calls 50853->50859 50855 487344 50856 487348 50855->50856 50857 4873ac 50855->50857 50862 4466d4 18 API calls 50856->50862 51132 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50857->51132 50863 486f8e 50858->50863 50864 486fb0 50858->50864 50895 487260 50859->50895 50860 4874d4 51144 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50860->51144 50871 487357 50862->50871 50863->50864 50872 486f94 50863->50872 51105 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50864->51105 50888 48753d 50865->50888 50889 487527 50865->50889 50873 4466d4 18 API calls 50866->50873 50880 4870b2 RegSetValueExA 50867->50880 50884 48719a RegSetValueExA 50869->50884 51129 446678 18 API calls 50871->51129 51103 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50872->51103 50878 487500 50873->50878 50875 487418 50881 48748c 50875->50881 50882 48741c 50875->50882 51145 42e168 73A1A570 EnumFontsA 73A1A480 50878->51145 50879 486fae 50879->50832 50890 4870d4 50880->50890 50891 4870c7 50880->50891 51138 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50881->51138 50892 4466d4 18 API calls 50882->50892 50897 4871a8 50884->50897 50898 4871b5 50884->50898 50885 487363 50909 487378 RegSetValueExA 50885->50909 50886 486fa3 51104 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50886->51104 50918 48754c 50888->50918 50919 487575 50888->50919 51147 42e264 11 API calls 50889->51147 51112 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50890->51112 51111 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50891->51111 50896 48742b 50892->50896 50900 487285 50895->50900 50904 40357c 4 API calls 50895->50904 50905 4466d4 18 API calls 50896->50905 51117 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50897->51117 51118 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50898->51118 50921 4872a4 RegSetValueExA 50900->50921 50902 487508 51146 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50902->51146 50903 4870d2 50907 4870df RegCloseKey 50903->50907 50904->50900 50912 48743a 50905->50912 50907->50626 50916 487393 50909->50916 50917 487386 50909->50917 50911 48752c 50913 446954 5 API calls 50911->50913 50930 403744 4 API calls 50912->50930 50913->50700 50914 4871b3 50915 4871c0 RegCloseKey 50914->50915 50915->50626 51131 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50916->51131 51130 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50917->51130 50923 4466d4 18 API calls 50918->50923 50929 487584 50919->50929 50943 4875b6 50919->50943 50925 4872bf 50921->50925 50926 4872b2 50921->50926 50927 487559 50923->50927 50924 487391 50928 48739e RegCloseKey 50924->50928 51124 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50925->51124 51123 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50926->51123 51148 42e4f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 50927->51148 50928->50626 50934 4466d4 18 API calls 50929->50934 50935 48744b 50930->50935 50939 487591 50934->50939 50942 487458 RegSetValueExA 50935->50942 50936 4872bd 50938 4872ca RegCloseKey 50936->50938 50937 487564 51149 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50937->51149 50938->50626 51150 446678 18 API calls 50939->51150 50945 487473 50942->50945 50946 487466 50942->50946 50943->50626 50947 4466d4 18 API calls 50943->50947 50944 4875a1 51151 42c3e8 IsDBCSLeadByte 50944->51151 51137 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50945->51137 51136 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50946->51136 50951 4875d2 50947->50951 51152 44664c 18 API calls 50951->51152 50952 4875a9 50957 446954 5 API calls 50952->50957 50953 487471 50954 48747e RegCloseKey 50953->50954 50954->50626 50956 4875e2 51153 451680 9 API calls 50956->51153 50957->50626 50959 4875ef 51154 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50959->51154 50962 4466dc 50961->50962 51155 435774 50962->51155 50964 4466fb 50965 45151c 50964->50965 51178 450ea0 Wow64DisableWow64FsRedirection SetLastError 50965->51178 50967 451532 50968 451536 50967->50968 51179 42cc08 50967->51179 50972 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50968->50972 50972->50626 50973->50314 50974->50626 50975->50626 50976->50354 50977->50626 50978->50336 50979->50342 50980->50375 50981->50386 50983 44695c 50982->50983 51184 435adc VariantClear 50983->51184 50985 44697f 50987 446996 50985->50987 51185 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50985->51185 50987->50626 50988->50372 50989->50382 50990->50626 50991->50385 50992->50626 50993->50390 50994->50626 50995->50416 50996->50626 50997->50423 50998->50429 50999->50626 51000->50436 51001->50442 51002->50626 51003->50626 51004->50626 51005->50626 51007 42d184 4 API calls 51006->51007 51008 42d235 51007->51008 51009 403400 4 API calls 51008->51009 51010 42d253 51009->51010 51011 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51010->51011 51011->50626 51013 42d184 4 API calls 51012->51013 51014 42d2f7 51013->51014 51015 42d309 51014->51015 51016 42d184 4 API calls 51014->51016 51017 403400 4 API calls 51015->51017 51016->51014 51018 42d31e 51017->51018 51018->50461 51019->50465 51020->50626 51021->50626 51022->50484 51023->50626 51024->50626 51025->50497 51026->50626 51027->50505 51028->50626 51029->50511 51030->50626 51031->50626 51032->50626 51033->50626 51034->50626 51036 42d950 5 API calls 51035->51036 51037 42da0f 51036->51037 51037->50552 51038->50626 51039->50546 51041 42d9fb 51040->51041 51043 42d970 51040->51043 51041->50568 51043->51041 51045 403800 4 API calls 51043->51045 51186 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51043->51186 51187 42c3e8 IsDBCSLeadByte 51043->51187 51045->51043 51046->50626 51047->50626 51048->50566 51049->50580 51050->50594 51051->50700 51052->50626 51053->50581 51054->50585 51055->50626 51056->50582 51057->50592 51058->50623 51059->50626 51060->50596 51061->50603 51062->50657 51063->50666 51064->50626 51065->50604 51066->50613 51067->50644 51068->50626 51069->50616 51070->50627 51071->50654 51072->50626 51073->50632 51074->50642 51075->50698 51076->50626 51077->50646 51078->50665 51079->50689 51080->50700 51081->50656 51082->50679 51083->50704 51084->50700 51085->50668 51086->50678 51087->50772 51088->50791 51089->50626 51090->50682 51091->50692 51092->50778 51093->50795 51094->50815 51095->50626 51096->50701 51097->50708 51098->50822 51099->50800 51100->50626 51101->50715 51102->50726 51103->50886 51104->50879 51105->50879 51106->50832 51107->50626 51108->50728 51109->50741 51110->50785 51111->50903 51112->50907 51113->50626 51114->50748 51115->50762 51116->50808 51117->50914 51118->50915 51119->50626 51120->50767 51121->50779 51122->50834 51123->50936 51124->50938 51125->50626 51126->50792 51127->50809 51128->50855 51129->50885 51130->50924 51131->50928 51132->50626 51133->50816 51134->50835 51135->50875 51136->50953 51137->50954 51138->50626 51188 42deac 51139->51188 51141 42e0d2 51142 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 51141->51142 51142->50626 51143->50860 51144->50626 51145->50902 51146->50626 51147->50911 51148->50937 51149->50626 51150->50944 51151->50952 51152->50956 51153->50959 51154->50626 51156 435780 51155->51156 51157 4357a2 51155->51157 51156->51157 51175 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51156->51175 51158 435825 51157->51158 51159 4357f5 51157->51159 51160 4357e9 51157->51160 51161 435819 51157->51161 51162 43580d 51157->51162 51168 435801 51157->51168 51177 408bac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51158->51177 51167 403510 4 API calls 51159->51167 51166 403510 4 API calls 51160->51166 51176 4040e8 18 API calls 51161->51176 51169 403494 4 API calls 51162->51169 51171 4357f2 51166->51171 51173 4357fe 51167->51173 51168->50964 51174 435816 51169->51174 51170 435822 51170->50964 51171->50964 51172 435836 51172->50964 51173->50964 51174->50964 51175->51157 51176->51170 51177->51172 51178->50967 51180 403738 51179->51180 51181 42cc12 GetFileAttributesA 51180->51181 51182 42cc1d GetLastError 51181->51182 51183 450edc Wow64RevertWow64FsRedirection 51182->51183 51183->50968 51184->50985 51185->50987 51186->51043 51187->51043 51189 42dec8 AllocateAndInitializeSid 51188->51189 51190 42debf 51188->51190 51189->51190 51191 42def3 GetVersion 51189->51191 51190->51141 51192 42df12 GetModuleHandleA GetProcAddress 51191->51192 51193 42df29 51191->51193 51192->51193 51194 42df52 GetCurrentThread OpenThreadToken 51193->51194 51195 42df2d 51193->51195 51196 42dfa3 GetTokenInformation 51194->51196 51197 42df6e GetLastError 51194->51197 51201 42e079 FreeSid 51195->51201 51199 42dfe6 51196->51199 51200 42dfcd GetLastError 51196->51200 51198 42df84 GetCurrentProcess OpenProcessToken 51197->51198 51206 42df7a 51197->51206 51198->51196 51198->51206 51202 402648 4 API calls 51199->51202 51200->51199 51200->51206 51201->51141 51203 42dfee GetTokenInformation 51202->51203 51204 42e018 51203->51204 51203->51206 51207 42e025 EqualSid 51204->51207 51209 42e049 51204->51209 51205 402660 4 API calls 51208 42e068 CloseHandle 51205->51208 51206->51190 51207->51204 51208->51141 51208->51201 51209->51205 51210 416aea 51211 416b92 51210->51211 51212 416b02 51210->51212 51229 4152c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51211->51229 51214 416b10 51212->51214 51215 416b1c SendMessageA 51212->51215 51216 416b36 51214->51216 51217 416b1a CallWindowProcA 51214->51217 51225 416b70 51215->51225 51226 41a000 GetSysColor 51216->51226 51217->51225 51220 416b41 SetTextColor 51221 416b56 51220->51221 51227 41a000 GetSysColor 51221->51227 51223 416b5b SetBkColor 51228 41a688 GetSysColor CreateBrushIndirect 51223->51228 51226->51220 51227->51223 51228->51225 51229->51225 51230 40cdcc 51233 406eb0 WriteFile 51230->51233 51234 406ecd 51233->51234 51235 4165ec 51236 416653 51235->51236 51237 4165f9 51235->51237 51242 4164f8 CreateWindowExA 51237->51242 51238 416600 SetPropA SetPropA 51238->51236 51239 416633 51238->51239 51240 416646 SetWindowPos 51239->51240 51240->51236 51242->51238 51243 490b04 51297 403344 51243->51297 51245 490b12 51300 4056a0 51245->51300 51247 490b17 51303 4098ec 51247->51303 51251 490b21 51313 4108fc 51251->51313 51253 490b26 51317 4128d0 51253->51317 51255 490b30 51322 418fe8 GetVersion 51255->51322 51257 490b35 51327 43020c 51257->51327 51558 4032fc 51297->51558 51299 403349 GetModuleHandleA GetCommandLineA 51299->51245 51302 4056db 51300->51302 51559 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51300->51559 51302->51247 51560 408fc4 51303->51560 51308 4086c0 7 API calls 51309 40990f 51308->51309 51575 409010 GetVersionExA 51309->51575 51312 409b20 6F571CD0 51312->51251 51314 410906 51313->51314 51315 410945 GetCurrentThreadId 51314->51315 51316 410960 51315->51316 51316->51253 51577 40aea4 51317->51577 51321 4128fc 51321->51255 51589 41ddcc 8 API calls 51322->51589 51324 419001 51591 418ee0 GetCurrentProcessId 51324->51591 51326 419006 51326->51257 51328 430216 51327->51328 51696 430158 RegisterClipboardFormatA RegisterClipboardFormatA GetCurrentThreadId 51328->51696 51330 43021b 51331 44ee30 51330->51331 51558->51299 51559->51302 51561 408c5c 5 API calls 51560->51561 51562 408fd5 51561->51562 51563 40857c GetSystemDefaultLCID 51562->51563 51567 4085b2 51563->51567 51564 406d8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51564->51567 51565 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 51565->51567 51566 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51566->51567 51567->51564 51567->51565 51567->51566 51571 408614 51567->51571 51568 406d8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51568->51571 51569 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 51569->51571 51570 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51570->51571 51571->51568 51571->51569 51571->51570 51572 408697 51571->51572 51573 403420 4 API calls 51572->51573 51574 4086b1 51573->51574 51574->51308 51576 409027 51575->51576 51576->51312 51578 40aeab 51577->51578 51578->51578 51579 40aeca 51578->51579 51588 40addc 19 API calls 51578->51588 51581 410fb4 51579->51581 51582 410fd6 51581->51582 51583 406d8c 5 API calls 51582->51583 51584 403450 4 API calls 51582->51584 51585 410ff5 51582->51585 51583->51582 51584->51582 51586 403400 4 API calls 51585->51586 51587 41100a 51586->51587 51587->51321 51588->51578 51590 41de46 51589->51590 51590->51324 51607 407860 51591->51607 51594 407860 19 API calls 51595 418f41 GlobalAddAtomA 51594->51595 51596 418f59 51595->51596 51597 40b560 4 API calls 51596->51597 51598 418f6d 51597->51598 51611 423070 51598->51611 51604 418f98 51641 40698c 51604->51641 51606 418fae 51606->51326 51608 407873 51607->51608 51609 407558 19 API calls 51608->51609 51610 407887 GlobalAddAtomA GetCurrentThreadId 51609->51610 51610->51594 51612 42307a 51611->51612 51644 4101c8 51612->51644 51616 423097 51617 4230c1 73A1A570 EnumFontsA 73A24620 73A1A480 51616->51617 51618 418f7b 51617->51618 51619 423634 51618->51619 51620 423643 51619->51620 51621 4101c8 5 API calls 51620->51621 51622 423659 51621->51622 51623 4236b4 LoadIconA 51622->51623 51654 41dd48 51623->51654 51625 4236d2 GetModuleFileNameA OemToCharA 51626 423716 51625->51626 51627 42373c CharLowerA 51626->51627 51628 42375c 51627->51628 51629 418f8e 51628->51629 51656 42381c 51628->51656 51631 41f0c0 51629->51631 51632 41f226 51631->51632 51633 41f0ce GetVersion 51631->51633 51632->51604 51634 41f109 51633->51634 51635 41f0da 51633->51635 51634->51632 51636 41f129 GetProcAddress 51634->51636 51635->51634 51637 41f0e5 SetErrorMode LoadLibraryA SetErrorMode 51635->51637 51638 41f14a 51636->51638 51637->51634 51639 41f211 FreeLibrary 51638->51639 51640 41f152 9 API calls 51638->51640 51639->51632 51640->51632 51642 402648 4 API calls 51641->51642 51643 406999 51642->51643 51643->51606 51645 4101cf 51644->51645 51647 4101f2 51645->51647 51653 410360 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51645->51653 51648 4231e4 LoadCursorA 51647->51648 51649 423203 51648->51649 51650 423217 LoadCursorA 51649->51650 51652 423234 51649->51652 51651 4232d8 4 API calls 51650->51651 51651->51649 51652->51616 51653->51647 51655 41dd54 51654->51655 51655->51625 51657 42394f 51656->51657 51658 42382c 51656->51658 51657->51629 51680 41f36c 51658->51680 51660 423837 GetClassInfoA 51661 423850 RegisterClassA 51660->51661 51662 42387f GetSystemMetrics 51660->51662 51661->51662 51663 423869 51661->51663 51664 42388a 51662->51664 51665 42388d GetSystemMetrics 51662->51665 51666 408c5c 5 API calls 51663->51666 51664->51665 51668 423899 51665->51668 51667 42387a 51666->51667 51667->51662 51683 406300 CreateWindowExA 51668->51683 51670 4238c6 51671 403400 4 API calls 51670->51671 51672 4238d1 51671->51672 51684 4235f4 51672->51684 51681 41f37c VirtualAlloc 51680->51681 51682 41f3aa 51680->51682 51681->51682 51682->51660 51683->51670 51692 4235a0 SystemParametersInfoA 51684->51692 51687 42360d ShowWindow 51689 423618 51687->51689 51690 42361f SetWindowLongA 51687->51690 51693 4235be 51692->51693 51693->51687 51694 4235d0 SystemParametersInfoA 51693->51694 51694->51687 51697 407860 19 API calls 51696->51697 51698 4301a9 GlobalAddAtomA 51697->51698 51698->51330 52961 42228c 52962 42229b 52961->52962 52967 42121c 52962->52967 52965 4222bb 52968 42128b 52967->52968 52981 42122b 52967->52981 52971 42129c 52968->52971 52992 412478 GetMenuItemCount GetMenuStringA GetMenuState 52968->52992 52970 4212ca 52974 42133d 52970->52974 52979 4212e5 52970->52979 52971->52970 52973 421362 52971->52973 52972 42133b 52975 42138e 52972->52975 52994 421dd4 11 API calls 52972->52994 52973->52972 52976 421376 SetMenu 52973->52976 52974->52972 52982 421351 52974->52982 52995 421164 10 API calls 52975->52995 52976->52972 52979->52972 52985 421308 GetMenu 52979->52985 52980 421395 52980->52965 52990 422190 10 API calls 52980->52990 52981->52968 52991 408ccc 19 API calls 52981->52991 52984 42135a SetMenu 52982->52984 52984->52972 52986 421312 52985->52986 52987 42132b 52985->52987 52989 421325 SetMenu 52986->52989 52993 412478 GetMenuItemCount GetMenuStringA GetMenuState 52987->52993 52989->52987 52990->52965 52991->52981 52992->52971 52993->52972 52994->52975 52995->52980 52996 48a9fc 52997 48aa30 52996->52997 52998 48aa32 52997->52998 52999 48aa46 52997->52999 53132 446678 18 API calls 52998->53132 53002 48aa82 52999->53002 53003 48aa55 52999->53003 53001 48aa3b Sleep 53014 48aa7d 53001->53014 53008 48aabe 53002->53008 53009 48aa91 53002->53009 53004 4466d4 18 API calls 53003->53004 53006 48aa64 53004->53006 53005 403420 4 API calls 53007 48aef0 53005->53007 53010 48aa6c FindWindowA 53006->53010 53013 48aacd 53008->53013 53016 48ab14 53008->53016 53011 4466d4 18 API calls 53009->53011 53012 446954 5 API calls 53010->53012 53015 48aa9e 53011->53015 53012->53014 53133 446678 18 API calls 53013->53133 53014->53005 53018 48aaa6 FindWindowA 53015->53018 53022 48ab70 53016->53022 53023 48ab23 53016->53023 53019 446954 5 API calls 53018->53019 53021 48aab9 53019->53021 53020 48aad9 53134 446678 18 API calls 53020->53134 53021->53014 53029 48abcc 53022->53029 53030 48ab7f 53022->53030 53137 446678 18 API calls 53023->53137 53026 48aae6 53135 446678 18 API calls 53026->53135 53027 48ab2f 53138 446678 18 API calls 53027->53138 53042 48abdb 53029->53042 53043 48ac06 53029->53043 53142 446678 18 API calls 53030->53142 53032 48aaf3 53136 446678 18 API calls 53032->53136 53034 48ab3c 53139 446678 18 API calls 53034->53139 53036 48ab8b 53143 446678 18 API calls 53036->53143 53038 48aafe SendMessageA 53041 446954 5 API calls 53038->53041 53040 48ab49 53140 446678 18 API calls 53040->53140 53041->53021 53044 4466d4 18 API calls 53042->53044 53051 48ac54 53043->53051 53052 48ac15 53043->53052 53047 48abe8 53044->53047 53045 48ab98 53144 446678 18 API calls 53045->53144 53054 48abf0 RegisterClipboardFormatA 53047->53054 53049 48ab54 PostMessageA 53141 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53049->53141 53050 48aba5 53145 446678 18 API calls 53050->53145 53060 48aca8 53051->53060 53061 48ac63 53051->53061 53147 446678 18 API calls 53052->53147 53057 446954 5 API calls 53054->53057 53057->53014 53058 48abb0 SendNotifyMessageA 53146 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53058->53146 53059 48ac21 53148 446678 18 API calls 53059->53148 53068 48acfc 53060->53068 53069 48acb7 53060->53069 53150 446678 18 API calls 53061->53150 53065 48ac2e 53149 446678 18 API calls 53065->53149 53066 48ac6f 53151 446678 18 API calls 53066->53151 53079 48ad0b 53068->53079 53080 48ad5e 53068->53080 53154 446678 18 API calls 53069->53154 53071 48ac39 SendMessageA 53072 446954 5 API calls 53071->53072 53072->53021 53074 48ac7c 53152 446678 18 API calls 53074->53152 53075 48acc3 53155 446678 18 API calls 53075->53155 53078 48ac87 PostMessageA 53153 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53078->53153 53083 4466d4 18 API calls 53079->53083 53088 48ad6d 53080->53088 53089 48ade5 53080->53089 53081 48acd0 53156 446678 18 API calls 53081->53156 53085 48ad18 53083->53085 53086 42e1e0 2 API calls 53085->53086 53090 48ad25 53086->53090 53087 48acdb SendNotifyMessageA 53157 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53087->53157 53092 4466d4 18 API calls 53088->53092 53097 48ae1a 53089->53097 53098 48adf4 53089->53098 53093 48ad3b GetLastError 53090->53093 53094 48ad2b 53090->53094 53095 48ad7c 53092->53095 53099 446954 5 API calls 53093->53099 53096 446954 5 API calls 53094->53096 53158 446678 18 API calls 53095->53158 53100 48ad39 53096->53100 53107 48ae29 53097->53107 53108 48ae4c 53097->53108 53163 446678 18 API calls 53098->53163 53099->53100 53104 446954 5 API calls 53100->53104 53103 48adfe FreeLibrary 53164 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53103->53164 53104->53014 53105 48ad8f GetProcAddress 53109 48ad9b 53105->53109 53110 48add5 53105->53110 53111 4466d4 18 API calls 53107->53111 53115 48ae5b 53108->53115 53121 48ae8f 53108->53121 53159 446678 18 API calls 53109->53159 53162 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53110->53162 53114 48ae35 53111->53114 53117 48ae3d CreateMutexA 53114->53117 53118 4466d4 18 API calls 53115->53118 53116 48ada7 53160 446678 18 API calls 53116->53160 53117->53014 53123 48ae67 53118->53123 53120 48adb4 53124 446954 5 API calls 53120->53124 53121->53014 53122 4466d4 18 API calls 53121->53122 53129 48aeaa 53122->53129 53125 48ae78 OemToCharBuffA 53123->53125 53126 48adc5 53124->53126 53165 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53125->53165 53161 4467ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53126->53161 53130 48aebb CharToOemBuffA 53129->53130 53166 446a28 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53130->53166 53132->53001 53133->53020 53134->53026 53135->53032 53136->53038 53137->53027 53138->53034 53139->53040 53140->53049 53141->53021 53142->53036 53143->53045 53144->53050 53145->53058 53146->53014 53147->53059 53148->53065 53149->53071 53150->53066 53151->53074 53152->53078 53153->53021 53154->53075 53155->53081 53156->53087 53157->53014 53158->53105 53159->53116 53160->53120 53161->53021 53162->53021 53163->53103 53164->53014 53165->53014 53166->53014 53167 416594 73A25CF0 53168 42e23b SetErrorMode
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ADDBACKSLASH$ADDPERIOD$ADDQUOTES$CHARLENGTH$CONVERTPERCENTSTRING$DELETEINIENTRY$DELETEINISECTION$DIREXISTS$FILECOPY$FILEEXISTS$FILEORDIREXISTS$FONTEXISTS$GETCMDTAIL$GETENV$GETINIBOOL$GETINIINT$GETINISTRING$GETSHORTNAME$GETSYSTEMDIR$GETSYSWOW64DIR$GETTEMPDIR$GETUILANGUAGE$GETWINDIR$INIKEYEXISTS$ISADMINLOGGEDON$ISINISECTIONEMPTY$ISPOWERUSERLOGGEDON$PARAMCOUNT$PARAMSTR$REGDELETEKEYIFEMPTY$REGDELETEKEYINCLUDINGSUBKEYS$REGDELETEVALUE$REGGETSUBKEYNAMES$REGGETVALUENAMES$REGKEYEXISTS$REGQUERYBINARYVALUE$REGQUERYDWORDVALUE$REGQUERYMULTISTRINGVALUE$REGQUERYSTRINGVALUE$REGVALUEEXISTS$REGWRITEBINARYVALUE$REGWRITEDWORDVALUE$REGWRITEEXPANDSTRINGVALUE$REGWRITEMULTISTRINGVALUE$REGWRITESTRINGVALUE$REMOVEBACKSLASH$REMOVEBACKSLASHUNLESSROOT$REMOVEQUOTES$SETINIBOOL$SETINIINT$SETINISTRING$SETNTFSCOMPRESSION$STRINGCHANGE$STRINGCHANGEEX$USINGWINNT
                                  • API String ID: 0-3658119371
                                  • Opcode ID: 789088b229e86f4f9a1f1d2f706c7aaf27d2d51285bd5630a46190d2fd968b3d
                                  • Instruction ID: 1f533a3817926901e21f115ced2a71318d89b1f82f9318c6f77aeb51c9d307cf
                                  • Opcode Fuzzy Hash: 789088b229e86f4f9a1f1d2f706c7aaf27d2d51285bd5630a46190d2fd968b3d
                                  • Instruction Fuzzy Hash: E6D24174B042155BDB00FF79C8925AEB6A5AF99704F21883FF401AB346DE3CED068799

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1488 423bb4-423be8 1489 423bea-423beb 1488->1489 1490 423c1c-423c33 call 423b10 1488->1490 1492 423bed-423c09 call 40b3e4 1489->1492 1495 423c94-423c99 1490->1495 1496 423c35 1490->1496 1525 423c0b-423c13 1492->1525 1526 423c18-423c1a 1492->1526 1498 423c9b 1495->1498 1499 423ccf-423cd4 1495->1499 1500 423c3b-423c3e 1496->1500 1501 423cf8-423d08 1496->1501 1502 423ca1-423ca9 1498->1502 1503 423f59-423f61 1498->1503 1506 424042-424050 IsIconic 1499->1506 1507 423cda-423cdd 1499->1507 1504 423c40 1500->1504 1505 423c6d-423c70 1500->1505 1508 423d13-423d1b call 42413c 1501->1508 1509 423d0a-423d0f 1501->1509 1512 423ebb-423ee2 SendMessageA 1502->1512 1513 423caf-423cb4 1502->1513 1515 4240fa-424102 1503->1515 1520 423f67-423f72 call 418188 1503->1520 1516 423c46-423c49 1504->1516 1517 423d9e-423dae call 423b2c 1504->1517 1521 423d51-423d58 1505->1521 1522 423c76-423c77 1505->1522 1514 424056-424061 GetFocus 1506->1514 1506->1515 1518 423ce3-423ce4 1507->1518 1519 42407e-424093 call 4247f8 1507->1519 1508->1515 1523 423d20-423d28 call 424184 1509->1523 1524 423d11-423d34 call 423b2c 1509->1524 1512->1515 1527 423ff2-423ffd 1513->1527 1528 423cba-423cbb 1513->1528 1514->1515 1536 424067-424070 call 41ef9c 1514->1536 1529 424119-42411f 1515->1529 1537 423dc6-423de2 PostMessageA call 423b2c 1516->1537 1538 423c4f-423c52 1516->1538 1517->1515 1531 424095-42409c 1518->1531 1532 423cea-423ced 1518->1532 1519->1515 1520->1515 1581 423f78-423f87 call 418188 IsWindowEnabled 1520->1581 1521->1515 1541 423d5e-423d65 1521->1541 1542 423ee7-423eee 1522->1542 1543 423c7d-423c80 1522->1543 1523->1515 1524->1515 1525->1529 1526->1490 1526->1492 1527->1515 1547 424003-424015 1527->1547 1544 423cc1-423cc4 1528->1544 1545 42401a-424025 1528->1545 1558 4240b3-4240c6 call 4244d4 1531->1558 1559 42409e-4240b1 call 42447c 1531->1559 1548 423cf3 1532->1548 1549 4240c8-4240cf 1532->1549 1536->1515 1596 424076-42407c SetFocus 1536->1596 1537->1515 1555 423c58-423c5b 1538->1555 1556 423e4d-423e54 1538->1556 1541->1515 1561 423d6b-423d71 1541->1561 1542->1515 1551 423ef4-423ef9 call 404e54 1542->1551 1562 423c86-423c89 1543->1562 1563 423de7-423e07 call 423b2c 1543->1563 1567 423cca 1544->1567 1568 423efe-423f06 1544->1568 1545->1515 1570 42402b-42403d 1545->1570 1547->1515 1569 4240f3-4240f4 call 423b2c 1548->1569 1565 4240e2-4240f1 1549->1565 1566 4240d1-4240e0 1549->1566 1551->1515 1576 423c61-423c62 1555->1576 1577 423d76-423d84 IsIconic 1555->1577 1578 423e56-423e69 call 423abc 1556->1578 1579 423e87-423e98 call 423b2c 1556->1579 1558->1515 1559->1515 1561->1515 1582 423db3-423dc1 call 424120 1562->1582 1583 423c8f 1562->1583 1609 423e2b-423e48 call 423a2c PostMessageA 1563->1609 1610 423e09-423e26 call 423abc PostMessageA 1563->1610 1565->1515 1566->1515 1567->1569 1568->1515 1594 423f0c-423f13 1568->1594 1605 4240f9 1569->1605 1570->1515 1597 423c68 1576->1597 1598 423d39-423d41 1576->1598 1587 423d92-423d99 call 423b2c 1577->1587 1588 423d86-423d8d call 423b68 1577->1588 1622 423e7b-423e82 call 423b2c 1578->1622 1623 423e6b-423e75 call 41ef00 1578->1623 1616 423e9a-423ea8 call 41ee4c 1579->1616 1617 423eae-423eb6 call 423a2c 1579->1617 1581->1515 1613 423f8d-423f9c call 418188 IsWindowVisible 1581->1613 1582->1515 1583->1569 1587->1515 1588->1515 1594->1515 1608 423f19-423f28 call 418188 IsWindowEnabled 1594->1608 1596->1515 1597->1569 1598->1515 1611 423d47-423d4c call 422bf4 1598->1611 1605->1515 1608->1515 1638 423f2e-423f44 call 4122b8 1608->1638 1609->1515 1610->1515 1611->1515 1613->1515 1639 423fa2-423fed GetFocus call 418188 SetFocus call 4151e8 SetFocus 1613->1639 1616->1617 1617->1515 1622->1515 1623->1622 1638->1515 1644 423f4a-423f54 1638->1644 1639->1515 1644->1515
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d3b1d29a4fbc1aed71327faafbbd414fabc03ccb6ce4f64ba57c149148d7331
                                  • Instruction ID: b3874c0ebfa8e5c98eb4c3a27b14194d81e346ea4a69c1a5551916dd99319231
                                  • Opcode Fuzzy Hash: 2d3b1d29a4fbc1aed71327faafbbd414fabc03ccb6ce4f64ba57c149148d7331
                                  • Instruction Fuzzy Hash: E4E1B134704125EFD710DF6AE585A5E77B0EB44304FA580A6E5069B362CB7CEE82DB18

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1675 422804-422815 1676 422817-422821 1675->1676 1677 422839-422858 1675->1677 1676->1677 1680 422823-422834 call 408c5c call 40311c 1676->1680 1678 422b4e-422b65 1677->1678 1679 42285e-422868 1677->1679 1681 422a49-422a8f call 402c00 1679->1681 1682 42286e-4228b3 call 402c00 1679->1682 1680->1677 1692 422a91-422a96 call 421dd4 1681->1692 1693 422a9b-422aa5 1681->1693 1694 422957-42296b 1682->1694 1695 4228b9-4228c3 1682->1695 1692->1693 1697 422aa7-422aaf call 416658 1693->1697 1698 422ab4-422abe 1693->1698 1701 422971-42297b 1694->1701 1702 422a24-422a44 call 418188 ShowWindow 1694->1702 1699 4228c5-4228dc call 414664 1695->1699 1700 4228ff-422913 call 423150 1695->1700 1697->1678 1705 422ac0-422add call 418188 SetWindowPos 1698->1705 1706 422adf-422af2 call 418188 GetActiveWindow 1698->1706 1723 4228e1-4228f8 call 4146a8 1699->1723 1724 4228de 1699->1724 1720 422915 1700->1720 1721 422918-42292c call 423148 1700->1721 1708 4229b3-4229fd call 418188 ShowWindow call 418188 CallWindowProcA call 414c6c 1701->1708 1709 42297d-4229b1 call 418188 SendMessageA call 418188 ShowWindow 1701->1709 1702->1678 1705->1678 1731 422af4-422b04 call 418188 IsIconic 1706->1731 1732 422b15-422b17 1706->1732 1741 422a02-422a1f SendMessageA 1708->1741 1709->1741 1720->1721 1742 422931-422933 1721->1742 1743 42292e 1721->1743 1723->1742 1747 4228fa-4228fd 1723->1747 1724->1723 1731->1732 1748 422b06-422b13 call 418188 call 41ef9c 1731->1748 1736 422b19-422b3c call 418188 SetWindowPos SetActiveWindow 1732->1736 1737 422b3e-422b49 call 418188 ShowWindow 1732->1737 1736->1678 1737->1678 1741->1678 1749 422937-422939 1742->1749 1750 422935 1742->1750 1743->1742 1747->1742 1748->1732 1754 42293b 1749->1754 1755 42293d-422952 1749->1755 1750->1749 1754->1755 1755->1694
                                  APIs
                                  • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 0042299C
                                  • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422B66), ref: 004229AC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSendShowWindow
                                  • String ID:
                                  • API String ID: 1631623395-0
                                  • Opcode ID: 7c78141ab0ca7620344792f2af95c3ff183131d8e274d08cb6d6ff51276b74f8
                                  • Instruction ID: 8c826587ba7af474f7b14690d684e7097f8878018e5f7bac2df75c57de2d2bfa
                                  • Opcode Fuzzy Hash: 7c78141ab0ca7620344792f2af95c3ff183131d8e274d08cb6d6ff51276b74f8
                                  • Instruction Fuzzy Hash: 1791A471B00214FFD710EFA9DA86F9E77F4AB15304F5500B6F500AB2A2C7B8AE419B58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1808 462994-4629aa 1809 4629b4-462a6b call 48d904 call 402b30 * 6 1808->1809 1810 4629ac-4629af call 402d30 1808->1810 1827 462a6d-462a94 call 4145e4 1809->1827 1828 462aa8-462ac1 1809->1828 1810->1809 1832 462a96 1827->1832 1833 462a99-462aa3 call 4145a4 1827->1833 1834 462ac3-462aea call 4145c4 1828->1834 1835 462afe-462b0c call 48dbe4 1828->1835 1832->1833 1833->1828 1841 462aef-462af9 call 414584 1834->1841 1842 462aec 1834->1842 1843 462b0e-462b1d call 48da54 1835->1843 1844 462b1f-462b21 call 48db78 1835->1844 1841->1835 1842->1841 1849 462b26-462b79 call 48d568 call 41a378 * 2 1843->1849 1844->1849 1856 462b8a-462b9f call 4506dc call 414ac0 1849->1856 1857 462b7b-462b88 call 414ac0 1849->1857 1862 462ba4-462bab 1856->1862 1857->1862 1864 462bf3-463079 call 48d9a4 call 48dca0 call 4145c4 * 3 call 414664 call 414584 * 3 call 45c360 call 45c378 call 45c384 call 45c3cc call 45c360 call 45c378 call 45c384 call 45c3cc call 45c378 call 45c3cc LoadBitmapA call 41d658 call 45c39c call 45c3b4 call 4627f0 call 46421c call 461e6c call 40357c call 414ac0 call 4621a4 call 4621ac call 461e6c call 40357c * 2 call 414ac0 call 46421c call 461e6c call 414ac0 call 4621a4 call 4621ac call 414ac0 * 2 call 46421c call 414ac0 * 2 call 4621a4 call 4145a4 call 4621a4 call 4145a4 call 46421c call 414ac0 call 4621a4 call 4621ac call 46421c call 414ac0 call 4621a4 call 4145a4 * 2 call 414ac0 call 4621a4 call 4145a4 1862->1864 1865 462bad-462bee call 414664 call 4146a8 call 420f40 call 420f6c call 420b10 call 420b3c 1862->1865 1995 4630d5-4630ee call 4149ec * 2 1864->1995 1996 46307b-4630d3 call 4145a4 call 414ac0 call 4621a4 call 4145a4 1864->1996 1865->1864 2004 4630f3-4631a4 call 461e6c call 46421c call 461e6c call 414ac0 call 48dca0 call 4621a4 1995->2004 1996->2004 2022 4631a6-4631c1 2004->2022 2023 4631de-463402 call 461e6c call 414ac0 call 48dcb0 * 2 call 42e658 call 4145a4 call 4621a4 call 4145a4 call 414ac0 call 48d9a4 call 48dca0 call 4145c4 call 461e6c call 414ac0 call 4621a4 call 4145a4 call 461e6c call 46421c call 461e6c call 414ac0 call 4621a4 call 4145a4 call 4621ac call 461e6c call 414ac0 call 4621a4 2004->2023 2024 4631c6-4631d9 call 4145a4 2022->2024 2025 4631c3 2022->2025 2080 463404-46340d 2023->2080 2081 463443-4634fc call 461e6c call 46421c call 461e6c call 414ac0 call 48dca0 call 4621a4 2023->2081 2024->2023 2025->2024 2080->2081 2082 46340f-46343e call 4149ec call 4621ac 2080->2082 2099 463536-463957 call 461e6c call 414ac0 call 48dcb0 * 2 call 42e658 call 4145a4 call 4621a4 call 4145a4 call 414ac0 call 48d9a4 call 48dca0 call 4145c4 call 414ac0 call 461e6c call 46421c call 461e6c call 414ac0 call 4621a4 call 4621ac call 42bb78 call 48dcb0 call 44df9c call 461e6c call 46421c call 461e6c call 46421c call 461e6c call 46421c * 2 call 414ac0 call 4621a4 call 4621ac call 46421c call 48d568 call 41a378 call 461e6c call 40357c call 414ac0 call 4621a4 call 4145a4 call 414ac0 * 2 call 48dcb0 call 403494 call 40357c * 2 call 414ac0 2081->2099 2100 4634fe-463519 2081->2100 2082->2081 2199 46397b-463982 2099->2199 2200 463959-463976 call 44f4cc call 44f600 2099->2200 2101 46351e-463531 call 4145a4 2100->2101 2102 46351b 2100->2102 2101->2099 2102->2101 2201 4639a6-4639ad 2199->2201 2202 463984-4639a1 call 44f4cc call 44f600 2199->2202 2200->2199 2206 4639d1-463a22 call 418188 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 464310 2201->2206 2207 4639af-4639cc call 44f4cc call 44f600 2201->2207 2202->2201 2220 463acb-463ad2 2206->2220 2221 463a28-463a31 2206->2221 2207->2206 2224 463b66-463b74 call 414ac0 2220->2224 2225 463ad8-463afb call 475650 call 403450 2220->2225 2222 463a33-463a8a call 475650 call 414ac0 call 475650 call 414ac0 call 475650 call 414ac0 2221->2222 2223 463a8c-463ac6 call 414ac0 * 3 2221->2223 2222->2220 2223->2220 2230 463b79-463b82 2224->2230 2248 463b0d-463b21 call 403494 2225->2248 2249 463afd-463b0b call 403494 2225->2249 2234 463c92-463cc1 call 42b914 call 44df28 2230->2234 2235 463b88-463ba0 call 429f80 2230->2235 2267 463cc7-463ccb 2234->2267 2268 463d6f-463d73 2234->2268 2251 463c17-463c1b 2235->2251 2252 463ba2-463ba6 2235->2252 2263 463b33-463b64 call 42c6fc call 42caa4 call 403494 call 414ac0 2248->2263 2264 463b23-463b2e call 403494 2248->2264 2249->2263 2257 463c1d-463c26 2251->2257 2258 463c6b-463c6f 2251->2258 2259 463ba8-463be2 call 40b3e4 call 475650 2252->2259 2257->2258 2265 463c28-463c33 2257->2265 2270 463c83-463c8d call 42a004 2258->2270 2271 463c71-463c81 call 42a004 2258->2271 2326 463be4-463beb 2259->2326 2327 463c11-463c15 2259->2327 2263->2230 2264->2263 2265->2258 2276 463c35-463c39 2265->2276 2278 463ccd-463cdf call 40b3e4 2267->2278 2279 463d75-463d7c 2268->2279 2280 463df2-463df6 2268->2280 2270->2234 2271->2234 2284 463c3b-463c5e call 40b3e4 call 406a2c 2276->2284 2304 463d11-463d48 call 475650 call 44c1e8 2278->2304 2305 463ce1-463d0f call 475650 call 44c2b8 2278->2305 2279->2280 2287 463d7e-463d85 2279->2287 2288 463e5f-463e68 2280->2288 2289 463df8-463e0f call 40b3e4 2280->2289 2337 463c65-463c69 2284->2337 2338 463c60-463c63 2284->2338 2287->2280 2297 463d87-463d92 2287->2297 2295 463e87-463e9c call 462550 call 4622c8 2288->2295 2296 463e6a-463e82 call 40b3e4 call 464f84 2288->2296 2317 463e11-463e4d call 40b3e4 call 464f84 * 2 call 464e24 2289->2317 2318 463e4f-463e5d call 464f84 2289->2318 2344 463eee-463ef8 call 4149ec 2295->2344 2345 463e9e-463ec1 call 429fe8 call 40b3e4 2295->2345 2296->2295 2297->2295 2307 463d98-463d9c 2297->2307 2346 463d4d-463d51 2304->2346 2305->2346 2316 463d9e-463db4 call 40b3e4 2307->2316 2341 463db6-463de2 call 42a004 call 464f84 call 464e24 2316->2341 2342 463de7-463deb 2316->2342 2317->2295 2318->2295 2326->2327 2339 463bed-463bff call 406a2c 2326->2339 2327->2251 2327->2259 2337->2258 2337->2284 2338->2258 2339->2327 2357 463c01-463c0b 2339->2357 2341->2295 2342->2316 2355 463ded 2342->2355 2358 463efd-463f1c call 4149ec 2344->2358 2376 463ec3-463eca 2345->2376 2377 463ecc-463edb call 4149ec 2345->2377 2353 463d53-463d5a 2346->2353 2354 463d5c-463d5e 2346->2354 2353->2354 2362 463d65-463d69 2353->2362 2354->2362 2355->2295 2357->2327 2363 463c0d 2357->2363 2372 463f46-463f69 call 475650 call 403450 2358->2372 2373 463f1e-463f41 call 429fe8 call 4650e4 2358->2373 2362->2268 2362->2278 2363->2327 2391 463f84-463f8d 2372->2391 2392 463f6b-463f72 2372->2392 2373->2372 2376->2377 2381 463edd-463eec call 4149ec 2376->2381 2377->2358 2381->2358 2394 463fa3-463fb3 call 403494 2391->2394 2395 463f8f-463fa1 call 403684 2391->2395 2392->2391 2393 463f74-463f82 call 403494 2392->2393 2402 463fc5-463fdc call 414ac0 2393->2402 2394->2402 2395->2394 2403 463fb5-463fc0 call 403494 2395->2403 2407 464012-46401c call 4149ec 2402->2407 2408 463fde-463fe5 2402->2408 2403->2402 2414 464021-464046 call 403400 * 3 2407->2414 2409 463fe7-463ff0 2408->2409 2410 463ff2-463ffc call 42b08c 2408->2410 2409->2410 2412 464001-464010 call 4149ec 2409->2412 2410->2412 2412->2414
                                  APIs
                                    • Part of subcall function 0048DA54: GetWindowRect.USER32(00000000), ref: 0048DA6A
                                  • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00462D63
                                    • Part of subcall function 0041D658: GetObjectA.GDI32(?,00000018,00462D7D), ref: 0041D683
                                    • Part of subcall function 004627F0: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046288D
                                    • Part of subcall function 004627F0: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004628B3
                                    • Part of subcall function 004627F0: SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046290F
                                    • Part of subcall function 004627F0: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00462935
