Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
StretchInstall.exe

Overview

General Information

Sample name:StretchInstall.exe
Analysis ID:1467084
MD5:3f82a2195043cd2877b674cb321e2cf7
SHA1:c2925fed17cba166db7164abdc0eb1f41de9717d
SHA256:8f77b3b68bdfa80e0688a09c5e08ed765b6783192f4792524b8a1eec7ed7b608
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Contains functionality to register a low level keyboard hook
Installs a global keyboard hook
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • StretchInstall.exe (PID: 884 cmdline: "C:\Users\user\Desktop\StretchInstall.exe" MD5: 3F82A2195043CD2877B674CB321E2CF7)
    • setup.exe (PID: 5788 cmdline: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe MD5: E98B8B16179129CC1B75C3D0A7B67CD4)
      • msiexec.exe (PID: 5040 cmdline: "C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\user\AppData\Local\Temp\IXP000.TMP\StretchWare.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 6936 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • rundll32.exe (PID: 2156 cmdline: "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\" MD5: EF3179D498793BF4234F708D3BE28633)
  • StchCtrl.exe (PID: 3360 cmdline: "C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe" MD5: A76894A90372756D69A9F51704EF43F5)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\StretchInstall.exe, ProcessId: 884, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01006205 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,0_2_01006205
Source: StretchInstall.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeFile created: C:\Users\user\AppData\Local\Temp\VSDAAAD.tmp\install.logJump to behavior
Source: Binary string: wextract.pdb source: StretchInstall.exe
Source: Binary string: setup.pdb source: setup.exe, setup.exe, 00000002.00000000.2092317947.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, setup.exe, 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, setup.exe.0.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01002A96 FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_01002A96
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D2DE9F __EH_prolog3_GS,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00D2DE9F
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F83089 GetModuleHandleA,GetProcAddress,FindFirstFileA,11_2_00F83089
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F83477 _strcpy_s,lstrlenA,SetLastError,FindFirstFileA,GetLastError,__fullpath,__splitpath_s,__makepath_s,11_2_00F83477
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F7D99C __EH_prolog3_GS,GetFullPathNameA,__cftof,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,_strcpy_s,11_2_00F7D99C
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Installer\{1D2F2573-A76A-47DA-BB96-6860D17CC45B}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\InstallerJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: StchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drString found in binary or memory: http://activate.esellerate.net
Source: StchCtrl.exe.4.drString found in binary or memory: http://activate.esellerate.net).
Source: setup.exe, 00000002.00000002.3342719410.0000000002356000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
Source: StchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drString found in binary or memory: http://www.esellerate.net/papolicy
Source: StchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drString found in binary or memory: http://www.esellerate.net/papolicyhttp://activate.esellerate.netSelect
Source: StchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drString found in binary or memory: http://www.esellerate.net/privacy.asp
Source: StchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drString found in binary or memory: http://www.esellerate.net/privacy.aspCONNECTION
Source: StchCtrl.exe, 0000000B.00000002.3342928233.000000006BCFA000.00000002.00000001.01000000.0000000A.sdmp, StretchRes.dll.4.drString found in binary or memory: http://www.shelterpub.com/
Source: StchCtrl.exe, 0000000B.00000002.3342928233.000000006BCFA000.00000002.00000001.01000000.0000000A.sdmp, StretchRes.dll.4.drString found in binary or memory: http://www.stretchware.com/
Source: StchCtrl.exe.4.drString found in binary or memory: http://www.stretchware.com/expire.html
Source: StchCtrl.exe, 0000000B.00000002.3342928233.000000006BCFA000.00000002.00000001.01000000.0000000A.sdmp, StretchRes.dll.4.drString found in binary or memory: http://www.stretchware.com/expire.htmlPAMornKeybWrisStrsLbakStanStifSpon
Source: StretchRes.dll.4.drString found in binary or memory: http://www.stretchware.com/stretching_resources.html(http://www.stretchware.com/products.html

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_73F712A0 SetWindowsHookExA 00000002,?KeyboardProc@@YGJHIJ@Z,?,0000000011_2_73F712A0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeWindows user hook set: 0 keyboard C:\Program Files (x86)\Shelter Publications\StretchWare\StretchHook.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeWindows user hook set: 0 mouse C:\Program Files (x86)\Shelter Publications\StretchWare\StretchHook.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_0100969E __EH_prolog3_catch_GS,CreateCompatibleDC,CreateCompatibleBitmap,FillRect,OpenClipboard,EmptyClipboard,CloseClipboard,SetClipboardData,CloseClipboard,11_2_0100969E
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F7A00F GetPropA,GlobalLock,SendMessageA,SendMessageA,GlobalUnlock,RemovePropA,GlobalFree,GlobalUnlock,GetAsyncKeyState,SendMessageA,11_2_00F7A00F
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeWindows user hook set: 0 mouse C:\Program Files (x86)\Shelter Publications\StretchWare\StretchHook.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FC0035 MessageBeep,SendMessageA,SendMessageA,SendMessageA,SendMessageA,GetKeyState,SendMessageA,GetKeyState,SendMessageA,SendMessageA,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,SendMessageA,GetKeyState,SendMessageA,GetKeyState,SendMessageA,SendMessageA,11_2_00FC0035
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FB235A GetKeyState,GetKeyState,GetKeyState,11_2_00FB235A
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F94665 IsWindow,SendMessageA,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,11_2_00F94665
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F927D9 IsWindow,SendMessageA,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,11_2_00F927D9
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FC0BF8 GetParent,GetKeyState,GetKeyState,GetKeyState,SendMessageA,SendMessageA,SendMessageA,11_2_00FC0BF8
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F6F1C6 SendMessageA,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageA,11_2_00F6F1C6
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FB3910 ScreenToClient,_memset,_free,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,11_2_00FB3910
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F6DAD0 GetKeyState,GetKeyState,GetKeyState,11_2_00F6DAD0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F6DA80 GetKeyState,GetKeyState,GetKeyState,MessageBeep,11_2_00F6DA80
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FDBC1B GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer,11_2_00FDBC1B
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F75E51 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,11_2_00F75E51
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCDF74 GetKeyState,GetKeyState,GetKeyState,GetKeyState,11_2_00FCDF74
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_73F71160 GetKeyState,GetKeyState,GetKeyState,GetKeyState,FindWindowA,PostMessageA,11_2_73F71160
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01002251 ExitWindowsEx,0_2_01002251
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010019C3 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_010019C3
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D4509A __EH_prolog3_catch_GS,HeapSetInformation,CoInitialize,CloseHandle,CoUninitialize,FreeLibrary,MessageBoxW,ExitWindowsEx,CloseHandle,CoUninitialize,FreeLibrary,MessageBoxW,KiUserCallbackDispatcher,CloseHandle,CoUninitialize,FreeLibrary,CloseHandle,CoUninitialize,FreeLibrary,CloseHandle,CoUninitialize,FreeLibrary,CoUninitialize,FreeLibrary,__CxxThrowException@8,CoUninitialize,MessageBoxW,Sleep,CoUninitialize,FreeLibrary,MessageBoxW,CoUninitialize,CoUninitialize,CoUninitialize,2_2_00D4509A
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D41C67 __EH_prolog3_GS,CloseHandle,ExitWindowsEx,2_2_00D41C67
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F61CE0 _memset,CreateProcessA,MessageBoxA,ExitWindowsEx,PostQuitMessage,11_2_00F61CE0
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3ad363.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{1D2F2573-A76A-47DA-BB96-6860D17CC45B}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID586.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3ad365.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3ad365.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\3ad365.msiJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_0100871A0_2_0100871A
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01009A1F0_2_01009A1F
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01008A3E0_2_01008A3E
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010091750_2_01009175
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01008DBD0_2_01008DBD
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010095E50_2_010095E5
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D4509A2_2_00D4509A
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D611BB2_2_00D611BB
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D643342_2_00D64334
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D5C5BF2_2_00D5C5BF
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D626562_2_00D62656
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D6070F2_2_00D6070F
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D6189C2_2_00D6189C
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D51A792_2_00D51A79
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D60C652_2_00D60C65
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D50DF02_2_00D50DF0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FE40F611_2_00FE40F6
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FA421B11_2_00FA421B
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_0100A9CA11_2_0100A9CA
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FE4A4511_2_00FE4A45
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FE2E8511_2_00FE2E85
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F972BF11_2_00F972BF
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_0106353C11_2_0106353C
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_01071C1711_2_01071C17
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D2A9C9 appears 38 times
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D531F0 appears 43 times
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D2AD06 appears 73 times
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D4F37D appears 104 times
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D6291B appears 32 times
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D4F3F0 appears 148 times
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: String function: 00D2EDD0 appears 34 times
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: String function: 00F72A87 appears 35 times
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: String function: 01062E02 appears 501 times
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: String function: 01062F10 appears 38 times
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: String function: 00F7E75E appears 42 times
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: String function: 00F66A20 appears 44 times
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: String function: 01062E6B appears 164 times
Source: StretchInstall.exeStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 2821436 bytes, 2 files, at 0x2c +A "StretchWare.msi" +A "setup.exe", ID 2436, number 1, 100 datablocks, 0x1503 compression
Source: StchCtrl.exe.4.drStatic PE information: Resource name: DLL type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Source: Stretch.exe.4.drStatic PE information: Resource name: DLL type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Source: StretchInstall.exeBinary or memory string: OriginalFilenameWEXTRACT.EXE j% vs StretchInstall.exe
Source: StretchInstall.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: sus24.spyw.evad.winEXE@8/29@0/0
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_0100456A lstrcpyA,GetCurrentDirectoryA,SetCurrentDirectoryA,SetCurrentDirectoryA,GetLastError,FormatMessageA,GetVolumeInformationA,GetLastError,FormatMessageA,SetCurrentDirectoryA,SetCurrentDirectoryA,lstrcpynA,0_2_0100456A
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010019C3 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_010019C3
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01006A45 GetDiskFreeSpaceA,SetCurrentDirectoryA,MulDiv,0_2_01006A45
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D43221 __EH_prolog3_catch_GS,GetCurrentProcessId,CreateToolhelp32Snapshot,__CxxThrowException@8,_memset,Process32FirstW,Process32NextW,Process32FirstW,Process32NextW,OpenProcess,GetExitCodeProcess,GetExitCodeProcess,Sleep,GetExitCodeProcess,CloseHandle,CreateFileW,CreateFileW,GetLastError,Sleep,CreateFileW,GetLastError,CloseHandle,CloseHandle,2_2_00D43221
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F85619 CoInitialize,CoCreateInstance,11_2_00F85619
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01004819 FindResourceA,LoadResource,DialogBoxIndirectParamA,FreeResource,0_2_01004819
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Shelter PublicationsJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLD5D4.tmpJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeMutant created: \Sessions\1\BaseNamedObjects\StretchWareCtrlClassSingleApplicationMutex
Source: C:\Users\user\Desktop\StretchInstall.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
Source: StretchInstall.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: StchCtrl.exeString found in binary or memory: -INSTALL
Source: unknownProcess created: C:\Users\user\Desktop\StretchInstall.exe "C:\Users\user\Desktop\StretchInstall.exe"
Source: C:\Users\user\Desktop\StretchInstall.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\user\AppData\Local\Temp\IXP000.TMP\StretchWare.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: unknownProcess created: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe "C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe"
Source: C:\Users\user\Desktop\StretchInstall.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\user\AppData\Local\Temp\IXP000.TMP\StretchWare.msi" Jump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: feclient.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeSection loaded: advpack.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: stretchhook.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: stretchres.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Stretch.lnk.4.drLNK file: ..\..\..\..\Installer\{1D2F2573-A76A-47DA-BB96-6860D17CC45B}\_24275761ADC5B212D44AB6.exe
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: StretchInstall.exeStatic file information: File size 2887680 > 1048576
Source: StretchInstall.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x2b6e00
Source: StretchInstall.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: StretchInstall.exe
Source: Binary string: setup.pdb source: setup.exe, setup.exe, 00000002.00000000.2092317947.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, setup.exe, 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, setup.exe.0.dr
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01006205 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,0_2_01006205
Source: setup.exe.0.drStatic PE information: real checksum: 0x65cd5 should be: 0x75d16
Source: StretchHook.dll.4.drStatic PE information: section name: .shared
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D53235 push ecx; ret 2_2_00D53248
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D4F469 push ecx; ret 2_2_00D4F47C
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FEC1D2 push 3BFFFFFFh; iretd 11_2_00FEC1D7
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_01062F55 push ecx; ret 11_2_01062F68
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_01062EDA push ecx; ret 11_2_01062EED
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_6BCF2285 push ecx; ret 11_2_6BCF2298
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_73F725B5 push ecx; ret 11_2_73F725C8
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Shelter Publications\StretchWare\StretchRes.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Shelter Publications\StretchWare\Stretch.exeJump to dropped file
Source: C:\Users\user\Desktop\StretchInstall.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Shelter Publications\StretchWare\StretchHook.dllJump to dropped file
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010026E2 LocalFree,lstrcpyA,lstrcpyA,lstrcmpiA,lstrcmpiA,lstrlenA,lstrlenA,lstrlenA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,wsprintfA,lstrcmpiA,lstrlenA,lstrlenA,lstrlenA,LocalAlloc,wsprintfA,LocalAlloc,GetFileAttributesA,0_2_010026E2
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeFile created: C:\Users\user\AppData\Local\Temp\VSDAAAD.tmp\install.logJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StretchWareJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StretchWare\Stretch.lnkJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run StretchWare StchCtrlJump to behavior
Source: C:\Windows\System32\msiexec.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run StretchWare StchCtrlJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FD6205 GetParent,GetParent,IsIconic,GetParent,11_2_00FD6205
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FD0420 IsIconic,PostMessageA,11_2_00FD0420
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCE541 IsWindow,GetFocus,IsChild,SendMessageA,IsChild,SendMessageA,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,11_2_00FCE541
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F9AD43 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageA,UpdateWindow,SendMessageA,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,11_2_00F9AD43
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCEFD0 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,11_2_00FCEFD0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCEFD0 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,11_2_00FCEFD0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCEFD0 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,11_2_00FCEFD0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCF2D0 IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,11_2_00FCF2D0
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FCF85B IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageA,PtInRect,SendMessageA,ScreenToClient,PtInRect,GetParent,SendMessageA,GetFocus,WindowFromPoint,SendMessageA,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageA,11_2_00FCF85B
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F6F9C7 IsWindowVisible,IsIconic,11_2_00F6F9C7
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F8FDC9 SetForegroundWindow,IsIconic,11_2_00F8FDC9
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F8FE6D IsIconic,11_2_00F8FE6D
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00FAFE0D GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos,11_2_00FAFE0D
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F865FF __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyA,lstrcpyA,EnumFontFamiliesA,EnumFontFamiliesA,lstrcpyA,EnumFontFamiliesA,lstrcpyA,CreateFontIndirectA,CreateFontIndirectA,CreateFontIndirectA,CreateFontIndirectA,CreateFontIndirectA,CreateFontIndirectA,GetSystemMetrics,lstrcpyA,CreateFontIndirectA,GetStockObject,GetStockObject,GetObjectA,GetObjectA,lstrcpyA,CreateFontIndirectA,CreateFontIndirectA,GetStockObject,GetObjectA,CreateFontIndirectA,CreateFontIndirectA,__EH_prolog3_GS,GetVersionExA,GetSystemMetrics,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_00F865FF
Source: C:\Users\user\Desktop\StretchInstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D43221 __EH_prolog3_catch_GS,GetCurrentProcessId,CreateToolhelp32Snapshot,__CxxThrowException@8,_memset,Process32FirstW,Process32NextW,Process32FirstW,Process32NextW,OpenProcess,GetExitCodeProcess,GetExitCodeProcess,Sleep,GetExitCodeProcess,CloseHandle,CreateFileW,CreateFileW,GetLastError,Sleep,CreateFileW,GetLastError,CloseHandle,CloseHandle,2_2_00D43221
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Shelter Publications\StretchWare\Stretch.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeEvaded block: after key decisiongraph_2-28535
Source: C:\Users\user\Desktop\StretchInstall.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-3700
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeAPI coverage: 3.6 %
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01002A96 FindFirstFileA,lstrcmpA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_01002A96
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D2DE9F __EH_prolog3_GS,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00D2DE9F
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F83089 GetModuleHandleA,GetProcAddress,FindFirstFileA,11_2_00F83089
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F83477 _strcpy_s,lstrlenA,SetLastError,FindFirstFileA,GetLastError,__fullpath,__splitpath_s,__makepath_s,11_2_00F83477
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_00F7D99C __EH_prolog3_GS,GetFullPathNameA,__cftof,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,_strcpy_s,11_2_00F7D99C
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010052D4 lstrcpyA,lstrcpyA,GetSystemInfo,lstrcpyA,CreateDirectoryA,RemoveDirectoryA,0_2_010052D4
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Installer\{1D2F2573-A76A-47DA-BB96-6860D17CC45B}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\InstallerJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeAPI call chain: ExitProcess graph end nodegraph_0-3511
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeAPI call chain: ExitProcess graph end nodegraph_2-28175
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeAPI call chain: ExitProcess graph end nodegraph_11-85008
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D55243 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D55243
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D43221 __EH_prolog3_catch_GS,GetCurrentProcessId,CreateToolhelp32Snapshot,__CxxThrowException@8,_memset,Process32FirstW,Process32NextW,Process32FirstW,Process32NextW,OpenProcess,GetExitCodeProcess,GetExitCodeProcess,Sleep,GetExitCodeProcess,CloseHandle,CreateFileW,CreateFileW,GetLastError,Sleep,CreateFileW,GetLastError,CloseHandle,CloseHandle,2_2_00D43221
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_0106333A VirtualProtect ?,-00000001,00000104,?11_2_0106333A
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01006205 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,SetCurrentDirectoryA,0_2_01006205
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D66CAC __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,2_2_00D66CAC
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_010064DE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_010064DE
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D55243 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D55243
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D4EF49 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00D4EF49
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_01060BBE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_01060BBE
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_01068E21 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_01068E21
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_6BCF3EF6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_6BCF3EF6
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_6BCF3719 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_6BCF3719
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_73F74226 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_73F74226
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_73F73A49 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_73F73A49
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: 2_2_00D2B0F4 _memset,ShellExecuteExW,GetLastError,WaitForSingleObject,CloseHandle,2_2_00D2B0F4
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\user\AppData\Local\Temp\IXP000.TMP\StretchWare.msi" Jump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_01001760 GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,LocalFree,CloseHandle,0_2_01001760
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,2_2_00D5C081
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,2_2_00D60070
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,2_2_00D5C021
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: GetLocaleInfoA,2_2_00D601AF
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,2_2_00D5C257
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,2_2_00D563CD
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,2_2_00D5C3C9
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_00D5C388
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_00D5C31C
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,2_2_00D5B67C
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,2_2_00D5B974
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,2_2_00D4FADD
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,2_2_00D5AA0C
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,2_2_00D5DC25
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,2_2_00D5DD04
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00D5BE6C
Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,2_2_00D5BF75
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,11_2_00F7F6EB
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: __EH_prolog3_GS,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,GetNumberFormatA,GetLocaleInfoA,lstrlenA,11_2_00FB5CD0
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_0100646B GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0100646B
Source: C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exeCode function: 11_2_01069115 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,11_2_01069115
Source: C:\Users\user\Desktop\StretchInstall.exeCode function: 0_2_0100488C GetVersionExA,MessageBeep,MessageBoxA,0_2_0100488C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
3
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
231
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
11
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol231
Input Capture
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
Process Injection
1
DLL Side-Loading
NTDS26
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