                                    • Part of subcall function 0048DCB0: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0048DCBA
                                    • Part of subcall function 0048D9A4: 73A1A570.USER32(00000000,?,?,?), ref: 0048D9C6
                                    • Part of subcall function 0048D9A4: SelectObject.GDI32(?,00000000), ref: 0048D9EC
                                    • Part of subcall function 0048D9A4: 73A1A480.USER32(00000000,?,0048DA4A,0048DA43,?,00000000,?,?,?), ref: 0048DA3D
                                    • Part of subcall function 0048DCA0: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0048DCAA
                                  • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,021AD0B4,021AED18,?,?,021AED40,?,?,021AED84,?), ref: 004639DB
                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004639EC
                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00463A04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu$AppendExtractFileIconInfoObject$A480A570BitmapLoadRectSelectSystemWindow
                                  • String ID: $(Default)$STOPIMAGE
                                  • API String ID: 2907157918-770201673
                                  • Opcode ID: edd87f1fb70ff78689207597ef215f3f1d8daab5004934605c616b6dfe41ea42
                                  • Instruction ID: 0ce2a7c8654b4bda645b85becf187eb8cd9f620879433755a56cf3d7b5830d6a
                                  • Opcode Fuzzy Hash: edd87f1fb70ff78689207597ef215f3f1d8daab5004934605c616b6dfe41ea42
                                  • Instruction Fuzzy Hash: 97F2E4386005609FCB00EF59D9D9F9A73F1BF8A304F1542B6E5049B36AD774AC46CB8A
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,00000000,?,00000000,00478D68,?,00000000,00000000,?,?,00479E8F,?,?,00000000), ref: 00478BCC
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,?,?,00000000,?,00000000,00478D68,?,00000000,00000000,?,?,00479E8F,?), ref: 00478C15
                                  • FindClose.KERNEL32(000000FF,000000FF,?,00000000,?,?,00000000,?,00000000,00478D68,?,00000000,00000000,?,?,00479E8F), ref: 00478C22
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00478D68,?,00000000,00000000,?,?,00479E8F,?), ref: 00478C6E
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00478D3B,?,00000000,?,00000000,?,?,00000000,?,00000000,00478D68,?,00000000), ref: 00478D17
                                  • FindClose.KERNEL32(000000FF,00478D42,00478D3B,?,00000000,?,00000000,?,?,00000000,?,00000000,00478D68,?,00000000,00000000), ref: 00478D35
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseFirstNext
                                  • String ID:
                                  • API String ID: 3541575487-0
                                  • Opcode ID: 61b973198d0b1fe0a2792cb2d3ebe50e9fb866b9979b51b3a9d52b52c7d2fea2
                                  • Instruction ID: 54e57abadac26bdf6b50859d29d6f630f81932fdc3dee25b4239eb6d38c32597
                                  • Opcode Fuzzy Hash: 61b973198d0b1fe0a2792cb2d3ebe50e9fb866b9979b51b3a9d52b52c7d2fea2
                                  • Instruction Fuzzy Hash: 9C512171900658AFCB21EF65CC49ADEB7B8EB48315F1084BAA408E7391DA389F45CF58
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004924C0,00000001,?,004085D3,?,00000000,004086B2), ref: 00408526
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: e78cb18e13a677ec314dcfb13bf641d8481e9719d632e97f187bed88d7cfff22
                                  • Instruction ID: fb41a53da0808811ac7d324c7af8f56b416e217676924749333d5f26c846bbbb
                                  • Opcode Fuzzy Hash: e78cb18e13a677ec314dcfb13bf641d8481e9719d632e97f187bed88d7cfff22
                                  • Instruction Fuzzy Hash: 84E0927170022466D711A95A9C86AF6B35C9758314F00427FB948EB3C2EDB89E8046A9
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004240F9,?,00000000,00424104), ref: 00423B56
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: e1688769fd7bd0d6dab607fe8fc3e2e26ffd360abf5a591b42ec6747995d87bd
                                  • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                  • Opcode Fuzzy Hash: e1688769fd7bd0d6dab607fe8fc3e2e26ffd360abf5a591b42ec6747995d87bd
                                  • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 903 48a9fc-48aa30 call 403684 906 48aa32-48aa41 call 446678 Sleep 903->906 907 48aa46-48aa53 call 403684 903->907 914 48aed6-48aef0 call 403420 906->914 912 48aa82-48aa8f call 403684 907->912 913 48aa55-48aa78 call 4466d4 call 403738 FindWindowA call 446954 907->913 922 48aabe-48aacb call 403684 912->922 923 48aa91-48aab9 call 4466d4 call 403738 FindWindowA call 446954 912->923 932 48aa7d 913->932 930 48aacd-48ab0f call 446678 * 4 SendMessageA call 446954 922->930 931 48ab14-48ab21 call 403684 922->931 923->914 930->914 941 48ab70-48ab7d call 403684 931->941 942 48ab23-48ab6b call 446678 * 4 PostMessageA call 4467ac 931->942 932->914 950 48abcc-48abd9 call 403684 941->950 951 48ab7f-48abc7 call 446678 * 4 SendNotifyMessageA call 4467ac 941->951 942->914 965 48abdb-48ac01 call 4466d4 call 403738 RegisterClipboardFormatA call 446954 950->965 966 48ac06-48ac13 call 403684 950->966 951->914 965->914 978 48ac54-48ac61 call 403684 966->978 979 48ac15-48ac4f call 446678 * 3 SendMessageA call 446954 966->979 991 48aca8-48acb5 call 403684 978->991 992 48ac63-48aca3 call 446678 * 3 PostMessageA call 4467ac 978->992 979->914 1002 48acfc-48ad09 call 403684 991->1002 1003 48acb7-48acf7 call 446678 * 3 SendNotifyMessageA call 4467ac 991->1003 992->914 1016 48ad0b-48ad29 call 4466d4 call 42e1e0 1002->1016 1017 48ad5e-48ad6b call 403684 1002->1017 1003->914 1034 48ad3b-48ad49 GetLastError call 446954 1016->1034 1035 48ad2b-48ad39 call 446954 1016->1035 1028 48ad6d-48ad99 call 4466d4 call 403738 call 446678 GetProcAddress 1017->1028 1029 48ade5-48adf2 call 403684 1017->1029 1059 48ad9b-48add0 call 446678 * 2 call 446954 call 4467ac 1028->1059 1060 48add5-48ade0 call 4467ac 1028->1060 1041 48ae1a-48ae27 call 403684 1029->1041 1042 48adf4-48ae15 call 446678 FreeLibrary call 4467ac 1029->1042 1047 48ad4e-48ad59 call 446954 1034->1047 1035->1047 1056 48ae29-48ae47 call 4466d4 call 403738 CreateMutexA 1041->1056 1057 48ae4c-48ae59 call 403684 1041->1057 1042->914 1047->914 1056->914 1069 48ae5b-48ae8d call 4466d4 call 403574 call 403738 OemToCharBuffA call 446a28 1057->1069 1070 48ae8f-48ae9c call 403684 1057->1070 1059->914 1060->914 1069->914 1079 48ae9e-48aed0 call 4466d4 call 403574 call 403738 CharToOemBuffA call 446a28 1070->1079 1080 48aed2 1070->1080 1079->914 1080->914
                                  APIs
                                  • Sleep.KERNEL32(00000000,00000000,0048AEF1,?,?,?,?,00000000,00000000,00000000), ref: 0048AA3C
                                  • FindWindowA.USER32(00000000,00000000), ref: 0048AA6D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FindSleepWindow
                                  • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                  • API String ID: 3078808852-3310373309
                                  • Opcode ID: 2a8871d8d55023be3087082fda80a682e2aee2b8b4ec1ca501907998ae9325a2
                                  • Instruction ID: 235d6cf6b0db6f7ade2b2b1cdaf506c84c5948104d9e726c8462171498c33706
                                  • Opcode Fuzzy Hash: 2a8871d8d55023be3087082fda80a682e2aee2b8b4ec1ca501907998ae9325a2
                                  • Instruction Fuzzy Hash: 52C183A0B402116BE714BF3E8C4252E559A9F95705B12CD3FB406DB78ACEBCDC1A435E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1408 47c39c-47c3c1 GetModuleHandleA GetProcAddress 1409 47c3c3-47c3d9 GetNativeSystemInfo GetProcAddress 1408->1409 1410 47c428-47c42d GetSystemInfo 1408->1410 1411 47c432-47c43b 1409->1411 1412 47c3db-47c3e6 GetCurrentProcess 1409->1412 1410->1411 1413 47c43d-47c441 1411->1413 1414 47c44b-47c452 1411->1414 1412->1411 1421 47c3e8-47c3ec 1412->1421 1417 47c454-47c45b 1413->1417 1418 47c443-47c447 1413->1418 1415 47c46d-47c472 1414->1415 1417->1415 1419 47c45d-47c464 1418->1419 1420 47c449-47c466 1418->1420 1419->1415 1420->1415 1421->1411 1423 47c3ee-47c3f5 call 450e98 1421->1423 1423->1411 1426 47c3f7-47c404 GetProcAddress 1423->1426 1426->1411 1427 47c406-47c41d GetModuleHandleA GetProcAddress 1426->1427 1427->1411 1428 47c41f-47c426 1427->1428 1428->1411
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0047C3AD
                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0047C3BA
                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047C3C8
                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0047C3D0
                                  • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0047C3DC
                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0047C3FD
                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 0047C410
                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0047C416
                                  • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047C42D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                  • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                  • API String ID: 2230631259-2623177817
                                  • Opcode ID: d03775e633738299a729604fc9c01b73d2fbc3ca108d1ce9ff2f27538810c40c
                                  • Instruction ID: 06dcc6403529f5206617775aef830b133aa19bd788f334af9eebe881936bbdd9
                                  • Opcode Fuzzy Hash: d03775e633738299a729604fc9c01b73d2fbc3ca108d1ce9ff2f27538810c40c
                                  • Instruction Fuzzy Hash: 0511E255044341A8CB20B3B55DE6BFB26488B51B18F68C43F688C762D3D67CCC888AAF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1429 464310-464348 call 475650 1432 46434e-46435e call 472618 1429->1432 1433 46452a-464544 call 403420 1429->1433 1438 464363-4643a8 call 407894 call 403738 call 42dc44 1432->1438 1444 4643ad-4643af 1438->1444 1445 4643b5-4643ca 1444->1445 1446 464520-464524 1444->1446 1447 4643df-4643e6 1445->1447 1448 4643cc-4643da call 42db74 1445->1448 1446->1433 1446->1438 1449 464413-46441a 1447->1449 1450 4643e8-46440a call 42db74 call 42db8c 1447->1450 1448->1447 1453 464473-46447a 1449->1453 1454 46441c-464441 call 42db74 * 2 1449->1454 1450->1449 1469 46440c 1450->1469 1456 4644c0-4644c7 1453->1456 1457 46447c-46448e call 42db74 1453->1457 1476 464443-46444c call 473090 1454->1476 1477 464451-464463 call 42db74 1454->1477 1462 464502-464518 RegCloseKey 1456->1462 1463 4644c9-4644fd call 42db74 * 3 1456->1463 1470 464490-464499 call 473090 1457->1470 1471 46449e-4644b0 call 42db74 1457->1471 1463->1462 1469->1449 1470->1471 1471->1456 1484 4644b2-4644bb call 473090 1471->1484 1476->1477 1477->1453 1485 464465-46446e call 473090 1477->1485 1484->1456 1485->1453
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegCloseKey.ADVAPI32(?,0046452A,?,?,00000001,00000000,00000000,00464545,?,00000000,00000000,?), ref: 00464513
                                  Strings
                                  • Inno Setup: Selected Components, xrefs: 00464432
                                  • Inno Setup: No Icons, xrefs: 004643FB
                                  • Inno Setup: User Info: Organization, xrefs: 004644E2
                                  • Inno Setup: Deselected Components, xrefs: 00464454
                                  • Inno Setup: Icon Group, xrefs: 004643EE
                                  • Inno Setup: User Info: Serial, xrefs: 004644F5
                                  • %s\%s_is1, xrefs: 0046438D
                                  • Inno Setup: Deselected Tasks, xrefs: 004644A1
                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0046436F
                                  • Inno Setup: App Path, xrefs: 004643D2
                                  • Inno Setup: Selected Tasks, xrefs: 0046447F
                                  • Inno Setup: User Info: Name, xrefs: 004644CF
                                  • Inno Setup: Setup Type, xrefs: 00464422
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                  • API String ID: 47109696-1093091907
                                  • Opcode ID: da52ca3c07eec67e3a71c249a625a344edc3886d0bb8355508e894d35cb1a976
                                  • Instruction ID: fc5077364d37a5906c2ffbe53c2f2339136cb7e8b2833831ee8049aef900e6f6
                                  • Opcode Fuzzy Hash: da52ca3c07eec67e3a71c249a625a344edc3886d0bb8355508e894d35cb1a976
                                  • Instruction Fuzzy Hash: 1D51D070A00244ABDF11DB64C552BDEBBF4EF85304F6080ABE941A7391E738AF01CB59

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1647 42381c-423826 1648 42394f-423953 1647->1648 1649 42382c-42384e call 41f36c GetClassInfoA 1647->1649 1652 423850-423867 RegisterClassA 1649->1652 1653 42387f-423888 GetSystemMetrics 1649->1653 1652->1653 1654 423869-42387a call 408c5c call 40311c 1652->1654 1655 42388a 1653->1655 1656 42388d-423897 GetSystemMetrics 1653->1656 1654->1653 1655->1656 1658 423899 1656->1658 1659 42389c-4238f8 call 403738 call 406300 call 403400 call 4235f4 SetWindowLongA 1656->1659 1658->1659 1670 423912-423940 GetSystemMenu DeleteMenu * 2 1659->1670 1671 4238fa-42390d call 424120 SendMessageA 1659->1671 1670->1648 1673 423942-42394a DeleteMenu 1670->1673 1671->1670 1673->1648
                                  APIs
                                    • Part of subcall function 0041F36C: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED4C,?,00423837,00423BB4,0041ED4C), ref: 0041F38A
                                  • GetClassInfoA.USER32(00400000,00423624), ref: 00423847
                                  • RegisterClassA.USER32(00491630), ref: 0042385F
                                  • GetSystemMetrics.USER32(00000000), ref: 00423881
                                  • GetSystemMetrics.USER32(00000001), ref: 00423890
                                  • SetWindowLongA.USER32(004105F8,000000FC,00423634), ref: 004238EC
                                  • SendMessageA.USER32(004105F8,00000080,00000001,00000000), ref: 0042390D
                                  • GetSystemMenu.USER32(004105F8,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423BB4,0041ED4C), ref: 00423918
                                  • DeleteMenu.USER32(00000000,0000F030,00000000,004105F8,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423BB4,0041ED4C), ref: 00423927
                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004105F8,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423934
                                  • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004105F8,00000000,00000000,00400000,00000000,00000000,00000000), ref: 0042394A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                  • String ID: $6B
                                  • API String ID: 183575631-3519776487
                                  • Opcode ID: c243faa105f484f8994615a9e18f86ab08e10570189d0b0026668523fc81ff00
                                  • Instruction ID: 44122239756f869d7af1fdba3570d6082de878778f6117c7260872992629901f
                                  • Opcode Fuzzy Hash: c243faa105f484f8994615a9e18f86ab08e10570189d0b0026668523fc81ff00
                                  • Instruction Fuzzy Hash: 2B31A1B17402107AEB10BF659C82F663698AB14708F10007BFA41EF2E7DABDED04876C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1759 4760f0-476146 call 42c3a4 call 4035c0 call 475d6c call 450d54 1768 476152-476161 call 450d54 1759->1768 1769 476148-47614d call 451ac0 1759->1769 1773 476163-476169 1768->1773 1774 47617b-476181 1768->1774 1769->1768 1775 47618b-476193 call 403494 1773->1775 1776 47616b-476171 1773->1776 1777 476183-476189 1774->1777 1778 476198-4761c0 call 42e1e0 * 2 1774->1778 1775->1778 1776->1774 1779 476173-476179 1776->1779 1777->1775 1777->1778 1785 4761e7-476201 GetProcAddress 1778->1785 1786 4761c2-4761e2 call 407894 call 451ac0 1778->1786 1779->1774 1779->1775 1788 476203-476208 call 451ac0 1785->1788 1789 47620d-47622a call 403400 * 2 1785->1789 1786->1785 1788->1789
                                  APIs
                                  • GetProcAddress.KERNEL32(6FBC0000,SHGetFolderPathA), ref: 004761F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: Failed to get address of SHGetFolderPathA function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                  • API String ID: 190572456-1072092678
                                  • Opcode ID: f8a945879734eb8a3e01e329d5f85791fe065c35f54aba2b2d6a486e5181d73e
                                  • Instruction ID: 226347d15c1c5d11692c613386f90c3546301fb27c77df9f9534ec7b1eb9fe62
                                  • Opcode Fuzzy Hash: f8a945879734eb8a3e01e329d5f85791fe065c35f54aba2b2d6a486e5181d73e
                                  • Instruction Fuzzy Hash: 68312130A009499FCB50EF95D9819DEB7B6EB45304F91C4B7E808E7252D738AE09CB59

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1797 45196c-4519bd GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1798 4519bf-4519c6 1797->1798 1799 4519c8-4519ca 1797->1799 1798->1799 1800 4519cc 1798->1800 1801 4519ce-451a04 call 42e1e0 call 42e660 call 403400 1799->1801 1800->1801
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451A05,?,?,?,?,00000000,?,00490B53), ref: 0045198C
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451992
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451A05,?,?,?,?,00000000,?,00490B53), ref: 004519A6
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004519AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                  • API String ID: 1646373207-2130885113
                                  • Opcode ID: 3cbb67f4092de5c9cddfa2d9bfb7862d968d6380399a9768a187bea8b87d8782
                                  • Instruction ID: bc30ab95aa3e68d9a300d6e2b8d7baffeb65242bdbb5e2da560ca488e233ca82
                                  • Opcode Fuzzy Hash: 3cbb67f4092de5c9cddfa2d9bfb7862d968d6380399a9768a187bea8b87d8782
                                  • Instruction Fuzzy Hash: AF0184B0241744FEDB12EB729C56B5A3A98D711B19F60487BF840A51A3D7FC4D08CA6D

                                  Control-flow Graph

                                  APIs
                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00475F37,?,?,00000000,00492628,00000000,00000000,?,00490529,00000000,004906D2,?,00000000), ref: 00475E57
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00475F37,?,?,00000000,00492628,00000000,00000000,?,00490529,00000000,004906D2,?,00000000), ref: 00475E60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                  • API String ID: 1375471231-1421604804
                                  • Opcode ID: d971e988ddd947d72368aaad927c191851754868bdd5cef345a65f7cfcfe1743
                                  • Instruction ID: 2992479d9a41277d4ba3c51ea03d54e21519c43d7d484cf0d062ff4dd53bb91c
                                  • Opcode Fuzzy Hash: d971e988ddd947d72368aaad927c191851754868bdd5cef345a65f7cfcfe1743
                                  • Instruction Fuzzy Hash: 0E415674A105099BDB00EF91D881ADEB7B9FF44305F50843BE815BB396DB78AE058B58

                                  Control-flow Graph

                                  APIs
                                  • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430160
                                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0043016F
                                  • GetCurrentThreadId.KERNEL32 ref: 00430189
                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 004301AA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                  • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                  • API String ID: 4130936913-2943970505
                                  • Opcode ID: 28029589c3db21dee67d6af112ea14edfd7444fd649c35e836976e13e9a64ada
                                  • Instruction ID: 59c811c4a41a2c0c62e5dc841fd9799240dd828c67306f5793c7ecde0d0b434c
                                  • Opcode Fuzzy Hash: 28029589c3db21dee67d6af112ea14edfd7444fd649c35e836976e13e9a64ada
                                  • Instruction Fuzzy Hash: F0F0A7705483409AD700EB35C902B1A7BE4AB58708F004A3FF458A63E1D77A9900CB1F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2552 423634-423641 2553 423643-423646 call 402d30 2552->2553 2554 42364b-423718 call 4101c8 call 402b30 * 2 call 41d9bc LoadIconA call 41dd48 GetModuleFileNameA OemToCharA call 407460 2552->2554 2553->2554 2568 42371a-423723 call 4072c8 2554->2568 2569 423728-423737 call 407440 2554->2569 2568->2569 2573 423739 2569->2573 2574 42373c-423763 CharLowerA call 40355c 2569->2574 2573->2574 2577 423765-423767 call 42381c 2574->2577 2578 42376c-423778 2574->2578 2577->2578 2580 423784-42378b 2578->2580 2581 42377a-423781 2578->2581 2581->2580
                                  APIs
                                  • LoadIconA.USER32(00400000,MAINICON), ref: 004236C4
                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F8E,00000000,?,?,?,00000001), ref: 004236F1
                                  • OemToCharA.USER32(?,?), ref: 00423704
                                  • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F8E,00000000,?,?,?,00000001), ref: 00423744
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Char$FileIconLoadLowerModuleName
                                  • String ID: 2$MAINICON
                                  • API String ID: 3935243913-3181700818
                                  • Opcode ID: 224cf75db4ea10a89a7eebe0d84fc4cc31f478398fb3606dfc63747a48c8d72c
                                  • Instruction ID: 65266eba4a5d446380783eb4ad5427bb3c2b6e1eaca800c785880fb46d02af3b
                                  • Opcode Fuzzy Hash: 224cf75db4ea10a89a7eebe0d84fc4cc31f478398fb3606dfc63747a48c8d72c
                                  • Instruction Fuzzy Hash: E53193B0A042559ADB10EF29C8C57C67BE89F14308F4441BAE944DB393D7BED988CB59

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00418EE5
                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F06
                                  • GetCurrentThreadId.KERNEL32 ref: 00418F21
                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F42
                                    • Part of subcall function 00423070: 73A1A570.USER32(00000000,?,?,00000000,?,00418F7B,00000000,?,?,?,00000001), ref: 004230C6
                                    • Part of subcall function 00423070: EnumFontsA.GDI32(00000000,00000000,00423010,004105F8,00000000,?,?,00000000,?,00418F7B,00000000,?,?,?,00000001), ref: 004230D9
                                    • Part of subcall function 00423070: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423010,004105F8,00000000,?,?,00000000,?,00418F7B,00000000), ref: 004230E1
                                    • Part of subcall function 00423070: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423010,004105F8,00000000,?,?,00000000,?,00418F7B,00000000), ref: 004230EC
                                    • Part of subcall function 00423634: LoadIconA.USER32(00400000,MAINICON), ref: 004236C4
                                    • Part of subcall function 00423634: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F8E,00000000,?,?,?,00000001), ref: 004236F1
                                    • Part of subcall function 00423634: OemToCharA.USER32(?,?), ref: 00423704
                                    • Part of subcall function 00423634: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F8E,00000000,?,?,?,00000001), ref: 00423744
                                    • Part of subcall function 0041F0C0: GetVersion.KERNEL32(?,00418F98,00000000,?,?,?,00000001), ref: 0041F0CE
                                    • Part of subcall function 0041F0C0: SetErrorMode.KERNEL32(00008000,?,00418F98,00000000,?,?,?,00000001), ref: 0041F0EA
                                    • Part of subcall function 0041F0C0: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F98,00000000,?,?,?,00000001), ref: 0041F0F6
                                    • Part of subcall function 0041F0C0: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F98,00000000,?,?,?,00000001), ref: 0041F104
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F134
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F15D
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F172
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F187
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F19C
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F1B1
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F1C6
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1DB
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1F0
                                    • Part of subcall function 0041F0C0: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F205
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                  • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                  • API String ID: 3864787166-2767913252
                                  • Opcode ID: ef7e27ba16645ad8f4c699e646a7607366e766e332a0da38ca4bd420b63be1db
                                  • Instruction ID: b182b06b3bcb1b2e8c3ba80a322d5fe38ad1e868bfed4ce1d31fb71d0c0c557e
                                  • Opcode Fuzzy Hash: ef7e27ba16645ad8f4c699e646a7607366e766e332a0da38ca4bd420b63be1db
                                  • Instruction Fuzzy Hash: 051142B06142406AC740FF36998274A76E1EBA4308F40853FF448EB3E1DB7D9945CB6E
                                  APIs
                                  • SetWindowLongA.USER32(?,000000FC,?), ref: 0041360C
                                  • GetWindowLongA.USER32(?,000000F0), ref: 00413617
                                  • GetWindowLongA.USER32(?,000000F4), ref: 00413629
                                  • SetWindowLongA.USER32(?,000000F4,?), ref: 0041363C
                                  • SetPropA.USER32(?,00000000,00000000), ref: 00413653
                                  • SetPropA.USER32(?,00000000,00000000), ref: 0041366A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: LongWindow$Prop
                                  • String ID:
                                  • API String ID: 3887896539-0
                                  • Opcode ID: 0a6263d03eac2d2bce2c4b1186c1d291e8e55930424baaf96426919c90c6d239
                                  • Instruction ID: f31fb67a9e11a3f95cb2897c8c98fc4a52a333ae5d38a5fa38f8a355adb326ca
                                  • Opcode Fuzzy Hash: 0a6263d03eac2d2bce2c4b1186c1d291e8e55930424baaf96426919c90c6d239
                                  • Instruction Fuzzy Hash: C911CC75500245BFDB00EF99DC84E9A37E8AB19364F104266F918DB2A1D738D9908B64
                                  APIs
                                  • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046288D
                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004628B3
                                    • Part of subcall function 00462730: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004627C8
                                    • Part of subcall function 00462730: DestroyCursor.USER32(00000000), ref: 004627DE
                                  • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046290F
                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00462935
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Icon$ExtractFileInfo$CursorDestroyDraw
                                  • String ID: c:\directory
                                  • API String ID: 2926980410-3984940477
                                  • Opcode ID: 053eec6837b37a16dfd373243ba5a34fa0dfe6360c683bd5468a3980c2d0a2d1
                                  • Instruction ID: 427904fd0b382b2f05c77991b1ac4ddebc586400d5837c21677a4a344efa396e
                                  • Opcode Fuzzy Hash: 053eec6837b37a16dfd373243ba5a34fa0dfe6360c683bd5468a3980c2d0a2d1
                                  • Instruction Fuzzy Hash: CD418D70700644BFDB10DB55CD8AFDBBBE8AB49304F1040A6F90497291D6B8AE84CA59
                                  APIs
                                  • 74D41520.VERSION(00000000,?,?,?,0048F996), ref: 00450CAC
                                  • 74D41500.VERSION(00000000,?,00000000,?,00000000,00450D27,?,00000000,?,?,?,0048F996), ref: 00450CD9
                                  • 74D41540.VERSION(?,00450D50,?,?,00000000,?,00000000,?,00000000,00450D27,?,00000000,?,?,?,0048F996), ref: 00450CF3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D41500D41520D41540
                                  • String ID: aE
                                  • API String ID: 2153611984-88912727
                                  • Opcode ID: 5f4df345e488c05fd5bd4e33c36db4a7a4bcf57642fa48d89191aa24049eff36
                                  • Instruction ID: fa6cca6fee997d329f140acf62b9c68117f89c9724db0c09afd566eb7417e920
                                  • Opcode Fuzzy Hash: 5f4df345e488c05fd5bd4e33c36db4a7a4bcf57642fa48d89191aa24049eff36
                                  • Instruction Fuzzy Hash: 66215379A00649AFDB01DAE98C41DBFB7FCEB49301F55407AFD04E3242D679AE088769
                                  APIs
                                  • GetMenu.USER32(00000000), ref: 00421309
                                  • SetMenu.USER32(00000000,00000000), ref: 00421326
                                  • SetMenu.USER32(00000000,00000000), ref: 0042135B
                                  • SetMenu.USER32(00000000,00000000), ref: 00421377
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu
                                  • String ID:
                                  • API String ID: 3711407533-0
                                  • Opcode ID: 69c3d24cbd3908ab398b23ff4996bcca6d71d6d9efd1b021582025e8ce73b4a6
                                  • Instruction ID: 0f81d55959a1cf47e4f4fbe1fb89748b5e36cc62268cbc8ca2fac5ad34181ecf
                                  • Opcode Fuzzy Hash: 69c3d24cbd3908ab398b23ff4996bcca6d71d6d9efd1b021582025e8ce73b4a6
                                  • Instruction Fuzzy Hash: 1341C37070025557EB20BB3AA88579A76924F65308F4901BFBC44DF3A7CA7DCC4683AC
                                  APIs
                                  • SendMessageA.USER32(?,?,?,?), ref: 00416B2C
                                  • SetTextColor.GDI32(?,00000000), ref: 00416B46
                                  • SetBkColor.GDI32(?,00000000), ref: 00416B60
                                  • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416B88
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Color$CallMessageProcSendTextWindow
                                  • String ID:
                                  • API String ID: 601730667-0
                                  • Opcode ID: 94d5e14a106f4ce483550bedbdeace2163082f32d69035d86e8ad094192f6645
                                  • Instruction ID: b033cece6509217f2327ce801b750aa6be190e92d4bc00e16b2453bc82832c42
                                  • Opcode Fuzzy Hash: 94d5e14a106f4ce483550bedbdeace2163082f32d69035d86e8ad094192f6645
                                  • Instruction Fuzzy Hash: DA112EB2204610AFC710EE6ECDC5E9777ECEF49314715882AB59ADB612D638F8418B29
                                  APIs
                                  • EnumWindows.USER32(004239C4), ref: 00423A50
                                  • GetWindow.USER32(?,00000003), ref: 00423A65
                                  • GetWindowLongA.USER32(?,000000EC), ref: 00423A74
                                  • SetWindowPos.USER32(00000000,00424104,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,00424153,?,?,00423D1B), ref: 00423AAA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$EnumLongWindows
                                  • String ID:
                                  • API String ID: 4191631535-0
                                  • Opcode ID: 2ac3058ad058fb58bc43d272a33111b98432a4fbb6a4c2e0798833925aa94dac
                                  • Instruction ID: 2aa942e0144c2f66fd74dad5558343876cb1daa91c8e5ea9adb7241dccc7aa7f
                                  • Opcode Fuzzy Hash: 2ac3058ad058fb58bc43d272a33111b98432a4fbb6a4c2e0798833925aa94dac
                                  • Instruction Fuzzy Hash: C9112E70704610ABDB10DF68DD85F5A77E4EB08725F11066AF994AB2E2C3789D41CB58
                                  APIs
                                  • 73A1A570.USER32(00000000,?,?,00000000,?,00418F7B,00000000,?,?,?,00000001), ref: 004230C6
                                  • EnumFontsA.GDI32(00000000,00000000,00423010,004105F8,00000000,?,?,00000000,?,00418F7B,00000000,?,?,?,00000001), ref: 004230D9
                                  • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423010,004105F8,00000000,?,?,00000000,?,00418F7B,00000000), ref: 004230E1
                                  • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423010,004105F8,00000000,?,?,00000000,?,00418F7B,00000000), ref: 004230EC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A24620A480A570EnumFonts
                                  • String ID:
                                  • API String ID: 2630238358-0
                                  • Opcode ID: 541138733ee3697c01f8c81797123c03923b2bd4d964166bd9626717c6dd975c
                                  • Instruction ID: afad048246e6630919bdfa9f1eb422a1972ed3af21ea5203bed7575143a0f70f
                                  • Opcode Fuzzy Hash: 541138733ee3697c01f8c81797123c03923b2bd4d964166bd9626717c6dd975c
                                  • Instruction Fuzzy Hash: 9D01D2717043002AE700BF7A5C82B9B3A549F05319F44023BF804AF2C2D6BE9905876E
                                  APIs
                                    • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00490B12), ref: 0040334B
                                    • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00490B12), ref: 00403356
                                    • Part of subcall function 00409B20: 6F571CD0.COMCTL32(00490B21), ref: 00409B20
                                    • Part of subcall function 004108FC: GetCurrentThreadId.KERNEL32 ref: 0041094A
                                    • Part of subcall function 00418FE8: GetVersion.KERNEL32(00490B35), ref: 00418FE8
                                    • Part of subcall function 0044EE30: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00490B49), ref: 0044EE6B
                                    • Part of subcall function 0044EE30: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044EE71
                                    • Part of subcall function 0045196C: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451A05,?,?,?,?,00000000,?,00490B53), ref: 0045198C
                                    • Part of subcall function 0045196C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451992
                                    • Part of subcall function 0045196C: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451A05,?,?,?,?,00000000,?,00490B53), ref: 004519A6
                                    • Part of subcall function 0045196C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004519AC
                                    • Part of subcall function 0045FCBC: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00490B67), ref: 0045FCCB
                                    • Part of subcall function 0045FCBC: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 0045FCD1
                                    • Part of subcall function 004678D8: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 004678ED
                                    • Part of subcall function 00472434: GetModuleHandleA.KERNEL32(kernel32.dll,?,00490B71), ref: 0047243A
                                    • Part of subcall function 00472434: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00472447
                                    • Part of subcall function 00472434: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00472457
                                    • Part of subcall function 0048DD14: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0048DD2D
                                  • SetErrorMode.KERNEL32(00000001,00000000,00490BB9), ref: 00490B8B
                                    • Part of subcall function 00490914: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00490B95,00000001,00000000,00490BB9), ref: 0049091E
                                    • Part of subcall function 00490914: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00490924
                                    • Part of subcall function 0042447C: SendMessageA.USER32(?,0000B020,00000000,?), ref: 0042449B
                                    • Part of subcall function 0042426C: SetWindowTextA.USER32(?,00000000), ref: 00424284
                                  • ShowWindow.USER32(?,00000005,00000000,00490BB9), ref: 00490BFC
                                    • Part of subcall function 0047B260: SetActiveWindow.USER32(?), ref: 0047B304
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleModule$Window$ActiveClipboardCommandCurrentErrorF571FormatLibraryLineLoadMessageModeRegisterSendShowTextThreadVersion
                                  • String ID: Setup
                                  • API String ID: 4284711697-3839654196
                                  • Opcode ID: 4a92e04b5a3bb167517f030a4e0266e5d02d6270ad180fa011e8cd7e0c68a178
                                  • Instruction ID: 93c4262b2fd0981b4a3bf9bbc89b82d5fe8812d296d35f6d6b268422da34e6e8
                                  • Opcode Fuzzy Hash: 4a92e04b5a3bb167517f030a4e0266e5d02d6270ad180fa011e8cd7e0c68a178
                                  • Instruction Fuzzy Hash: CC31C635204204AED605BBB7ED1391E3BA4EB8971CB61447FF404929A3DE7C5C518A7E
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(?,ProductType,00000000,?,00000000,?,00000000,0042DB61), ref: 0042DA78
                                  • RegQueryValueExA.ADVAPI32(?,ProductType,00000000,?,00000000,00000000,?,ProductType,00000000,?,00000000,?,00000000,0042DB61), ref: 0042DAD0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: QueryValue
                                  • String ID: ProductType
                                  • API String ID: 3660427363-120863269
                                  • Opcode ID: ab12decc903a6d1df9f117d79e0e5479a639dfb10b7c27d5f7c64920541e152b
                                  • Instruction ID: 22425fb9ba400e549f89719797a15a519fe31236383ac1a1c9c2ba634efda0a6
                                  • Opcode Fuzzy Hash: ab12decc903a6d1df9f117d79e0e5479a639dfb10b7c27d5f7c64920541e152b
                                  • Instruction Fuzzy Hash: 67416934E04128EFDF21DF95D890BEFBBB8EB45304F9185A7E510A7280D778AA44CB58
                                  APIs
                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045228F,?,?,00000000,00492628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004521E6
                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045228F,?,?,00000000,00492628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004521EF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: .tmp
                                  • API String ID: 1375471231-2986845003
                                  • Opcode ID: 95b321a80a7f49f3410ff19ad884a03b5149450dce792f72d1a7e619d8ed1185
                                  • Instruction ID: 1cc7738378c32de01c08681629a8df9cd6432d6ac9a10e78220417a5cd0dd7bd
                                  • Opcode Fuzzy Hash: 95b321a80a7f49f3410ff19ad884a03b5149450dce792f72d1a7e619d8ed1185
                                  • Instruction Fuzzy Hash: 68213579A002089BDB01EFA1C9529DFB7B9EF49305F50457BF801B7342DA7C9E058A65
                                  APIs
                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,00475B5A,00000000,00475B70,?,?,?,?,00000000), ref: 00475936
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Close
                                  • String ID: RegisteredOrganization$RegisteredOwner
                                  • API String ID: 3535843008-1113070880
                                  • Opcode ID: b3b711482d8e628ec3f61362cfc892467dbb757c2662bd40f62ad5005f9431cc
                                  • Instruction ID: 48b656342ec2bd2b5ab7dbcfa9b326a46bbbd2cb26f9bcc12124a5356ca6e139
                                  • Opcode Fuzzy Hash: b3b711482d8e628ec3f61362cfc892467dbb757c2662bd40f62ad5005f9431cc
                                  • Instruction Fuzzy Hash: 63F0F6B0B04144EBEB00DA72AC9279B3759D742304F60807BA2058F251D6B9AF01D74C
                                  APIs
                                    • Part of subcall function 0042E1E0: SetErrorMode.KERNEL32(00008000), ref: 0042E1EA
                                    • Part of subcall function 0042E1E0: LoadLibraryA.KERNEL32(00000000,00000000,0042E234,?,00000000,0042E252,?,00008000), ref: 0042E219
                                  • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 004678ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressErrorLibraryLoadModeProc
                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                  • API String ID: 2492108670-2683653824
                                  • Opcode ID: 2d4ab07854a1d4988602b7a8c2149ed72f66a48f089839e8f0029271a52bc1ea
                                  • Instruction ID: fa085d398d84bf6bdc376de8b0adffa78d8cd9c0cd14655664e75f653ebd6975
                                  • Opcode Fuzzy Hash: 2d4ab07854a1d4988602b7a8c2149ed72f66a48f089839e8f0029271a52bc1ea
                                  • Instruction Fuzzy Hash: 90B092E0B0474092EF0077BA584AB1A1454D78079CB64883BB040AB289EE7C8A18EB9E
                                  APIs
                                  • GetSystemMenu.USER32(00000000,00000000,00000000,0047AA50), ref: 0047A9E8
                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0047A9F9
                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 0047AA11
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu$Append$System
                                  • String ID:
                                  • API String ID: 1489644407-0
                                  • Opcode ID: f080a53e69ae36a7c53ecc201a6def57175b7aa651597f400192a04eb8f0c766
                                  • Instruction ID: 9416a2e69f94d1bacdcd5589100605e7a17a6fee69d6532038c11be2b18ca1fe
                                  • Opcode Fuzzy Hash: f080a53e69ae36a7c53ecc201a6def57175b7aa651597f400192a04eb8f0c766
                                  • Instruction Fuzzy Hash: BB31E5B07043442AE711EB359C82BAE3B945B91308F40843FB940AB2E3C67C9D18879E
                                  APIs
                                  • 73A1A570.USER32(00000000,?,00000000,00000000,0044AB69,?,0047B27B,?,?), ref: 0044AADD
                                  • SelectObject.GDI32(?,00000000), ref: 0044AB00
                                  • 73A1A480.USER32(00000000,?,0044AB40,00000000,0044AB39,?,00000000,?,00000000,00000000,0044AB69,?,0047B27B,?,?), ref: 0044AB33
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A480A570ObjectSelect
                                  • String ID:
                                  • API String ID: 1230475511-0
                                  • Opcode ID: 6206e762a1325ba623ac8cb259efe5e16e8ff7365d7f6aa6f873279f897fc210
                                  • Instruction ID: 5ebdf1d2f2544012dfa55b31c85aaba12dd464d1382fd60bb62d336af458de0c
                                  • Opcode Fuzzy Hash: 6206e762a1325ba623ac8cb259efe5e16e8ff7365d7f6aa6f873279f897fc210
                                  • Instruction Fuzzy Hash: 6E21C170E44248AFEB11DFA5C841B9EBBB9EB48304F4180BAF500A7281C77C9950CB2A
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044A828,?,0047B27B,?,?), ref: 0044A7FA
                                  • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044A80D
                                  • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044A841
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DrawText$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 65125430-0
                                  • Opcode ID: 8317c523276f314509038111108d47a2590dbd1258818dab6b6b76e6ad298f5c
                                  • Instruction ID: 547ddd58e113f665f2c4bd30cca118ef6da0f4e8a03e0e68a63751e0d3c3e5d9
                                  • Opcode Fuzzy Hash: 8317c523276f314509038111108d47a2590dbd1258818dab6b6b76e6ad298f5c
                                  • Instruction Fuzzy Hash: 2F1108B27406047FEB00EBAA8C82D6FB7ECDB48724F10813BF504E72C0D5389E018A69
                                  APIs
                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004243BA
                                  • TranslateMessage.USER32(?), ref: 00424437
                                  • DispatchMessageA.USER32(?), ref: 00424441
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Message$DispatchPeekTranslate
                                  • String ID:
                                  • API String ID: 4217535847-0
                                  • Opcode ID: 5ba890f0d626e851ae5eb072c17b98b7617e900c1ccbace483623866fa51125f
                                  • Instruction ID: 29ec6bb2c2fe33ce96073087ef8f049612c87f0656b6e82933878d2f51458537
                                  • Opcode Fuzzy Hash: 5ba890f0d626e851ae5eb072c17b98b7617e900c1ccbace483623866fa51125f
                                  • Instruction Fuzzy Hash: 1F11C43030435056DA20E6A4B94179B73D4CFC1708F85485EF9C957382D7BD9E4487AB
                                  APIs
                                  • SetPropA.USER32(00000000,00000000), ref: 00416612
                                  • SetPropA.USER32(00000000,00000000), ref: 00416627
                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 0041664E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Prop$Window
                                  • String ID:
                                  • API String ID: 3363284559-0
                                  • Opcode ID: b31ba192d97bc2a8128d85a50ffa45febb98a78fe245b4b5ec301087639eabad
                                  • Instruction ID: 675018db8e1bdf4ebffe2da0d9b09b3c9fe28390eae3e6cfa7bb9a74213a9f8e
                                  • Opcode Fuzzy Hash: b31ba192d97bc2a8128d85a50ffa45febb98a78fe245b4b5ec301087639eabad
                                  • Instruction Fuzzy Hash: 9DF0B271701210BFDB109B599C85FA632DCBB19B15F160176BE08EF286D6B8DD40C7A8
                                  APIs
                                  • SetActiveWindow.USER32(?), ref: 0047B304
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ActiveWindow
                                  • String ID: InitializeWizard
                                  • API String ID: 2558294473-2356795471
                                  • Opcode ID: 3a7496bf7c2806cc2f61ad9c515dd49884b44335ce2f4f167811691a48ea3c91
                                  • Instruction ID: 4e25cab65ed988d36d771276a92aef87a17e854c81311b79447974de30300cc1
                                  • Opcode Fuzzy Hash: 3a7496bf7c2806cc2f61ad9c515dd49884b44335ce2f4f167811691a48ea3c91
                                  • Instruction Fuzzy Hash: CA11A330204204AFD701EB69FD45B5A77E4E755324F2084BBF40A877A1D7796C41DB5D
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,00475A36,00000000,00475B70), ref: 00475835
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 00475805
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: Software\Microsoft\Windows\CurrentVersion
                                  • API String ID: 47109696-1019749484
                                  • Opcode ID: 32ef8136de0120a00000d409f2c8a2fabb2658739af061c3bbedf7e0271f1c3a
                                  • Instruction ID: 6f23ae70e013487785b82a96322c3c90f2bad5c8cb9ef8bfae3d8b83ecadceb2
                                  • Opcode Fuzzy Hash: 32ef8136de0120a00000d409f2c8a2fabb2658739af061c3bbedf7e0271f1c3a
                                  • Instruction Fuzzy Hash: A1F08231B0451467EA04B69A9C42B9EA79D9B84758F21407BF908DF342D9F99E0242AD
                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  Strings
                                  • System\CurrentControlSet\Control\Windows, xrefs: 0042DC5E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID: System\CurrentControlSet\Control\Windows
                                  • API String ID: 71445658-1109719901
                                  • Opcode ID: 22e0c054078c54348808a8319995cc634a026ba4b678fe1ea34de8a5361bc097
                                  • Instruction ID: 29d81e93da8360ba13d0a113dd5009aeb6b598c84d67836305bbff2bc9e8969e
                                  • Opcode Fuzzy Hash: 22e0c054078c54348808a8319995cc634a026ba4b678fe1ea34de8a5361bc097
                                  • Instruction Fuzzy Hash: B7D09E72910128BB9B109A89DC41DF7775DDB19760F44401AF904A7141C1B4AC519BE4
                                  APIs
                                  • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AF8A
                                  • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B0E7,00000000,0040B0FF,?,?,?,00000000), ref: 0040AF9B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Resource$FindFree
                                  • String ID:
                                  • API String ID: 4097029671-0
                                  • Opcode ID: 8c30dec602ece8ae2a8e71100469382659f92ae3bfb2da213009fea87c39b6d5
                                  • Instruction ID: 1221a5199f13f7129315330983e0874b2bf41397b47310acc6f6b643a0b38e17
                                  • Opcode Fuzzy Hash: 8c30dec602ece8ae2a8e71100469382659f92ae3bfb2da213009fea87c39b6d5
                                  • Instruction Fuzzy Hash: FB012FB1300300AFDB00EF69DC82E1A33A9EB493087108077F500BB2D0DA799C11962A
                                  APIs
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004231F1
                                  • LoadCursorA.USER32(00000000,00000000), ref: 0042321B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CursorLoad
                                  • String ID:
                                  • API String ID: 3238433803-0
                                  • Opcode ID: 97721f6b4bea7dfcfee2643c439e1d77a1de27f79bc3f669c874631e657f12ca
                                  • Instruction ID: 43eb0a081647544f07c75950a444ff3626244229c91a8f980807230630bdce3f
                                  • Opcode Fuzzy Hash: 97721f6b4bea7dfcfee2643c439e1d77a1de27f79bc3f669c874631e657f12ca
                                  • Instruction Fuzzy Hash: 56F05C11740110A6D6105D7E6CC0E2A7268DBC1735B7103BBFB7BD32D2C62E5C01417D
                                  APIs
                                  • SetErrorMode.KERNEL32(00008000), ref: 0042E1EA
                                  • LoadLibraryA.KERNEL32(00000000,00000000,0042E234,?,00000000,0042E252,?,00008000), ref: 0042E219
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLibraryLoadMode
                                  • String ID:
                                  • API String ID: 2987862817-0
                                  • Opcode ID: df3f20b22e32febbdad40190a0324c62e8b0ac07168a33a3d01648edd1efc6b6
                                  • Instruction ID: a5bf76ec7fc0037a961c30f1a8367ec2ab03dc69631e0c622de06244be8b127b
                                  • Opcode Fuzzy Hash: df3f20b22e32febbdad40190a0324c62e8b0ac07168a33a3d01648edd1efc6b6
                                  • Instruction Fuzzy Hash: 6CF08270B14744BEDB019F779C6282BBBECEB4DB1479248B6F800A2691E63C4C10CD39
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: 08da3f0d1e78bfe9c634c9aa4f5f35e672582809eb99289594877bc0e4020af2
                                  • Instruction ID: 725a70dfb87e22c3967cff80d89a5dac4b2b1bb1b28326949d670fe9fc14322f
                                  • Opcode Fuzzy Hash: 08da3f0d1e78bfe9c634c9aa4f5f35e672582809eb99289594877bc0e4020af2
                                  • Instruction Fuzzy Hash: 82F0A772B0073067EB60596A4C81F5359C49FC5794F154076FD0DFF3E9D6B58C0142A9
                                  APIs
                                  • SendNotifyMessageA.USER32(0001043A,00000496,00002711,00000000), ref: 00477350
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageNotifySend
                                  • String ID:
                                  • API String ID: 3556456075-0
                                  • Opcode ID: 252e5136d57f140269efebacecac5dd0592624cb6a566e5f719c9ce0fa9de95c
                                  • Instruction ID: 16409b2b564c283e2081e6b17d670531f43b9e979188f2c8fa02a8160c9bfcf5
                                  • Opcode Fuzzy Hash: 252e5136d57f140269efebacecac5dd0592624cb6a566e5f719c9ce0fa9de95c
                                  • Instruction Fuzzy Hash: 8B4186343040009BC710FF66EC8255A77A9AB55309790C5B7B8049F3ABCA78EE06DB9D
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,004086B2), ref: 0040859B
                                    • Part of subcall function 00406D8C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406DA9
                                    • Part of subcall function 00408508: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004924C0,00000001,?,004085D3,?,00000000,004086B2), ref: 00408526
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                  • String ID:
                                  • API String ID: 1658689577-0
                                  • Opcode ID: 80ecc8c9aace017e09db60a449651f58f9edaaa4523f5ba9ad143ce156ad8401
                                  • Instruction ID: 8b9545330178279bc2ddac5e6fa168bd58cc03261140f3a6a95c7e376186b839
                                  • Opcode Fuzzy Hash: 80ecc8c9aace017e09db60a449651f58f9edaaa4523f5ba9ad143ce156ad8401
                                  • Instruction Fuzzy Hash: 86315035E00109ABCB00EF95CC819EEB779FF84314F518577E815BB285E738AE018B98
                                  APIs
                                  • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FBE1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoScroll
                                  • String ID:
                                  • API String ID: 629608716-0
                                  • Opcode ID: de4704f2c710e71cab7264c2153380fdf922c8bbe904c6d895339fb26e0428f4
                                  • Instruction ID: 2699cc02af870d89e6a5ad5e313ee30afbb4c435a81dca5bff53af4edc800ccf
                                  • Opcode Fuzzy Hash: de4704f2c710e71cab7264c2153380fdf922c8bbe904c6d895339fb26e0428f4
                                  • Instruction Fuzzy Hash: E22142B16087456FC340DF39D440696BBE4BB88314F04493EE498C3741D774E996CBD6
                                  APIs
                                  • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 0041652D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: a90cc2cdc4384ce14c959999bf908b8a2b5a488b97049405d08f79aee015cd0a
                                  • Instruction ID: a820f4678b9f5f8a39c028f8276f7672b34f9079ce199e45b6728efe25cce622
                                  • Opcode Fuzzy Hash: a90cc2cdc4384ce14c959999bf908b8a2b5a488b97049405d08f79aee015cd0a
                                  • Instruction Fuzzy Hash: D5F019B2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD260EC108BB0
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00414997
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID:
                                  • API String ID: 2492992576-0
                                  • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                  • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                  • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                  • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                  APIs
                                    • Part of subcall function 0042CAA4: CharPrevA.USER32(?,00000000,?,00000001,?,?,0042CBD2,00000000,0042CBF8,?,00000001,?,?,00000000,?,0042CC4A), ref: 0042CACC
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0042CBF8,?,00000001,?,?,00000000,?,0042CC4A,00000000,004511A1,00000000,004511C2,?,00000000), ref: 0042CBDB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AttributesCharFilePrev
                                  • String ID:
                                  • API String ID: 4082512850-0
                                  • Opcode ID: 22241e4889f104e7f41f6a8233d5b92d6a893f3137f18e20c265477f4e7dcce1
                                  • Instruction ID: bcc2a10ba17e46f4a9e3aa80fd67cbe88bd74874a982435321d161081e45760d
                                  • Opcode Fuzzy Hash: 22241e4889f104e7f41f6a8233d5b92d6a893f3137f18e20c265477f4e7dcce1
                                  • Instruction Fuzzy Hash: 96E09B71304308BFD701EF62EC93E5EBBECDB85714BA14476F400E7641D5B9AE008418
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044FB1C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 7da2e43c929a1b3cf4f1d1b3a38018dcf9ef8b29aa3a0f5ed13920a3cf2a8183
                                  • Instruction ID: b9ff2f1e843887c32db999b8e56f693fcf835da1e8ac5748e56ca63b18eefbc2
                                  • Opcode Fuzzy Hash: 7da2e43c929a1b3cf4f1d1b3a38018dcf9ef8b29aa3a0f5ed13920a3cf2a8183
                                  • Instruction Fuzzy Hash: 64E092A53501083ED340EEACAC52FA337CC9319754F048033B988C7351D4619D11CBA8
                                  APIs
                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004519EF,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E67F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FormatMessage
                                  • String ID:
                                  • API String ID: 1306739567-0
                                  • Opcode ID: 5cdf8f27468f89c1e221846afb926f353a68fd9131fa2110eec1806da2fbbfdd
                                  • Instruction ID: e1450acef62d714b472a60d6f425ebfa2555b1e5ba62ff61a1a92b84590c1f2f
                                  • Opcode Fuzzy Hash: 5cdf8f27468f89c1e221846afb926f353a68fd9131fa2110eec1806da2fbbfdd
                                  • Instruction Fuzzy Hash: 2EE020723843111AF23550676C47B7F170D4790704F9580263B10DE3D2D9AEDD0F02AD
                                  APIs
                                  • CreateWindowExA.USER32(00000000,00423624,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423BB4), ref: 00406329
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                  • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                  • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                  • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(0048DB6E,?,0048DB90,?,?,00000000,0048DB6E,?,?), ref: 00414643
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID:
                                  • API String ID: 2492992576-0
                                  • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                  • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                  • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                  • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406EC4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 53bf0c971a6682272cbe113517155efe353acdf78c65c7717e273512bbedbf67
                                  • Instruction ID: 4d76dac8211929e62cce8888c47837621b30d3b0c7e20a3f427cea6db45cb60b
                                  • Opcode Fuzzy Hash: 53bf0c971a6682272cbe113517155efe353acdf78c65c7717e273512bbedbf67
                                  • Instruction Fuzzy Hash: 48D05B763082507AD620965BAC44DA76BDCCBC5770F11063EB558C71C1D6309C01C775
                                  APIs
                                    • Part of subcall function 004235A0: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 004235B5
                                  • ShowWindow.USER32(004105F8,00000009,?,00000000,0041ED4C,004238E2,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423BB4), ref: 0042360F
                                    • Part of subcall function 004235D0: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 004235EC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoParametersSystem$ShowWindow
                                  • String ID:
                                  • API String ID: 3202724764-0
                                  • Opcode ID: cb52d813e726ef3bf1f97996af8dbdf7dcfd597cb966ddb70d5cf92a6749ad4e
                                  • Instruction ID: 2a465d5d678e454343823bde05cb816eafc76b3616d44e2642b2febe52ce8396
                                  • Opcode Fuzzy Hash: cb52d813e726ef3bf1f97996af8dbdf7dcfd597cb966ddb70d5cf92a6749ad4e
                                  • Instruction Fuzzy Hash: F8D0A7123422343143203BB73845A8B46BC4DC62A7388043BB548CB303FD1E8F5130BC
                                  APIs
                                  • SetWindowTextA.USER32(?,00000000), ref: 00424284
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: TextWindow
                                  • String ID:
                                  • API String ID: 530164218-0
                                  • Opcode ID: 627cc26754df0e5d4ac2449ef7fa78a92304547f29cb65040aa964a78537c4ea
                                  • Instruction ID: 464bc4534e7500a79cd72818e7fe6fdc88b43f9c3cedd93f67ec80ba9b13fbd8
                                  • Opcode Fuzzy Hash: 627cc26754df0e5d4ac2449ef7fa78a92304547f29cb65040aa964a78537c4ea
                                  • Instruction Fuzzy Hash: A8D05BE270113017C741BAED54C4AC577CC4B4825671540B7F904EF257C638CD404398
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0045084B,00000000), ref: 0042CC13
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 2ad41afce022a7edf35b9913b4ba60846e4e43961883ad7ce5a0ddd1fe693583
                                  • Instruction ID: 1275fb06175802a4eec18308edc692cabbb6af922db63e061f4609c964e4cce9
                                  • Opcode Fuzzy Hash: 2ad41afce022a7edf35b9913b4ba60846e4e43961883ad7ce5a0ddd1fe693583
                                  • Instruction Fuzzy Hash: 41C08CE13022001A9A1065FE2CC511F02C8891423A3A42F37F42EE33D2DA3D8C17201A
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A86C,0040CE18,?,00000000,?), ref: 00406E7D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: d547fc177cc010ebbf72a9c89b9c423b161151a012076ed4013ddf55a6f1100b
                                  • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                  • Opcode Fuzzy Hash: d547fc177cc010ebbf72a9c89b9c423b161151a012076ed4013ddf55a6f1100b
                                  • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                  APIs
                                  • SetErrorMode.KERNEL32(?,0042E259), ref: 0042E24C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 0a051d32a78ad3617f7ea1dbaf78ac9652f3e2ca0c092313af1445ab26d6b84d
                                  • Instruction ID: 74ebc363d3dd9adc156b0186d58570fa2bbeeb99e87a8c897359723e7ad10afe
                                  • Opcode Fuzzy Hash: 0a051d32a78ad3617f7ea1dbaf78ac9652f3e2ca0c092313af1445ab26d6b84d
                                  • Instruction Fuzzy Hash: ABB09B7670C6009DB709D6D6755552D63D8D7C47203E145B7F015E2580D53C58004928
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da20a264590b8da76bcc673a24629bda81143ece4f0058ab807c22f450b41b4b
                                  • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                  • Opcode Fuzzy Hash: da20a264590b8da76bcc673a24629bda81143ece4f0058ab807c22f450b41b4b
                                  • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0045B1F0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 40e67bd12d84b901d644a32061550c5eab03b59ca4c5dcb87dd2f004890e4884
                                  • Instruction ID: 4e53742ce62a887a6b6d1ed8658a57c71b670a96a09bd10cc268158586706a5e
                                  • Opcode Fuzzy Hash: 40e67bd12d84b901d644a32061550c5eab03b59ca4c5dcb87dd2f004890e4884
                                  • Instruction Fuzzy Hash: D01175716006049BDB00EF15C88175B77A4EF8435AF04846AFD589B2C7DB38EC09CBEA
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED4C,?,00423837,00423BB4,0041ED4C), ref: 0041F38A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 12d8c903e1d35d4ed3e61744099085c4d88952c6e60055fc50c96d732ccf1ffc
                                  • Instruction ID: 0cc0efa10282cde451e00f43d434c8f6590961a15256f6519a3dd582a972fe71
                                  • Opcode Fuzzy Hash: 12d8c903e1d35d4ed3e61744099085c4d88952c6e60055fc50c96d732ccf1ffc
                                  • Instruction Fuzzy Hash: 21115E746407059BC710DF19C880B86FBE5EF98750F10C53BE9A88B785D374E945CBA9
                                  APIs
                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,00401973), ref: 00401766
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: b62b8f1c307d4adcebf6fa1a253ea1af05d3ba4dba9aec1dff74914ddceb4cab
                                  • Instruction ID: 8116451f728c5aa32ea3c360de9e7882c02e29ec9bc76b399c7381bc7e3fefdc
                                  • Opcode Fuzzy Hash: b62b8f1c307d4adcebf6fa1a253ea1af05d3ba4dba9aec1dff74914ddceb4cab
                                  • Instruction Fuzzy Hash: F40170766057109FC3109F29DCC0E2677E8D780378F05413EDA84673A1D37A6C0187D8
                                  APIs
                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,0045B1E6), ref: 0045B11F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: 738f9e8baf208e14bafd32a0a90fff7df9624ba6fd4da3bc033a9b1b79592317
                                  • Instruction ID: 6d5ad091bc6b63f34aeb1917c6f1250fd7e3330d7d8b7736af9f6265ced051ec
                                  • Opcode Fuzzy Hash: 738f9e8baf208e14bafd32a0a90fff7df9624ba6fd4da3bc033a9b1b79592317
                                  • Instruction Fuzzy Hash: 5BD0E9B17557045BDF90EE794C81B1677D8BB48741F5044766904DB286E774E8048A58
                                  APIs
                                    • Part of subcall function 0044ACE0: GetVersionExA.KERNEL32(00000094), ref: 0044ACFD
                                  • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044EE61,00490B49), ref: 0044AD5B
                                  • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044AD73
                                  • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044AD85
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044AD97
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044ADA9
                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044ADBB
                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044ADCD
                                  • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044ADDF
                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044ADF1
                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044AE03
                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044AE15
                                  • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044AE27
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044AE39
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044AE4B
                                  • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044AE5D
                                  • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044AE6F
                                  • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044AE81
                                  • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044AE93
                                  • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044AEA5
                                  • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044AEB7
                                  • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044AEC9
                                  • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044AEDB
                                  • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044AEED
                                  • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044AEFF
                                  • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044AF11
                                  • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044AF23
                                  • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044AF35
                                  • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044AF47
                                  • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044AF59
                                  • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044AF6B
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044AF7D
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044AF8F
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044AFA1
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044AFB3
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044AFC5
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044AFD7
                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044AFE9
                                  • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044AFFB
                                  • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B00D
                                  • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B01F
                                  • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B031
                                  • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B043
                                  • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B055
                                  • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B067
                                  • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B079
                                  • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B08B
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B09D
                                  • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B0AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoadVersion
                                  • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                  • API String ID: 1968650500-2910565190
                                  • Opcode ID: 05300c773c3fe8c519dd0aafd2a74ca4f4417e5fa76d1045a5fec025cdc9a15c
                                  • Instruction ID: 5169d35cc0c40435630ad3afe2d7a88fabdc5ea4a28e3ebae144798e7e1bad85
                                  • Opcode Fuzzy Hash: 05300c773c3fe8c519dd0aafd2a74ca4f4417e5fa76d1045a5fec025cdc9a15c
                                  • Instruction Fuzzy Hash: 1891D6B0A40B50EBEF00EFF59DC6A2636A8EB15B14714457BB444EF295D7B8C804CF99
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 0045671F
                                  • QueryPerformanceCounter.KERNEL32(02193858,00000000,004569B2,?,?,02193858,00000000,?,004570AE,?,02193858,00000000), ref: 00456728
                                  • GetSystemTimeAsFileTime.KERNEL32(02193858,02193858), ref: 00456732
                                  • GetCurrentProcessId.KERNEL32(?,02193858,00000000,004569B2,?,?,02193858,00000000,?,004570AE,?,02193858,00000000), ref: 0045673B
                                  • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004567B1
                                  • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02193858,02193858), ref: 004567BF
                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00491A80,00000003,00000000,00000000,00000000,0045696E), ref: 00456807
                                  • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045695D,?,00000000,C0000000,00000000,00491A80,00000003,00000000,00000000,00000000,0045696E), ref: 00456840
                                    • Part of subcall function 0042D7A8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7BB
                                  • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004568E9
                                  • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045691F
                                  • CloseHandle.KERNEL32(000000FF,00456964,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00456957
                                    • Part of subcall function 00451C18: GetLastError.KERNEL32(00000000,00452689,00000005,00000000,004526BE,?,?,00000000,00492628,00000004,00000000,00000000,00000000,?,00490395,00000000), ref: 00451C1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                  • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$h$helper %d 0x%x
                                  • API String ID: 770386003-3739555822
                                  • Opcode ID: 7a652d3851aa2a46fc11de33a7847c7f814403f051549c5087853c1f47360dd1
                                  • Instruction ID: 11cc02d5b4c65d74a0167c6227b1ef0bb38041da715edce79722e55ed4dc78f9
                                  • Opcode Fuzzy Hash: 7a652d3851aa2a46fc11de33a7847c7f814403f051549c5087853c1f47360dd1
                                  • Instruction Fuzzy Hash: FD713370A00744AEDB11DB69CC41B9EBBF8EB09305F5181BAF908FB282D7785944CF69
                                  APIs
                                  • GetVersion.KERNEL32 ref: 0045A102
                                  • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045A122
                                  • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoA), ref: 0045A12F
                                  • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoA), ref: 0045A13C
                                  • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045A14A
                                  • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045A31E), ref: 0045A1E9
                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045A31E), ref: 0045A1F2
                                  • LocalFree.KERNEL32(?,0045A2CC), ref: 0045A2BF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$AllocateErrorFreeHandleInitializeLastLocalModuleVersion
                                  • String ID: GetNamedSecurityInfoA$SetEntriesInAclW$SetNamedSecurityInfoA$W$advapi32.dll
                                  • API String ID: 4088882585-3389539026
                                  • Opcode ID: a750f6bc507d3a328a51a5dbc9105ee0b18db01a3e0f408d2edc8ea27e296f40
                                  • Instruction ID: 53dbb0a0fcd2a75aff2a5c1782a6a4235bf2da2959e2968fa151a2620b62acf5
                                  • Opcode Fuzzy Hash: a750f6bc507d3a328a51a5dbc9105ee0b18db01a3e0f408d2edc8ea27e296f40
                                  • Instruction Fuzzy Hash: 045182B1900608AFDB10DF99C845BAEB7F8EB08315F10816AF904F7382D2799E55CF69
                                  APIs