Registry Run Keys / Startup Folder
1
File Deletion
LSA Secrets3
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
Masquerading
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Access Token Manipulation
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
Process Injection
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Rundll32
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467084 Sample: StretchInstall.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 24 31 Contains functionality to register a low level keyboard hook 2->31 7 msiexec.exe 87 52 2->7         started        10 StchCtrl.exe 25 2->10         started        13 StretchInstall.exe 1 4 2->13         started        15 rundll32.exe 2->15         started        process3 file4 21 C:\Program Files (x86)\...\StretchHook.dll, PE32 7->21 dropped 23 C:\Program Files (x86)\...\StchCtrl.exe, PE32 7->23 dropped 25 C:\Program Files (x86)\...\StretchRes.dll, PE32 7->25 dropped 27 C:\Program Files (x86)\...\Stretch.exe, PE32 7->27 dropped 33 Installs a global keyboard hook 10->33 29 C:\Users\user\AppData\Local\...\setup.exe, PE32 13->29 dropped 17 setup.exe 4 13->17         started        signatures5 process6 process7 19 msiexec.exe 3 17->19         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
StretchInstall.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe0%ReversingLabs
C:\Program Files (x86)\Shelter Publications\StretchWare\Stretch.exe0%ReversingLabs
C:\Program Files (x86)\Shelter Publications\StretchWare\StretchHook.dll3%ReversingLabs
C:\Program Files (x86)\Shelter Publications\StretchWare\StretchRes.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://activate.esellerate.net0%Avira URL Cloudsafe
http://activate.esellerate.net).0%Avira URL Cloudsafe
http://www.stretchware.com/0%Avira URL Cloudsafe
http://www.esellerate.net/papolicyhttp://activate.esellerate.netSelect0%Avira URL Cloudsafe
http://www.esellerate.net/papolicy0%Avira URL Cloudsafe
http://www.esellerate.net/privacy.aspCONNECTION0%Avira URL Cloudsafe
http://go.microsoft.c0%Avira URL Cloudsafe
http://www.shelterpub.com/0%Avira URL Cloudsafe
http://www.esellerate.net/privacy.asp0%Avira URL Cloudsafe
http://www.stretchware.com/stretching_resources.html(http://www.stretchware.com/products.html0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.stretchware.com/StchCtrl.exe, 0000000B.00000002.3342928233.000000006BCFA000.00000002.00000001.01000000.0000000A.sdmp, StretchRes.dll.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.esellerate.net/privacy.aspStchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.esellerate.net/privacy.aspCONNECTIONStchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drfalse
  • Avira URL Cloud: safe
unknown
http://activate.esellerate.netStchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drfalse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.csetup.exe, 00000002.00000002.3342719410.0000000002356000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://activate.esellerate.net).StchCtrl.exe.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.esellerate.net/papolicyhttp://activate.esellerate.netSelectStchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.shelterpub.com/StchCtrl.exe, 0000000B.00000002.3342928233.000000006BCFA000.00000002.00000001.01000000.0000000A.sdmp, StretchRes.dll.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.stretchware.com/stretching_resources.html(http://www.stretchware.com/products.htmlStretchRes.dll.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.esellerate.net/papolicyStchCtrl.exe, 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmp, Stretch.exe.4.dr, StchCtrl.exe.4.drfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467084
Start date and time:2024-07-03 17:31:48 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:StretchInstall.exe
Detection:SUS
Classification:sus24.spyw.evad.winEXE@8/29@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 96%
  • Number of executed functions: 142
  • Number of non-executed functions: 294
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: StretchInstall.exe
TimeTypeDescription
17:32:50AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run StretchWare StchCtrl C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe
No context
No context
No context
No context
No context
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:modified
Size (bytes):10894
Entropy (8bit):5.688535433953687
Encrypted:false
SSDEEP:96:/Qo39yI9r99o9V9v9zT93983L0KqtW9WgbzHeQzmeU/tqTCsThqe9vU/tqTC6jxM:/3tyOxY7Fltgtze3xkOIzckOkzamLp+
MD5:1626F09FF90BA3951D815412FA08FD41
SHA1:38FD5096D78B35DA38FFBFF2C8EA35DC85E579C0
SHA-256:7AF1E75A1618912AD5C7B2C2D7224F008CB8D1B43EB32036CC8189B7A798F89F
SHA-512:3BB9C0BF75A3B81A15987575DD55A5EC480B104F1F57A7C204BBFD3F6711360C6634CAFAE43B0FA9147A5C4CB352191C52BBFD43F3B9FC0F20F7FBCB1C7ACB06
Malicious:false
Reputation:low
Preview:...@IXOS.@.....@.\.X.@.....@.....@.....@.....@.....@......&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}..StretchWare..StretchWare.msi.@.....@.....@.....@........&.{F20E5EB4-1FAE-4866-A8F0-484FF0C9EC46}.....@.....@.....@.....@.......@.....@.....@.......@......StretchWare......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{C994A9B4-4693-5B42-1160-03FD539ADF8C}&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}.@......&.{63F7FADE-22B2-8417-7BC8-B0C954578C84}&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}.@......&.{E7566C56-DACE-8B37-EA0E-DDB190DE03D9}&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}.@......&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}.@......&.{BABD6A42-56B3-C969-14E0-5E47BCA58465}&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}.@......&.{892A55E1-D3BC-CBE3-A5FF-3B113D6FBB1B}&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}.@......&.{6981CAC8-3564-0BD2-BE80-CE65D7A539BD}&.{1D2F2573-A76A-47
Process:C:\Windows\System32\msiexec.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):2295296
Entropy (8bit):6.461904278761
Encrypted:false
SSDEEP:49152:LasSoJRpdg+aorhnTglGh83+I+SzmOdoHAy8VrmYh0mTESwccJx1j8YNwqR:EoJRpdgArhnThhk+I+SzmOdoHAykB7Tq
MD5:A76894A90372756D69A9F51704EF43F5
SHA1:FB6153D9AFBB9C4068631CDFA883D2BABB956C4F
SHA-256:51DBD9DDC4A4FE7FD1812F5474684C55FDD448568472C4226E908F9197FC6CD7
SHA-512:21B935E747AA956861AACED82A568EE6F6A8C864EEA8EEAEB636FE45927BF4136CB876F9B90CBD5882B65A560C4DC52850046699C6737E75D56ED96D306E887A
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........G.._G.._G.._..S_D.._(.U_h.._(.a_..._N.H_K.._(.W_E.._N.X_d.._G.._Z.._(.`_.._(.Q_F.._(.V_F.._RichG.._........................PE..L...P..P.................`..........G........p....@...........................#.......#...@..................................q..h........m....................!........................................@............p...............................text....^.......`.................. ..`.rdata...6...p...8...d..............@..@.data...@........\..................@....rsrc....m.......n..................@..@.reloc..j.....!......f .............@..B........................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):2380800
Entropy (8bit):6.472919522974936
Encrypted:false
SSDEEP:49152:vL1vJuzusEWjh5XFYi/46de9+HbRO/KSgvta3QPSANa0kXrtlTOJx1j8YN8G:1JuznEMFDrde9+HbRO/KSgvtGbA80kX0
MD5:50FB5019BAF9E418ED82F08B515F7BCD
SHA1:DF44CAF83D2A972470950A2E0BBD1588BDD72DC8
SHA-256:3321E9D85BCEC22FF895D9A01A29DCAD5DDBF143A2AE525BA5B151ABD87C3719
SHA-512:031AF32656F219472B2011895600A488D626C29D802544DB8A9B87511BE4A18554A6FCB919300002BC3B0854FF8414C0AD352A0A3325A4D910C2EA112B84F5CE
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........o.R..CR..CR..C..CP..C[..C^..C=.C...C=.C...C[..Cv..C=.CQ..CR..CG..C=.C...C=.CS..CR..CS..C=.CS..CRichR..C................PE..L......P.................P..........T........`....@...........................$.......%...@.....................................|.......,r...................@".L...................................h...@............`..$............................text....O.......P.................. ..`.rdata...|...`...~...T..............@..@.data............d..................@....rsrc...,r.......t...6..............@..@.reloc......@".......!.............@..B........................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):36864
Entropy (8bit):5.791916877493206
Encrypted:false
SSDEEP:384:29/1HRo2/RdlheclCUo1wRn0vMdZoFbWhU8N/lvH+1nu6EDHkCNu1/NCcvy+rNar:2nRzCv1e0+iNWhDDfmnTEDjcvy0avjo
MD5:0735585D8C460E8C7F1797EBB06B837B
SHA1:409DA2D7504D9603DD8F3260BD95C77E19317BA1
SHA-256:C6E8A615111A880D7D100DB340A84C8C8DBE3E34D5C7AD5E58071CA15FD137A0
SHA-512:95759D9BBCD07BC19665FDFB2348C2C39B65550D0BE394F631147D8E052B6FF0D75B4A983716CEE02C06BBFDD437B4CD03E1DAA84C865B416796BF699FC8DE59
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 3%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.Sq.|=".|=".|="w..".|="w.."/|="...".|=".|<"[|="w..".|="w..".|="w..".|="w..".|="Rich.|="........PE..L......P...........!.....J...B...............`...................................... i....@.................................<z..<.......x.......................(...................................(x..@............`...............................text...2H.......J.................. ..`.rdata...!...`..."...N..............@..@.data................p..............@....shared.8............|..............@....rsrc...x............~..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):1590272
Entropy (8bit):5.180953186200703
Encrypted:false
SSDEEP:24576:a+tb1k07WWcKpDftXIrbsv1tB6RT1dfYddcca:Dtb1kwWulftXIHsvt6RT1dfYddcca
MD5:3D24CB6438DC5393F19BBFA17AAA4F22
SHA1:7B44D9CEDA2A8DE770FECC8B185408E3D6F4A654
SHA-256:56900FC785F2AFBF3166CBA269D7D7C4DCECCFFD6B161A4F7EC05CCDA9C3C421
SHA-512:350EA91C0F16EC2DFD70F22C10A249BE351242A4FE3187C946BC046760CAC3D2DAC2266C2CE1D25FD6104205A9E2485AC4806F055FD73884EB4EBCFBE46C0558
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:.G@[b.@[b.@[b./-..H[b./-..w[b.I#..C[b.@[c.}[b./-..J[b./-..A[b./-..A[b./-..A[b.Rich@[b.........PE..L......P...........!.....F..........r........`.......................................@....@......................... ...M....z..(...........................`.......................................w..@............`...............................text....E.......F.................. ..`.rdata..m....`... ...J..............@..@.data................j..............@....rsrc...............v..............@..@.reloc.......`.......,..............@..B........................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:MS Windows icon resource - 2 icons, 16x16, 16 colors, 32x32
Category:dropped
Size (bytes):2550
Entropy (8bit):4.0424826344288345
Encrypted:false
SSDEEP:48:2wMHOta08t7E/gbN1pv6u8StVHzKGVV2jw3:RMHOtJyg4DCSrz3VE+
MD5:8656713F2A6B60114A263052F9495402
SHA1:26A0899A07B23794DC205B6DFA52168D20EF3035
SHA-256:BCF09453E0E3CE2A39A4E901087191E48744ED9AC05EEA6803676BD9E5C202E6
SHA-512:3543E9F5D1BEB8D9ED3735E05E36309E623AB73CD628CBF45E15D1005C928D96B53C72920DBE6AE6D2E772E193B8577EF6CB3EEF61B532E6D701558F9854F26A
Malicious:false
Reputation:low
Preview:..............(...&... ..........N...(....... ..................................................................................................ww.............................ypp............7...................0.........q............p.............p..........?..............................................................(... ...@..............................................................................................""".))).UUU.MMM.BBB.999..|..PP........................3...f..........3...33..3f..3...3...3...f...f3..ff..f...f...f........3...f...................3...f..............f.........3...3.3.3.f.3...3...3...33..333.33f.33..33..33..3f..3f3.3ff.3f..3f..3f..3...3.3.3.f.3...3...3...3...3.3.3.f.3..3...3...3.3.3.f.3...3...3...f...f.3.f.f.f...f...f...f3..f33.f3f.f3..f3..f3..ff..ff3.fff.ff..ff..f...f.3.f.f.f...f...f...f...f.3.f..f...f...f...f.3.f...f................3...............33...f..3.......f...f3..3f..f...f...3....3...f...................3.f.f..................
Process:C:\Users\user\Desktop\StretchInstall.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {F20E5EB4-1FAE-4866-A8F0-484FF0C9EC46}, Title: StretchWare, Author: Quality Process, Number of Words: 2, Last Saved Time/Date: Wed Jan 2 21:00:23 2013, Last Printed: Wed Jan 2 21:00:23 2013
Category:dropped
Size (bytes):2834944
Entropy (8bit):7.900119741375992
Encrypted:false
SSDEEP:49152:HcABtONA2wfOL0M5mpSGM8gSpdB5HqMMjw7NSSa1iqzAyQMdc:hOTwfOLIwX8g+dnqwZSSaogQ0c
MD5:C0CCB7C257F4E3B0262A40D3D22E8BD3
SHA1:6C89D90276E17B406FC4FBF85A5EF9D183A5EB5B
SHA-256:D1B9E44DDCDF5569B8137D2919585D6FF6FA4147DA13F2EC49DB4E31BE8035FB
SHA-512:D39E417B2AC944405D011CD8309552A9E43F78958BA7EF61AB16F00C05EA06E35708B72390F9D08DC02D9F2E149B7C389A744046E02547B9061165B619A23822
Malicious:false
Reputation:low
Preview:......................>...................,...............8...........................{...|...}...~...................................................................................................................................................................................................................................................................................................................................................................................................................................Z................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...[...f...:...;...<...=...>...?...@...A...B...C...D...Y...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X.......\...]..._...`...^...a...b...e...h...c...d...i...g.......j...r...o...k...l...m...n...q...p...s...w...{...t...u...v...|...x...y...z...