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00471DC3
                                  • GetLastError.KERNEL32(-00000010,?), ref: 00471DCC
                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00471E19
                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00471E3D
                                  • CloseHandle.KERNEL32(00000000,00471E6E,00000000,00000000,000000FF,000000FF,00000000,00471E67,?,-00000010,?), ref: 00471E61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCodeErrorExecuteExitHandleLastMultipleObjectsProcessShellWait
                                  • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                  • API String ID: 171997614-221126205
                                  • Opcode ID: 85f8e2aa896032996c12e34d9895de412d9f9db673f6e56ec0164cd69b6af82a
                                  • Instruction ID: 5ecb40f87429d7d11547f51ae298583b800dd69eb7e736ddd6194e700b57543d
                                  • Opcode Fuzzy Hash: 85f8e2aa896032996c12e34d9895de412d9f9db673f6e56ec0164cd69b6af82a
                                  • Instruction Fuzzy Hash: 73216574A40104AADB10EBAD8842BDE76A8DF05358F50843BF908E72A1DB7C99458B5D
                                  APIs
                                  • IsIconic.USER32(?), ref: 0041833B
                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00418358
                                  • GetWindowRect.USER32(?), ref: 00418374
                                  • GetWindowLongA.USER32(?,000000F0), ref: 00418382
                                  • GetWindowLongA.USER32(?,000000F8), ref: 00418397
                                  • ScreenToClient.USER32(00000000), ref: 004183A0
                                  • ScreenToClient.USER32(00000000,?), ref: 004183AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                  • String ID: ,
                                  • API String ID: 2266315723-3772416878
                                  • Opcode ID: e846b1d96ad6d403d5ac4900d6db5fa2b4fc685dffe037c5368f6a7b37d89c4b
                                  • Instruction ID: acb8bb2f18b9e5a8d0717189301f77369ef91ad6b472dfe09f3ff812f2607344
                                  • Opcode Fuzzy Hash: e846b1d96ad6d403d5ac4900d6db5fa2b4fc685dffe037c5368f6a7b37d89c4b
                                  • Instruction Fuzzy Hash: 70111971505201AFDB00DF69C885F9B77E8AF49314F18067EBD58DB286C739D900CBA9
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028), ref: 00453B07
                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453B0D
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00453B26
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00453B4D
                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00453B52
                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00453B63
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 107509674-3733053543
                                  • Opcode ID: 982ff0191f50bbd9cd411f2d5bf63d981ee67892c17860e9fb891ba62e1030d4
                                  • Instruction ID: 7f7469d741d4a2fc9540d00a6168bb4e8b3a9b73c98c3c4e7b422180d550d177
                                  • Opcode Fuzzy Hash: 982ff0191f50bbd9cd411f2d5bf63d981ee67892c17860e9fb891ba62e1030d4
                                  • Instruction Fuzzy Hash: E6F06870684302B5E610AE768D07F6B6188974078AF50092ABD45EA1C3D6BDEA0C4A3E
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004901D2,?,?,00000000,00492628,?,0049035C,00000000,004903B0,?,?,00000000,00492628), ref: 004900EB
                                  • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049016E
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004901AA,?,00000000,?,00000000,004901D2,?,?,00000000,00492628,?,0049035C,00000000), ref: 00490186
                                  • FindClose.KERNEL32(000000FF,004901B1,004901AA,?,00000000,?,00000000,004901D2,?,?,00000000,00492628,?,0049035C,00000000,004903B0), ref: 004901A4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileFind$AttributesCloseFirstNext
                                  • String ID: isRS-$isRS-???.tmp
                                  • API String ID: 134685335-3422211394
                                  • Opcode ID: a0909815745651a6e29cf20bd8b781976d1d4314a862de6b75aa5fb42f452788
                                  • Instruction ID: aeb5e1c6dec8106b2d0d5562d2962c543317903ced43ff168440b54f7dc1d23c
                                  • Opcode Fuzzy Hash: a0909815745651a6e29cf20bd8b781976d1d4314a862de6b75aa5fb42f452788
                                  • Instruction Fuzzy Hash: E1318671A006186FDF14EF65CC42ACEBBBDDB49314F5184B7A808B32A1D7389F458E58
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,?,?,?,00000000,00476D36), ref: 00476AD1
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00476BE1,?,00000000,?,?,?,?,00000000,00476D36), ref: 00476BBD
                                  • FindClose.KERNEL32(000000FF,00476BE8,00476BE1,?,00000000,?,?,?,?,00000000,00476D36), ref: 00476BDB
                                  • FindFirstFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 00476C34
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$File$First$CloseNext
                                  • String ID:
                                  • API String ID: 2001080981-0
                                  • Opcode ID: e6f926a53b3c1e954d20b2074f6006038b3d4c05a9a49b0a12ac5ecd0ae4d054
                                  • Instruction ID: 14931f8a0e3cac93bb735ea196381e3f6523e98b7e5ca17cfb4e14f2e37d7476
                                  • Opcode Fuzzy Hash: e6f926a53b3c1e954d20b2074f6006038b3d4c05a9a49b0a12ac5ecd0ae4d054
                                  • Instruction Fuzzy Hash: 8F716F7090061DAFCF21EFA5CC41ADFBBB9EB49304F5184AAE408A7291D7399A45CF58
                                  APIs
                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00455271
                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00455298
                                  • SetForegroundWindow.USER32(?), ref: 004552A9
                                  • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00455574,?,00000000,004555B0), ref: 0045555F
                                  Strings
                                  • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004553E9
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessagePostWindow$ForegroundNtdllProc_
                                  • String ID: Cannot evaluate variable because [Code] isn't running yet
                                  • API String ID: 2236967946-3182603685
                                  • Opcode ID: 099e3b808230fa4ae78bad551a04f96312a8d2ac3e3a530bfd6b6edaffce8ff0
                                  • Instruction ID: 392021ee4ceeb38a924916f9eb287e4a04e01d199228d5f5cdfc091a65a304ea
                                  • Opcode Fuzzy Hash: 099e3b808230fa4ae78bad551a04f96312a8d2ac3e3a530bfd6b6edaffce8ff0
                                  • Instruction Fuzzy Hash: 2C91F134604604EFD701CF55C961F6ABBF5EB89701F2080BAF80497796D678AE04DF18
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00454454), ref: 00454350
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00454356
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                  • API String ID: 1646373207-3712701948
                                  • Opcode ID: 520f3e2607fe0fa08eb4d9a7f93f0e182fe4af2e7d12abdc28646ae8dc8ecfed
                                  • Instruction ID: 308890e583471f7d729b9dc2fcd7aa40e9e9c611359b8057d7b1245ba4b987a9
                                  • Opcode Fuzzy Hash: 520f3e2607fe0fa08eb4d9a7f93f0e182fe4af2e7d12abdc28646ae8dc8ecfed
                                  • Instruction Fuzzy Hash: E6318871A44259AFCF01DFA5C882AEEB7B8EF49704F508566F800F7252D63C5D49CB64
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0046F2BE,?,?,00000001,0049307C), ref: 0046F1C5
                                  • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0046F2BE,?,?,00000001,0049307C), ref: 0046F28A
                                  • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0046F2BE,?,?,00000001,0049307C), ref: 0046F298
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseFirstNext
                                  • String ID: unins$unins???.*
                                  • API String ID: 3541575487-1009660736
                                  • Opcode ID: 36003060cf21bb4efa049de99e7bc8982056908e5327694f5b5213cd553c9e96
                                  • Instruction ID: 3c9c22acd9639b612fd9d01020641e4b72dcc3c09d6e577180f12476a66c67e0
                                  • Opcode Fuzzy Hash: 36003060cf21bb4efa049de99e7bc8982056908e5327694f5b5213cd553c9e96
                                  • Instruction Fuzzy Hash: 2831D474600108AFDB50EB69D891ADEB7BCEF05308F5044F6E848E72A2E7399F458F19
                                  APIs
                                  • IsIconic.USER32(?), ref: 00417CB7
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417CD5
                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417D0B
                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D32
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$Placement$Iconic
                                  • String ID: ,
                                  • API String ID: 568898626-3772416878
                                  • Opcode ID: 1384c885decf350a388a6044328c4ef6f341b8841973c44ec72f33afddd09757
                                  • Instruction ID: 3ed2450f0a7179b47446a38646254312085a05cbd9a13da21c4f815be273b126
                                  • Opcode Fuzzy Hash: 1384c885decf350a388a6044328c4ef6f341b8841973c44ec72f33afddd09757
                                  • Instruction Fuzzy Hash: 26214CB16002089BDF10EF69D8C0ADA77A8AF48314F55856AFD18DF246D638E845CBA8
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001,00000000,0045F561), ref: 0045F3D5
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045F534,?,00000001,00000000,0045F561), ref: 0045F464
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045F516,?,00000000,?,00000000,0045F534,?,00000001,00000000,0045F561), ref: 0045F4F6
                                  • FindClose.KERNEL32(000000FF,0045F51D,0045F516,?,00000000,?,00000000,0045F534,?,00000001,00000000,0045F561), ref: 0045F510
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseErrorFirstModeNext
                                  • String ID:
                                  • API String ID: 4011626565-0
                                  • Opcode ID: cfbc6f39b4e8b5bcaa8efc0914daf560513fda0f474cccf54896c9a6300cb9d6
                                  • Instruction ID: e743b63e75f8199e1de71fb1591aa20c9e7e702e030350ab1363ce7340e32dce
                                  • Opcode Fuzzy Hash: cfbc6f39b4e8b5bcaa8efc0914daf560513fda0f474cccf54896c9a6300cb9d6
                                  • Instruction Fuzzy Hash: 48416870A00618AFCB11EF65DC45ADEB7B8EB48315F4044BAF804A7392D63C9E4D8E59
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001,00000000,0045FA07), ref: 0045F895
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045F9D2,?,00000001,00000000,0045FA07), ref: 0045F8DB
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045F9B4,?,00000000,?,00000000,0045F9D2,?,00000001,00000000,0045FA07), ref: 0045F990
                                  • FindClose.KERNEL32(000000FF,0045F9BB,0045F9B4,?,00000000,?,00000000,0045F9D2,?,00000001,00000000,0045FA07), ref: 0045F9AE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseErrorFirstModeNext
                                  • String ID:
                                  • API String ID: 4011626565-0
                                  • Opcode ID: 59525afeafe4148722d584f1d2047be4bc65e0fc6c60f27493fd8ef1fa6d9f1a
                                  • Instruction ID: b06fad13edd5318fdfd495eee050f4f7a9e8aa821ad8a724925d5bb9b3bb6141
                                  • Opcode Fuzzy Hash: 59525afeafe4148722d584f1d2047be4bc65e0fc6c60f27493fd8ef1fa6d9f1a
                                  • Instruction Fuzzy Hash: E1414471A00A18ABCB11EF65CC859DEB7B9EF88315F5044B6FC04E7341D7389E488E59
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,004516BB,00000000,004516DC), ref: 0042E6EE
                                  • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E719
                                  • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,004516BB,00000000,004516DC), ref: 0042E726
                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,004516BB,00000000,004516DC), ref: 0042E72E
                                  • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,004516BB,00000000,004516DC), ref: 0042E734
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                  • String ID:
                                  • API String ID: 1177325624-0
                                  • Opcode ID: f18602867fbc86e501edeea524c91156c3b3802428a683b191dd3457d48d53f0
                                  • Instruction ID: 1e70605f52ae136b2496113c77cf63f65d5ab7d673e450a7d96165da6ee8aff6
                                  • Opcode Fuzzy Hash: f18602867fbc86e501edeea524c91156c3b3802428a683b191dd3457d48d53f0
                                  • Instruction Fuzzy Hash: 85F0CD713917203AF620B17A6C82F7B428C8785B68F10823ABB04FF1C1D9A84C05056D
                                  APIs
                                  • IsIconic.USER32(?), ref: 0047C29A
                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 0047C2B8
                                  • ShowWindow.USER32(00000000,00000005,00000000,000000F0,00492F5C,0047BAE6,0047BB1A,00000000,0047BB3A,?,?,00000001,00492F5C), ref: 0047C2DA
                                  • ShowWindow.USER32(00000000,00000000,00000000,000000F0,00492F5C,0047BAE6,0047BB1A,00000000,0047BB3A,?,?,00000001,00492F5C), ref: 0047C2EE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$Show$IconicLong
                                  • String ID:
                                  • API String ID: 2754861897-0
                                  • Opcode ID: fed5852980bebdd882c35d2d98819e89d57ad67722e601b6875c178357f78e16
                                  • Instruction ID: fd372386a479fdc92fac3e2ef30eced7ce39e9e6ab59154070fbeb580aa605ee
                                  • Opcode Fuzzy Hash: fed5852980bebdd882c35d2d98819e89d57ad67722e601b6875c178357f78e16
                                  • Instruction Fuzzy Hash: E9017970E44245B6D710A7B5DD85FE633D56B15304F1840BFB8099B2A7CBBDCC42961C
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045DEF4), ref: 0045DE78
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045DED4,?,00000000,?,00000000,0045DEF4), ref: 0045DEB4
                                  • FindClose.KERNEL32(000000FF,0045DEDB,0045DED4,?,00000000,?,00000000,0045DEF4), ref: 0045DECE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseFirstNext
                                  • String ID:
                                  • API String ID: 3541575487-0
                                  • Opcode ID: a216a7bdbdee3682f527e071f5b1695ae15f696d728e6939e7ee4b5ef1c15c59
                                  • Instruction ID: 32c984a38fc023b26ff7fc855e6f7d071233f0675ee5b85f89907f23cc5ee99f
                                  • Opcode Fuzzy Hash: a216a7bdbdee3682f527e071f5b1695ae15f696d728e6939e7ee4b5ef1c15c59
                                  • Instruction Fuzzy Hash: D121DB31D046086EDB31EB65CC42ADEB7BCDF49705F5044B7EC08E6562D63C9D49CA18
                                  APIs
                                  • IsIconic.USER32(?), ref: 0042418C
                                  • SetActiveWindow.USER32(?,?,?,0046781F), ref: 00424199
                                    • Part of subcall function 004235F4: ShowWindow.USER32(004105F8,00000009,?,00000000,0041ED4C,004238E2,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423BB4), ref: 0042360F
                                    • Part of subcall function 00423ABC: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021925AC,004241B2,?,?,?,0046781F), ref: 00423AF7
                                  • SetFocus.USER32(00000000,?,?,?,0046781F), ref: 004241C6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$ActiveFocusIconicShow
                                  • String ID:
                                  • API String ID: 649377781-0
                                  • Opcode ID: abf3d26623ce3f5f1df30a1bb2ccc38e960545179f371c4c6c880d0d7118eb6a
                                  • Instruction ID: 9d7b97b1588b57ef25092538823a17ee25a728ca1780dde3acf0986de5f54100
                                  • Opcode Fuzzy Hash: abf3d26623ce3f5f1df30a1bb2ccc38e960545179f371c4c6c880d0d7118eb6a
                                  • Instruction Fuzzy Hash: 36F03A717001209BCB00AFAAECC5B9632A8AF18304B55017BBC08DF34BCABCDD5187A8
                                  APIs
                                  • IsIconic.USER32(?), ref: 00417CB7
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417CD5
                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417D0B
                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D32
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$Placement$Iconic
                                  • String ID:
                                  • API String ID: 568898626-0
                                  • Opcode ID: ccf45bac815ac9650c1eda7d7ee920735da51ae8acefeeb5a5ed1e1968a9009b
                                  • Instruction ID: 69af1cea5ab0db390c44c228a9afcc828c7f08346dc1f1cf855d2dc861a92e07
                                  • Opcode Fuzzy Hash: ccf45bac815ac9650c1eda7d7ee920735da51ae8acefeeb5a5ed1e1968a9009b
                                  • Instruction Fuzzy Hash: AF018471204104ABDB20EE69DCC1EEB77A8AF54324F158166FD0CCF246E639EC8187E8
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045123F,?,?,-00000001,00000000), ref: 00451219
                                  • GetLastError.KERNEL32(00000000,?,00000000,0045123F,?,?,-00000001,00000000), ref: 00451221
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorFileFindFirstLast
                                  • String ID:
                                  • API String ID: 873889042-0
                                  • Opcode ID: a602d2efdf960d6167be496792d274a39b8ae1fe5526e10b942367c2e78b3dad
                                  • Instruction ID: 48b66b5ea5a2bd036d7052275c493811c4e0670e4fb7de4650a4648509248124
                                  • Opcode Fuzzy Hash: a602d2efdf960d6167be496792d274a39b8ae1fe5526e10b942367c2e78b3dad
                                  • Instruction Fuzzy Hash: B0F0F971A04604AB8B10DB6AAC4249EB7ECDB45725B6046BBFC14F3292DA784E048559
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CaptureIconic
                                  • String ID:
                                  • API String ID: 2277910766-0
                                  • Opcode ID: 91823dd687394a4ed8ee48a39c45190aee43210de23b0732d742fca1e8511f91
                                  • Instruction ID: f3ef26a9ec4c3639b3254842bc08cf6d9feb289c2be9135b2bbb431e5f50db89
                                  • Opcode Fuzzy Hash: 91823dd687394a4ed8ee48a39c45190aee43210de23b0732d742fca1e8511f91
                                  • Instruction Fuzzy Hash: B6F03171315601ABD720962AC885AAB72B69F84319B14483BE41ACBB55EB78DCC58258
                                  APIs
                                  • IsIconic.USER32(?), ref: 00424143
                                    • Part of subcall function 00423A2C: EnumWindows.USER32(004239C4), ref: 00423A50
                                    • Part of subcall function 00423A2C: GetWindow.USER32(?,00000003), ref: 00423A65
                                    • Part of subcall function 00423A2C: GetWindowLongA.USER32(?,000000EC), ref: 00423A74
                                    • Part of subcall function 00423A2C: SetWindowPos.USER32(00000000,00424104,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,00424153,?,?,00423D1B), ref: 00423AAA
                                  • SetActiveWindow.USER32(?,?,?,00423D1B,00000000,00424104), ref: 00424157
                                    • Part of subcall function 004235F4: ShowWindow.USER32(004105F8,00000009,?,00000000,0041ED4C,004238E2,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423BB4), ref: 0042360F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$ActiveEnumIconicLongShowWindows
                                  • String ID:
                                  • API String ID: 2671590913-0
                                  • Opcode ID: 657f3c15db0d6cf34cada4c58ec239c69b7baa88831cd667e440955cb53f6524
                                  • Instruction ID: d512277381545323e1bd2a4b4845e65b82e595a2bd73893c0d57f68d30832658
                                  • Opcode Fuzzy Hash: 657f3c15db0d6cf34cada4c58ec239c69b7baa88831cd667e440955cb53f6524
                                  • Instruction Fuzzy Hash: B0E01AA1B0010097EB00EF69DCC9B9672A8BF58304F55017ABC0CCF24BD67CC8908724
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,0041277D), ref: 0041276B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: 84af43a7efb99244d046e7d510ceccf456a9c98264e621075b9ccc522f6ffcaf
                                  • Instruction ID: 0d09216766d9d5b385ece6e8cba1e36b912c6a1774b5342391935a21d5851d13
                                  • Opcode Fuzzy Hash: 84af43a7efb99244d046e7d510ceccf456a9c98264e621075b9ccc522f6ffcaf
                                  • Instruction Fuzzy Hash: 7551F431204205DFCB14DB6ADA81A9BF3E5FF98314B20817BE814C3791DBB8AC92C758
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00472422
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: a5a8acde2ea139e8bd48252c6c24868853d47a4937822392afe82ac5ea5e748c
                                  • Instruction ID: c3992268c3801ed1beac7631f2e5f9cad90702d4ee9162ede732c10c083e2767
                                  • Opcode Fuzzy Hash: a5a8acde2ea139e8bd48252c6c24868853d47a4937822392afe82ac5ea5e748c
                                  • Instruction Fuzzy Hash: 5F413575604108DFCB10CFA9D7809AAB7F5FB48310B25C996E848DB301D3BCEE41AB55
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 5296a1f906bcaa54e59ae334d9b19b6ea28d15cb2d3d13e924c6b19246622dfc
                                  • Instruction ID: 059ce6dee4a85458501d0894a56d11df68a23133cc4b2401fd590ab7d757c589
                                  • Opcode Fuzzy Hash: 5296a1f906bcaa54e59ae334d9b19b6ea28d15cb2d3d13e924c6b19246622dfc
                                  • Instruction Fuzzy Hash: 5AD0C2B120420053C701AE68DC8269B358C8B84316F10483E7CC6DA2C3E67DDF48A75A
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042ED54
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: 1618573b336cfe43e6365c49c1add1a31867e84e149d2e83090908c597df2fde
                                  • Instruction ID: 530d004986d911579cf02e8422d66cb1dcb863e7172150f09f51376a0a0a5638
                                  • Opcode Fuzzy Hash: 1618573b336cfe43e6365c49c1add1a31867e84e149d2e83090908c597df2fde
                                  • Instruction Fuzzy Hash: 64D0A77121010DAFCB00DE9AE840D6F33ACEB88700BA0C806F518C7201C234EC108BB4
                                  APIs
                                    • Part of subcall function 004695AC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,?,0049307C,?,004697A3,?,00000000,00469BEA,?,_is1), ref: 004695CF
                                  • RegCloseKey.ADVAPI32(?,00469BF1,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,00469C39,?,?,00000001,0049307C), ref: 00469BE4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseValue
                                  • String ID: " /SILENT$5.2.3$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                  • API String ID: 3132538880-1148470211
                                  • Opcode ID: 1a066fec2956ed7fb3ca26c1169ca7e0e404097702973f26aff6aed69efbdb2c
                                  • Instruction ID: b10ae86822701baf94b0909050c6c73479acdbc000c85b0031fe9b3e7e797c5a
                                  • Opcode Fuzzy Hash: 1a066fec2956ed7fb3ca26c1169ca7e0e404097702973f26aff6aed69efbdb2c
                                  • Instruction Fuzzy Hash: BEE13475A00109ABCB04EF55D98199F73BDEB44304F60847BE4056B395EBB9BE01CB6E
                                  APIs
                                  • CreateMutexA.KERNEL32(00491A74,00000001,00000000,00000000,004562D1,?,?,?,00000001,?,004564EB,00000000,00456501,?,00000000,00492628), ref: 00455FE9
                                  • CreateFileMappingA.KERNEL32(000000FF,00491A74,00000004,00000000,00002018,00000000), ref: 00456021
                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,004562A7,?,00491A74,00000001,00000000,00000000,004562D1,?,?,?), ref: 00456048
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456155
                                  • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,004562A7,?,00491A74,00000001,00000000,00000000,004562D1), ref: 004560AD
                                    • Part of subcall function 00451C18: GetLastError.KERNEL32(00000000,00452689,00000005,00000000,004526BE,?,?,00000000,00492628,00000004,00000000,00000000,00000000,?,00490395,00000000), ref: 00451C1B
                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045616C
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004561A5
                                  • GetLastError.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004561B7
                                  • UnmapViewOfFile.KERNEL32(00000000,004562AE,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456289
                                  • CloseHandle.KERNEL32(00000000,004562AE,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456298
                                  • CloseHandle.KERNEL32(00000000,004562AE,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004562A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                  • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp$dE
                                  • API String ID: 4012871263-2761909193
                                  • Opcode ID: 83662bab74edad31f8ddda3ae7b32a3842f160b385c6df833838aa9f7605bd42
                                  • Instruction ID: f83b799fad480325abbebf32ce7824c881fe6810fb4ea4fb229400168c5a50eb
                                  • Opcode Fuzzy Hash: 83662bab74edad31f8ddda3ae7b32a3842f160b385c6df833838aa9f7605bd42
                                  • Instruction Fuzzy Hash: E0918070A402149FDF10EBA9C841B9EB7B4EB48305F91856BF814EB393DB789948CF59
                                  APIs
                                  • GetVersion.KERNEL32(?,00418F98,00000000,?,?,?,00000001), ref: 0041F0CE
                                  • SetErrorMode.KERNEL32(00008000,?,00418F98,00000000,?,?,?,00000001), ref: 0041F0EA
                                  • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F98,00000000,?,?,?,00000001), ref: 0041F0F6
                                  • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F98,00000000,?,?,?,00000001), ref: 0041F104
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F134
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F15D
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F172
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F187
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F19C
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F1B1
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F1C6
                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1DB
                                  • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1F0
                                  • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F205
                                  • FreeLibrary.KERNEL32(00000001,?,00418F98,00000000,?,?,?,00000001), ref: 0041F217
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                  • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                  • API String ID: 2323315520-3614243559
                                  • Opcode ID: 39377f19203999d82cec5eda0a213dd08459800d8dedc3050573d9428b858516
                                  • Instruction ID: 9ff2825c27a268439dd1d1bb46a0bfc7fca62d380631be57860753cffe2250cf
                                  • Opcode Fuzzy Hash: 39377f19203999d82cec5eda0a213dd08459800d8dedc3050573d9428b858516
                                  • Instruction Fuzzy Hash: C4310DB5600701FBDB00EBF5AC86A763298B768764746093BB109DB1B2E77D484ACB1D
                                  Strings
                                  • Uninstall DAT: , xrefs: 0048F242
                                  • utCompiledCode[1] is invalid, xrefs: 0048F3BF
                                  • Install was done in 64-bit mode but not running 64-bit Windows now, xrefs: 0048F3F9
                                  • Setup version: Inno Setup version 5.2.3, xrefs: 0048F215
                                  • InitializeUninstall, xrefs: 0048F53E
                                  • Will not restart Windows automatically., xrefs: 0048F7F2
                                  • Original Uninstall EXE: , xrefs: 0048F21F
                                  • Removed all? %s, xrefs: 0048F648
                                  • DeinitializeUninstall, xrefs: 0048F888
                                  • UninstallNeedRestart, xrefs: 0048F67E, 0048F6B7
                                  • Uninstall command line: , xrefs: 0048F265
                                  • Will restart because UninstallNeedRestart returned True., xrefs: 0048F6CE
                                  • Need to restart Windows? %s, xrefs: 0048F71F
                                  • Cannot find utCompiledCode record for this version of the uninstaller, xrefs: 0048F391
                                  • Uninstall, xrefs: 0048F1C8
                                  • InitializeUninstall returned False; aborting., xrefs: 0048F576
                                  • Not calling UninstallNeedRestart because a restart has already been deemed necessary., xrefs: 0048F6FD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$Long$Show
                                  • String ID: Cannot find utCompiledCode record for this version of the uninstaller$DeinitializeUninstall$InitializeUninstall$InitializeUninstall returned False; aborting.$Install was done in 64-bit mode but not running 64-bit Windows now$Need to restart Windows? %s$Not calling UninstallNeedRestart because a restart has already been deemed necessary.$Original Uninstall EXE: $Removed all? %s$Setup version: Inno Setup version 5.2.3$Uninstall$Uninstall DAT: $Uninstall command line: $UninstallNeedRestart$Will not restart Windows automatically.$Will restart because UninstallNeedRestart returned True.$utCompiledCode[1] is invalid
                                  • API String ID: 3609083571-2151202259
                                  • Opcode ID: 17d8b5f42ab7f82cb7451de9c533369e7edc4c53996bed38a7280d377b86ce4a
                                  • Instruction ID: 2b269d8c764b7bac30a443b9f4bc23fd7acbfe7da633e0682c37f6fe37a00802
                                  • Opcode Fuzzy Hash: 17d8b5f42ab7f82cb7451de9c533369e7edc4c53996bed38a7280d377b86ce4a
                                  • Instruction Fuzzy Hash: 2C12B234A00244AFD711FF65D842B5E7BA1AB5A709F50487BF800AB3A6CB7C9D49CB1D
                                  APIs
                                  • 73A1A570.USER32(00000000,?,0041A8EC,?), ref: 0041C9E8
                                  • 73A24C40.GDI32(?,00000000,?,0041A8EC,?), ref: 0041C9F4
                                  • 73A26180.GDI32(0041A8EC,?,00000001,00000001,00000000,00000000,0041CC0A,?,?,00000000,?,0041A8EC,?), ref: 0041CA18
                                  • 73A24C00.GDI32(?,0041A8EC,?,00000000,0041CC0A,?,?,00000000,?,0041A8EC,?), ref: 0041CA28
                                  • SelectObject.GDI32(0041CDE4,00000000), ref: 0041CA43
                                  • FillRect.USER32(0041CDE4,?,?), ref: 0041CA7E
                                  • SetTextColor.GDI32(0041CDE4,00000000), ref: 0041CA93
                                  • SetBkColor.GDI32(0041CDE4,00000000), ref: 0041CAAA
                                  • PatBlt.GDI32(0041CDE4,00000000,00000000,0041A8EC,?,00FF0062), ref: 0041CAC0
                                  • 73A24C40.GDI32(?,00000000,0041CBC3,?,0041CDE4,00000000,?,0041A8EC,?,00000000,0041CC0A,?,?,00000000,?,0041A8EC), ref: 0041CAD3
                                  • SelectObject.GDI32(00000000,00000000), ref: 0041CB04
                                  • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CBB2,?,?,00000000,0041CBC3,?,0041CDE4,00000000,?,0041A8EC), ref: 0041CB1C
                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CBB2,?,?,00000000,0041CBC3,?,0041CDE4,00000000,?), ref: 0041CB25
                                  • 73A18830.GDI32(0041CDE4,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CBB2,?,?,00000000,0041CBC3), ref: 0041CB34
                                  • 73A122A0.GDI32(0041CDE4,0041CDE4,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CBB2,?,?,00000000,0041CBC3), ref: 0041CB3D
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041CB56
                                  • SetBkColor.GDI32(00000000,00000000), ref: 0041CB6D
                                  • 73A24D40.GDI32(0041CDE4,00000000,00000000,0041A8EC,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CBB2,?,?,00000000), ref: 0041CB89
                                  • SelectObject.GDI32(00000000,?), ref: 0041CB96
                                  • DeleteDC.GDI32(00000000), ref: 0041CBAC
                                    • Part of subcall function 0041A000: GetSysColor.USER32(?), ref: 0041A00A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                  • String ID:
                                  • API String ID: 1381628555-0
                                  • Opcode ID: c8262b5c9687899cb3da658a9da79215068cbf101d5c2b8ed1964b5729b21c16
                                  • Instruction ID: ff179a34f285c3436bc621bb31859736a2280516ecfda4d40c06e70735cb6950
                                  • Opcode Fuzzy Hash: c8262b5c9687899cb3da658a9da79215068cbf101d5c2b8ed1964b5729b21c16
                                  • Instruction Fuzzy Hash: 8E61DE71A44608ABDF10EBE9DC86FDFB7B8EF48704F10446AF504E7281D67CA9408B69
                                  APIs
                                  • AllocateAndInitializeSid.ADVAPI32(00491788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DEE6
                                  • GetVersion.KERNEL32(00000000,0042E090,?,00491788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF03
                                  • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E090,?,00491788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF1C
                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DF22
                                  • FreeSid.ADVAPI32(00000000,0042E097,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E08A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressAllocateFreeHandleInitializeModuleProcVersion
                                  • String ID: CheckTokenMembership$advapi32.dll
                                  • API String ID: 1717332306-1888249752
                                  • Opcode ID: 5f5c98329cab989edc111d9b036305000fa4ba23c93f54e06945bc06275b7e1f
                                  • Instruction ID: c9ca30b7fa2e8a9abceabce4e586e827254369ae75abf0d5bc05731ff3bd77e9
                                  • Opcode Fuzzy Hash: 5f5c98329cab989edc111d9b036305000fa4ba23c93f54e06945bc06275b7e1f
                                  • Instruction Fuzzy Hash: 2B51C571B44625AEDB10EAF69D42F7F7BACDB09704F94087BB600E7282C5BC9805866D
                                  APIs
                                  • ShowWindow.USER32(?,00000005,00000000,00490758,?,?,00000000,?,00000000,00000000,?,00490A99,00000000,00490AA3,?,00000000), ref: 00490443
                                  • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00490758,?,?,00000000,?,00000000,00000000,?,00490A99,00000000), ref: 00490456
                                  • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00490758,?,?,00000000,?,00000000,00000000), ref: 00490466
                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00490487
                                  • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00490758,?,?,00000000,?,00000000), ref: 00490497
                                    • Part of subcall function 0042D330: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3BE,?,?,00000000,?,?,0048FE54,00000000,0049001D,?,?,00000005), ref: 0042D365
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                  • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                  • API String ID: 2000705611-3672972446
                                  • Opcode ID: 3699ef8ba76cb401735b22bcdb05d11d0a8b461a6bb93247a14510d4b066adbb
                                  • Instruction ID: 6666ff25eec7c53b5eb866eda449138b93a1580bdca8663c56f4b5746ffc9271
                                  • Opcode Fuzzy Hash: 3699ef8ba76cb401735b22bcdb05d11d0a8b461a6bb93247a14510d4b066adbb
                                  • Instruction Fuzzy Hash: 4E91C430A04244AFDF11EBA5C852BAF7BB4EB49314F5144B7F900AB692C77CAC15CB69
                                  APIs