Process:C:\Users\user\Desktop\StretchInstall.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):428032
Entropy (8bit):6.243157878229617
Encrypted:false
SSDEEP:6144:CqIpd/w8ylWKxavR+dJ1oMBClrbMAo+nhmuFfvY0SHZvuD3SojDuUlXkeO:C7IRWDvFa+nhmuF3Y0scSeDuUlX9
MD5:E98B8B16179129CC1B75C3D0A7B67CD4
SHA1:582AEA512EAE1D66DE970138B09B1ADC436481C1
SHA-256:71D63A47476D65CE1724808C7AADB62595465E031854E9AAA4A788F5492BF2B8
SHA-512:10358EB6A53C9B47AB1E5B49E561B2BCF3A4DFC072A323B764D5FD7D46BC2D64375A6A1CB150A01516E697ED3E8CBAB6A0A32AC3F41599980A3BECFC1F0508D1
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.................................A..........................................................Rich....................PE..L......K..........".................A.............@..................................\....@...... ......................x............P...5..............................................................@...............(............................text...H........................... ..`.data....@..........................@....rsrc....5...P...6..................@..@.reloc..@G.......H...@..............@..B........................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe
File Type:data
Category:dropped
Size (bytes):4242
Entropy (8bit):3.6186884067376806
Encrypted:false
SSDEEP:48:kl82sPb1YR+OLjGl8AjfFeqo+ULTaA1kSrB8rDCQ+yl8Akcq+++f+++wMxeqU+cf:s8t4e8AMrBbBsCw8AbF3PHhlB
MD5:9863274684E75C035E043FC4B0F5F917
SHA1:E7884230594BB420EECF7DCB9337142F93792DBD
SHA-256:5988D18122F84E1A29FCD963D5136F3BA600E5E371B1071F7C2A3ED689F9025B
SHA-512:5B42091847603DBCAF11EB4F016E80568D2B42D53EE85B64D306B836F459A8149BE90AD5AD628B1229AE92C3F0FD90E422D06373C4A38D10DE3D75B363AF435B
Malicious:false
Reputation:low
Preview:T.h.e. .f.o.l.l.o.w.i.n.g. .p.r.o.p.e.r.t.i.e.s. .h.a.v.e. .b.e.e.n. .s.e.t.:.....P.r.o.p.e.r.t.y.:. .[.A.d.m.i.n.U.s.e.r.]. .=. .t.r.u.e. .{.b.o.o.l.e.a.n.}.....P.r.o.p.e.r.t.y.:. .[.I.n.s.t.a.l.l.M.o.d.e.]. .=. .H.o.m.e.S.i.t.e. .{.s.t.r.i.n.g.}.....P.r.o.p.e.r.t.y.:. .[.P.r.o.c.e.s.s.o.r.A.r.c.h.i.t.e.c.t.u.r.e.]. .=. .A.M.D.6.4. .{.s.t.r.i.n.g.}.....P.r.o.p.e.r.t.y.:. .[.V.e.r.s.i.o.n.N.T.]. .=. .6...2...0. .{.v.e.r.s.i.o.n.}.....R.u.n.n.i.n.g. .c.h.e.c.k.s. .f.o.r. .p.a.c.k.a.g.e. .'.W.i.n.d.o.w.s. .I.n.s.t.a.l.l.e.r. .3...1.'.,. .p.h.a.s.e. .B.u.i.l.d.L.i.s.t.....T.h.e. .f.o.l.l.o.w.i.n.g. .p.r.o.p.e.r.t.i.e.s. .h.a.v.e. .b.e.e.n. .s.e.t. .f.o.r. .p.a.c.k.a.g.e. .'.W.i.n.d.o.w.s. .I.n.s.t.a.l.l.e.r. .3...1.'.:.....R.u.n.n.i.n.g. .c.h.e.c.k.s. .f.o.r. .c.o.m.m.a.n.d. .'.W.i.n.d.o.w.s.I.n.s.t.a.l.l.e.r.3._.1.\.W.i.n.d.o.w.s.I.n.s.t.a.l.l.e.r.-.K.B.8.9.3.8.0.3.-.v.2.-.x.8.6...e.x.e.'.....R.e.s.u.l.t. .o.f. .r.u.n.n.i.n.g. .o.p.e.r.a.t.o.r. .'.V.e.r.s.i.o.n.G.r.e.a.t.e.r.T.h.a.n.O.r.
Process:C:\Windows\System32\msiexec.exe
File Type:MS Windows icon resource - 2 icons, 16x16, 16 colors, 4 bits/pixel, 32x32, 8 bits/pixel
Category:dropped
Size (bytes):2550
Entropy (8bit):4.045124870638817
Encrypted:false
SSDEEP:48:GwM7Ota08t7E/gbN1pv6u8StVHzKGVV2jw3:hM7OtJyg4DCSrz3VE+
MD5:EF7DF15155B2C6E56F94FA17835AE00D
SHA1:11788F7E640A20EC7C22DDC1BADD9829D959097C
SHA-256:69E8709BE6D1693CCAA63A1A4A967CD6C189F97DED447AC20A4D364738D74861
SHA-512:235651D393D3771AE22E880DCED3BDB7026323710447B7346A1388C87FF6D015B88585531F9C56B6B81D896087B00745AAD3E36F6FF83A5D86C1F387BA6A01A3
Malicious:false
Reputation:low
Preview:..............(...&... ..........N...(....... ..................................................................................................ww.............................ypp............7...................0.........q............p.............p..........?..............................................................(... ...@..............................................................................................""".))).UUU.MMM.BBB.999..|..PP........................3...f..........3...33..3f..3...3...3...f...f3..ff..f...f...f........3...f...................3...f..............f.........3...3.3.3.f.3...3...3...33..333.33f.33..33..33..3f..3f3.3ff.3f..3f..3f..3...3.3.3.f.3...3...3...3...3.3.3.f.3..3...3...3.3.3.f.3...3...3...f...f.3.f.f.f...f...f...f3..f33.f3f.f3..f3..f3..ff..ff3.fff.ff..ff..f...f.3.f.f.f...f...f...f...f.3.f..f...f...f...f.3.f...f................3...............33...f..3.......f...f3..3f..f...f...3....3...f...................3.f.f..................
Process:C:\Windows\System32\msiexec.exe
File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
Category:dropped
Size (bytes):3087
Entropy (8bit):2.934094798075439
Encrypted:false
SSDEEP:24:8A2h1lX4gOGExEUYzHo4KnNYzHbxcdE5kNYzHbx2dSsIdu1wdNYzHbx:8R1lq+DzzKuz2dEWuzUdSsIdu1wduz
MD5:B9C1DE8D6B049089B898BAABDD9A1314
SHA1:6934A9ADB551B3DE4CF61310640CDEA76259FBE0
SHA-256:96A6D4FD065560373BDD228FB4D5960C0D106C468E4EFA5F806E18C80E4E036A
SHA-512:A365EDD81B013951E0FAB9DA040F961A812DB901F2BAA055DFEC36633A79FA503C85C0EEDE2C2EC77021A084C03729C56F62B0993BDA4690550A0563767D5427
Malicious:false
Preview:L..................F.P...........................................................P.O. .:i.....+00.../C:\...................x.1.....EW.2..Users.d......OwH.X.|....................:.....6.d.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....Z.1......X.|..user..B......EW<2.X.|....^......................>s.e.n.g.i.n.e.e.r.....V.1.....EW<2..AppData.@......EW<2.X.|...........................^.A.p.p.D.a.t.a.....V.1......X.|..Roaming.@......EW<2.X.|..../.....................m.p.R.o.a.m.i.n.g.....\.1......X.|..MICROS~1..D......EW<2.X.|....0.....................rTH.M.i.c.r.o.s.o.f.t.....\.1......X.|..INSTAL~1..D.......X.|.X.|..........................rTH.I.n.s.t.a.l.l.e.r.......1......X.|..{1D2F2~1..~.......X.|.X.|..........................i.$.{.1.D.2.F.2.5.7.3.-.A.7.6.A.-.4.7.D.A.-.B.B.9.6.-.6.8.6.0.D.1.7.C.C.4.5.B.}.......2......X.|!._24275~1.EXE..h.......X.|.X.|....D.....................i.$._.2.4.2.7.5.7.6.1.A.D.C.5.B.2.1.2.D.4.4.A.B.6...e.x.e.......X.....\.....\.....\.....\.I
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {F20E5EB4-1FAE-4866-A8F0-484FF0C9EC46}, Title: StretchWare, Author: Quality Process, Number of Words: 2, Last Saved Time/Date: Wed Jan 2 21:00:23 2013, Last Printed: Wed Jan 2 21:00:23 2013
Category:dropped
Size (bytes):2834944
Entropy (8bit):7.900119741375992
Encrypted:false
SSDEEP:49152:HcABtONA2wfOL0M5mpSGM8gSpdB5HqMMjw7NSSa1iqzAyQMdc:hOTwfOLIwX8g+dnqwZSSaogQ0c
MD5:C0CCB7C257F4E3B0262A40D3D22E8BD3
SHA1:6C89D90276E17B406FC4FBF85A5EF9D183A5EB5B
SHA-256:D1B9E44DDCDF5569B8137D2919585D6FF6FA4147DA13F2EC49DB4E31BE8035FB
SHA-512:D39E417B2AC944405D011CD8309552A9E43F78958BA7EF61AB16F00C05EA06E35708B72390F9D08DC02D9F2E149B7C389A744046E02547B9061165B619A23822
Malicious:false
Preview:......................>...................,...............8...........................{...|...}...~...................................................................................................................................................................................................................................................................................................................................................................................................................................Z................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...[...f...:...;...<...=...>...?...@...A...B...C...D...Y...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X.......\...]..._...`...^...a...b...e...h...c...d...i...g.......j...r...o...k...l...m...n...q...p...s...w...{...t...u...v...|...x...y...z...
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {F20E5EB4-1FAE-4866-A8F0-484FF0C9EC46}, Title: StretchWare, Author: Quality Process, Number of Words: 2, Last Saved Time/Date: Wed Jan 2 21:00:23 2013, Last Printed: Wed Jan 2 21:00:23 2013
Category:dropped
Size (bytes):2834944
Entropy (8bit):7.900119741375992
Encrypted:false
SSDEEP:49152:HcABtONA2wfOL0M5mpSGM8gSpdB5HqMMjw7NSSa1iqzAyQMdc:hOTwfOLIwX8g+dnqwZSSaogQ0c
MD5:C0CCB7C257F4E3B0262A40D3D22E8BD3
SHA1:6C89D90276E17B406FC4FBF85A5EF9D183A5EB5B
SHA-256:D1B9E44DDCDF5569B8137D2919585D6FF6FA4147DA13F2EC49DB4E31BE8035FB
SHA-512:D39E417B2AC944405D011CD8309552A9E43F78958BA7EF61AB16F00C05EA06E35708B72390F9D08DC02D9F2E149B7C389A744046E02547B9061165B619A23822
Malicious:false
Preview:......................>...................,...............8...........................{...|...}...~...................................................................................................................................................................................................................................................................................................................................................................................................................................Z................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...[...f...:...;...<...=...>...?...@...A...B...C...D...Y...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X.......\...]..._...`...^...a...b...e...h...c...d...i...g.......j...r...o...k...l...m...n...q...p...s...w...{...t...u...v...|...x...y...z...
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):7080
Entropy (8bit):5.704924142091014
Encrypted:false
SSDEEP:96:6QoHLCMkPF/hUAyZuQTnqDquV9M7OtJyg4DCSrz3VEEO/LgHejqJZL+EdrEPvwqY:63rVyJhvoeDquV9/KDCAheeB1WvwL
MD5:A5C3C7FDD6EB95C3F092061E4BC48ED9
SHA1:03CD339FFCF445BD2657DF87512C67E563669D36
SHA-256:AEA1C93F83613D120F9F89019A44394D389068E5A36B12AE0679E733C314BA51
SHA-512:DF0283630802064AB2945AF4A2DACC0649C1039E2DA4BA5553C18A1DC3C38F58FE354EB49BDD3E5A528F5F763194B175CA71F25928AEFBD6975C5DF98F1F80A1
Malicious:false
Preview:...@IXOS.@.....@.\.X.@.....@.....@.....@.....@.....@......&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}..StretchWare..StretchWare.msi.@.....@.....@.....@........&.{F20E5EB4-1FAE-4866-A8F0-484FF0C9EC46}.....@.....@.....@.....@.......@.....@.....@.......@......StretchWare......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{C994A9B4-4693-5B42-1160-03FD539ADF8C}G.C:\Program Files (x86)\Shelter Publications\StretchWare\StretchHook.dll.@.......@.....@.....@......&.{63F7FADE-22B2-8417-7BC8-B0C954578C84}G.C:\Program Files (x86)\Shelter Publications\StretchWare\StretchWare.ico.@.......@.....@.....@......&.{E7566C56-DACE-8B37-EA0E-DDB190DE03D9}f.01:\Software\Shelter Publications\StretchWare\{E7566C56-DACE-8B37-EA0E-DDB190DE03D9}\ProgramMenuFolder.@.......@.....@.....@......&.{1D2F2573-A76A-47DA-BB96-6860D17CC45B}8.C:\Program Files (x86)\Shelter Publications\StretchWa
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):20480
Entropy (8bit):1.16423746488061
Encrypted:false
SSDEEP:12:JSbX72Fj0liAGiLIlHVRpih/7777777777777777777777777vDHFi0xl0i8Q:JFQI5yYF
MD5:71B84B26FCE5F331AE26405016D5FE7C
SHA1:A33555D21B87766537D793820DEC22965AC11C5A
SHA-256:8FD18A94AD0FBD34AF119E5633C367930345896315B605B7BC23F4A40467BEDE
SHA-512:9501885EECF6CBBE0B9C6B4B71CE954B40D897036DFD3334D3445618687F71947A122D3F1412D6F2EC2848C93C15F89E23921746F590B49AA2F4AF912D6E00B7
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):20480
Entropy (8bit):1.6011932875234902
Encrypted:false
SSDEEP:48:78PhUuRc06WXJgnT5NNjcSkdEcU/Cy9Jc+rjSkdE5U/Cy9vT0bjz:ihU1jnTNcviCIOiCn
MD5:7EDD94909C86C7B8EA84F0B6CBC7DA63
SHA1:2C25D60D3505338C822C186776DAB43C7F2408AC
SHA-256:C6329CFF99B0B391C2FAAF9625A609EE18903F97EEA4024CA61F2ACA6FE8A60A
SHA-512:E90A98FED1881A2A8FEC5284466C974E012CBEAA2956992094E79BF4601A1873AEF17B578E59047C7A3F249E388BF37A9F8E27AFEA07B42149CB65BF814B1ED4
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):360001
Entropy (8bit):5.3629895564192775
Encrypted:false
SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauU:zTtbmkExhMJCIpEJ
MD5:F02EBEEF3D283221E0FFC3CFF0402D4D
SHA1:1F18EE9CA732D97F46E3C9EC422A8626B33BC078
SHA-256:04BCDD7D3DA47D2D58E0639EEE732F5F05A6CDB33CBBB7C5E1019D3C4CC17344
SHA-512:EA420BAAB69EB9B8DE35144E9BD9EEDB60C090C1648EE98109D3D4A59410B38DD9C82EE7DB753CA29A6D27094D17CE17F98B5D474E9D64687B5330B523812B18
Malicious:false
Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):32768
Entropy (8bit):1.2788844367346557
Encrypted:false
SSDEEP:48:9TcuNNveFXJHT5LNjcSkdEcU/Cy9Jc+rjSkdE5U/Cy9vT0bjz:FclvTDcviCIOiCn
MD5:EC882B8404962AA1A3E1739DA987A3EE
SHA1:116AF12D753E542D082EDFE4D904DC1A37080360
SHA-256:EBA4DB0BB25FF2FD41D9377E24F9DAD67452654031A6A6651BDA692C4AD3E300
SHA-512:C0E7BF6F136DF40528F3BD1590C90E2AC3CBB5F102B2A05D9875A6B6C6425376EBD59C734B47C2972616CC305A5F5AEA1E5D8A0A84A4A4E603CB693EEB66627E
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):32768
Entropy (8bit):1.2788844367346557
Encrypted:false
SSDEEP:48:9TcuNNveFXJHT5LNjcSkdEcU/Cy9Jc+rjSkdE5U/Cy9vT0bjz:FclvTDcviCIOiCn
MD5:EC882B8404962AA1A3E1739DA987A3EE
SHA1:116AF12D753E542D082EDFE4D904DC1A37080360
SHA-256:EBA4DB0BB25FF2FD41D9377E24F9DAD67452654031A6A6651BDA692C4AD3E300
SHA-512:C0E7BF6F136DF40528F3BD1590C90E2AC3CBB5F102B2A05D9875A6B6C6425376EBD59C734B47C2972616CC305A5F5AEA1E5D8A0A84A4A4E603CB693EEB66627E
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):32768
Entropy (8bit):0.07173838843652341
Encrypted:false
SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOiqsgpJAEaVky6lhX:2F0i8n0itFzDHFi0x
MD5:4DC70082B340346C6A9579C8718C9D4D
SHA1:97831FD6D8FBB341919F6DCEE84CF68B222468C9
SHA-256:F3E15CFEFD279CDAFF7868F8E0134C5B493757E6CAE9EB9A32C71E4341FEE97C
SHA-512:15042CC9611C71B9024F3925D03CA13ED940474F4318E5DFC5A523AD834D1DA861CD5A34FAFCD827474747061EE6D2E8AD637C5A823D03C30E312C21A86943DC
Malicious:false
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):20480
Entropy (8bit):1.6011932875234902
Encrypted:false
SSDEEP:48:78PhUuRc06WXJgnT5NNjcSkdEcU/Cy9Jc+rjSkdE5U/Cy9vT0bjz:ihU1jnTNcviCIOiCn
MD5:7EDD94909C86C7B8EA84F0B6CBC7DA63
SHA1:2C25D60D3505338C822C186776DAB43C7F2408AC
SHA-256:C6329CFF99B0B391C2FAAF9625A609EE18903F97EEA4024CA61F2ACA6FE8A60A
SHA-512:E90A98FED1881A2A8FEC5284466C974E012CBEAA2956992094E79BF4601A1873AEF17B578E59047C7A3F249E388BF37A9F8E27AFEA07B42149CB65BF814B1ED4
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):20480
Entropy (8bit):1.6011932875234902
Encrypted:false
SSDEEP:48:78PhUuRc06WXJgnT5NNjcSkdEcU/Cy9Jc+rjSkdE5U/Cy9vT0bjz:ihU1jnTNcviCIOiCn
MD5:7EDD94909C86C7B8EA84F0B6CBC7DA63
SHA1:2C25D60D3505338C822C186776DAB43C7F2408AC
SHA-256:C6329CFF99B0B391C2FAAF9625A609EE18903F97EEA4024CA61F2ACA6FE8A60A
SHA-512:E90A98FED1881A2A8FEC5284466C974E012CBEAA2956992094E79BF4601A1873AEF17B578E59047C7A3F249E388BF37A9F8E27AFEA07B42149CB65BF814B1ED4
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):69632
Entropy (8bit):0.1587929062369609
Encrypted:false
SSDEEP:48:Dzgb0T+SkdE5U/Cy9oSkdEcU/Cy9Jc+r3rN:DOOiCtviCO
MD5:FCBC7DF33F54C706EE7498B74D91E8D1
SHA1:89D622E0BB7BB822F36AC87DABEE9368190DBDDB
SHA-256:C8F2275B6300241B6C4AE7AC186B3BD82C6787EC004CC07D1B142D27430CEA46
SHA-512:80FBE39E26F230F1BE0A8968E56F5E98342A2F6D73B044AC1591D914D83B10FAD6DFAA9983690860970F233EC531969ABA58613998851E102E31B4DD56860020
Malicious:false
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):32768
Entropy (8bit):1.2788844367346557
Encrypted:false
SSDEEP:48:9TcuNNveFXJHT5LNjcSkdEcU/Cy9Jc+rjSkdE5U/Cy9vT0bjz:FclvTDcviCIOiCn
MD5:EC882B8404962AA1A3E1739DA987A3EE
SHA1:116AF12D753E542D082EDFE4D904DC1A37080360
SHA-256:EBA4DB0BB25FF2FD41D9377E24F9DAD67452654031A6A6651BDA692C4AD3E300
SHA-512:C0E7BF6F136DF40528F3BD1590C90E2AC3CBB5F102B2A05D9875A6B6C6425376EBD59C734B47C2972616CC305A5F5AEA1E5D8A0A84A4A4E603CB693EEB66627E
Malicious:false
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.994389649334824
TrID:
  • Win32 Executable (generic) a (10002005/4) 97.02%
  • Win32 MS Cabinet Self-Extractor (WExtract stub) (303627/2) 2.95%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:StretchInstall.exe
File size:2'887'680 bytes
MD5:3f82a2195043cd2877b674cb321e2cf7
SHA1:c2925fed17cba166db7164abdc0eb1f41de9717d
SHA256:8f77b3b68bdfa80e0688a09c5e08ed765b6783192f4792524b8a1eec7ed7b608
SHA512:d59a78e4906a8353797091a32c12bb572b24c22e480cdea52c862a97d631d8de17e2929542bafcb67844e1c1132827b816bde2b2f8c2f1434e462f4ecafbabc8
SSDEEP:49152:uLPKwfOe06yZwRgztRMaX4pbl7HgMN6IlvE09aH0fmqbuoahuAzXp5X6Pdq6bLdE:MiwfOeerztKaXYbtsX09aHC145uqwL2L
TLSH:05D5330196E4847AE8D80F30A4ED2D672FB4BE605572E32B91CD2AE9F4504E4BF76317
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...Cu..C...C...C0..Cu..C...Cu..C...Cu..C...CRich...C................PE..L....Q.H.....................r+.....\d.....