                                  • GetLastError.KERNEL32(00000000,00458252,?,?,?,?,?,00000006,?,00000000,0048F8FB,?,00000000,0048F996), ref: 00458104
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: .chm$.chw$.fts$.gid$.hlp$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                  • API String ID: 1452528299-1593206319
                                  • Opcode ID: 65522557b16a1cbde8cdd02fe37cdddf060d0912458871050b3dee5c91aa5157
                                  • Instruction ID: f32569dbdd6adc11da929e147044c40dcc52494f0e71e5ec630e07cd073e3049
                                  • Opcode Fuzzy Hash: 65522557b16a1cbde8cdd02fe37cdddf060d0912458871050b3dee5c91aa5157
                                  • Instruction Fuzzy Hash: 666192307046449BDB00EB6988517AE7BA4AB49715F5184AFFC01EB383CF7C9E49CB59
                                  APIs
                                  • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B36B
                                  • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B375
                                  • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B387
                                  • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B39E
                                  • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3AA
                                  • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B403,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3D7
                                  • 73A1A480.USER32(00000000,00000000,0041B40A,00000000,0041B403,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3FD
                                  • SelectObject.GDI32(00000000,?), ref: 0041B418
                                  • SelectObject.GDI32(?,00000000), ref: 0041B427
                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B453
                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B461
                                  • SelectObject.GDI32(?,00000000), ref: 0041B46F
                                  • DeleteDC.GDI32(00000000), ref: 0041B478
                                  • DeleteDC.GDI32(?), ref: 0041B481
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Object$Select$Delete$A26180A480A570Stretch
                                  • String ID:
                                  • API String ID: 359944910-0
                                  • Opcode ID: e92431f9581d06db8cd21544c0e7e04c7f7b808437c697100934415fbb48ef82
                                  • Instruction ID: f97b2a76bc4940b7567ba323b4cd0a089c72401e81ca6e31c969396a69b82abf
                                  • Opcode Fuzzy Hash: e92431f9581d06db8cd21544c0e7e04c7f7b808437c697100934415fbb48ef82
                                  • Instruction Fuzzy Hash: 4941BF71E40609AFDF10DAE9D846FEFB7B8EB08704F104466B614FB281C77869418BA4
                                  APIs
                                    • Part of subcall function 0042C6FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C720
                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0046CFF7
                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046D0EA
                                  • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0046D100
                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046D125
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                  • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                  • API String ID: 971782779-3668018701
                                  • Opcode ID: 15655358d0d1de2a64c2a888f53485090e8f4bbb5d0d251c73c18022aa3e10a2
                                  • Instruction ID: 7241237f7b2753aa4bad096b30eb67052993fe11f1c9b15bd1d8ff4051f223ab
                                  • Opcode Fuzzy Hash: 15655358d0d1de2a64c2a888f53485090e8f4bbb5d0d251c73c18022aa3e10a2
                                  • Instruction Fuzzy Hash: E5D10174E002499FDB01EF99D885BDDBBF5AF08318F14406AF804B7392D678AE45CB69
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegQueryValueExA.ADVAPI32(0045841A,00000000,00000000,?,00000000,?,00000000,00453145,?,0045841A,00000003,00000000,00000000,0045317C), ref: 00452FC5
                                    • Part of subcall function 0042E660: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004519EF,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E67F
                                  • RegQueryValueExA.ADVAPI32(0045841A,00000000,00000000,00000000,?,00000004,00000000,0045308F,?,0045841A,00000000,00000000,?,00000000,?,00000000), ref: 00453049
                                  • RegQueryValueExA.ADVAPI32(0045841A,00000000,00000000,00000000,?,00000004,00000000,0045308F,?,0045841A,00000000,00000000,?,00000000,?,00000000), ref: 00453078
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452EE3
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452F1C
                                  • , xrefs: 00452F36
                                  • RegOpenKeyEx, xrefs: 00452F48
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: QueryValue$FormatMessageOpen
                                  • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                  • API String ID: 2812809588-1577016196
                                  • Opcode ID: e1411df6ceafc0478c986fe7b9f71ee5aec4cc66ec50f85e14bddc139ce29aae
                                  • Instruction ID: 928035bd272ea07f578a002d221a9efba8d97d5daeae889991e526f08aa7b5e3
                                  • Opcode Fuzzy Hash: e1411df6ceafc0478c986fe7b9f71ee5aec4cc66ec50f85e14bddc139ce29aae
                                  • Instruction Fuzzy Hash: 70913671E00208ABDB10DFA5D941BDEB7F9EB49746F10446BF900F7282D6789E098B69
                                  APIs
                                  • CloseHandle.KERNEL32(?), ref: 00456B6B
                                  • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00456B87
                                  • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00456B95
                                  • GetExitCodeProcess.KERNEL32(?), ref: 00456BA6
                                  • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00456BED
                                  • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00456C09
                                  Strings
                                  • Helper process exited, but failed to get exit code., xrefs: 00456BDF
                                  • Stopping 64-bit helper process. (PID: %u), xrefs: 00456B5D
                                  • Helper isn't responding; killing it., xrefs: 00456B77
                                  • Helper process exited., xrefs: 00456BB5
                                  • Helper process exited with failure code: 0x%x, xrefs: 00456BD3
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                  • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                  • API String ID: 3355656108-1243109208
                                  • Opcode ID: 77dbf362da9f19e54cd8de27c356b651535bcd490225afbe62cf3a86257faec4
                                  • Instruction ID: 9d7a733ba7e4b400d55abe2d76827c4ec82c7121443a5166b5708a03c4d9d847
                                  • Opcode Fuzzy Hash: 77dbf362da9f19e54cd8de27c356b651535bcd490225afbe62cf3a86257faec4
                                  • Instruction Fuzzy Hash: 37217C70604B009ADB20E779C446B5BB7D49F08315F81882FB8D9CB293D67CF8488B6A
                                  APIs
                                    • Part of subcall function 0042DC0C: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC38
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00452D37,?,00000000,00452DFB), ref: 00452C87
                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00452D37,?,00000000,00452DFB), ref: 00452DC3
                                    • Part of subcall function 0042E660: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004519EF,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E67F
                                  Strings
                                  • RegCreateKeyEx, xrefs: 00452BFB
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452B9F
                                  • , xrefs: 00452BE9
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00452BCF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateFormatMessageQueryValue
                                  • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                  • API String ID: 2481121983-1280779767
                                  • Opcode ID: 6f124a48ecf100d3e8553b578cd000851431d6a6b6a63acb158ce1470409b43d
                                  • Instruction ID: 541388b9b65ddcc629600b839954f269b6f8816a0d78520760673cf251dcd2db
                                  • Opcode Fuzzy Hash: 6f124a48ecf100d3e8553b578cd000851431d6a6b6a63acb158ce1470409b43d
                                  • Instruction Fuzzy Hash: A381ED75A00209ABDB01DFD5D941BEEB7B9EF49305F50442BF900F7282D778AA09CB69
                                  APIs
                                    • Part of subcall function 00452038: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048EF85,_iu,?,00000000,00452172), ref: 00452127
                                    • Part of subcall function 00452038: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048EF85,_iu,?,00000000,00452172), ref: 00452137
                                  • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0048EE31
                                  • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,0048EF85), ref: 0048EE52
                                  • CreateWindowExA.USER32(00000000,STATIC,0048EF94,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0048EE79
                                  • SetWindowLongA.USER32(?,000000FC,0048E60C), ref: 0048EE8C
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,0048EF58,?,?,000000FC,0048E60C,00000000,STATIC,0048EF94), ref: 0048EEBC
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0048EF30
                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,0048EF58,?,?,000000FC,0048E60C,00000000), ref: 0048EF3C
                                    • Part of subcall function 00452388: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0045246F
                                  • 73A25CF0.USER32(?,0048EF5F,00000000,00000000,00000000,00000000,00000000,00000097,00000000,0048EF58,?,?,000000FC,0048E60C,00000000,STATIC), ref: 0048EF52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                  • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                  • API String ID: 170458502-2312673372
                                  • Opcode ID: d286ce31f0742afd55fe71401d241f91e74279016cdde02258f129c258f02059
                                  • Instruction ID: 899c3a807d8ebef90b2c1b053718f2bfa0ca9862065cd7989ddb6901344ff065
                                  • Opcode Fuzzy Hash: d286ce31f0742afd55fe71401d241f91e74279016cdde02258f129c258f02059
                                  • Instruction Fuzzy Hash: 3E415370A44248BFDB00FBA6DD42F9E77B8EB19704F50497AF604F72D1D6799A008B58
                                  APIs
                                  • GetActiveWindow.USER32 ref: 0045E0CC
                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0045E0E0
                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0045E0ED
                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0045E0FA
                                  • GetWindowRect.USER32(?,00000000), ref: 0045E146
                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 0045E184
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                  • API String ID: 2610873146-3407710046
                                  • Opcode ID: 73036e16f42da6acd576e16728c400c4a88c57da147c7a5b0db3527e42c6b991
                                  • Instruction ID: ef411939a0946b870fd052df56d83547aac6ed7b4a766e15f820ec3551d64de0
                                  • Opcode Fuzzy Hash: 73036e16f42da6acd576e16728c400c4a88c57da147c7a5b0db3527e42c6b991
                                  • Instruction Fuzzy Hash: CE21D475705B04AFD3149669CD81F3F3299DB88B11F08453AFD44DB382DA78DD068AA9
                                  APIs
                                  • GetActiveWindow.USER32 ref: 0042EA6C
                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042EA80
                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042EA8D
                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042EA9A
                                  • GetWindowRect.USER32(?,00000000), ref: 0042EAE6
                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042EB24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                  • API String ID: 2610873146-3407710046
                                  • Opcode ID: a4cb5d69fce430bae7c1880873c7e2b8c2455fe2b3b354cb8798867c4811814b
                                  • Instruction ID: de6f8a07dda85d31b5a5cc2262033447bbfd7554ac1e79db9a4c9fe52e5b2086
                                  • Opcode Fuzzy Hash: a4cb5d69fce430bae7c1880873c7e2b8c2455fe2b3b354cb8798867c4811814b
                                  • Instruction Fuzzy Hash: 2A21C271701614AFD700EA79DCD1F3B3B98DB88710F48452AF945DB382DA78FC008AA9
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(00492420,00000000,00401B68), ref: 00401ABD
                                  • LocalFree.KERNEL32(005A2550,00000000,00401B68), ref: 00401ACF
                                  • VirtualFree.KERNEL32(?,00000000,00008000,005A2550,00000000,00401B68), ref: 00401AEE
                                  • LocalFree.KERNEL32(005A3550,?,00000000,00008000,005A2550,00000000,00401B68), ref: 00401B2D
                                  • RtlLeaveCriticalSection.KERNEL32(00492420,00401B6F), ref: 00401B58
                                  • RtlDeleteCriticalSection.KERNEL32(00492420,00401B6F), ref: 00401B62
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                  • String ID: $;Z$P%Z$P5Z$t;Z
                                  • API String ID: 3782394904-2626233235
                                  • Opcode ID: 13d60d6258edcbf522f01d7291c019f1f170a7a552ba6335bbe69aef08fb1927
                                  • Instruction ID: fb38efb60124e33bd0d6d544a4e8ce278d04d8a52801059130394851150c0a80
                                  • Opcode Fuzzy Hash: 13d60d6258edcbf522f01d7291c019f1f170a7a552ba6335bbe69aef08fb1927
                                  • Instruction Fuzzy Hash: C611BF30A017407AEB15AB659E82F263BE8A76170CF44007BF40067AF2D7FC9840C7AE
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00456EEB,?,00000000,00456F4E,?,?,02193858,00000000), ref: 00456D69
                                  • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00002034,00000014,02193858,?,00000000,00456E80,?,00000000,00000001,00000000,00000000,00000000,00456EEB), ref: 00456DC6
                                  • GetLastError.KERNEL32(?,-00000020,0000000C,-00002034,00000014,02193858,?,00000000,00456E80,?,00000000,00000001,00000000,00000000,00000000,00456EEB), ref: 00456DD3
                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00456E1F
                                  • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00456E59,?,-00000020,0000000C,-00002034,00000014,02193858,?,00000000,00456E80,?,00000000), ref: 00456E45
                                  • GetLastError.KERNEL32(?,?,00000000,00000001,00456E59,?,-00000020,0000000C,-00002034,00000014,02193858,?,00000000,00456E80,?,00000000), ref: 00456E4C
                                    • Part of subcall function 00451C18: GetLastError.KERNEL32(00000000,00452689,00000005,00000000,004526BE,?,?,00000000,00492628,00000004,00000000,00000000,00000000,?,00490395,00000000), ref: 00451C1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                  • String ID: CreateEvent$TransactNamedPipe
                                  • API String ID: 2182916169-3012584893
                                  • Opcode ID: 48229fdc3ef61929d6ac761d7619ebca0006deda708ad69f0594bdf8de0f3da7
                                  • Instruction ID: 3505877414f257bb21a012f26b9d0d7704acec035ae139655f100219df004d2f
                                  • Opcode Fuzzy Hash: 48229fdc3ef61929d6ac761d7619ebca0006deda708ad69f0594bdf8de0f3da7
                                  • Instruction Fuzzy Hash: 6C41C275A00208AFDB05DF95CD82F9EB7F9FB08714F5140AAF904E7292C6789E44CB68
                                  APIs
                                  • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00454C91,?,?,00000031,?), ref: 00454B54
                                  • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00454B5A
                                  • LoadTypeLib.OLEAUT32(00000000,?), ref: 00454BA7
                                    • Part of subcall function 00451C18: GetLastError.KERNEL32(00000000,00452689,00000005,00000000,004526BE,?,?,00000000,00492628,00000004,00000000,00000000,00000000,?,00490395,00000000), ref: 00451C1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressErrorHandleLastLoadModuleProcType
                                  • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                  • API String ID: 1914119943-2711329623
                                  • Opcode ID: 267718d7f289f145d4860ce98bfa165204caeedbe32666a38feb01051b1adf5e
                                  • Instruction ID: e4400bf96c166b5c8e97fc258379556c86f091726ab19f10260670aaeab998db
                                  • Opcode Fuzzy Hash: 267718d7f289f145d4860ce98bfa165204caeedbe32666a38feb01051b1adf5e
                                  • Instruction Fuzzy Hash: 3831B475600604AFDB12EFAACC01E5BB7B9EBC870971144AAF814DB752DA38D984C628
                                  APIs
                                  • GetActiveWindow.USER32 ref: 0042EDA7
                                  • GetFocus.USER32 ref: 0042EDAF
                                  • RegisterClassA.USER32(004917AC), ref: 0042EDD0
                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042EEA4,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042EE0E
                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042EE54
                                  • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042EE65
                                  • SetFocus.USER32(00000000,00000000,0042EE87,?,?,?,00000001,00000000,?,004564AE,00000000,00492628), ref: 0042EE6C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                  • String ID: (&I$TWindowDisabler-Window
                                  • API String ID: 3167913817-491212620
                                  • Opcode ID: c97347664f234b384af7137d1076830138c21674df7d1872669ff5baeb9184fc
                                  • Instruction ID: 82027174cfd9f418450fe8ca69ab33f3320fea0b1784bdf35dac21ea3b2746f1
                                  • Opcode Fuzzy Hash: c97347664f234b384af7137d1076830138c21674df7d1872669ff5baeb9184fc
                                  • Instruction Fuzzy Hash: E0218171740710BAE710EB62ED02F1B76A8EB04B04F62453BF604AB6D1D7B86D50C6ED
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E369,?,?,00000001,00000000,?,?,00000001,00000000,00000002,00000000,0047A008), ref: 0042E28D
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E293
                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E369,?,?,00000001,00000000,?,?,00000001), ref: 0042E2E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressCloseHandleModuleProc
                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                  • API String ID: 4190037839-2401316094
                                  • Opcode ID: 483f878939a1d75b5fa373088ebdec22d0b5c61e1835e4ed4c89f0f78693b90c
                                  • Instruction ID: b5527917e10b0fb8c326f7aa8ff769b2caa43ea40ee794feba058f86ebb39bc0
                                  • Opcode Fuzzy Hash: 483f878939a1d75b5fa373088ebdec22d0b5c61e1835e4ed4c89f0f78693b90c
                                  • Instruction Fuzzy Hash: 0C215334B00219EBDB00EBA7DC55A9F77A9EB44705FA0447BA900E7291DBBC9A05CB5C
                                  APIs
                                  • RtlInitializeCriticalSection.KERNEL32(00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                  • RtlEnterCriticalSection.KERNEL32(00492420,00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                  • LocalAlloc.KERNEL32(00000000,00000FF8,00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                  • RtlLeaveCriticalSection.KERNEL32(00492420,00401A89,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                  • String ID: $;Z$P%Z$`$I$`$I$t;Z
                                  • API String ID: 730355536-1610350602
                                  • Opcode ID: 45966a33f2cca9af6227f06f99b0f7a08db919fa22154029dacd4e349c8f896d
                                  • Instruction ID: 60313ebd75f34371d34e31ab956689d8a0b747d94a089b2a958688c132db86d3
                                  • Opcode Fuzzy Hash: 45966a33f2cca9af6227f06f99b0f7a08db919fa22154029dacd4e349c8f896d
                                  • Instruction Fuzzy Hash: AA01C0706452407EFB1AAB6A9A06B263ED8E795748F11803BF440A6AF1C6FC4840CB6D
                                  APIs
                                  • RectVisible.GDI32(?,?), ref: 00416DBB
                                  • SaveDC.GDI32(?), ref: 00416DCF
                                  • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416DF2
                                  • RestoreDC.GDI32(?,?), ref: 00416E0D
                                  • CreateSolidBrush.GDI32(00000000), ref: 00416E8D
                                  • FrameRect.USER32(?,?,?), ref: 00416EC0
                                  • DeleteObject.GDI32(?), ref: 00416ECA
                                  • CreateSolidBrush.GDI32(00000000), ref: 00416EDA
                                  • FrameRect.USER32(?,?,?), ref: 00416F0D
                                  • DeleteObject.GDI32(?), ref: 00416F17
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                  • String ID:
                                  • API String ID: 375863564-0
                                  • Opcode ID: 9eaa094af12716ba6a712ed9638624616ca55e3879d61aed165e71946b14b20b
                                  • Instruction ID: b1e82343d8b9ba510e891f63597e6edb4555071dc73553b60de04657c1de1759
                                  • Opcode Fuzzy Hash: 9eaa094af12716ba6a712ed9638624616ca55e3879d61aed165e71946b14b20b
                                  • Instruction Fuzzy Hash: 32513C712086445FDB50EF69C8C0B9B77E8AF48314F15466AFD48CB286C778EC81CB99
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                  • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                  • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                  • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                  • String ID:
                                  • API String ID: 1694776339-0
                                  • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                  • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                  • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                  • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                  APIs
                                  • GetSystemMenu.USER32(00000000,00000000), ref: 004221DB
                                  • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004221F9
                                  • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422206
                                  • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422213
                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422220
                                  • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 0042222D
                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 0042223A
                                  • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 00422247
                                  • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 00422265
                                  • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422281
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu$Delete$EnableItem$System
                                  • String ID:
                                  • API String ID: 3985193851-0
                                  • Opcode ID: 2ac919316b1e548bcce60f4eb3ccb73fb66cb5d1796470b9090fa35795744f24
                                  • Instruction ID: 142bb334ff85b79c2121110e2d141a600bd35af2d4b4289324417f29a70e323f
                                  • Opcode Fuzzy Hash: 2ac919316b1e548bcce60f4eb3ccb73fb66cb5d1796470b9090fa35795744f24
                                  • Instruction Fuzzy Hash: 802136703457457BE720D725DD8BFAB7AD89B08708F0440A5B6447F2D3C6FDEA4086A8
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000), ref: 0047A6B8
                                  • FreeLibrary.KERNEL32(00000000), ref: 0047A6CC
                                  • SendNotifyMessageA.USER32(0001043A,00000496,00002710,00000000), ref: 0047A731
                                  Strings
                                  • Not restarting Windows because Setup is being run from the debugger., xrefs: 0047A6ED
                                  • DeinitializeSetup, xrefs: 0047A5C9
                                  • Restarting Windows., xrefs: 0047A70C
                                  • Deinitializing Setup., xrefs: 0047A52E
                                  • GetCustomSetupExitCode, xrefs: 0047A56D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FreeLibrary$MessageNotifySend
                                  • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                  • API String ID: 3817813901-1884538726
                                  • Opcode ID: 7f94562b06cf16aec7fed6c22f1f9bdc246657c7fdb5891cc2b878ec11392670
                                  • Instruction ID: f287f9a6f42f295c8f4485c9d1258599c6f04b79e283e83c7e33560143f14427
                                  • Opcode Fuzzy Hash: 7f94562b06cf16aec7fed6c22f1f9bdc246657c7fdb5891cc2b878ec11392670
                                  • Instruction Fuzzy Hash: 8C51D034600200AFD315DF65D885B9EBBA4FB9A315F61C4BBE808C73A1CB389D55CB5A
                                  APIs
                                    • Part of subcall function 0042CAA4: CharPrevA.USER32(?,00000000,?,00000001,?,?,0042CBD2,00000000,0042CBF8,?,00000001,?,?,00000000,?,0042CC4A), ref: 0042CACC
                                  • SHGetMalloc.SHELL32(?), ref: 0045CE2B
                                  • GetActiveWindow.USER32 ref: 0045CE8F
                                  • CoInitialize.OLE32(00000000), ref: 0045CEA3
                                  • SHBrowseForFolder.SHELL32(?), ref: 0045CEBA
                                  • 756CD120.OLE32(0045CEFB,00000000,?,?,?,?,?,00000000,0045CF7F), ref: 0045CECF
                                  • SetActiveWindow.USER32(?,0045CEFB,00000000,?,?,?,?,?,00000000,0045CF7F), ref: 0045CEE5
                                  • SetActiveWindow.USER32(?,?,0045CEFB,00000000,?,?,?,?,?,00000000,0045CF7F), ref: 0045CEEE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ActiveWindow$BrowseCharD120FolderInitializeMallocPrev
                                  • String ID: A
                                  • API String ID: 2093991911-3554254475
                                  • Opcode ID: a57be843ccaacac0a46b99ad4989412c07f02d64ca0905ed98f03eef16ad0010
                                  • Instruction ID: 44e22db6f723d0e43817c9017cb3acb801a4f8e8d8f4fd9594430335e44c7cfb
                                  • Opcode Fuzzy Hash: a57be843ccaacac0a46b99ad4989412c07f02d64ca0905ed98f03eef16ad0010
                                  • Instruction Fuzzy Hash: 7A310F70E00308AFDB01EFB6D886A9EBBF8EB09304F51447AF914E7252D6785A44CB59
                                  APIs
                                  • GetSystemMetrics.USER32(0000000E), ref: 00418C18
                                  • GetSystemMetrics.USER32(0000000D), ref: 00418C20
                                  • 6F552980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C26
                                    • Part of subcall function 00409958: 6F54C400.COMCTL32((&I,000000FF,00000000,00418C54,00000000,00418CB0,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 0040995C
                                  • 6F5BCB00.COMCTL32((&I,00000000,00000000,00000000,00000000,00418CB0,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C76
                                  • 6F5BC740.COMCTL32(00000000,?,(&I,00000000,00000000,00000000,00000000,00418CB0,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418C81
                                  • 6F5BCB00.COMCTL32((&I,00000001,?,?,00000000,?,(&I,00000000,00000000,00000000,00000000,00418CB0,?,00000000,0000000D,00000000), ref: 00418C94
                                  • 6F550860.COMCTL32((&I,00418CB7,?,00000000,?,(&I,00000000,00000000,00000000,00000000,00418CB0,?,00000000,0000000D,00000000,0000000E), ref: 00418CAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$C400C740F550860F552980
                                  • String ID: (&I
                                  • API String ID: 1828538299-96580698
                                  • Opcode ID: cb724f8f61eeec6223193507a99a441db1e856c55be7018474d1ece8e95461e9
                                  • Instruction ID: 46645d9a52805bd5c852c20026195d53dd59d6b8e5b8ddd5dae0d8f2325046d5
                                  • Opcode Fuzzy Hash: cb724f8f61eeec6223193507a99a441db1e856c55be7018474d1ece8e95461e9
                                  • Instruction Fuzzy Hash: 8B113671B44604BBDB10EBA5DC82F5EB3B8DB48714F50446EBA04F73D2EAB99D408768
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045A7B1
                                  • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045A7C1
                                  • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045A7D1
                                  • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045A7E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                  • API String ID: 190572456-3516654456
                                  • Opcode ID: 174d8b13224192ef84b630455ef95026d12c70233b8f3b0abbd4307774cc5ebe
                                  • Instruction ID: 8bdbbd7099bf23791bc9fd54354aee5868bc2dbadb77176a7910e3edbd90d505
                                  • Opcode Fuzzy Hash: 174d8b13224192ef84b630455ef95026d12c70233b8f3b0abbd4307774cc5ebe
                                  • Instruction Fuzzy Hash: 8E0125B0500B00EED728EF32AE8872336B5A764345F14C17B9805652BBDBF8045EDA1D
                                  APIs
                                  • SetBkColor.GDI32(?,00000000), ref: 0041A961
                                  • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A99B
                                  • SetBkColor.GDI32(?,?), ref: 0041A9B0
                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041A9FA
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA05
                                  • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA15
                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AA54
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5E
                                  • SetBkColor.GDI32(00000000,?), ref: 0041AA6B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Color$StretchText
                                  • String ID:
                                  • API String ID: 2984075790-0
                                  • Opcode ID: c5f223bee4bb783086f44ddf098ec2f005a4e4987d44d46892a6de9d9b7dd681
                                  • Instruction ID: e254907fa32ae31809fa254cf51b9897988a5b4c94e3051facbc65a4db038bdb
                                  • Opcode Fuzzy Hash: c5f223bee4bb783086f44ddf098ec2f005a4e4987d44d46892a6de9d9b7dd681
                                  • Instruction Fuzzy Hash: 6161E5B5A00105EFCB40EFA9D985E9AB7F8EF08314B11856AF518DB262C734ED41CF69
                                  APIs
                                    • Part of subcall function 0042D7A8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7BB
                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00455ECC,?, /s ",?,regsvr32.exe",?,00455ECC), ref: 00455E3E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseDirectoryHandleSystem
                                  • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                  • API String ID: 2051275411-1862435767
                                  • Opcode ID: 8956d8217134ec924540eaef24f8b7af3bddc5cdde220baed02106d84dc35579
                                  • Instruction ID: 20fae124b9662d37c7335df2d5232179d222b48998ad5ae4538026d20c86275f
                                  • Opcode Fuzzy Hash: 8956d8217134ec924540eaef24f8b7af3bddc5cdde220baed02106d84dc35579
                                  • Instruction Fuzzy Hash: 71413771E007086BDB11EFD5C852BDDB7F9AF48305F50803BA808BB296D7789A09CB58
                                  APIs
                                  • OffsetRect.USER32(?,00000001,00000001), ref: 0044C895
                                  • GetSysColor.USER32(00000014), ref: 0044C89C
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C8B4
                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C8DD
                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044C8E7
                                  • GetSysColor.USER32(00000010), ref: 0044C8EE
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C906
                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C92F
                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C95A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Text$Color$Draw$OffsetRect
                                  • String ID:
                                  • API String ID: 1005981011-0
                                  • Opcode ID: 57028361129e52f9431e5318b710a4d40606affc4f959fc4e5e926226b5bbf1d
                                  • Instruction ID: b575c18274847aba3012457626d0aaea5839951ed62bd291699816a0262c3fb5
                                  • Opcode Fuzzy Hash: 57028361129e52f9431e5318b710a4d40606affc4f959fc4e5e926226b5bbf1d
                                  • Instruction Fuzzy Hash: 0321A0B42016047FC710FB6ACD8AE9B7BDCDF19319B04457AB918EB3A3C678DD408669
                                  APIs
                                    • Part of subcall function 00471674: GetWindowThreadProcessId.USER32(00000000), ref: 0047167C
                                    • Part of subcall function 00471674: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00471773,\/I,00000000), ref: 0047168F
                                    • Part of subcall function 00471674: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00471695
                                  • SendMessageA.USER32(00000000,0000004A,00000000,00471B06), ref: 00471781
                                  • GetTickCount.KERNEL32 ref: 004717C6
                                  • GetTickCount.KERNEL32 ref: 004717D0
                                  • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00471825
                                  Strings
                                  • \/I, xrefs: 00471753
                                  • CallSpawnServer: Unexpected status: %d, xrefs: 0047180E
                                  • CallSpawnServer: Unexpected response: $%x, xrefs: 004717B6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                  • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d$\/I
                                  • API String ID: 613034392-4045567746
                                  • Opcode ID: 0bdae429eff8d1580745a98c8e118b2776b597856db30de61ff8ebb473ee6832
                                  • Instruction ID: f11b9d24a016228fd55770aab2269764d20f87266426001b19c3ff40abdb7d86
                                  • Opcode Fuzzy Hash: 0bdae429eff8d1580745a98c8e118b2776b597856db30de61ff8ebb473ee6832
                                  • Instruction Fuzzy Hash: E0317F78F002159BDB10EBBD88867EEB6A59F04704F50843AB548EB3A2D67C9D01879E
                                  APIs
                                    • Part of subcall function 0044FC44: SetEndOfFile.KERNEL32(?,?,004599C5,00000000,00459B68,?,00000000,00000002,00000002), ref: 0044FC4B
                                    • Part of subcall function 00406EF0: DeleteFileA.KERNEL32(00000000,00492628,004906E1,00000000,00490736,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EFB
                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0048E6E9
                                  • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 0048E6FD
                                  • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 0048E717
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 0048E723
                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 0048E729
                                  • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 0048E73C
                                  Strings
                                  • Deleting Uninstall data files., xrefs: 0048E65F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                  • String ID: Deleting Uninstall data files.
                                  • API String ID: 1570157960-2568741658
                                  • Opcode ID: 9d067bf5239d494c11ca6ea2ee92c558df55eaca7c9a40dc827b20b8e50aa70c
                                  • Instruction ID: 7eb9b81ebef4b9935662b2bd99c088e093be0b50f7952a605171971ca98b3156
                                  • Opcode Fuzzy Hash: 9d067bf5239d494c11ca6ea2ee92c558df55eaca7c9a40dc827b20b8e50aa70c
                                  • Instruction Fuzzy Hash: 5B216F74744204BEE721FBBADC86B2B3698E759319F50053BF9119A1A2DA789D009B1C
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046A8E1,?,?,?,?,00000000), ref: 0046A84B
                                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046A8E1), ref: 0046A862
                                  • AddFontResourceA.GDI32(00000000), ref: 0046A87F
                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0046A893
                                  Strings
                                  • Failed to open Fonts registry key., xrefs: 0046A869
                                  • AddFontResource, xrefs: 0046A89D
                                  • Failed to set value in Fonts registry key., xrefs: 0046A854
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                  • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                  • API String ID: 955540645-649663873
                                  • Opcode ID: 4f0b21af98cfc754761b164548fb728c356102c5a86faa4868257e3bcd0555eb
                                  • Instruction ID: 1afd192ee4ee27fe0430144d256ae41832f88f75df52154e79e2d4afe470c12e
                                  • Opcode Fuzzy Hash: 4f0b21af98cfc754761b164548fb728c356102c5a86faa4868257e3bcd0555eb
                                  • Instruction Fuzzy Hash: 2D2191707406047AE710BB668C42B6E679CDB45704F604437B900FB2C2E67CDE169A6F
                                  APIs
                                    • Part of subcall function 004163B8: GetClassInfoA.USER32(00400000,?,?), ref: 00416427
                                    • Part of subcall function 004163B8: UnregisterClassA.USER32(?,00400000), ref: 00416453
                                    • Part of subcall function 004163B8: RegisterClassA.USER32(?), ref: 00416476
                                  • GetVersion.KERNEL32 ref: 0045E530
                                  • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0045E56E
                                  • SHGetFileInfo.SHELL32(0045E60C,00000000,?,00000160,00004011), ref: 0045E58B
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0045E5A9
                                  • SetCursor.USER32(00000000,00000000,00007F02,0045E60C,00000000,?,00000160,00004011), ref: 0045E5AF
                                  • SetCursor.USER32(?,0045E5EF,00007F02,0045E60C,00000000,?,00000160,00004011), ref: 0045E5E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                  • String ID: Explorer
                                  • API String ID: 2594429197-512347832
                                  • Opcode ID: 04dae18e0789727a76a8890a65ab041c4f98a0ef290a8ca75c183f3cffa742e1
                                  • Instruction ID: e5db7c9749215eeb2d02e5ed912e0b3fe28138e3e2d2d7ddb3fe69776e4d8daf
                                  • Opcode Fuzzy Hash: 04dae18e0789727a76a8890a65ab041c4f98a0ef290a8ca75c183f3cffa742e1
                                  • Instruction Fuzzy Hash: 80213D717803087AEB14BBB69C47B9A36889B05709F4100BFBE05EA1C3EDBC8D05866C
                                  APIs
                                  • GetLastError.KERNEL32(00000000,004578DE,?,00000000,?,00000000,?,00000006,?,00000000,0048F8FB,?,00000000,0048F996), ref: 00457822
                                    • Part of subcall function 00452A2C: FindClose.KERNEL32(000000FF,00452B22), ref: 00452B11
                                  Strings
                                  • Failed to strip read-only attribute., xrefs: 004577F0
                                  • Failed to delete directory (%d). Will retry later., xrefs: 0045783B
                                  • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 004577FC
                                  • Deleting directory: %s, xrefs: 004577AB
                                  • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00457897
                                  • Failed to delete directory (%d)., xrefs: 004578B8
                                  • Stripped read-only attribute., xrefs: 004577E4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseErrorFindLast
                                  • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                  • API String ID: 754982922-1448842058
                                  • Opcode ID: c942cc8746309d6c4fde1d13e5877ff426f738c54e561dd9b6452c2f2059cbe1
                                  • Instruction ID: 7ed85959ced61155a0d0e848b4d98e2feb505fad3b81ad5ee62f34683386d719
                                  • Opcode Fuzzy Hash: c942cc8746309d6c4fde1d13e5877ff426f738c54e561dd9b6452c2f2059cbe1
                                  • Instruction Fuzzy Hash: 1941F830A182089BDB00EB69A8053AF76E59F49316F54857BAC01DB393D77C9E0CC75E
                                  APIs
                                  • GetCapture.USER32 ref: 00422E4C
                                  • GetCapture.USER32 ref: 00422E5B
                                  • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E61
                                  • ReleaseCapture.USER32 ref: 00422E66
                                  • GetActiveWindow.USER32 ref: 00422E75
                                  • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EF4
                                  • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F58
                                  • GetActiveWindow.USER32 ref: 00422F67
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CaptureMessageSend$ActiveWindow$Release
                                  • String ID:
                                  • API String ID: 862346643-0
                                  • Opcode ID: fab0767262203ab9b8eef4ea09c7b9bd12ecfbe98aad2e612e19eb807ad95d19
                                  • Instruction ID: 0cb4f9409eeca59ffb975aedecb23b840502150724600c34407ecb599f309318
                                  • Opcode Fuzzy Hash: fab0767262203ab9b8eef4ea09c7b9bd12ecfbe98aad2e612e19eb807ad95d19
                                  • Instruction Fuzzy Hash: BA416270B00254BFDB10EB69DA42B9EB7F1EB44304F5540BAF444AB292D7B89E40DB1C
                                  APIs
                                  • 73A1A570.USER32(00000000), ref: 00429432
                                  • GetTextMetricsA.GDI32(00000000), ref: 0042943B
                                    • Part of subcall function 0041A190: CreateFontIndirectA.GDI32(?), ref: 0041A24F
                                  • SelectObject.GDI32(00000000,00000000), ref: 0042944A
                                  • GetTextMetricsA.GDI32(00000000,?), ref: 00429457
                                  • SelectObject.GDI32(00000000,00000000), ref: 0042945E
                                  • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00429466
                                  • GetSystemMetrics.USER32(00000006), ref: 0042948B
                                  • GetSystemMetrics.USER32(00000006), ref: 004294A5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                  • String ID:
                                  • API String ID: 361401722-0
                                  • Opcode ID: 9834c26a9960500f6a9ecfd8d753213a1de3cd4ea19aff41d6da438e204e4863
                                  • Instruction ID: 1059aa7a6e273236e125af25209637a8817c3066b806c9f95c2c1fc45335f5e0
                                  • Opcode Fuzzy Hash: 9834c26a9960500f6a9ecfd8d753213a1de3cd4ea19aff41d6da438e204e4863
                                  • Instruction Fuzzy Hash: 830100917087503BF710B27A9CC2F6B5588DB8435CF80003FFA469A3C3DA6C8C41826A
                                  APIs
                                  • 73A1A570.USER32(00000000,?,00419001,00490B35), ref: 0041DDCF
                                  • 73A24620.GDI32(00000000,0000005A,00000000,?,00419001,00490B35), ref: 0041DDD9
                                  • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419001,00490B35), ref: 0041DDE6
                                  • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DDF5
                                  • GetStockObject.GDI32(00000007), ref: 0041DE03
                                  • GetStockObject.GDI32(00000005), ref: 0041DE0F
                                  • GetStockObject.GDI32(0000000D), ref: 0041DE1B
                                  • LoadIconA.USER32(00000000,00007F00), ref: 0041DE2C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ObjectStock$A24620A480A570IconLoad
                                  • String ID:
                                  • API String ID: 3573811560-0
                                  • Opcode ID: 9c1e6b037cfcf526f883390b7a6738af9fd81bafc879f9cac69ea1757f065c58
                                  • Instruction ID: 4ac4bd4aadafbff56ec06caa1a3c2c499f9ae773c567f2f7cd71ce954fcb2d20
                                  • Opcode Fuzzy Hash: 9c1e6b037cfcf526f883390b7a6738af9fd81bafc879f9cac69ea1757f065c58
                                  • Instruction Fuzzy Hash: F81142706453416AE740FF795E92BA63694EB24748F00803BF604EF6D2D7BD1C449B5E
                                  APIs
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0045EA14
                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,0045EAA9), ref: 0045EA1A
                                  • SetCursor.USER32(?,0045EA91,00007F02,00000000,0045EAA9), ref: 0045EA84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Cursor$Load
                                  • String ID: $ $Internal error: Item already expanding
                                  • API String ID: 1675784387-1948079669
                                  • Opcode ID: 062bc24e025f87a5132b01d4a23ebbd0a7af6c8b69919735a7d8bfb9171ae665
                                  • Instruction ID: dca47056957fcd899ad7342011e10480afea1a1a27e56c2873f80f5661136381
                                  • Opcode Fuzzy Hash: 062bc24e025f87a5132b01d4a23ebbd0a7af6c8b69919735a7d8bfb9171ae665
                                  • Instruction Fuzzy Hash: 35B1BF30A042449FDB25DF2AC585B9ABBF0BF04305F5484AAEC459B793D738EE49CB45
                                  APIs
                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0045246F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWrite
                                  • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                  • API String ID: 390214022-3304407042
                                  • Opcode ID: 45e843453f2affb6e33b9457c2c394c31b255a0f61839c8a32d89fd390f5010c
                                  • Instruction ID: b02a2244c8ac043b1712f4d5d459e41a201eed142cab655ca7120e0de3a2e1df
                                  • Opcode Fuzzy Hash: 45e843453f2affb6e33b9457c2c394c31b255a0f61839c8a32d89fd390f5010c
                                  • Instruction Fuzzy Hash: BA91F330A001099BDB11EFA5D982BDEB7F5AF49305F50847BE90077392D7B8AE09CB59
                                  APIs
                                  • 756FE550.OLE32(00491A3C,00000000,00000001,00491774,?,00000000,0045499A), ref: 004547E0
                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • 756FE550.OLE32(00491764,00000000,00000001,00491774,?,00000000,0045499A), ref: 00454804
                                  • SysFreeString.OLEAUT32(00000000), ref: 0045495F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: E550String$AllocByteCharFreeMultiWide
                                  • String ID: CoCreateInstance$IPersistFile::Save$IShellLink::QueryInterface
                                  • API String ID: 2757340368-615220198
                                  • Opcode ID: 30c84a6b22ae8ec60ba87615f6782f2ed58e1117184a8e9cdc9aaee44ca2ff94
                                  • Instruction ID: 20b93dc07a47b2b5ead177be154b0c5a355cf91e616f5ebb89302d411650f3f2
                                  • Opcode Fuzzy Hash: 30c84a6b22ae8ec60ba87615f6782f2ed58e1117184a8e9cdc9aaee44ca2ff94
                                  • Instruction Fuzzy Hash: F15120B5A00105AFDB50EFA9C885F9F77F8AF49309F044066B904EB262D778DD88CB19
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,00408908,?,?,?,?,00000000,00000000,00000000,?,0040990F,00000000,00409922), ref: 004086DA
                                    • Part of subcall function 00408508: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004924C0,00000001,?,004085D3,?,00000000,004086B2), ref: 00408526
                                    • Part of subcall function 00408554: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00408756,?,?,?,00000000,00408908), ref: 00408567
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: InfoLocale$DefaultSystem
                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                  • API String ID: 1044490935-665933166
                                  • Opcode ID: ff036df80b210b54e2fa160841ffd8a7ad68a192e85da69035cbbac9a23d53b8
                                  • Instruction ID: 056ecf6f2f1527b7684b606c263ef1e3982ac19046fe7e290d3a86a54856ae2c
                                  • Opcode Fuzzy Hash: ff036df80b210b54e2fa160841ffd8a7ad68a192e85da69035cbbac9a23d53b8
                                  • Instruction Fuzzy Hash: 21512C74B001086BDB01FBA6DE91A9E7BA9DB84304F50D47FA181BB3C6CA3CDA05875D
                                  APIs
                                  • GetVersion.KERNEL32(00000000,004118A1), ref: 00411734
                                  • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 004117F2
                                    • Part of subcall function 00411A54: CreatePopupMenu.USER32 ref: 00411A6E
                                  • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 0041187E
                                    • Part of subcall function 00411A54: CreateMenu.USER32 ref: 00411A78
                                  • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00411865
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu$Insert$Create$ItemPopupVersion
                                  • String ID: ,$?
                                  • API String ID: 2359071979-2308483597
                                  • Opcode ID: baa12968a9006a52d5e4ef876005b49ebe402715d6320ec9eb47ca094d0fc02d
                                  • Instruction ID: 726e600f223273bd08914059578a8101eea6a2d33d3ff692803082349b8399f4
                                  • Opcode Fuzzy Hash: baa12968a9006a52d5e4ef876005b49ebe402715d6320ec9eb47ca094d0fc02d
                                  • Instruction Fuzzy Hash: 02511574A041419BDB10EF6ADC815DA7BF9AF09304B1185BBFA04E73B2D738D941CB58
                                  APIs
                                  • GetLastError.KERNEL32(?,D:"G,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00453794,00453794,?,00453794,00000000), ref: 00453720
                                  • CloseHandle.KERNEL32(?,?,D:"G,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00453794,00453794,?,00453794), ref: 0045372D
                                    • Part of subcall function 004534E4: WaitForInputIdle.USER32(?,00000032), ref: 00453510
                                    • Part of subcall function 004534E4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00453532
                                    • Part of subcall function 004534E4: GetExitCodeProcess.KERNEL32(?,?), ref: 00453541
                                    • Part of subcall function 004534E4: CloseHandle.KERNEL32(?,0045356E,00453567,?,?,?,00000000,?,?,00453741,?,?,?,D:"G,00000000,00000000), ref: 00453561
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                  • String ID: .bat$.cmd$COMMAND.COM" /C $D:"G$cmd.exe" /C "
                                  • API String ID: 854858120-4270494884
                                  • Opcode ID: 68475bbf8ef61ab6d23b9b8fd69e100de0613aec3012e07989d0195ce28e20d8
                                  • Instruction ID: e48de0c09470f56e814a1eaeb461330263aa011ed8558adaef5bf8b5374a4d6d
                                  • Opcode Fuzzy Hash: 68475bbf8ef61ab6d23b9b8fd69e100de0613aec3012e07989d0195ce28e20d8
                                  • Instruction Fuzzy Hash: AD517874A0034DABCB11EF95C881B9DBBB9AF48746F50403BBC04B7382D7789B198B58
                                  APIs
                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BED0
                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BEDF
                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF30
                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF3E
                                  • DeleteObject.GDI32(?), ref: 0041BF47
                                  • DeleteObject.GDI32(?), ref: 0041BF50
                                  • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BF6D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Object$BitmapBitsDelete$CreateIcon
                                  • String ID:
                                  • API String ID: 1030595962-0
                                  • Opcode ID: 1e4853d75d21bc1926ba7cf5224c89ea8ebb7500f7ae85efd10c66dcd062618b
                                  • Instruction ID: f0e05dfe27ce23013596edce2c43a20e6d26497d7b74886029f11bde31f0b820
                                  • Opcode Fuzzy Hash: 1e4853d75d21bc1926ba7cf5224c89ea8ebb7500f7ae85efd10c66dcd062618b
                                  • Instruction Fuzzy Hash: 2A511675E002099FCB14DFA9C8819EEB7F9EF49310B11842AF514E7391D738AD81CB64
                                  APIs
                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEA6
                                  • 73A24620.GDI32(00000000,00000026), ref: 0041CEC5
                                  • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF2B
                                  • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF3A
                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFA4
                                  • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041CFE2
                                  • 73A18830.GDI32(?,?,00000001,0041D014,00000000,00000026), ref: 0041D007
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Stretch$A18830$A122A24620BitsMode
                                  • String ID:
                                  • API String ID: 430401518-0
                                  • Opcode ID: aa7efd9841db0397c835a8e493930d486de59a27429b2987e03207e86632ff54
                                  • Instruction ID: 716ae2cbf74db7cca6ca85613245d2cbdededc4b908a0ab63d95ef833b57d340
                                  • Opcode Fuzzy Hash: aa7efd9841db0397c835a8e493930d486de59a27429b2987e03207e86632ff54
                                  • Instruction Fuzzy Hash: 4C511EB0600604AFDB14DFA9C985F9BBBE8EF08304F14455AB545D7792C778ED81CB68
                                  APIs
                                  • SendMessageA.USER32(00000000,?,?), ref: 00454F8E
                                    • Part of subcall function 00424224: GetWindowTextA.USER32(?,?,00000100), ref: 00424244
                                    • Part of subcall function 0041EE4C: GetCurrentThreadId.KERNEL32 ref: 0041EE9B
                                    • Part of subcall function 0041EE4C: 73A25940.USER32(00000000,0041EDFC,00000000,00000000,0041EEB8,?,00000000,0041EEEF,?,0042E7E8,?,00000001), ref: 0041EEA1
                                    • Part of subcall function 0042426C: SetWindowTextA.USER32(?,00000000), ref: 00424284
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00454FF5
                                  • TranslateMessage.USER32(?), ref: 00455013
                                  • DispatchMessageA.USER32(?), ref: 0045501C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                  • String ID: [Paused]
                                  • API String ID: 3047529653-4230553315
                                  • Opcode ID: 141f149095fb27d577fc31764a328687d2f30d229be375c220db36f4bd74699d
                                  • Instruction ID: 741a01f18879a345a5b07686917d8e40ce5d5c24a876243dd54feaf600687e8f
                                  • Opcode Fuzzy Hash: 141f149095fb27d577fc31764a328687d2f30d229be375c220db36f4bd74699d
                                  • Instruction Fuzzy Hash: 3231E331908644AECB11DBB5DC51BEE7BB8EB49704F50447BE800E32D2D67C9909CBA9
                                  APIs
                                  • GetCursor.USER32(00000000,0046634F), ref: 004662CC
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004662DA
                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046634F), ref: 004662E0
                                  • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046634F), ref: 004662EA
                                  • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046634F), ref: 004662F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Cursor$LoadSleep
                                  • String ID: CheckPassword
                                  • API String ID: 4023313301-1302249611
                                  • Opcode ID: a2f9e29d2fd47cbe49e50b2b8c9181dc4ebe3878211084bf54e37939886680c3
                                  • Instruction ID: e12dea2b5957d6b50ca2ed371003984113864468440f1a681d17ee3b0f813ced
                                  • Opcode Fuzzy Hash: a2f9e29d2fd47cbe49e50b2b8c9181dc4ebe3878211084bf54e37939886680c3
                                  • Instruction Fuzzy Hash: 2931A774644204AFD701EF69C88AF9E7BE1AF45304F5680B6F904AB3E2D7789E40CB59
                                  APIs
                                    • Part of subcall function 0041BFF0: GetObjectA.GDI32(?,00000018), ref: 0041BFFD
                                  • GetFocus.USER32 ref: 0041C110
                                  • 73A1A570.USER32(?), ref: 0041C11C
                                  • 73A18830.GDI32(?,?,00000000,00000000,0041C19B,?,?), ref: 0041C13D
                                  • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C19B,?,?), ref: 0041C149
                                  • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C160
                                  • 73A18830.GDI32(?,00000000,00000000,0041C1A2,?,?), ref: 0041C188
                                  • 73A1A480.USER32(?,?,0041C1A2,?,?), ref: 0041C195
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A18830$A122A480A570BitsFocusObject
                                  • String ID:
                                  • API String ID: 2231653193-0
                                  • Opcode ID: 4b5817af3930a7da88de8c776c2c87f1b057dc8e6189491f9691f509f6f43723
                                  • Instruction ID: e1839615c60f4afd83c90c330261c8dd65eba5fe4d32295df669e4ba5c229ee2
                                  • Opcode Fuzzy Hash: 4b5817af3930a7da88de8c776c2c87f1b057dc8e6189491f9691f509f6f43723
                                  • Instruction Fuzzy Hash: 24116D71A44608BBDB10DBE9CC85FAFB7FCEF48700F54446AB518E7281D63898008B28
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0047C644), ref: 0047C629
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                  • API String ID: 47109696-2530820420
                                  • Opcode ID: 216c442831188f385001bfb6125c95756f0f6973d9343121dce614720b27fbcb
                                  • Instruction ID: ba25b35c1adc0b75f4f324f6cb59f82a98d74cc289aeabc78b4d1a44d03816b4
                                  • Opcode Fuzzy Hash: 216c442831188f385001bfb6125c95756f0f6973d9343121dce614720b27fbcb
                                  • Instruction Fuzzy Hash: 84118E30B04204AADB10DB659AC2B9A7BA89B56308F61D0BFA408A7285DB789A018758
                                  APIs
                                  • SelectObject.GDI32(00000000,?), ref: 0041B418
                                  • SelectObject.GDI32(?,00000000), ref: 0041B427
                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B453
                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B461
                                  • SelectObject.GDI32(?,00000000), ref: 0041B46F
                                  • DeleteDC.GDI32(00000000), ref: 0041B478
                                  • DeleteDC.GDI32(?), ref: 0041B481
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$Delete$Stretch
                                  • String ID:
                                  • API String ID: 1458357782-0
                                  • Opcode ID: d8fcd08cd1e6b3b068bfae977a68b3e89a280d1eb5928260e7975f8e8b8626d0
                                  • Instruction ID: 04c6450d5990685007640eea88a29337d1268334102612a79928454e9dde4d04
                                  • Opcode Fuzzy Hash: d8fcd08cd1e6b3b068bfae977a68b3e89a280d1eb5928260e7975f8e8b8626d0
                                  • Instruction Fuzzy Hash: 3F114CB2E00555ABDF10DAD9D885FEFB3BCEF08704F048556B614FB241C678A9418B54
                                  APIs
                                  • 73A1A570.USER32(00000000,?,?,00000000), ref: 0048D6A1
                                    • Part of subcall function 0041A190: CreateFontIndirectA.GDI32(?), ref: 0041A24F
                                  • SelectObject.GDI32(00000000,00000000), ref: 0048D6C3
                                  • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,0048DC19), ref: 0048D6D7
                                  • GetTextMetricsA.GDI32(00000000,?), ref: 0048D6F9
                                  • 73A1A480.USER32(00000000,00000000,0048D723,0048D71C,?,00000000,?,?,00000000), ref: 0048D716
                                  Strings
                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 0048D6CE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                  • API String ID: 1435929781-222967699
                                  • Opcode ID: 2b902195bd78e3a85a14461ba25cf2a461328febbf25ed1a984847a0c9924e98
                                  • Instruction ID: 56f2b7a4074af1b55b95a42d0c90d732b29dffae751eaa68173dd8b8b984e531
                                  • Opcode Fuzzy Hash: 2b902195bd78e3a85a14461ba25cf2a461328febbf25ed1a984847a0c9924e98
                                  • Instruction Fuzzy Hash: E5012575A05608AFDB01EEA5CC41F5FB7ECDB49704F51447AB504E72C1D678AD008B68
                                  APIs
                                  • GetCursorPos.USER32 ref: 00423357
                                  • WindowFromPoint.USER32(?,?), ref: 00423364
                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00423372
                                  • GetCurrentThreadId.KERNEL32 ref: 00423379
                                  • SendMessageA.USER32(00000000,00000084,?,?), ref: 00423392
                                  • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 004233A9
                                  • SetCursor.USER32(00000000), ref: 004233BB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                  • String ID:
                                  • API String ID: 1770779139-0
                                  • Opcode ID: 7a1fa5eb43588ed905b36272748367152b50e279982f14557b7e119d831a34ac
                                  • Instruction ID: 0b857e85cec8b006a236e34f0c55496e129225b07c91d7ef35ca05f8a9fb34e8
                                  • Opcode Fuzzy Hash: 7a1fa5eb43588ed905b36272748367152b50e279982f14557b7e119d831a34ac
                                  • Instruction Fuzzy Hash: 5801D42230431026D620BB795C86F2F62A9DFC5B25F50453FBA09AB283DE3D8D1063AD
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0048D4C4
                                  • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0048D4D1
                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0048D4DE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                  • API String ID: 667068680-2254406584
                                  • Opcode ID: 39bebf5cdc522e2b788824c1d824eab9c167e0fb480ea12f995934913c9d8500
                                  • Instruction ID: 67b51c375aa01bca0c5088982691f1e3d037f3b871651ee40e205a1bc027e1e2
                                  • Opcode Fuzzy Hash: 39bebf5cdc522e2b788824c1d824eab9c167e0fb480ea12f995934913c9d8500
                                  • Instruction Fuzzy Hash: 19F0C292E42B1476DA1035BA0C82E7F628CCB8A768F140837BD45A72C2E9688D0543AD
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,ISCryptGetVersion), ref: 0045A685
                                  • GetProcAddress.KERNEL32(00000000,ArcFourInit), ref: 0045A695
                                  • GetProcAddress.KERNEL32(00000000,ArcFourCrypt), ref: 0045A6A5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                  • API String ID: 190572456-508647305
                                  • Opcode ID: 6c44a559e0113ee3e9627393b6d72c696891dddf580004d2a213ddd529ef0017
                                  • Instruction ID: 4e0395d972810c9416c3368882ebdde2c5e01ffaaeaf982be760f48a4fca4704
                                  • Opcode Fuzzy Hash: 6c44a559e0113ee3e9627393b6d72c696891dddf580004d2a213ddd529ef0017
                                  • Instruction Fuzzy Hash: 3DF062B1532700FBDB08DF729EC422736B5B364396F18C13BA804551AAD7BC0458EA0D
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045AB85
                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045AB95
                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045ABA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                  • API String ID: 190572456-212574377
                                  • Opcode ID: 7f769d8cd905983f6cd8b0047f0826717d18397314b06371627eac2a981e6e67
                                  • Instruction ID: 78c3aec0c34357df070bc40c46de1e5cd03a4b776be7e77430bdb5cc110f23ad
                                  • Opcode Fuzzy Hash: 7f769d8cd905983f6cd8b0047f0826717d18397314b06371627eac2a981e6e67
                                  • Instruction Fuzzy Hash: 66F06DB0500742EADB14DF32AE44B3237A6A368306F04913BA909552AAD7FC145EEE5E
                                  APIs
                                  • LoadLibraryA.KERNEL32(oleacc.dll,?,0044E775), ref: 0044BEC7
                                  • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044BED8
                                  • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044BEE8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                  • API String ID: 2238633743-1050967733
                                  • Opcode ID: 94c7f55b7858a86dfc8e1d027d5a29c74593de5c18c70a69c9d3636859c232a8
                                  • Instruction ID: 119d9ded96c8020385292050e9bd4a1b60054d62b4ab52501d4127c2865211ec
                                  • Opcode Fuzzy Hash: 94c7f55b7858a86dfc8e1d027d5a29c74593de5c18c70a69c9d3636859c232a8
                                  • Instruction Fuzzy Hash: 62F0FE70545745AAEB10ABE49E86B223294E320709F10157BA005B52E1C7FDC48CCE5D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0048DD4A,QueryCancelAutoPlay,00490B7B), ref: 0042E75A
                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E760
                                  • InterlockedExchange.KERNEL32(00492660,00000001), ref: 0042E771
                                  • ChangeWindowMessageFilter.USER32(0000C1C1,00000001), ref: 0042E782
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressChangeExchangeFilterHandleInterlockedMessageModuleProcWindow
                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                  • API String ID: 1365377179-2498399450
                                  • Opcode ID: 6a9de858e1701b34b855b8354cc27d5781c45a445a0336004b65701d5bd939bd
                                  • Instruction ID: 232ca1bda8f30e1dbeb1e37a17564225c323fdce3e6d3ccf23913f9b659c3ecd
                                  • Opcode Fuzzy Hash: 6a9de858e1701b34b855b8354cc27d5781c45a445a0336004b65701d5bd939bd
                                  • Instruction Fuzzy Hash: 50E0ECB1742310BAEA247BB26E8AF5A2594A774715F900037F000655E6C6FD0D44D91D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,00490B71), ref: 0047243A
                                  • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00472447
                                  • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00472457
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                  • API String ID: 667068680-222143506
                                  • Opcode ID: 7080541768798b3df736431f9a72840aa573f0e58d303b716fe08131e3bd796c
                                  • Instruction ID: 2634119a36086f07b4582bff0c6698110bc0db6046ba951e872dfe9231fcc97c
                                  • Opcode Fuzzy Hash: 7080541768798b3df736431f9a72840aa573f0e58d303b716fe08131e3bd796c
                                  • Instruction Fuzzy Hash: 7AC0C9E0641700AEAA08B7B11E8397A2168D520B29B10813B704869187D6FC08045A2C
                                  APIs
                                  • GetFocus.USER32 ref: 0041B6ED
                                  • 73A1A570.USER32(?), ref: 0041B6F9
                                  • 73A18830.GDI32(00000000,?,00000000,00000000,0041B7C4,?,?), ref: 0041B72E
                                  • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B7C4,?,?), ref: 0041B73A
                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B7A2,?,00000000,0041B7C4,?,?), ref: 0041B768
                                  • 73A18830.GDI32(00000000,00000000,00000000,0041B7A9,?,?,00000000,00000000,0041B7A2,?,00000000,0041B7C4,?,?), ref: 0041B79C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A18830$A122A26310A570Focus
                                  • String ID:
                                  • API String ID: 3906783838-0
                                  • Opcode ID: 2189f248925abbd8b3ed1d854bd6b727da44b470d0452cebfb9837d533ec30a6
                                  • Instruction ID: 8a3990a2e5d6fcee7426173f9b26f44009bdffde0bb17d68edab7397fe7bbe52
                                  • Opcode Fuzzy Hash: 2189f248925abbd8b3ed1d854bd6b727da44b470d0452cebfb9837d533ec30a6
                                  • Instruction Fuzzy Hash: 8C513D70A00608AFCF11DFA9C895AEEBBF4EF49704F10446AF510A7390D7789D81CBA9
                                  APIs
                                  • GetFocus.USER32 ref: 0041B9BF
                                  • 73A1A570.USER32(?), ref: 0041B9CB
                                  • 73A18830.GDI32(00000000,?,00000000,00000000,0041BA91,?,?), ref: 0041BA05
                                  • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BA91,?,?), ref: 0041BA11
                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BA6F,?,00000000,0041BA91,?,?), ref: 0041BA35
                                  • 73A18830.GDI32(00000000,00000000,00000000,0041BA76,?,?,00000000,00000000,0041BA6F,?,00000000,0041BA91,?,?), ref: 0041BA69
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A18830$A122A26310A570Focus
                                  • String ID:
                                  • API String ID: 3906783838-0
                                  • Opcode ID: d8a2f350e31498a5aae0f9e9012618de704534965e1e336577d5547a4b9cf6c8
                                  • Instruction ID: 5f2264137962bc3366777cb0a2f232ffee2f3444c58f5864d32a49a15d3a62ac
                                  • Opcode Fuzzy Hash: d8a2f350e31498a5aae0f9e9012618de704534965e1e336577d5547a4b9cf6c8
                                  • Instruction Fuzzy Hash: FF512A75A002089FCB11DFA9C891AAEBBF9EF48700F118066F904EB751D7389D40CBA4
                                  APIs
                                  • GetFocus.USER32 ref: 0041B526
                                  • 73A1A570.USER32(?,00000000,0041B600,?,?,?,?), ref: 0041B532
                                  • 73A24620.GDI32(?,00000068,00000000,0041B5D4,?,?,00000000,0041B600,?,?,?,?), ref: 0041B54E
                                  • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B5D4,?,?,00000000,0041B600,?,?,?,?), ref: 0041B56B
                                  • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B5D4,?,?,00000000,0041B600), ref: 0041B582
                                  • 73A1A480.USER32(?,?,0041B5DB,?,?), ref: 0041B5CE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: E680$A24620A480A570Focus
                                  • String ID:
                                  • API String ID: 3709697839-0
                                  • Opcode ID: 01c1ab1f7a911bde34d09cc2a342371f0a4accf8ff51a2ca553a34b6587143a8
                                  • Instruction ID: 7d01233871e956700e45bbdad6d64e5c71f2ea9c135790645ddd3605e450c40d
                                  • Opcode Fuzzy Hash: 01c1ab1f7a911bde34d09cc2a342371f0a4accf8ff51a2ca553a34b6587143a8
                                  • Instruction Fuzzy Hash: 75410831A04258AFCB10DFA9C885EAFBBB5EF49704F1484AAF540E7341D3389D10CBA9
                                  APIs
                                    • Part of subcall function 0042C6FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C720
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,02193888,00000FFF,00000000,00457320,?,?,00000000,00000000), ref: 0045725B
                                    • Part of subcall function 00456B34: CloseHandle.KERNEL32(?), ref: 00456B6B
                                    • Part of subcall function 00456B34: WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00456B95
                                    • Part of subcall function 00456B34: GetExitCodeProcess.KERNEL32(?), ref: 00456BA6
                                    • Part of subcall function 00456B34: CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00456BED
                                    • Part of subcall function 00456B34: Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00456C09
                                    • Part of subcall function 00456B34: TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00456B87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$ByteCharCodeExitFullMultiNameObjectPathSingleSleepTerminateWaitWide
                                  • String ID: HelperRegisterTypeLibrary: StatusCode invalid$ITypeLib::GetLibAttr$LoadTypeLib$RegisterTypeLib$UnRegisterTypeLib
                                  • API String ID: 3965036325-83444288
                                  • Opcode ID: 48a304393f9a5fdad174ccbc4c24f8d38665409cf09cad508aa9efef9afbbf6f
                                  • Instruction ID: f74eade9246c561d7eda77dee430a1fc41308778ed490b298c47d2a514b049d7
                                  • Opcode Fuzzy Hash: 48a304393f9a5fdad174ccbc4c24f8d38665409cf09cad508aa9efef9afbbf6f
                                  • Instruction Fuzzy Hash: 1A318F30708604EBD711EB7A9882A5EB7E8EB44316F50847BBC45D7393DB38AE09D61D
                                  APIs
                                  • SetLastError.KERNEL32(00000057,00000000,0045A60C,?,?,?,?,00000000), ref: 0045A5AB
                                  • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045A678,?,00000000,0045A60C,?,?,?,?,00000000), ref: 0045A5EA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                  • API String ID: 1452528299-1580325520
                                  • Opcode ID: 068a73805bbc91043a3266f77ff4c4ee40905737be1478f272e1aee34357c8d5