Icon Hash:878fd7f3b9353593
Entrypoint:0x100645c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x1000000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x480251CD [Sun Apr 13 18:32:45 2008 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:0ebb3c09b06b1666d307952e824c8697
Instruction
call 00007F7CA8B2791Fh
jmp 00007F7CA8B2788Fh
int3
int3
int3
int3
int3
mov edi, edi
push ebp
mov ebp, esp
sub esp, 10h
mov eax, dword ptr [0100B2D0h]
test eax, eax
je 00007F7CA8B27919h
cmp eax, 0000BB40h
jne 00007F7CA8B2795Fh
push esi
lea eax, dword ptr [ebp-08h]
push eax
call dword ptr [01001170h]
mov esi, dword ptr [ebp-04h]
xor esi, dword ptr [ebp-08h]
call dword ptr [0100116Ch]
xor esi, eax
call dword ptr [01001168h]
xor esi, eax
call dword ptr [01001164h]
xor esi, eax
lea eax, dword ptr [ebp-10h]
push eax
call dword ptr [01001160h]
mov eax, dword ptr [ebp-0Ch]
xor eax, dword ptr [ebp-10h]
xor eax, esi
and eax, 0000FFFFh
pop esi
jne 00007F7CA8B27917h
mov eax, 0000BB40h
mov dword ptr [0100B2D0h], eax
not eax
mov dword ptr [0100B2CCh], eax
leave
ret
int3
int3
int3
int3
int3
cmp ecx, dword ptr [0100B2D0h]
jne 00007F7CA8B2791Bh
test ecx, FFFF0000h
jne 00007F7CA8B27913h
ret
jmp 00007F7CA8B2791Ah
int3
int3
int3
int3
int3
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000330h
push edi
mov dword ptr [ebp-00000228h], eax
mov dword ptr [ebp-0000022Ch], ecx
mov dword ptr [ebp-00000230h], edx
mov dword ptr [ebp-00000234h], ebx
mov dword ptr [ebp-00000238h], esi
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x9d800x8c.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x2b6d4c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x12300x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x230.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x99c80x9a00fd7744c26c2bf4d279968be94b283b11False0.5805093344155844data6.577725502979647IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0xb0000x1be40x40099858e86526942a66950c7139f78a725False0.330078125data4.247999525438142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xd0000x2b70000x2b6e00bc114b0edae49996daae0b6dbad0bbc1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
AVI0xd7a00x2e1aRIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppEnglishUnited States0.2713099474665311
RT_ICON0x105bc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.3709677419354839
RT_ICON0x108a40x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6081081081081081
RT_DIALOG0x109cc0x2ccdataEnglishUnited States0.4553072625698324
RT_DIALOG0x10c980x18adataEnglishUnited States0.6040609137055838
RT_DIALOG0x10e240x140dataEnglishUnited States0.565625
RT_DIALOG0x10f640x196dataEnglishUnited States0.5960591133004927
RT_DIALOG0x110fc0x10edataEnglishUnited States0.6111111111111112
RT_DIALOG0x1120c0xfadataEnglishUnited States0.652
RT_STRING0x113080x8cMatlab v4 mat-file (little endian) l, numeric, rows 0, columns 0EnglishUnited States0.6214285714285714
RT_STRING0x113940x520dataEnglishUnited States0.4032012195121951
RT_STRING0x118b40x5ccdataEnglishUnited States0.36455525606469
RT_STRING0x11e800x4b0dataEnglishUnited States0.385
RT_STRING0x123300x44adataEnglishUnited States0.3970856102003643
RT_STRING0x1277c0x3cedataEnglishUnited States0.36858316221765913
RT_RCDATA0x12b4c0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x12b540x2b0d3cMicrosoft Cabinet archive data, many, 2821436 bytes, 2 files, at 0x2c +A "StretchWare.msi" +A "setup.exe", ID 2436, number 1, 100 datablocks, 0x1503 compressionEnglishUnited States0.9957904815673828
RT_RCDATA0x2c38900x4dataEnglishUnited States3.0
RT_RCDATA0x2c38940x24dataEnglishUnited States0.9444444444444444
RT_RCDATA0x2c38b80x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x2c38c00x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x2c38c80x4dataEnglishUnited States3.0
RT_RCDATA0x2c38cc0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x2c38d40x4dataEnglishUnited States3.0
RT_RCDATA0x2c38d80xcdataEnglishUnited States1.6666666666666667
RT_RCDATA0x2c38e40x4dataEnglishUnited States3.0
RT_RCDATA0x2c38e80xcdataEnglishUnited States1.6666666666666667
RT_RCDATA0x2c38f40x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_RCDATA0x2c38fc0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
RT_GROUP_ICON0x2c39040x22dataEnglishUnited States1.0
RT_VERSION0x2c39280x424dataEnglishUnited States0.42924528301886794
DLLImport
ADVAPI32.dllFreeSid, AllocateAndInitializeSid, EqualSid, GetTokenInformation, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueA, RegCloseKey, RegDeleteValueA, RegOpenKeyExA, RegSetValueExA, RegQueryValueExA, RegCreateKeyExA, RegQueryInfoKeyA
KERNEL32.dllLocalFree, LocalAlloc, GetLastError, GetCurrentProcess, lstrlenA, GetModuleFileNameA, GetSystemDirectoryA, _lclose, _llseek, _lopen, WritePrivateProfileStringA, GetWindowsDirectoryA, CreateDirectoryA, GetFileAttributesA, ExpandEnvironmentStringsA, lstrcpyA, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, IsDBCSLeadByte, GetShortPathNameA, GetPrivateProfileStringA, GetPrivateProfileIntA, lstrcmpiA, RemoveDirectoryA, FindClose, FindNextFileA, DeleteFileA, SetFileAttributesA, lstrcmpA, FindFirstFileA, FreeResource, GetProcAddress, LoadResource, SizeofResource, FindResourceA, lstrcatA, CloseHandle, WriteFile, SetFilePointer, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, SetCurrentDirectoryA, GetTempFileNameA, ExitProcess, CreateFileA, LoadLibraryExA, lstrcpynA, GetVolumeInformationA, FormatMessageA, GetCurrentDirectoryA, GetVersionExA, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, GetTempPathA, GetSystemInfo, CreateMutexA, SetEvent, CreateEventA, CreateThread, ResetEvent, TerminateThread, GetDriveTypeA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, ReadFile, LoadLibraryA, GetDiskFreeSpaceA, MulDiv, EnumResourceLanguagesA, FreeLibrary, LockResource
GDI32.dllGetDeviceCaps
USER32.dllExitWindowsEx, wsprintfA, CharNextA, CharUpperA, CharPrevA, SetWindowLongA, GetWindowLongA, CallWindowProcA, DispatchMessageA, MsgWaitForMultipleObjects, PeekMessageA, SendMessageA, SetWindowPos, ReleaseDC, GetDC, GetWindowRect, SendDlgItemMessageA, GetDlgItem, SetForegroundWindow, SetWindowTextA, MessageBoxA, DialogBoxIndirectParamA, ShowWindow, EnableWindow, GetDlgItemTextA, EndDialog, GetDesktopWindow, MessageBeep, SetDlgItemTextA, LoadStringA, GetSystemMetrics
COMCTL32.dll
VERSION.dllGetFileVersionInfoA, VerQueryValueA, GetFileVersionInfoSizeA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:11:32:35
Start date:03/07/2024
Path:C:\Users\user\Desktop\StretchInstall.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\StretchInstall.exe"
Imagebase:0x1000000
File size:2'887'680 bytes
MD5 hash:3F82A2195043CD2877B674CB321E2CF7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:2
Start time:11:32:36
Start date:03/07/2024
Path:C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\AppData\Local\Temp\IXP000.TMP\setup.exe
Imagebase:0xd20000
File size:428'032 bytes
MD5 hash:E98B8B16179129CC1B75C3D0A7B67CD4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 0%, ReversingLabs
Reputation:low
Has exited:false

Target ID:3
Start time:11:32:36
Start date:03/07/2024
Path:C:\Windows\SysWOW64\msiexec.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\user\AppData\Local\Temp\IXP000.TMP\StretchWare.msi"
Imagebase:0x7b0000
File size:59'904 bytes
MD5 hash:9D09DC1EDA745A5F87553048E57620CF
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:4
Start time:11:32:36
Start date:03/07/2024
Path:C:\Windows\System32\msiexec.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\msiexec.exe /V
Imagebase:0x7ff781aa0000
File size:69'632 bytes
MD5 hash:E5DA170027542E25EDE42FC54C929077
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:5
Start time:11:32:45
Start date:03/07/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Imagebase:0x7ff6c2e20000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:11:32:59
Start date:03/07/2024
Path:C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe
Wow64 process (32bit):true
Commandline:"C:\Program Files (x86)\Shelter Publications\StretchWare\StchCtrl.exe"
Imagebase:0xf60000
File size:2'295'296 bytes
MD5 hash:A76894A90372756D69A9F51704EF43F5
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 0%, ReversingLabs
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:24.8%
    Dynamic/Decrypted Code Coverage:59.8%
    Signature Coverage:19.5%
    Total number of Nodes:1070
    Total number of Limit Nodes:51