                                  • Instruction ID: 2c7cc5846e01bfe9336b3e21a4f35d5db95fca715acc3ac4ded287c5e5725028
                                  • Opcode Fuzzy Hash: 068a73805bbc91043a3266f77ff4c4ee40905737be1478f272e1aee34357c8d5
                                  • Instruction Fuzzy Hash: 3611A53560420CFBDB11DAA5C941F9E7AACDB84306F644137BD0166283E67C5F1E992F
                                  APIs
                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BD7D
                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BD87
                                  • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD91
                                  • 73A24620.GDI32(00000000,0000000E,00000000,0041BE04,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDB8
                                  • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE04,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDC5
                                  • 73A1A480.USER32(00000000,00000000,0041BE0B,0000000E,00000000,0041BE04,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDFE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A24620MetricsSystem$A480A570
                                  • String ID:
                                  • API String ID: 4042297458-0
                                  • Opcode ID: c0f607c4832dab40e87e7b844f37412e582122e43c2ccad9e229f5b09a45b98f
                                  • Instruction ID: ff93124ca59b6ac00208e06d0df3eb10c0faf638cbb47b26d2833e339793a6eb
                                  • Opcode Fuzzy Hash: c0f607c4832dab40e87e7b844f37412e582122e43c2ccad9e229f5b09a45b98f
                                  • Instruction Fuzzy Hash: 54213C74E00649AFEB04EFA9C942BEEB7B4EB48714F10802AF514B7780D7785940CFA9
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EC), ref: 004774A2
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,00467815), ref: 004774C8
                                  • GetWindowLongA.USER32(?,000000EC), ref: 004774D8
                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 004774F9
                                  • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047750D
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 00477529
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$Long$Show
                                  • String ID:
                                  • API String ID: 3609083571-0
                                  • Opcode ID: eb138f1f0dc8c3891b790c124640c211a15ee428b02e70e25eaa3bdc4020e718
                                  • Instruction ID: d82ed46f6b466fc3f8bc0bdcacefb2f605830931c017ceeb26b2ec5954116533
                                  • Opcode Fuzzy Hash: eb138f1f0dc8c3891b790c124640c211a15ee428b02e70e25eaa3bdc4020e718
                                  • Instruction Fuzzy Hash: 46015EB5655310BBD700DBA8CE41F263798AB0D334F090266B558DF7E3C279DC008BA8
                                  APIs
                                    • Part of subcall function 0041A688: CreateBrushIndirect.GDI32 ref: 0041A6F3
                                  • UnrealizeObject.GDI32(00000000), ref: 0041B224
                                  • SelectObject.GDI32(?,00000000), ref: 0041B236
                                  • SetBkColor.GDI32(?,00000000), ref: 0041B259
                                  • SetBkMode.GDI32(?,00000002), ref: 0041B264
                                  • SetBkColor.GDI32(?,00000000), ref: 0041B27F
                                  • SetBkMode.GDI32(?,00000001), ref: 0041B28A
                                    • Part of subcall function 0041A000: GetSysColor.USER32(?), ref: 0041A00A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                  • String ID:
                                  • API String ID: 3527656728-0
                                  • Opcode ID: f29873dfcf61593aa75cb2549b6a9cf3e48997b8b5295c1044d98b88f295631e
                                  • Instruction ID: 991835cd13d00b1ecf70cab2c5668301369c46a92689b2ced77f157eaba3f874
                                  • Opcode Fuzzy Hash: f29873dfcf61593aa75cb2549b6a9cf3e48997b8b5295c1044d98b88f295631e
                                  • Instruction Fuzzy Hash: F1F0BFB1151500ABCF00FFAAD9CBE4B27A89F043097148057B944DF197C538D8504B3A
                                  APIs
                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,jPG,?,00000000,00000000,00000001,00000000,00473BAD,?,00000000), ref: 00473B71
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Close
                                  • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant$jPG$yNG
                                  • API String ID: 3535843008-3932832818
                                  • Opcode ID: fe45ef2342a58487a09325f3d72e231b2f56a556e2c95cc83f03531c0fc218de
                                  • Instruction ID: b7c2468eb7ac37771866f0ed0bbac7860b45a2d6c62ae04d18380af0e8b21fb7
                                  • Opcode Fuzzy Hash: fe45ef2342a58487a09325f3d72e231b2f56a556e2c95cc83f03531c0fc218de
                                  • Instruction Fuzzy Hash: D6816474E00148AFCB10DFA5C442ADEBBF9AF48315F5085AAE454B7391D738AF05CB98
                                  APIs
                                  • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004708D2
                                  • 73A259E0.USER32(00000000,000000FC,00470830,00000000,00470A62,?,00000000,00470A87), ref: 004708F9
                                  • GetACP.KERNEL32(00000000,00470A62,?,00000000,00470A87), ref: 00470936
                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0047097C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A259ClassInfoMessageSend
                                  • String ID: COMBOBOX
                                  • API String ID: 3217714596-1136563877
                                  • Opcode ID: 4db748e39614629576759290719755d4f62f5ff744c25c03a842ef39f5d171c9
                                  • Instruction ID: ada8455a1527fb003519a52fc9fb8cd1e3de5cb64bb436e33c8ec601d2d438b3
                                  • Opcode Fuzzy Hash: 4db748e39614629576759290719755d4f62f5ff744c25c03a842ef39f5d171c9
                                  • Instruction Fuzzy Hash: 63514D74A01205EFDB10DF69D885A9EB7B5EB49304F1481BAE808DB762C778AD41CB98
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00453D83,?,00000000,00453DC3), ref: 00453CC9
                                  Strings
                                  • PendingFileRenameOperations, xrefs: 00453C68
                                  • WININIT.INI, xrefs: 00453CF8
                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00453C4C
                                  • PendingFileRenameOperations2, xrefs: 00453C98
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                  • API String ID: 47109696-2199428270
                                  • Opcode ID: 5e4138a75d676a6e29719ea14a6ac8f3ccc9f4e4cde26a7556b0de88dae5e1ac
                                  • Instruction ID: aa5cd69e504587c061a58de22e540fe2c0eb6883408e267526cdea27caab368f
                                  • Opcode Fuzzy Hash: 5e4138a75d676a6e29719ea14a6ac8f3ccc9f4e4cde26a7556b0de88dae5e1ac
                                  • Instruction Fuzzy Hash: AF51D730E002489BDB10EF61DC52ADEB7B9EF44745F50857BE804A7292DB3CAF09CA18
                                  APIs
                                    • Part of subcall function 0042426C: SetWindowTextA.USER32(?,00000000), ref: 00424284
                                  • ShowWindow.USER32(?,00000005,00000000,00490051,?,?,00000000), ref: 0048FE22
                                    • Part of subcall function 0042D7A8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7BB
                                    • Part of subcall function 00407248: SetCurrentDirectoryA.KERNEL32(00000000,?,0048FE4A,00000000,0049001D,?,?,00000005,00000000,00490051,?,?,00000000), ref: 00407253
                                    • Part of subcall function 0042D330: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3BE,?,?,00000000,?,?,0048FE54,00000000,0049001D,?,?,00000005), ref: 0042D365
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                  • String ID: .dat$.msg$IMsg$Uninstall
                                  • API String ID: 3312786188-1660910688
                                  • Opcode ID: 58f822fbd837717f0981da684dc2b383601ea0dfaea9b5e4cf4cd09cf21b3ff0
                                  • Instruction ID: 7c6a2e238760992e5c67a20dbafbe681e3287029f6f793f122bf29b0ac37eaf5
                                  • Opcode Fuzzy Hash: 58f822fbd837717f0981da684dc2b383601ea0dfaea9b5e4cf4cd09cf21b3ff0
                                  • Instruction Fuzzy Hash: 33316134A002049FCB11FF65DC52A5E7BB5EB89308F50847BF900A7751CB39AD05DB58
                                  APIs
                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                  • ExitProcess.KERNEL32 ref: 00404E0D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ExitMessageProcess
                                  • String ID: Error$Runtime error at 00000000$di@
                                  • API String ID: 1220098344-180755605
                                  • Opcode ID: cb3f50221c7fc4a280dd17ceecd31964af7b7a4f5716c995046d60236483f2a1
                                  • Instruction ID: 54305f10cd77fd258ec0cbb2b3b89b3afa079266c0d37f3845e7031a68d66c88
                                  • Opcode Fuzzy Hash: cb3f50221c7fc4a280dd17ceecd31964af7b7a4f5716c995046d60236483f2a1
                                  • Instruction Fuzzy Hash: 1E21C560A44281AAEB16A775EE817163B9197E5348F048177E700B73F3C6FC8C84C7AE
                                  APIs
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00455C7C
                                  • GetExitCodeProcess.KERNEL32(?,00490736), ref: 00455C9D
                                  • CloseHandle.KERNEL32(?,00455CD0,?,?,dE,00000000,00000000), ref: 00455CC3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                  • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                  • API String ID: 2573145106-3235461205
                                  • Opcode ID: 3a4e1d8e3212983b0db30b4301edd67b4f03435f1b712903e7d44db79ec60759
                                  • Instruction ID: e42cd4710a2bc55cfeee88e204bbff949c6156d41efd27b396eab6340a6db490
                                  • Opcode Fuzzy Hash: 3a4e1d8e3212983b0db30b4301edd67b4f03435f1b712903e7d44db79ec60759
                                  • Instruction Fuzzy Hash: 2001DB30644B04AFDB12DB99CD51F3A73A8EB45714F604477F910E73D3D679AD048658
                                  APIs
                                  • RegDeleteKeyA.ADVAPI32(?,00000000), ref: 0042DC78
                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DDFB,00000000,0042DE13,?,?,?,?,00000006,?,00000000,0048F8FB), ref: 0042DC93
                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DC99
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressDeleteHandleModuleProc
                                  • String ID: RegDeleteKeyExA$advapi32.dll
                                  • API String ID: 588496660-1846899949
                                  • Opcode ID: 4d879dacb439db73e44281dd357f43295a9124d1e96faca6c59bbbcf227e751d
                                  • Instruction ID: f6d26141eb233d03b94b2ed72026fa1db25b9960d6d40d8c32de7d906beb62d4
                                  • Opcode Fuzzy Hash: 4d879dacb439db73e44281dd357f43295a9124d1e96faca6c59bbbcf227e751d
                                  • Instruction Fuzzy Hash: AAE06DF0B41230BAD62067ABBE4AF9326289F64725F544537F145A62D182FC4C41DE5C
                                  APIs
                                  • GetWindowThreadProcessId.USER32(00000000), ref: 0047167C
                                  • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00471773,\/I,00000000), ref: 0047168F
                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00471695
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProcProcessThreadWindow
                                  • String ID: AllowSetForegroundWindow$user32.dll
                                  • API String ID: 1782028327-3855017861
                                  • Opcode ID: aa661ddeab3caf5f101db6b0e0b7614fbf7376c7e63f4f7fd5c65f3a9d368f71
                                  • Instruction ID: a3f3d1e0e2b6813b030e7eba76e2e5281102dca64866dc994b1bbab78c7268d3
                                  • Opcode Fuzzy Hash: aa661ddeab3caf5f101db6b0e0b7614fbf7376c7e63f4f7fd5c65f3a9d368f71
                                  • Instruction Fuzzy Hash: ACD05EA0A017016BDE20B2B98D46D9B229C8D9471571C842B3404E21A6CA7CE800593C
                                  APIs
                                  • BeginPaint.USER32(00000000,?), ref: 00416BFA
                                  • SaveDC.GDI32(?), ref: 00416C2B
                                  • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416CED), ref: 00416C8C
                                  • RestoreDC.GDI32(?,?), ref: 00416CB3
                                  • EndPaint.USER32(00000000,?,00416CF4,00000000,00416CED), ref: 00416CE7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Paint$BeginClipExcludeRectRestoreSave
                                  • String ID:
                                  • API String ID: 3808407030-0
                                  • Opcode ID: 05b91c705dead32c22d601d06aaaaefc09bf00903a581cfd1e69d9044e53cd27
                                  • Instruction ID: 511e07c03593910ab38166e7e8fb99fbe2c7a584a9aae09983b44cf3f48c28fc
                                  • Opcode Fuzzy Hash: 05b91c705dead32c22d601d06aaaaefc09bf00903a581cfd1e69d9044e53cd27
                                  • Instruction Fuzzy Hash: E3414F70A04204AFCB14DFA9C985FAEB7F8EF48304F1640AAE84497362D778ED41CB58
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1db4e5bd5f3073e3ba55cd164d497178988a2e4975f87a427fd18fb625363a14
                                  • Instruction ID: 16203bcbef39f9c243701adad7e95064df465d958f07c31b5226583d855f1c1b
                                  • Opcode Fuzzy Hash: 1db4e5bd5f3073e3ba55cd164d497178988a2e4975f87a427fd18fb625363a14
                                  • Instruction Fuzzy Hash: 26311F746047409FC320EB69C985BABB7E8AF89714F04891EF9D5C7791C678EC818B19
                                  APIs
                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297B0
                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297DF
                                  • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 004297FB
                                  • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 00429826
                                  • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429844
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 4dd9bf55c7c84a0b3396b3554a59a90620238bc04d6e8efcc95ab0f776c5b98c
                                  • Instruction ID: 5d1141d17212aa5e1ef3752c12f2028c23e494b9df8dcdef2cd4cdfe20676ed7
                                  • Opcode Fuzzy Hash: 4dd9bf55c7c84a0b3396b3554a59a90620238bc04d6e8efcc95ab0f776c5b98c
                                  • Instruction Fuzzy Hash: 3D21A1707507047AD710AB67DC82F9B76ACEB42B04F95443E7502BB2D2DA79DD428258
                                  APIs
                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BB72
                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BB7C
                                  • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BBBA
                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD25,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC01
                                  • DeleteObject.GDI32(00000000), ref: 0041BC42
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$A26310A570DeleteObject
                                  • String ID:
                                  • API String ID: 4277397052-0
                                  • Opcode ID: 9adb9e8c89caf01d0a638f348740fc7edbd2731d44c2c24643151140fb28a82b
                                  • Instruction ID: 7d0d535dbebdf4f070bae8ba3fc8fcac1153e0bddf000454aa628fb6ab968105
                                  • Opcode Fuzzy Hash: 9adb9e8c89caf01d0a638f348740fc7edbd2731d44c2c24643151140fb28a82b
                                  • Instruction Fuzzy Hash: 0D317174E00209EFDB04DFA5C941AAEF7F5EB48700F10846AF514AB385D7389E80DB94
                                  APIs
                                    • Part of subcall function 0045A540: SetLastError.KERNEL32(00000057,00000000,0045A60C,?,?,?,?,00000000), ref: 0045A5AB
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0046D96C,?,?,00000001,0049307C), ref: 0046D925
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0046D96C,?,?,00000001,0049307C), ref: 0046D93B
                                  Strings
                                  • Could not set permissions on the registry key because it currently does not exist., xrefs: 0046D92F
                                  • Setting permissions on registry key: %s\%s, xrefs: 0046D8EA
                                  • Failed to set permissions on registry key (%d)., xrefs: 0046D94C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                  • API String ID: 1452528299-4018462623
                                  • Opcode ID: 18f77fade0994c6fc899b5d9ef85e329e14ba50152d782af13df1c5d82336a90
                                  • Instruction ID: 2fb07483fd0a7251048a58d7dedf702ee348f7c8dbf283d8b9408d2b96eb0a9e
                                  • Opcode Fuzzy Hash: 18f77fade0994c6fc899b5d9ef85e329e14ba50152d782af13df1c5d82336a90
                                  • Instruction Fuzzy Hash: CB21A4B0F046445FCB00DBA9C8826AEBAE4DB49314F50417BA414E7392E6785D09CBAE
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocString
                                  • String ID:
                                  • API String ID: 262959230-0
                                  • Opcode ID: ec9330e6fa7a8659c1beb9ec543e50d139d4e0e8a78981a79d0ac640ed5c34b8
                                  • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                  • Opcode Fuzzy Hash: ec9330e6fa7a8659c1beb9ec543e50d139d4e0e8a78981a79d0ac640ed5c34b8
                                  • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                  APIs
                                  • 73A18830.GDI32(00000000,00000000,00000000), ref: 004143C1
                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 004143C9
                                  • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143DD
                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143E3
                                  • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143EE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A122A18830$A480
                                  • String ID:
                                  • API String ID: 3325508737-0
                                  • Opcode ID: a82122af31a8aec246995b2a86ca6dd819a62577bbe41f01694e2b233259fffd
                                  • Instruction ID: 075c4eaa6eababf39ef1bcc04ba03af1ed36323413641ea814e4f99408aec64f
                                  • Opcode Fuzzy Hash: a82122af31a8aec246995b2a86ca6dd819a62577bbe41f01694e2b233259fffd
                                  • Instruction Fuzzy Hash: E501DF3131C3806AD200B63E8C85A9F6BED8FCA314F05546EF498DB382CA7ACC018766
                                  APIs
                                  • SetActiveWindow.USER32(?,?,00000000,0047BE5D,?,?,00000001,?), ref: 0047BC59
                                  • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0047BCCE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ActiveChangeNotifyWindow
                                  • String ID: $Need to restart Windows? %s
                                  • API String ID: 1160245247-4200181552
                                  • Opcode ID: f71dca2b3cdd1a9f974c47fd04c85dafb3fc8e5a441d9339a4d45334759f384d
                                  • Instruction ID: f4c1e1fff3503470ea18fdaabc6d14c851de77ee15ab21044676623dc6a244ae
                                  • Opcode Fuzzy Hash: f71dca2b3cdd1a9f974c47fd04c85dafb3fc8e5a441d9339a4d45334759f384d
                                  • Instruction Fuzzy Hash: 0F9170346042449FCB01EF69D886B9A77F5EF56308F1080BBE8049B366DB78AD45CB99
                                  APIs
                                    • Part of subcall function 0042C6FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C720
                                    • Part of subcall function 0042CAA4: CharPrevA.USER32(?,00000000,?,00000001,?,?,0042CBD2,00000000,0042CBF8,?,00000001,?,?,00000000,?,0042CC4A), ref: 0042CACC
                                  • GetLastError.KERNEL32(00000000,0046A17D,?,?,00000001,0049307C), ref: 0046A05A
                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046A0D4
                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046A0F9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ChangeNotify$CharErrorFullLastNamePathPrev
                                  • String ID: Creating directory: %s
                                  • API String ID: 2168629741-483064649
                                  • Opcode ID: eaa5e955b4a82374fedd4bb1d7a028e07cef00fa7cb12a1e86328300a5bb0db0
                                  • Instruction ID: 39b67aeb1d7855c22aabfe2f82cf891ef9e94af442bcdac43ae26702b455444b
                                  • Opcode Fuzzy Hash: eaa5e955b4a82374fedd4bb1d7a028e07cef00fa7cb12a1e86328300a5bb0db0
                                  • Instruction Fuzzy Hash: 8A512374E00248ABDB01DFA9C982BDEB7F5AF49304F50846AE851B7382D7785E04CF5A
                                  APIs
                                  • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406FA3
                                  • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040701D
                                  • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 00407075
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Enum$NameOpenResourceUniversal
                                  • String ID: Z
                                  • API String ID: 3604996873-1505515367
                                  • Opcode ID: b45eb0edb20795645dcbd4fc4cc9de1517ba2fb8e3a3a1bdfe5558624a41bfc2
                                  • Instruction ID: bd8e5ae94ca74df4e9131491a9bde93b7ed2ce1d7e59c57d2d509c2ab305fdf4
                                  • Opcode Fuzzy Hash: b45eb0edb20795645dcbd4fc4cc9de1517ba2fb8e3a3a1bdfe5558624a41bfc2
                                  • Instruction Fuzzy Hash: C3516370E04248AFDB11DF65C981A9FB7B9EF09304F1041BAE500BB3D1D778AE458B5A
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 0044C72A
                                  • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044C755
                                  • DrawTextA.USER32(00000000,00000000), ref: 0044C7EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DrawText$EmptyRect
                                  • String ID:
                                  • API String ID: 182455014-2867612384
                                  • Opcode ID: f37fe9e577420607298c9583aacd29a253469b4ecb6affd38da19aac1ff88878
                                  • Instruction ID: 4bcae54fe600c87244e68b3e4b857699d32a5b02b35774ead0fedabfa34a998c
                                  • Opcode Fuzzy Hash: f37fe9e577420607298c9583aacd29a253469b4ecb6affd38da19aac1ff88878
                                  • Instruction Fuzzy Hash: 14514C70A00249AFDB51DFA5C885BDEBBF4EF49304F18807AE845EB252D738A945CF64
                                  APIs
                                  • 73A1A570.USER32(00000000,00000000,0042E9FF,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042E8D6
                                    • Part of subcall function 0041A190: CreateFontIndirectA.GDI32(?), ref: 0041A24F
                                  • SelectObject.GDI32(?,00000000), ref: 0042E8F9
                                  • 73A1A480.USER32(00000000,?,0042E9E4,00000000,0042E9DD,?,00000000,00000000,0042E9FF,?,?,?,?,00000000,00000000,00000000), ref: 0042E9D7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: A480A570CreateFontIndirectObjectSelect
                                  • String ID: ...\
                                  • API String ID: 2998766281-983595016
                                  • Opcode ID: 0abe42e3825d138716532803585986b19ef8b1cd23e6fed3d9a5b7748e7d04e5
                                  • Instruction ID: 807027aef349940e21883cde7310681b589974d129d52fe5cab9b03fce9682ec
                                  • Opcode Fuzzy Hash: 0abe42e3825d138716532803585986b19ef8b1cd23e6fed3d9a5b7748e7d04e5
                                  • Instruction Fuzzy Hash: E43163B0B00228AFDF11EB9AD841BAEB7F8EF49304F90447BF400A7291D7785D41CA59
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 004533EA
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,004534B0), ref: 00453454
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressByteCharMultiProcWide
                                  • String ID: SfcIsFileProtected$sfc.dll
                                  • API String ID: 2508298434-591603554
                                  • Opcode ID: 85079f74e90700b6d1b366bf6e001016943dfb8dc77e17398e66bb02010dc287
                                  • Instruction ID: 1adb4bde248a8b19f2f304064bd770535e454300abe4aaf5ea9dda1ac3de6c9a
                                  • Opcode Fuzzy Hash: 85079f74e90700b6d1b366bf6e001016943dfb8dc77e17398e66bb02010dc287
                                  • Instruction Fuzzy Hash: C741B470A00218ABEB21DF55DD85B9DB7B8AB0534AF5040BBF808A3292D7785F48DA5C
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048EF85,_iu,?,00000000,00452172), ref: 00452127
                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,0048EF85,_iu,?,00000000,00452172), ref: 00452137
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle
                                  • String ID: .tmp$_iu
                                  • API String ID: 3498533004-10593223
                                  • Opcode ID: cbc7b6296da48d79ffcb0f48c517e04f3662845ca18ee5cfcd3d2c16b97ed60b
                                  • Instruction ID: 8b1672352a1cca793e1e6cdfbdd22016e493eddba5fdcbb921eb9ed9b7b44ad0
                                  • Opcode Fuzzy Hash: cbc7b6296da48d79ffcb0f48c517e04f3662845ca18ee5cfcd3d2c16b97ed60b
                                  • Instruction Fuzzy Hash: 0A31B470A00219ABCB11EBA5C982B9FBBB5AF55305F60452BF900B73C2D6785F05C769
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegCloseKey.ADVAPI32(?,0048B2FE,?,?,00000001,00000000,00000000,0048B319), ref: 0048B2E7
                                  Strings
                                  • %s\%s_is1, xrefs: 0048B278
                                  • Inno Setup CodeFile: , xrefs: 0048B2AA
                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0048B25A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: %s\%s_is1$Inno Setup CodeFile: $Software\Microsoft\Windows\CurrentVersion\Uninstall
                                  • API String ID: 47109696-1837835967
                                  • Opcode ID: 14285ca2f0b5050eeb10927837999f101f9ee02a017fb9b220db0c994c14a3e0
                                  • Instruction ID: 0bbfca5d8e67a63f19b98566c4155a9780f55c0bd593ce93c1bd7f852685ee81
                                  • Opcode Fuzzy Hash: 14285ca2f0b5050eeb10927837999f101f9ee02a017fb9b220db0c994c14a3e0
                                  • Instruction Fuzzy Hash: 6C319970A042485FDB11EF96CC5169EBBF8EB48304F904477E814E7391D7789D058B98
                                  APIs
                                  • GetClassInfoA.USER32(00400000,?,?), ref: 00416427
                                  • UnregisterClassA.USER32(?,00400000), ref: 00416453
                                  • RegisterClassA.USER32(?), ref: 00416476
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Class$InfoRegisterUnregister
                                  • String ID: @
                                  • API String ID: 3749476976-2766056989
                                  • Opcode ID: a20fcd8b4000eae86e158a7cf10cda7c64d6fb475a14681c470eb96fef312757
                                  • Instruction ID: 74af36b6803d41f6853cd3ce3d24e6ffc0c269dd3492e9de927f187c4c73ed65
                                  • Opcode Fuzzy Hash: a20fcd8b4000eae86e158a7cf10cda7c64d6fb475a14681c470eb96fef312757
                                  • Instruction Fuzzy Hash: AA315C702042409BDB10EF69C981B9A77E5AB88308F04457FFA45DB392DB39D985CB6A
                                  APIs
                                  • SendMessageA.USER32(00000000,0000000E,00000000,00000000), ref: 0044F694
                                  • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044F6D6
                                  • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044F707
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$ExecuteShell
                                  • String ID: open
                                  • API String ID: 2179883421-2758837156
                                  • Opcode ID: 5d65bdf1a68a50360177b59e1b17de20557ee183efcfcb1c09acd8af14c107c4
                                  • Instruction ID: 27722ccdd30e14b9079027b813231ec9417c8d596d109131258b3d0fa24c6570
                                  • Opcode Fuzzy Hash: 5d65bdf1a68a50360177b59e1b17de20557ee183efcfcb1c09acd8af14c107c4
                                  • Instruction Fuzzy Hash: 1C215070E40204BFEB10DFA9DC82B9EBBB8EF44714F11857AB501A7292D67C9A458A48
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,00490ACD,00000000,004902F6,?,?,00000000,00492628), ref: 00490270
                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00490ACD,00000000,004902F6,?,?,00000000,00492628), ref: 00490299
                                  • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004902B2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$Attributes$Move
                                  • String ID: isRS-%.3u.tmp
                                  • API String ID: 3839737484-3657609586
                                  • Opcode ID: 8d501dbe8754779fbbc4551a6ef16c6ba155ba939730555f28b22adbbd9d1952
                                  • Instruction ID: 84ec0ba2a7a86931400e9934c1aa84bf5b308f9588d1f16149e0ac51d8a7354a
                                  • Opcode Fuzzy Hash: 8d501dbe8754779fbbc4551a6ef16c6ba155ba939730555f28b22adbbd9d1952
                                  • Instruction Fuzzy Hash: CE216271E01219AFCF11EFA9C885AAFBBB8EF44314F10457BB814B72D1D6389E018A59
                                  APIs
                                    • Part of subcall function 0042C6FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C720
                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00454A5C
                                  • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00454A89
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                  • String ID: LoadTypeLib$RegisterTypeLib
                                  • API String ID: 1312246647-2435364021
                                  • Opcode ID: 61cb2b2391c203defd257abac4021e1b6939228e1dc124a340144f06dba41211
                                  • Instruction ID: 783231ea94435fc0087f34711460946af1774244c06649ca950b936fb7940314
                                  • Opcode Fuzzy Hash: 61cb2b2391c203defd257abac4021e1b6939228e1dc124a340144f06dba41211
                                  • Instruction Fuzzy Hash: 8911A230B40604AFDB51DBA6DD51A5EB7B9DB89309B104476B800D7652DA389D44C618
                                  APIs
                                    • Part of subcall function 0042426C: SetWindowTextA.USER32(?,00000000), ref: 00424284
                                  • GetFocus.USER32 ref: 00471F6B
                                  • GetKeyState.USER32(0000007A), ref: 00471F7D
                                  • WaitMessage.USER32(?,00000000,00471FA4,?,00000000,00471FCB,?,?,00000001,00000000,?,?,?,?,004791FF,00000000), ref: 00471F87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FocusMessageStateTextWaitWindow
                                  • String ID: Wnd=$%x
                                  • API String ID: 1381870634-2927251529
                                  • Opcode ID: 904e366136cff3dcaea322836a94cc964bf7325938357fb60853c8530aeb4b31
                                  • Instruction ID: c5684f2cadfa6479c06ce6299043275e4b927561dd953dc9e3c22c30dc13880d
                                  • Opcode Fuzzy Hash: 904e366136cff3dcaea322836a94cc964bf7325938357fb60853c8530aeb4b31
                                  • Instruction Fuzzy Hash: 51115434A04144AFC701EFA9DC51A9E77B8EB49714B5184B7F408E3661D73C6E00CA69
                                  APIs
                                  • GetActiveWindow.USER32 ref: 0042EB9F
                                  • MessageBoxA.USER32(?,00000000,00000000,00000001), ref: 0042EBCB
                                  • SetActiveWindow.USER32(?,0042EBF9,00000000,0042EC47,?,?,00000000,?), ref: 0042EBEC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ActiveWindow$Message
                                  • String ID: t}G
                                  • API String ID: 2113736151-3734030870
                                  • Opcode ID: 29a5b97e5e16aea11bd18ac248af5cdc38bd738e31227901ecfe22b68a917f0a
                                  • Instruction ID: 93637352c78226270701b452ebd95810c2fea060df2177fc870e4549b641cd3b
                                  • Opcode Fuzzy Hash: 29a5b97e5e16aea11bd18ac248af5cdc38bd738e31227901ecfe22b68a917f0a
                                  • Instruction Fuzzy Hash: 1B010030A00218AFD701EBB6DC02D5BBBACEB09714B42487AB400D3261D6789C10CA68
                                  APIs
                                  • FileTimeToLocalFileTime.KERNEL32(?), ref: 00468DAC
                                  • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00468DBB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Time$File$LocalSystem
                                  • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                  • API String ID: 1748579591-1013271723
                                  • Opcode ID: 7e5271fab70280bf4b606e1d52b7b41780ffbf2908240b8135230958cc2b66a9
                                  • Instruction ID: af565f08344929a1575728fac9f51d9e1992ec61425725bc294c4af9dfcd658b
                                  • Opcode Fuzzy Hash: 7e5271fab70280bf4b606e1d52b7b41780ffbf2908240b8135230958cc2b66a9
                                  • Instruction Fuzzy Hash: 4D11F8A140C3919ED340DF6AC44432FBBE4AB89704F44496EF9D8D6381E77AC948DB67
                                  APIs
                                  • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 004525DB
                                    • Part of subcall function 00406EF0: DeleteFileA.KERNEL32(00000000,00492628,004906E1,00000000,00490736,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EFB
                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00452600
                                    • Part of subcall function 00451C18: GetLastError.KERNEL32(00000000,00452689,00000005,00000000,004526BE,?,?,00000000,00492628,00000004,00000000,00000000,00000000,?,00490395,00000000), ref: 00451C1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$AttributesDeleteErrorLastMove
                                  • String ID: DeleteFile$MoveFile
                                  • API String ID: 3024442154-139070271
                                  • Opcode ID: a50aafd5b99c9cbf6c6a1f16007cc2786bef0d47e124eeb0cd35235b1fbc0f60
                                  • Instruction ID: 4e1aed58776595ab6c7b67b54cba174f3ed66ee01ab59955a5ec3a7bb6030dfd
                                  • Opcode Fuzzy Hash: a50aafd5b99c9cbf6c6a1f16007cc2786bef0d47e124eeb0cd35235b1fbc0f60
                                  • Instruction Fuzzy Hash: 5AF086706441045BEB01FBA5DA5266F63ECEB4930AFA0443BB800B76C3DA7C9D094939
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegCloseKey.ADVAPI32(?,00453F8F,?,00000001,00000000), ref: 00453F82
                                  Strings
                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00453F30
                                  • PendingFileRenameOperations2, xrefs: 00453F63
                                  • PendingFileRenameOperations, xrefs: 00453F54
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpen
                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                  • API String ID: 47109696-2115312317
                                  • Opcode ID: 21250b3f59e8a1b3ab45e49100b6a533c2958c5d03e63bbb63f4184d55fa8918
                                  • Instruction ID: 2fe5d9dd412f96f0258c427e8e9e7532a7d77a38f3856869fbc3dabfb8f5c388
                                  • Opcode Fuzzy Hash: 21250b3f59e8a1b3ab45e49100b6a533c2958c5d03e63bbb63f4184d55fa8918
                                  • Instruction Fuzzy Hash: 1DF0C233B443087FDB09DA62AC07A1AB3ECD744B56FA0446BF80086582DA79AE04922C
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047C525
                                  • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047C548
                                  Strings
                                  • System\CurrentControlSet\Control\Windows, xrefs: 0047C4F2
                                  • CSDVersion, xrefs: 0047C51C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                  • API String ID: 3677997916-1910633163
                                  • Opcode ID: 32f9c9d33b3d4a1cec81c858ea2cc638cd0cfa3a42bb1ff432fda8eb6f705346
                                  • Instruction ID: 2b22ae4652a4094afc35098fa0d5140fa3c6298d341fdca8ef5f3daa64d39871
                                  • Opcode Fuzzy Hash: 32f9c9d33b3d4a1cec81c858ea2cc638cd0cfa3a42bb1ff432fda8eb6f705346
                                  • Instruction Fuzzy Hash: 9EF03175A40218B6DF10DBD58C85BDFB3BCAB04704F20856BE518E7280E779EB04CB99
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,004522D6,00000000,00452379,?,?,00000000,00000000,00000000,00000000,00000000,?,00452645,00000000), ref: 0042D7EE
                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D7F4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                  • API String ID: 1646373207-4063490227
                                  • Opcode ID: 3ed141b827fa145380e35482eff6ef17b39d2e2a6c7c0a7d94d3e4db73219d37
                                  • Instruction ID: 72f845c82f3cbe693efe641176354b007bcea55f3b4776dcd007fff52ee4f80f
                                  • Opcode Fuzzy Hash: 3ed141b827fa145380e35482eff6ef17b39d2e2a6c7c0a7d94d3e4db73219d37
                                  • Instruction Fuzzy Hash: CEE04F61F40B9012D71079BA6C87B6B158D8B88724F94843B39A4E62C3DEBCD9441A9E
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00490B49), ref: 0044EE6B
                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044EE71
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: NotifyWinEvent$user32.dll
                                  • API String ID: 1646373207-597752486
                                  • Opcode ID: 70ab6ca44c1c58fc54deb4365d547e37731eaf459d85ae999571f99ff6fdd204
                                  • Instruction ID: 3299c0b031c0e1fe2281b99bd24a528ff0331131e662fdb77b0e16fc83453d47