    execution_graph 4262 1005670 4263 1005684 4262->4263 4299 10056e9 EndDialog 4262->4299 4264 100582a GetDesktopWindow 4263->4264 4265 100568f 4263->4265 4266 1002d83 7 API calls 4264->4266 4267 1005692 4265->4267 4270 10056a3 4265->4270 4271 100574f GetDlgItemTextA 4265->4271 4269 100583a SetWindowTextA SendDlgItemMessageA 4266->4269 4269->4267 4272 100586b GetDlgItem EnableWindow 4269->4272 4274 1005735 EndDialog 4270->4274 4275 10056aa 4270->4275 4273 1005771 4271->4273 4276 10057b5 4271->4276 4272->4267 4277 1002c57 lstrlenA 4273->4277 4274->4267 4275->4267 4278 10056b5 LoadStringA 4275->4278 4281 1003ebe 28 API calls 4276->4281 4282 1005777 4277->4282 4279 10056d5 4278->4279 4280 10056ef 4278->4280 4283 1003ebe 28 API calls 4279->4283 4304 1004e73 LoadLibraryA 4280->4304 4281->4267 4282->4276 4285 100577f GetFileAttributesA 4282->4285 4283->4299 4286 10057c1 4285->4286 4287 100578d 4285->4287 4290 10066cf 2 API calls 4286->4290 4289 1003ebe 28 API calls 4287->4289 4292 10057a0 4289->4292 4293 10057cd 4290->4293 4291 1005707 SetDlgItemTextA 4291->4267 4294 100571c 4291->4294 4292->4267 4295 10057a9 CreateDirectoryA 4292->4295 4296 10044bd 40 API calls 4293->4296 4297 1003ebe 28 API calls 4294->4297 4295->4276 4295->4286 4298 10057d3 4296->4298 4297->4299 4298->4276 4300 10057e3 4298->4300 4299->4267 4301 100456a 44 API calls 4300->4301 4302 1005802 4301->4302 4302->4267 4303 1005806 EndDialog 4302->4303 4303->4267 4305 1004e98 GetProcAddress 4304->4305 4306 1004f8f 4304->4306 4307 1004eb1 GetProcAddress 4305->4307 4308 1004f7c FreeLibrary 4305->4308 4310 1003ebe 28 API calls 4306->4310 4307->4308 4309 1004ec4 GetProcAddress 4307->4309 4308->4306 4309->4308 4311 1004ed7 4309->4311 4312 1004fa1 4310->4312 4313 1004ee4 GetTempPathA lstrlenA CharPrevA 4311->4313 4314 1004f14 4311->4314 4312->4267 4312->4291 4313->4314 4315 1004f0b CharPrevA 4313->4315 4316 1004f6a FreeLibrary 4314->4316 4317 1004f64 4314->4317 4318 1004f5c lstrcpyA 4314->4318 4315->4314 4316->4312 4317->4316 4318->4317 4319 1003bf2 lstrcpyA 4320 10066cf 2 API calls 4319->4320 4321 1003c44 CreateFileA 4320->4321 4322 1003c67 4321->4322 4323 1003c79 WriteFile 4321->4323 4326 10064de 4 API calls 4322->4326 4324 1003c90 CloseHandle 4323->4324 4324->4322 4327 1003cc3 4326->4327 4328 1003165 4329 10031b1 SetFilePointer 4328->4329 4331 100317f 4328->4331 4329->4331 4332 1002fe5 4333 1003042 ReadFile 4332->4333 4335 1002ffe 4332->4335 4334 100305e 4333->4334 4336 1003d57 4337 1003d68 4336->4337 4338 1003dee 4336->4338 4340 1003d72 4337->4340 4341 1003d9c GetDesktopWindow 4337->4341 4339 1003df7 SendDlgItemMessageA 4338->4339 4346 1003d94 4338->4346 4339->4346 4342 1003d8b EndDialog 4340->4342 4340->4346 4343 1002d83 7 API calls 4341->4343 4342->4346 4344 1003dae SetDlgItemTextA SetWindowTextA SetForegroundWindow GetDlgItem 4343->4344 4347 1002bec GetWindowLongA SetWindowLongA 4344->4347 4347->4346 4348 1003e28 4349 1003ea6 EndDialog 4348->4349 4350 1003e36 4348->4350 4351 1003e40 4349->4351 4352 1003e6f GetDesktopWindow 4350->4352 4356 1003e3d 4350->4356 4353 1002d83 7 API calls 4352->4353 4354 1003e7f SetWindowTextA SetDlgItemTextA SetForegroundWindow 4353->4354 4354->4351 4355 1003e61 EndDialog 4355->4351 4356->4351 4356->4355 4357 1002c18 4358 1002c36 CallWindowProcA 4357->4358 4359 1002c26 4357->4359 4360 1002c32 4358->4360 4359->4358 4359->4360 4361 1002d5a 4362 1002d65 SendMessageA 4361->4362 4363 1002d78 4361->4363 4362->4363 3129 100589b 3130 10058ad 3129->3130 3131 1005a0b 3129->3131 3130->3131 3132 10058c1 3130->3132 3133 1005964 GetDesktopWindow 3130->3133 3134 1005a1f EndDialog 3131->3134 3137 10058cb 3131->3137 3135 10058f4 3132->3135 3136 10058c4 3132->3136 3153 1002d83 6 API calls 3133->3153 3134->3137 3135->3137 3140 1005901 ResetEvent 3135->3140 3136->3137 3139 10058d2 TerminateThread KiUserCallbackDispatcher 3136->3139 3139->3137 3156 1003ebe 3140->3156 3141 100597b 3142 10059c4 SetWindowTextA CreateThread 3141->3142 3143 1005985 GetDlgItem SendMessageA GetDlgItem SendMessageA 3141->3143 3142->3137 3145 10059ed 3142->3145 3221 1005190 3142->3221 3143->3142 3147 1003ebe 28 API calls 3145->3147 3149 10059fd EndDialog 3147->3149 3148 1005942 SetEvent 3183 1002c91 3148->3183 3149->3137 3150 1005931 SetEvent 3150->3137 3155 1002e06 SetWindowPos 3153->3155 3155->3141 3157 1003f04 3156->3157 3168 1003f61 3156->3168 3190 1002ece 3157->3190 3161 1003f21 3193 10068b3 3161->3193 3162 1003f69 3165 1003f72 lstrlenA lstrlenA lstrlenA LocalAlloc 3162->3165 3166 1003fbd 3162->3166 3163 1004096 3163->3148 3163->3150 3165->3168 3169 1003fa3 wsprintfA 3165->3169 3170 1004000 lstrlenA LocalAlloc 3166->3170 3171 1003fc1 lstrlenA lstrlenA LocalAlloc 3166->3171 3210 10064de 3168->3210 3174 100402f MessageBeep 3169->3174 3170->3168 3172 1004021 lstrcpyA 3170->3172 3171->3168 3175 1003fec wsprintfA 3171->3175 3172->3174 3173 1003f39 MessageBoxA 3173->3168 3176 10068b3 10 API calls 3174->3176 3175->3174 3179 100403d 3176->3179 3180 1004050 MessageBoxA LocalFree 3179->3180 3181 100685e EnumResourceLanguagesA 3179->3181 3180->3168 3181->3180 3184 1002caa MsgWaitForMultipleObjects 3183->3184 3185 1002cc1 PeekMessageA 3184->3185 3186 1002cf7 3184->3186 3185->3184 3187 1002ccf 3185->3187 3186->3134 3187->3184 3187->3186 3188 1002cda DispatchMessageA 3187->3188 3189 1002ce4 PeekMessageA 3187->3189 3188->3189 3189->3187 3191 1002ef1 3190->3191 3192 1002edb LoadStringA 3190->3192 3191->3161 3191->3162 3192->3191 3194 10068e4 GetVersionExA 3193->3194 3203 10069ac 3193->3203 3196 100690a 3194->3196 3194->3203 3195 10064de 4 API calls 3197 1003f26 3195->3197 3198 1006931 GetSystemMetrics 3196->3198 3196->3203 3197->3173 3204 100685e 3197->3204 3199 1006941 RegOpenKeyExA 3198->3199 3198->3203 3200 1006963 RegQueryValueExA RegCloseKey 3199->3200 3199->3203 3201 100699c 3200->3201 3200->3203 3215 100678f 3201->3215 3203->3195 3205 1006897 3204->3205 3206 100686c 3204->3206 3205->3173 3219 1006822 EnumResourceLanguagesA 3206->3219 3208 1006883 3208->3205 3220 1006822 EnumResourceLanguagesA 3208->3220 3211 10064e6 3210->3211 3212 10064ef SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3210->3212 3211->3212 3213 10064ee 3211->3213 3212->3163 3213->3163 3216 100679a 3215->3216 3217 10067c6 CharNextA 3216->3217 3218 10067d4 3216->3218 3217->3216 3218->3203 3219->3208 3220->3205 3244 10032ff 3221->3244 3223 1005195 3224 1005199 3223->3224 3225 10051d2 3223->3225 3226 10051a8 GetDlgItem ShowWindow GetDlgItem ShowWindow 3223->3226 3247 10042a4 3225->3247 3226->3225 3228 10051e1 3229 1003ebe 28 API calls 3228->3229 3231 1005270 3229->3231 3230 10051dd 3230->3228 3255 1007b2d 3230->3255 3232 1005272 3231->3232 3234 1005288 3232->3234 3235 100527b FreeResource 3232->3235 3237 1005294 3234->3237 3239 10052a4 3234->3239 3235->3234 3236 1005241 3236->3232 3260 100735b 3236->3260 3242 1003ebe 28 API calls 3237->3242 3238 10052c9 3239->3238 3243 10052b6 SendMessageA 3239->3243 3242->3239 3243->3238 3263 1002e55 FindResourceA SizeofResource 3244->3263 3248 10042e5 3247->3248 3254 1004348 3248->3254 3268 10041d8 3248->3268 3250 1004303 3250->3254 3276 1003108 3250->3276 3253 100735b 2 API calls 3253->3254 3254->3230 3257 1007b72 3255->3257 3256 1007c44 3256->3236 3257->3256 3292 100502e 3257->3292 3322 10079d7 3257->3322 3261 1007309 2 API calls 3260->3261 3262 1005250 3261->3262 3262->3228 3262->3232 3264 1002e7c 3263->3264 3265 1002ea0 FindResourceA LoadResource LockResource 3263->3265 3264->3265 3266 1002e85 FindResourceA LoadResource LockResource 3264->3266 3265->3223 3266->3265 3267 1002ea4 FreeResource 3266->3267 3267->3265 3269 10041e8 3268->3269 3270 1004219 lstrcmpA 3269->3270 3271 10041fd 3269->3271 3273 100426d 3270->3273 3275 1004212 3270->3275 3272 1003ebe 28 API calls 3271->3272 3272->3275 3279 100412e 3273->3279 3275->3250 3277 1003123 3276->3277 3278 100313f FindCloseChangeNotification 3276->3278 3277->3253 3277->3254 3278->3277 3280 100413b 3279->3280 3281 1004143 CreateFileA 3279->3281 3280->3275 3281->3280 3283 10041af 3281->3283 3283->3280 3284 10041b5 3283->3284 3287 1002f6b 3284->3287 3288 1002fd9 CreateFileA 3287->3288 3290 1002f7d 3287->3290 3288->3280 3289 1002fcc CharNextA 3289->3290 3290->3288 3290->3289 3291 1002fbf CreateDirectoryA 3290->3291 3291->3289 3293 1005065 3292->3293 3294 100504e 3292->3294 3296 1005071 3293->3296 3297 100517a 3293->3297 3295 100505c 3294->3295 3298 1003108 FindCloseChangeNotification 3294->3298 3300 10064de 4 API calls 3295->3300 3296->3295 3301 1005077 3296->3301 3302 10050eb 3296->3302 3361 10032a1 lstrcpyA lstrcpyA lstrcpyA 3297->3361 3298->3295 3305 1005189 3300->3305 3301->3295 3333 1002efd lstrlenA lstrlenA 3301->3333 3303 1005103 3302->3303 3304 10050f4 SetDlgItemTextA 3302->3304 3307 1002efd 8 API calls 3303->3307 3304->3303 3305->3257 3308 100511c 3307->3308 3308->3295 3344 1004faf 3308->3344 3314 10041d8 33 API calls 3316 100514e 3314->3316 3315 1003108 FindCloseChangeNotification 3317 10050c3 3315->3317 3316->3295 3318 100515c 3316->3318 3320 10050d0 SetFileAttributesA 3317->3320 3352 100409f LocalAlloc 3318->3352 3320->3295 3323 1007a94 3322->3323 3324 10079ed 3322->3324 3331 100502e 61 API calls 3323->3331 3372 100796d 3324->3372 3326 1007a0d 3328 1007a27 3326->3328 3329 1007a6b 3326->3329 3386 10078c5 3326->3386 3328->3323 3328->3329 3330 10078c5 6 API calls 3328->3330 3378 1003072 3328->3378 3329->3257 3330->3328 3331->3329 3334 1002f23 lstrcpyA lstrlenA 3333->3334 3335 1002f1f 3333->3335 3336 1002f53 lstrcatA 3334->3336 3337 1002f3a lstrlenA 3334->3337 3335->3295 3339 10031ee 3335->3339 3336->3335 3337->3336 3338 1002f44 lstrlenA lstrlenA 3337->3338 3338->3336 3340 100320d DosDateTimeToFileTime 3339->3340 3341 1003209 3339->3341 3340->3341 3342 1003221 LocalFileTimeToFileTime 3340->3342 3341->3295 3341->3315 3342->3341 3343 1003233 SetFileTime 3342->3343 3343->3341 3362 100672a GetFileAttributesA 3344->3362 3346 1005011 SetFileAttributesA 3350 100501d 3346->3350 3350->3295 3350->3314 3351 100500b 3351->3346 3353 10040d2 lstrlenA LocalAlloc 3352->3353 3354 10040bb 3352->3354 3355 1004107 lstrcpyA 3353->3355 3356 10040e7 3353->3356 3357 1003ebe 28 API calls 3354->3357 3358 10040d0 3355->3358 3359 1003ebe 28 API calls 3356->3359 3357->3358 3358->3295 3360 10040fc LocalFree 3359->3360 3360->3358 3361->3295 3363 1004fc2 3362->3363 3363->3346 3363->3350 3364 1004819 FindResourceA 3363->3364 3365 1004836 LoadResource 3364->3365 3366 100486b 3364->3366 3365->3366 3369 1004844 DialogBoxIndirectParamA FreeResource 3365->3369 3367 1003ebe 28 API calls 3366->3367 3368 100487b 3367->3368 3370 100487e 3368->3370 3369->3366 3369->3370 3370->3346 3370->3350 3370->3351 