                                  • Opcode Fuzzy Hash: 70ab6ca44c1c58fc54deb4365d547e37731eaf459d85ae999571f99ff6fdd204
                                  • Instruction Fuzzy Hash: B0E012E0E42741AAEB01BBF79A46B0A3AD1B73471DF1004BBF10467192CBBC0458CB1E
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00490B95,00000001,00000000,00490BB9), ref: 0049091E
                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00490924
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: DisableProcessWindowsGhosting$user32.dll
                                  • API String ID: 1646373207-834958232
                                  • Opcode ID: c967897bb093205d4fedeed5c30c4f40c75fdd424a4095d0a0f0bad314443b32
                                  • Instruction ID: 838b278ec98e31f4c73fd57d7bfbee2b42f08c5e91e18395c18da76804b5d864
                                  • Opcode Fuzzy Hash: c967897bb093205d4fedeed5c30c4f40c75fdd424a4095d0a0f0bad314443b32
                                  • Instruction Fuzzy Hash: EEB092C064170168EC1033F60D12B1F0C084881724B1400373810B10C3CD6CD800582D
                                  APIs
                                    • Part of subcall function 0044AD34: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044EE61,00490B49), ref: 0044AD5B
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044AD73
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044AD85
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044AD97
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044ADA9
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044ADBB
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044ADCD
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044ADDF
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044ADF1
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044AE03
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044AE15
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044AE27
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044AE39
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044AE4B
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044AE5D
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044AE6F
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044AE81
                                    • Part of subcall function 0044AD34: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044AE93
                                  • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00490B67), ref: 0045FCCB
                                  • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 0045FCD1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                  • API String ID: 2238633743-2683653824
                                  • Opcode ID: dceba0c1e70a86ae6835c65f47c615907b02d718ce7920ac66bf667d9a7d3384
                                  • Instruction ID: 337f9dc4bf1040498e6f486c22bc5dde57220a7dd07e65f04bb4b60c7b67ef44
                                  • Opcode Fuzzy Hash: dceba0c1e70a86ae6835c65f47c615907b02d718ce7920ac66bf667d9a7d3384
                                  • Instruction Fuzzy Hash: 83B092D0A81785B88E01B7B2998391A2514A650B0F720047B7C04B94C7CEBC008D6A6F
                                  APIs
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046C7F5,?,00000000,?,00000001,00000000,0046C9C3,?,00000000,?,00000000,?,0046CB7E), ref: 0046C7D1
                                  • FindClose.KERNEL32(000000FF,0046C7FC,0046C7F5,?,00000000,?,00000001,00000000,0046C9C3,?,00000000,?,00000000,?,0046CB7E,?), ref: 0046C7EF
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046C917,?,00000000,?,00000001,00000000,0046C9C3,?,00000000,?,00000000,?,0046CB7E), ref: 0046C8F3
                                  • FindClose.KERNEL32(000000FF,0046C91E,0046C917,?,00000000,?,00000001,00000000,0046C9C3,?,00000000,?,00000000,?,0046CB7E,?), ref: 0046C911
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileNext
                                  • String ID:
                                  • API String ID: 2066263336-0
                                  • Opcode ID: 1eb9b9d3c023d84a09ef91d182cf047f3dac9a2ab61e2e2cb0095298d4bd912f
                                  • Instruction ID: 1dd2fae92c3a96226fdad02eb244197cfc035410fb76892232ec07de3388933a
                                  • Opcode Fuzzy Hash: 1eb9b9d3c023d84a09ef91d182cf047f3dac9a2ab61e2e2cb0095298d4bd912f
                                  • Instruction Fuzzy Hash: 21B12D7490424D9FCF11DFA5C881ADEBBB9BF4C304F5081AAE848B3251E7389A45CF59
                                  APIs
                                  • GetDesktopWindow.USER32 ref: 00413CEE
                                  • GetDesktopWindow.USER32 ref: 00413DA6
                                    • Part of subcall function 00418E68: 6F5BC6F0.COMCTL32(?,00000000,00413F6B,00000000,0041407B,?,?,00492628), ref: 00418E84
                                    • Part of subcall function 00418E68: ShowCursor.USER32(00000001,?,00000000,00413F6B,00000000,0041407B,?,?,00492628), ref: 00418EA1
                                  • SetCursor.USER32(00000000,?,?,?,?,00413A9B,00000000,00413AAE), ref: 00413DE4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CursorDesktopWindow$Show
                                  • String ID:
                                  • API String ID: 2074268717-0
                                  • Opcode ID: c0a5a9a3f23ddf0fdb38005436cf92fc6adf24d58530c29053f60a471aec8e15
                                  • Instruction ID: c44ea819ba4037f48297b9dda5801cfcbd8121a3a152854b6b02c08412c937c2
                                  • Opcode Fuzzy Hash: c0a5a9a3f23ddf0fdb38005436cf92fc6adf24d58530c29053f60a471aec8e15
                                  • Instruction Fuzzy Hash: 90414C75600110BFCB10EF29FAD9B9637E5AB64325F16807BE404CB365DAB8EC81DB58
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A15
                                  • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408A84
                                  • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B1F
                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408B5E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: LoadString$FileMessageModuleName
                                  • String ID:
                                  • API String ID: 704749118-0
                                  • Opcode ID: e08be93b19a1cddc4bd5487b5509b10aac953965d6ff4287a83413ce4527f0a1
                                  • Instruction ID: 4e3ae3d55980ca36df37c0f6f31f55762440d7de19fd646938f5a693a080efc6
                                  • Opcode Fuzzy Hash: e08be93b19a1cddc4bd5487b5509b10aac953965d6ff4287a83413ce4527f0a1
                                  • Instruction Fuzzy Hash: 0F3143706083849AD330EB65C945F9B77E89B86704F40483FB6C8E72D1DB795908876B
                                  APIs
                                  • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044DFF9
                                    • Part of subcall function 0044C62C: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044C65E
                                  • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E07D
                                    • Part of subcall function 0042BB5C: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BB70
                                  • IsRectEmpty.USER32(?), ref: 0044E03F
                                  • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E062
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                  • String ID:
                                  • API String ID: 855768636-0
                                  • Opcode ID: a016e4b893d0b61d6fc16ea788ceac071314e27b0018c062adb4e940fa0ff4d7
                                  • Instruction ID: 7aee670bcfb8eb3b6de293677f7b28f2d941b2dfee79f0c9038e744660d2ac79
                                  • Opcode Fuzzy Hash: a016e4b893d0b61d6fc16ea788ceac071314e27b0018c062adb4e940fa0ff4d7
                                  • Instruction Fuzzy Hash: BD11907174031027E610BA3E9C86B5F76899B88748F05493FB545EB383DDBDDC094399
                                  APIs
                                  • OffsetRect.USER32(?,?,00000000), ref: 0048DB10
                                  • OffsetRect.USER32(?,00000000,?), ref: 0048DB2B
                                  • OffsetRect.USER32(?,?,00000000), ref: 0048DB45
                                  • OffsetRect.USER32(?,00000000,?), ref: 0048DB60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: OffsetRect
                                  • String ID:
                                  • API String ID: 177026234-0
                                  • Opcode ID: fc16b123eb7b5af0d1f41d7d74d95bc65ca2d2300f8b1348e127f489464c5e53
                                  • Instruction ID: 20aeee4d2b07ae62cc9dc5e78f47db44159e8b2d0969b42eb6e8c3539826bbe7
                                  • Opcode Fuzzy Hash: fc16b123eb7b5af0d1f41d7d74d95bc65ca2d2300f8b1348e127f489464c5e53
                                  • Instruction Fuzzy Hash: DA218EB6B04201ABD700DE69CD85E5BB7EEEBD4304F14CA2AF544C7389D634F84487A6
                                  APIs
                                  • GetCursorPos.USER32 ref: 00417208
                                  • SetCursor.USER32(00000000), ref: 0041724B
                                  • GetLastActivePopup.USER32(?), ref: 00417275
                                  • GetForegroundWindow.USER32(?), ref: 0041727C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Cursor$ActiveForegroundLastPopupWindow
                                  • String ID:
                                  • API String ID: 1959210111-0
                                  • Opcode ID: 31a9e7ed65d1c6a10f15c6d0b6e52d74fbafc79933164b7f4b16210c0427c26c
                                  • Instruction ID: c6d496dfd2e179b176722755b72bbf9acc304802cb498c635dadf3855441ee16
                                  • Opcode Fuzzy Hash: 31a9e7ed65d1c6a10f15c6d0b6e52d74fbafc79933164b7f4b16210c0427c26c
                                  • Instruction Fuzzy Hash: AF21B0302042108ACB10EB6AD9446D733B1AB58724B5649BFF8449B392D77CCCC2CB89
                                  APIs
                                  • MulDiv.KERNEL32(8B500000,00000008,?), ref: 0048D779
                                  • MulDiv.KERNEL32(50142444,00000008,?), ref: 0048D78D
                                  • MulDiv.KERNEL32(F77DE7E8,00000008,?), ref: 0048D7A1
                                  • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 0048D7BF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1c7c6c338261a481ad8b7901dc756b9c3c7a5dc3a5f053bd0898b94715f12a61
                                  • Instruction ID: 600d8a0932f196341a5d2119bb187cb8608b3b3d374fe33bc178acc1610e68b6
                                  • Opcode Fuzzy Hash: 1c7c6c338261a481ad8b7901dc756b9c3c7a5dc3a5f053bd0898b94715f12a61
                                  • Instruction Fuzzy Hash: 7D113376A04204AFCB40EFA9D8C4D9B77ECEF4D370B14456AF918DB286D634ED408BA4
                                  APIs
                                  • GetClassInfoA.USER32(00400000,0041F418,?), ref: 0041F449
                                  • UnregisterClassA.USER32(0041F418,00400000), ref: 0041F472
                                  • RegisterClassA.USER32(00491598), ref: 0041F47C
                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F4B7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Class$InfoLongRegisterUnregisterWindow
                                  • String ID:
                                  • API String ID: 4025006896-0
                                  • Opcode ID: 761ca2ece1ab3754932666086e5ff0fe31a56c3d7f92931e99de52f18d346379
                                  • Instruction ID: 0e76fd6e7c714867a95bae8c9fe2d4343c59fb837708c2c10e589f0ce1237785
                                  • Opcode Fuzzy Hash: 761ca2ece1ab3754932666086e5ff0fe31a56c3d7f92931e99de52f18d346379
                                  • Instruction Fuzzy Hash: 380192712401057BCB10EBA8DD81E9B3798A759324B11423BBA16E72E2C6359D198BAC
                                  APIs
                                  • WaitForInputIdle.USER32(?,00000032), ref: 00453510
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00453532
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00453541
                                  • CloseHandle.KERNEL32(?,0045356E,00453567,?,?,?,00000000,?,?,00453741,?,?,?,D:"G,00000000,00000000), ref: 00453561
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                  • String ID:
                                  • API String ID: 4071923889-0
                                  • Opcode ID: 3a38fcc9bb95e77e0da836e4e5a18b4c9ab16e283b4f9bbdb0fce61a35c68c2f
                                  • Instruction ID: 976b375f78923eada3d8d1f25cef2af6e5c381faa9b0e8b7c45c7f6a29b52fc4
                                  • Opcode Fuzzy Hash: 3a38fcc9bb95e77e0da836e4e5a18b4c9ab16e283b4f9bbdb0fce61a35c68c2f
                                  • Instruction Fuzzy Hash: 48019670A4060C7AEB209BA98C06E6B7AACDB057A1F610167B904D72C2E5789E008A68
                                  APIs
                                  • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D1BF
                                  • LoadResource.KERNEL32(00400000,72756F73,0040A960,00400000,00000001,00000000,?,0040D11C,00000000,?,00000000,?,?,00475D88,0000000A,REGDLL_EXE), ref: 0040D1D9
                                  • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A960,00400000,00000001,00000000,?,0040D11C,00000000,?,00000000,?,?,00475D88), ref: 0040D1F3
                                  • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A960,00400000,00000001,00000000,?,0040D11C,00000000,?,00000000,?), ref: 0040D1FD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID:
                                  • API String ID: 3473537107-0
                                  • Opcode ID: 06d5a2224ff0889236480c5d79a412c4b439f6556495b070d29e0fa02e81d982
                                  • Instruction ID: bdc6fd998ef4e88b0830a639bb7e725ca803f690ad01cf79ba3c1cf188caca31
                                  • Opcode Fuzzy Hash: 06d5a2224ff0889236480c5d79a412c4b439f6556495b070d29e0fa02e81d982
                                  • Instruction Fuzzy Hash: 9FF0FBB2A056046F9744EE9EA881D6B76DCDE88364320016FF908EB246DA38DD118B78
                                  APIs
                                  • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,t;Z,?,?,?,004018B4), ref: 00401566
                                  • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,t;Z,?,?,?,004018B4), ref: 0040158B
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,t;Z,?,?,?,004018B4), ref: 004015B1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Virtual$Alloc$Free
                                  • String ID: t;Z
                                  • API String ID: 3668210933-464866892
                                  • Opcode ID: fce1606467af8550c5b018af38dd943930b60dea47268f49170f1643513630e1
                                  • Instruction ID: 87006be24bad80dd1cc56b86a6ffae3645cf31722f94d2f4d5d5d4de76e86b34
                                  • Opcode Fuzzy Hash: fce1606467af8550c5b018af38dd943930b60dea47268f49170f1643513630e1
                                  • Instruction Fuzzy Hash: 48F0C2B1640320BAEB315A294C85F133AD8DBC5794F1040B6BE09FF3DAD6B8980082AC
                                  APIs
                                  • GetLastError.KERNEL32(00000000,00000000), ref: 0046A2E9
                                  Strings
                                  • Unsetting NTFS compression on directory: %s, xrefs: 0046A2CF
                                  • Failed to set NTFS compression state (%d)., xrefs: 0046A2FA
                                  • Setting NTFS compression on directory: %s, xrefs: 0046A2B7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                  • API String ID: 1452528299-1392080489
                                  • Opcode ID: 4d3942e9cc61f02bf791f275095a639e0222dadc5439085e038e50f3473c57ee
                                  • Instruction ID: fae52b56698cbef2ef65a100aaaf1ff6f22f0878e20b839bb13b77e1b18f05a4
                                  • Opcode Fuzzy Hash: 4d3942e9cc61f02bf791f275095a639e0222dadc5439085e038e50f3473c57ee
                                  • Instruction Fuzzy Hash: 62018430D18648A6CB0097ED50512DDBBE49F09304F4481EBA855EB382EB791A184F9B
                                  APIs
                                    • Part of subcall function 0042DC44: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047C503,?,00000001,?,?,0047C503,?,00000001,00000000), ref: 0042DC60
                                  • RegDeleteValueA.ADVAPI32(?,00000000,?,00000002,00000000,?,?,00000000,00458EC3,?,?,?,?,?,00000000,00458ED6), ref: 004542EC
                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,?,00000002,00000000,?,?,00000000,00458EC3,?,?,?,?,?,00000000), ref: 004542F5
                                  • RemoveFontResourceA.GDI32(00000000), ref: 00454302
                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00454316
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                  • String ID:
                                  • API String ID: 4283692357-0
                                  • Opcode ID: 2877f501dee16d655d75d116cfb29e793393d1176e080bde7ec29140c7e78512
                                  • Instruction ID: 6bcd884f58daa4cf242193067a8401f82c1379502e7cf10432dee752efbb2f93
                                  • Opcode Fuzzy Hash: 2877f501dee16d655d75d116cfb29e793393d1176e080bde7ec29140c7e78512
                                  • Instruction Fuzzy Hash: 9CF05EB574535136EA10B6B65C87F5B228C8F94749F10883BBA00EF2D3D97CDC05962D
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000), ref: 0046ABD9
                                  Strings
                                  • Unsetting NTFS compression on file: %s, xrefs: 0046ABBF
                                  • Setting NTFS compression on file: %s, xrefs: 0046ABA7
                                  • Failed to set NTFS compression state (%d)., xrefs: 0046ABEA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                  • API String ID: 1452528299-3038984924
                                  • Opcode ID: 1e8bcf552af8bc3392dbf0996a1f185d8ced690d2f94648fef7693de0000dbcf
                                  • Instruction ID: e77f6018277675d8139a31bc4823810fa5650a54dc532de9f13faf9e2e869009
                                  • Opcode Fuzzy Hash: 1e8bcf552af8bc3392dbf0996a1f185d8ced690d2f94648fef7693de0000dbcf
                                  • Instruction Fuzzy Hash: 4F016230E186486ACB04D7AD90512EEBBE49F09304F4481EFA455E7382EA791A188F9B
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CountSleepTick
                                  • String ID:
                                  • API String ID: 2227064392-0
                                  • Opcode ID: f718e6b50ed350133e41aa23a99476cb64688864381fa2aa0eea5d6d0af79086
                                  • Instruction ID: ac2bc92c64288a8ae8ad87d3879801b84766de851918f2f303a3950bd66c2a85
                                  • Opcode Fuzzy Hash: f718e6b50ed350133e41aa23a99476cb64688864381fa2aa0eea5d6d0af79086
                                  • Instruction Fuzzy Hash: E8E02B31309D8045CE2879BE18827FF458AEB85324B35493FF0CED6282CC1C4C05A92E
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000008,?,00479787,?,?,00000001,00000000,00000002,00000000,0047A008,?,?,?,?,?,00490C38), ref: 00471CED
                                  • OpenProcessToken.ADVAPI32(00000000,00000008,?,00479787,?,?,00000001,00000000,00000002,00000000,0047A008), ref: 00471CF3
                                  • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,00479787,?,?,00000001,00000000,00000002,00000000,0047A008), ref: 00471D15
                                  • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,00479787,?,?,00000001,00000000,00000002,00000000), ref: 00471D26
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                  • String ID:
                                  • API String ID: 215268677-0
                                  • Opcode ID: b8dd8522978c37078a23bae837822d7669e7a9385b1b3912b8ae2519caf80a33
                                  • Instruction ID: c12eef84649cb6e2f6a6854870b7cf4ad062ba222e75244fe963afc4875e72bb
                                  • Opcode Fuzzy Hash: b8dd8522978c37078a23bae837822d7669e7a9385b1b3912b8ae2519caf80a33
                                  • Instruction Fuzzy Hash: 2DF037616443056BD610E6B5CD81E5B77DCEB44354F04493A7E98C71D1D678DC089B26
                                  APIs
                                  • GetLastActivePopup.USER32(?), ref: 004241F4
                                  • IsWindowVisible.USER32(?), ref: 00424205
                                  • IsWindowEnabled.USER32(?), ref: 0042420F
                                  • SetForegroundWindow.USER32(?), ref: 00424219
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                  • String ID:
                                  • API String ID: 2280970139-0
                                  • Opcode ID: d9228b7f269806e4fe8e97f345a82837c2af6ea24a9e24666224f8ff684892d2
                                  • Instruction ID: e71b939943bb08068cd538cfbf2adeec964b373e7692791c6f26669312c8020f
                                  • Opcode Fuzzy Hash: d9228b7f269806e4fe8e97f345a82837c2af6ea24a9e24666224f8ff684892d2
                                  • Instruction Fuzzy Hash: 23E08CA178253593AE22B6A72D81A9B018CCD453C434A01A7BC08FB283DBACCC0082BC
                                  APIs
                                  • GlobalHandle.KERNEL32 ref: 00406287
                                  • GlobalUnWire.KERNEL32(00000000), ref: 0040628E
                                  • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                  • GlobalFix.KERNEL32(00000000), ref: 00406299
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$AllocHandleWire
                                  • String ID:
                                  • API String ID: 2210401237-0
                                  • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                  • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                  • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                  • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                  APIs
                                  • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 00465E11
                                  • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 00465E17
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Menu$EnableItemSystem
                                  • String ID: CurPageChanged
                                  • API String ID: 3692539535-2490978513
                                  • Opcode ID: 4c78da4d24218412021c3909a6acb726144e1dbd0d30da321cddcfbbb7aea40b
                                  • Instruction ID: ab7830cd034902a018f3633d5f7e813821d05f3ecf729ff0a8a04420c7cd6334
                                  • Opcode Fuzzy Hash: 4c78da4d24218412021c3909a6acb726144e1dbd0d30da321cddcfbbb7aea40b
                                  • Instruction Fuzzy Hash: 7CA10734604604EFC741DB69D989EAA73F5EF89304F2541F6F8049B362EB38AE41DB49
                                  APIs
                                    • Part of subcall function 0044FC44: SetEndOfFile.KERNEL32(?,?,004599C5,00000000,00459B68,?,00000000,00000002,00000002), ref: 0044FC4B
                                  • FlushFileBuffers.KERNEL32(?), ref: 00459B34
                                  Strings
                                  • EndOffset range exceeded, xrefs: 00459A56
                                  • NumRecs range exceeded, xrefs: 00459A1F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$BuffersFlush
                                  • String ID: EndOffset range exceeded$NumRecs range exceeded
                                  • API String ID: 3593489403-659731555
                                  • Opcode ID: 8ae3be6554068dfdb21ba64c754101badf157809c3998e251981b1590163acf1
                                  • Instruction ID: 995539901c97ad68f5746cda8c194ef6f3d3db8d93705507f5965892a0295e18
                                  • Opcode Fuzzy Hash: 8ae3be6554068dfdb21ba64c754101badf157809c3998e251981b1590163acf1
                                  • Instruction Fuzzy Hash: D2613E34A00258CBDB25DF15C881ADAB3B5EB49305F0081EAED49AB352D778AEC9CF54
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(00492420,00000000,004021FC), ref: 004020CB
                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(00492420,00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(00492420,00401A89,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                  • String ID: P%Z
                                  • API String ID: 296031713-4038107055
                                  • Opcode ID: e1edfae6cf2c17bbd4669533da60f2e7d0b1b7a9f33573fe9cb1b0bdb675c80a
                                  • Instruction ID: 58254c69d885ef9708e875f84cb8bea788a13d4415adb82183e1d41e883b2ff5
                                  • Opcode Fuzzy Hash: e1edfae6cf2c17bbd4669533da60f2e7d0b1b7a9f33573fe9cb1b0bdb675c80a
                                  • Instruction Fuzzy Hash: 6041D4B2E01301AFDB10CF69DE8521A77A4F7A8324B15417BD854A77E1D3B89841CB88
                                  Strings
                                  • Failed to proceed to next wizard page; showing wizard., xrefs: 00467804
                                  • Failed to proceed to next wizard page; aborting., xrefs: 004677F0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                  • API String ID: 0-1974262853
                                  • Opcode ID: ca7d52e32b1f50b24c16d12faf74625e74990e5f2a97b77bfd751917ec34c771
                                  • Instruction ID: 54b8d4b4028f273aede26eca5f3620dfaa6aeb886877892ecf599f8e019bb906
                                  • Opcode Fuzzy Hash: ca7d52e32b1f50b24c16d12faf74625e74990e5f2a97b77bfd751917ec34c771
                                  • Instruction Fuzzy Hash: BF31E034A08204EFDB01EB65C985E9D77F5EB49718F6140BBF80497352EB78AE00CA59
                                  APIs
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 0045388C
                                  • GetLastError.KERNEL32(0000003C,00000000,004538D5,?,?,?), ref: 0045389D
                                    • Part of subcall function 004534E4: WaitForInputIdle.USER32(?,00000032), ref: 00453510
                                    • Part of subcall function 004534E4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00453532
                                    • Part of subcall function 004534E4: GetExitCodeProcess.KERNEL32(?,?), ref: 00453541
                                    • Part of subcall function 004534E4: CloseHandle.KERNEL32(?,0045356E,00453567,?,?,?,00000000,?,?,00453741,?,?,?,D:"G,00000000,00000000), ref: 00453561
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                  • String ID: <
                                  • API String ID: 35504260-4251816714
                                  • Opcode ID: 0ccb10dcf298b0fc8a039a98a305e9a75669da3d8a4312c41de7e15a11d174fd
                                  • Instruction ID: a48743936d6917b30e90ea1336603dc98d5f36d007a8bf71f63bee0ab98bf73b
                                  • Opcode Fuzzy Hash: 0ccb10dcf298b0fc8a039a98a305e9a75669da3d8a4312c41de7e15a11d174fd
                                  • Instruction Fuzzy Hash: 95218670A00209AFDB14EF65D88269E7BF8EF04356F50443AF844E7381D7789E49CB98
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(00492420,00000000,)), ref: 004025C7
                                  • RtlLeaveCriticalSection.KERNEL32(00492420,0040263D), ref: 00402630
                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(00492420,00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,00492420,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(00492420,00401A89,00000000,00401A82,?,?,0040222E,00492460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                  • String ID: )
                                  • API String ID: 2227675388-1084416617
                                  • Opcode ID: 4485ac256982a062d4fa7b498a16ced20a2b64ccb8ee85a4042039cc97c61c73
                                  • Instruction ID: 5ca06efdeebc3fba4ee02943ae555fbbec684c5e6e5b72b014691e2301117c59
                                  • Opcode Fuzzy Hash: 4485ac256982a062d4fa7b498a16ced20a2b64ccb8ee85a4042039cc97c61c73
                                  • Instruction Fuzzy Hash: 9B1101317052047FEB25AB7A9F1A62B6AD4D795758B24087FF404F32D2D9FD8C02826C
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 0048ECCB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window
                                  • String ID: /INITPROCWND=$%x $@
                                  • API String ID: 2353593579-4169826103
                                  • Opcode ID: 9fceb97f9dee9116b4f9cd4460141dcdd6850024def755ee183cc3526b898cc5
                                  • Instruction ID: f0e425cee1880468264a3bcbee4eb035e6200ab2a1fbac31d2564d6a1bb1e37f
                                  • Opcode Fuzzy Hash: 9fceb97f9dee9116b4f9cd4460141dcdd6850024def755ee183cc3526b898cc5
                                  • Instruction Fuzzy Hash: 9B11D371A042499FDB01EBA5D841BEE7BF8EB49314F50487BE404E7292D77CA909CB9C
                                  APIs
                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • SysFreeString.OLEAUT32(?), ref: 00446BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: String$AllocByteCharFreeMultiWide
                                  • String ID: NIL Interface Exception$Unknown Method
                                  • API String ID: 3952431833-1023667238
                                  • Opcode ID: 6cfdb488caeb7d7681ac0af27f1ef08cc2626e2ae4e3480024423c9f119b8ea1
                                  • Instruction ID: 34182cf724be706de40d5a6da2d3ea217801cbd4a50a487fa4911f02854a4a1d
                                  • Opcode Fuzzy Hash: 6cfdb488caeb7d7681ac0af27f1ef08cc2626e2ae4e3480024423c9f119b8ea1
                                  • Instruction Fuzzy Hash: F211B9706003489FDB10DFA5CC52AAEBBBCEB49704F52407AF500E7681D679AD04C76A
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,0048E5CC,?,0048E5C0,00000000,0048E5A7), ref: 0048E572
                                  • CloseHandle.KERNEL32(0048E60C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,0048E5CC,?,0048E5C0,00000000), ref: 0048E589
                                    • Part of subcall function 0048E45C: GetLastError.KERNEL32(00000000,0048E4F4,?,?,?,?), ref: 0048E480
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorHandleLastProcess
                                  • String ID: D
                                  • API String ID: 3798668922-2746444292
                                  • Opcode ID: fa7bdcc11f5ef5bee1e69b8ec904ff8917b0f561a8a38e53a969cabdf9631441
                                  • Instruction ID: 6a615ac2cff9bf009bed2b39286a60f6aa18dfcc8d35b7c44523146efba21c0d
                                  • Opcode Fuzzy Hash: fa7bdcc11f5ef5bee1e69b8ec904ff8917b0f561a8a38e53a969cabdf9631441
                                  • Instruction Fuzzy Hash: 060165B1604248BFDB04EBD2CC52E9F7BECDF08718F51043AB504E7291E6785E05C658
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DBA0
                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DBE0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Value$EnumQuery
                                  • String ID: Inno Setup: No Icons
                                  • API String ID: 1576479698-2016326496
                                  • Opcode ID: d1a5a528ef564f2780d65b419a62ed7265ab650cf9fb354477a1f950a26e9855
                                  • Instruction ID: 963321e0e52aed92ccfb8a2f54d21a93e2c319f999d6bed2d0c39c2fe313cf58
                                  • Opcode Fuzzy Hash: d1a5a528ef564f2780d65b419a62ed7265ab650cf9fb354477a1f950a26e9855
                                  • Instruction Fuzzy Hash: 7201F731B4536069F73085166D11B7BA9889B41B64F65003BF940EA3C0D2D9AC04E36E
                                  APIs
                                  • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00454E01
                                  • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00454E93
                                  Strings
                                  • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00454E2D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)
                                  • API String ID: 3850602802-809544686
                                  • Opcode ID: a1adc5262f18ccc09dab35f6281ca63863273ffb2e92d3f90e9b3158a6a75f82
                                  • Instruction ID: c0f4a4cb65a707f69109a7cbf24843c611ca21f6354bed41214754854ac40189
                                  • Opcode Fuzzy Hash: a1adc5262f18ccc09dab35f6281ca63863273ffb2e92d3f90e9b3158a6a75f82
                                  • Instruction Fuzzy Hash: 2F11C8716443506BD300EB699C82B5F7BA89B95308F04847FFA81DF3D2C3B95844D76A
                                  APIs
                                    • Part of subcall function 00406EF0: DeleteFileA.KERNEL32(00000000,00492628,004906E1,00000000,00490736,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EFB
                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 0046F906
                                    • Part of subcall function 0046F758: GetLastError.KERNEL32(00000000,0046F844,?,?,?,00493060,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0046F8CB,00000001), ref: 0046F779
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$DeleteErrorLastMove
                                  • String ID: DeleteFile$MoveFile
                                  • API String ID: 3195829115-139070271
                                  • Opcode ID: 5c8c727110c0e0b4565a3325b8e4452370312bb855e0c18274313c129a62c069
                                  • Instruction ID: f1cebc0cb96c5cf1ed8be3b38952e05ad97f7cd0b069703ba66f8283a9432f3b
                                  • Opcode Fuzzy Hash: 5c8c727110c0e0b4565a3325b8e4452370312bb855e0c18274313c129a62c069
                                  • Instruction Fuzzy Hash: 35F062A12051446BDE10BB69B54275B23889F0239DB1041BBBCC06B387EB3D9C0E87AF
                                  APIs
                                    • Part of subcall function 00453AF8: GetCurrentProcess.KERNEL32(00000028), ref: 00453B07
                                    • Part of subcall function 00453AF8: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00453B0D
                                  • SetForegroundWindow.USER32(?), ref: 0048F934
                                  Strings
                                  • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 0048F95F
                                  • Restarting Windows., xrefs: 0048F911
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Process$CurrentForegroundOpenTokenWindow
                                  • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                  • API String ID: 3179053593-4147564754
                                  • Opcode ID: af8013956ed1e441d462507a332d2bb0e9ba5b4fab94b57e1f2de3ed3b9a88cc
                                  • Instruction ID: 6d3c2020791d7036b49287d64f904da8ce72110519df1e124044460b8ab960db
                                  • Opcode Fuzzy Hash: af8013956ed1e441d462507a332d2bb0e9ba5b4fab94b57e1f2de3ed3b9a88cc
                                  • Instruction Fuzzy Hash: 1001F2B0204240BBE701FB75E942B9C27D89748309F50847BF440AB2D3CABCAD4C8B2D
                                  APIs
                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0046F62F), ref: 0046F41D
                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0046F62F), ref: 0046F434
                                    • Part of subcall function 00451C18: GetLastError.KERNEL32(00000000,00452689,00000005,00000000,004526BE,?,?,00000000,00492628,00000004,00000000,00000000,00000000,?,00490395,00000000), ref: 00451C1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorFileHandleLast
                                  • String ID: CreateFile
                                  • API String ID: 2528220319-823142352
                                  • Opcode ID: 83a25d90d7310315855ab5c96ce9738bc8fdc91c694f0aa79d336ebee5981cdc
                                  • Instruction ID: 8566c0baceda2c5727a8425b1213297a8e6c3c46ac1f7708f5e95aedaf673be2
                                  • Opcode Fuzzy Hash: 83a25d90d7310315855ab5c96ce9738bc8fdc91c694f0aa79d336ebee5981cdc
                                  • Instruction Fuzzy Hash: EDE065342843047FDA10E669DCC6F0677989B14728F108161F6446F3E2C5B5EC448659
                                  APIs
                                  • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,|0I,00000004,00000001,?,00469B43,?,?,00000000,00469BEA,?,_is1,?), ref: 0046962F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID: NoModify$|0I
                                  • API String ID: 3702945584-1260956942
                                  • Opcode ID: 8b91cc6152b2179ce9e637dcb014ffca10acbe7234aaced8902c34e3e8e2fc59
                                  • Instruction ID: 2bef48f429356fc4da1bc079aaf13935e8d13ae686911c9cef0d84ca04fc1d48
                                  • Opcode Fuzzy Hash: 8b91cc6152b2179ce9e637dcb014ffca10acbe7234aaced8902c34e3e8e2fc59
                                  • Instruction Fuzzy Hash: 59E04FB0604304BFEB04DB95CD4AF6B77ACDB48714F108059BA049B381EAB4EE00C668
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,00490B12), ref: 0040334B
                                  • GetCommandLineA.KERNEL32(00000000,00490B12), ref: 00403356
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CommandHandleLineModule
                                  • String ID: x7X
                                  • API String ID: 2123368496-1343527176
                                  • Opcode ID: d737cc7b9cd13b528ce14af1aacc88c8ddd298868fec6d91f7c233b30a1e07fe
                                  • Instruction ID: 15d18a38a4fda6e83645f6d70f9b704c6f366be4de143aedaa8863cd8992b112
                                  • Opcode Fuzzy Hash: d737cc7b9cd13b528ce14af1aacc88c8ddd298868fec6d91f7c233b30a1e07fe
                                  • Instruction Fuzzy Hash: EAC002609012059AE750AF7559467152A949751349F80447FB204B61E3D6BC82059BDE
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2922051073.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000001.00000002.2922031669.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922130951.0000000000491000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2922151772.00000000004A2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLastSleep
                                  • String ID:
                                  • API String ID: 1458359878-0
                                  • Opcode ID: 1c3ac95de8c21fbfebb9eb49584ea609f7c2c977139e8f984cbd0286e03cbb55
                                  • Instruction ID: 70cd491ee1c602b8227b57ee529d2398dd08f77e1846977ffbd05afa78f388ef
                                  • Opcode Fuzzy Hash: 1c3ac95de8c21fbfebb9eb49584ea609f7c2c977139e8f984cbd0286e03cbb55
                                  • Instruction Fuzzy Hash: 2CF0B432B04514679F20BD9F9985A6F628CDA943E7720016FFD05DF303C43AEE4956A9