3373 100797f 3372->3373 3374 1007984 3372->3374 3373->3326 3374->3373 3394 100766b 3374->3394 3376 10079b3 3376->3373 3377 10078c5 6 API calls 3376->3377 3377->3373 3379 1002c91 4 API calls 3378->3379 3380 1003082 3379->3380 3381 1003090 WriteFile 3380->3381 3382 100308b 3380->3382 3383 10030b4 3381->3383 3384 10030b9 3381->3384 3382->3328 3383->3328 3384->3383 3385 10030da SendDlgItemMessageA 3384->3385 3385->3383 3387 10078e2 3386->3387 3390 10078e8 3386->3390 3445 1007774 3387->3445 3389 1007940 3389->3326 3390->3389 3391 1007774 2 API calls 3390->3391 3393 100790f 3390->3393 3391->3393 3393->3389 3449 10071a5 3393->3449 3395 100769d 3394->3395 3397 10076f0 3395->3397 3398 1007309 3395->3398 3397->3376 3399 1007325 3398->3399 3403 1007320 3398->3403 3404 1006ef9 3399->3404 3401 100732b 3401->3403 3412 1006f72 3401->3412 3403->3397 3405 1006f38 3404->3405 3407 1006f14 3404->3407 3409 1006f1d 3405->3409 3424 100328c GlobalFree 3405->3424 3406 1006f5c 3425 100328c GlobalFree 3406->3425 3407->3405 3407->3409 3420 1007ee1 3407->3420 3409->3401 3413 1006fa2 3412->3413 3414 1006fdf 3412->3414 3413->3414 3415 1007da4 GlobalAlloc 3413->3415 3416 1006fab 3413->3416 3414->3416 3431 1003275 GlobalAlloc 3414->3431 3415->3414 3416->3403 3417 1007040 3417->3416 3432 1007da4 3417->3432 3421 1007ef7 3420->3421 3423 1007ef2 3420->3423 3426 1007f18 3421->3426 3423->3405 3424->3406 3425->3409 3427 100809d 3426->3427 3428 10080b3 3427->3428 3430 100328c GlobalFree 3427->3430 3428->3423 3430->3428 3431->3417 3433 1007dbf 3432->3433 3434 1007dc1 3432->3434 3433->3416 3436 1007de6 3434->3436 3437 1007fb7 3434->3437 3436->3416 3438 100800f 3437->3438 3440 1008023 3437->3440 3438->3440 3441 100803e 3438->3441 3440->3436 3442 1008056 3441->3442 3444 1003275 GlobalAlloc 3442->3444 3443 1008085 3443->3440 3444->3443 3447 10077c2 3445->3447 3446 100766b 2 API calls 3446->3447 3447->3446 3448 1007864 3447->3448 3448->3390 3450 10071ce 3449->3450 3451 10071c5 3449->3451 3450->3389 3451->3450 3453 1007e66 3451->3453 3454 1007e7b 3453->3454 3455 1007e80 3453->3455 3454->3450 3456 1007e8b 3455->3456 3458 1007f54 3455->3458 3456->3450 3459 1007f82 3458->3459 3462 1008295 3459->3462 3466 10082ab 3462->3466 3463 1008496 3480 1009590 3463->3480 3465 1007f8b 3465->3456 3466->3463 3466->3465 3469 10099ce 3466->3469 3473 10098ff 3466->3473 3471 10099e1 3469->3471 3470 10099fb 3470->3466 3471->3470 3484 1009c30 3471->3484 3488 10095e5 3473->3488 3476 10095e5 4 API calls 3477 100994e 3476->3477 3478 10095e5 4 API calls 3477->3478 3479 1009927 3477->3479 3478->3479 3479->3466 3481 10095a3 3480->3481 3482 10095db 3480->3482 3481->3482 3492 10081b8 3481->3492 3482->3465 3485 1009c5d 3484->3485 3485->3485 3486 10064de SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3485->3486 3487 1009d54 3486->3487 3487->3470 3491 100960d 3488->3491 3489 10064de SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3490 10098f2 3489->3490 3490->3476 3490->3479 3491->3489 3495 10081d7 3492->3495 3493 10064de SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3494 100828c 3493->3494 3494->3482 3495->3493 3496 100645c 3517 100646b 3496->3517 3500 10063f7 3500->3500 3501 1006420 GetStartupInfoA 3500->3501 3502 1006434 GetModuleHandleA 3501->3502 3506 100637a 3502->3506 3522 10053fa 3506->3522 3509 10063c2 3511 10063d2 ExitProcess 3509->3511 3512 10063cb CloseHandle 3509->3512 3512->3511 3518 1006483 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 3517->3518 3519 100647c 3517->3519 3521 10064c6 3518->3521 3519->3518 3520 10063e0 GetCommandLineA 3519->3520 3520->3500 3521->3520 3523 1002e55 6 API calls 3522->3523 3524 100546e 3523->3524 3525 1005578 3524->3525 3526 1005481 CreateEventA SetEvent 3524->3526 3528 1003ebe 28 API calls 3525->3528 3527 1002e55 6 API calls 3526->3527 3529 10054a8 3527->3529 3556 1005646 3528->3556 3530 10054d3 3529->3530 3531 1005563 3529->3531 3532 10054b9 3529->3532 3534 1003ebe 28 API calls 3530->3534 3630 100359c 3531->3630 3536 1002e55 6 API calls 3532->3536 3533 10064de 4 API calls 3537 1005667 3533->3537 3549 10054e3 3534->3549 3539 10054cf 3536->3539 3537->3509 3566 1006205 3537->3566 3539->3530 3541 10054f2 CreateMutexA 3539->3541 3540 1005587 3542 100559e FindResourceA 3540->3542 3543 100558f 3540->3543 3541->3531 3544 100550a GetLastError 3541->3544 3547 10055b5 LoadResource 3542->3547 3548 10055c8 3542->3548 3660 1002a96 3543->3660 3544->3531 3546 1005517 3544->3546 3550 1005520 3546->3550 3551 1005532 3546->3551 3547->3548 3552 10055d0 #17 3548->3552 3553 10055d6 3548->3553 3549->3556 3554 1003ebe 28 API calls 3550->3554 3555 1003ebe 28 API calls 3551->3555 3552->3553 3553->3556 3557 10055de 3553->3557 3558 1005530 3554->3558 3559 1005543 3555->3559 3556->3533 3674 100488c GetVersionExA 3557->3674 3561 1005548 CloseHandle 3558->3561 3559->3531 3559->3561 3561->3556 3565 1004819 32 API calls 3565->3549 3567 1006224 3566->3567 3568 1006247 3566->3568 3570 100623e 3567->3570 3770 10043ec 3567->3770 3790 100435e 3568->3790 3924 1004bc8 3570->3924 3572 100624c 3597 1006259 3572->3597 3805 1005f21 3572->3805 3577 10064de 4 API calls 3579 1006373 3577->3579 3605 1003346 3579->3605 3580 1006260 GetSystemDirectoryA 3581 10066cf 2 API calls 3580->3581 3582 1006287 LoadLibraryA 3581->3582 3583 10062b3 FreeLibrary 3582->3583 3584 100629f GetProcAddress 3582->3584 3585 10062c2 3583->3585 3586 10062da SetCurrentDirectoryA 3583->3586 3584->3583 3587 10062af DecryptFileA 3584->3587 3585->3586 3855 10047b3 GetWindowsDirectoryA 3585->3855 3588 1006301 3586->3588 3589 10062e5 3586->3589 3587->3583 3592 100630e 3588->3592 3866 1005a36 3588->3866 3591 1003ebe 28 API calls 3589->3591 3594 10062f5 3591->3594 3592->3597 3600 1006329 3592->3600 3875 1001f93 3592->3875 3943 1003aa1 GetLastError 3594->3943 3597->3577 3599 10062fa 3599->3597 3603 100634b 3600->3603 3884 1005abc 3600->3884 3602 1006360 3946 1004de5 3602->3946 3603->3597 3603->3602 3606 1003367 3605->3606 3609 10033a5 3605->3609 3608 1003395 LocalFree LocalFree 3606->3608 3613 1003380 SetFileAttributesA DeleteFileA 3606->3613 3607 1003418 3612 10064de 4 API calls 3607->3612 3608->3606 3608->3609 3610 10033c2 lstrcpyA 3609->3610 3611 1003400 3609->3611 3614 10033e9 SetCurrentDirectoryA 3610->3614 3615 10033dd 3610->3615 3611->3607 4252 1001a5b 3611->4252 3617 1003427 3612->3617 3613->3608 3619 1002a96 14 API calls 3614->3619 3618 1006666 5 API calls 3615->3618 3617->3509 3620 1002251 3617->3620 3618->3614 3619->3611 3621 1002261 3620->3621 3622 100225c 3620->3622 3626 1003ebe 28 API calls 3621->3626 3627 10022a3 3621->3627 3629 1002283 3621->3629 3623 100221e 17 API calls 3622->3623 3623->3621 3624 1002292 ExitWindowsEx 3624->3627 3625 100229e 4256 10019c3 GetCurrentProcess OpenProcessToken 3625->4256 3626->3629 3627->3509 3629->3624 3629->3625 3629->3627 3631 10039a1 3630->3631 3657 10035c6 3630->3657 3632 10064de 4 API calls 3631->3632 3633 1003a98 3632->3633 3633->3525 3633->3540 3634 1003600 CharNextA 3634->3657 3635 10036be GetModuleFileNameA 3636 10036e5 3635->3636 3637 10036dd 3635->3637 3636->3631 3712 1006752 3637->3712 3639 1003708 CharUpperA 3640 1003a5f 3639->3640 3639->3657 3724 10019a7 3640->3724 3643 10039c9 lstrlenA 3643->3657 3644 1003908 lstrlenA 3644->3657 3645 1003a74 ExitProcess 3646 1003a6d CloseHandle 3646->3645 3647 100369d 3647->3631 3647->3635 3648 100384e CharUpperA 3648->3657 3649 100394a CharUpperA 3649->3657 3650 1003819 lstrcmpiA 3650->3657 3651 10038b6 CharUpperA 3651->3657 3652 100662b IsDBCSLeadByte CharNextA 3652->3657 3653 1003972 lstrcpyA 3717 10066cf lstrlenA 3653->3717 3654 10037a1 CharUpperA 3654->3657 3656 1003517 lstrlenA 3656->3657 3657->3631 3657->3634 3657->3639 3657->3643 3657->3644 3657->3647 3657->3648 3657->3649 3657->3650 3657->3651 3657->3652 3657->3653 3657->3654 3657->3656 3659 1003a42 lstrcpyA 3657->3659 3721 1002c57 3657->3721 3659->3657 3661 1002bd9 3660->3661 3664 1002ab5 3660->3664 3662 10064de 4 API calls 3661->3662 3663 1002be3 3662->3663 3663->3549 3664->3661 3665 1002ae4 FindFirstFileA 3664->3665 3665->3661 3672 1002b07 3665->3672 3666 1002b2b lstrcmpA 3667 1002b37 lstrcmpA 3666->3667 3668 1002baa FindNextFileA 3666->3668 3667->3668 3667->3672 3669 1002bc5 FindClose RemoveDirectoryA 3668->3669 3668->3672 3669->3661 3670 1002b8b SetFileAttributesA DeleteFileA 3670->3668 3671 10066cf 2 API calls 3671->3672 3672->3666 3672->3668 3672->3670 3672->3671 3673 1002a96 6 API calls 3672->3673 3673->3672 3675 10048ed 3674->3675 3676 10048cd 3674->3676 3675->3676 3680 100490b 3675->3680 3677 1003ebe 28 API calls 3676->3677 3691 10048e8 3677->3691 3678 10064de 4 API calls 3679 1004bbf 3678->3679 3679->3556 3692 1001760 3679->3692 3681 1004a79 3680->3681 3680->3691 3730 1002410 3680->3730 3683 1004b92 3681->3683 3684 1004ae3 MessageBeep 3681->3684 3681->3691 3685 1003ebe 28 API calls 3683->3685 3686 10068b3 10 API calls 3684->3686 3685->3691 3687 1004af0 3686->3687 3688 1004b03 MessageBoxA 3687->3688 3690 100685e EnumResourceLanguagesA 3687->3690 3688->3691 3690->3688 3691->3678 3693 1001797 3692->3693 3694 100187b 3692->3694 3761 10016b4 LoadLibraryA 3693->3761 3696 10064de 4 API calls 3694->3696 3698 1001896 3696->3698 3698->3556 3698->3565 3699 10017a8 GetCurrentProcess OpenProcessToken 3699->3694 3700 10017c3 GetTokenInformation 3699->3700 3701 100186f CloseHandle 3700->3701 3702 10017df GetLastError 3700->3702 3701->3694 3702->3701 3703 10017ee LocalAlloc 3702->3703 3704 100186e 3703->3704 3705 10017ff GetTokenInformation 3703->3705 3704->3701 3706 1001812 AllocateAndInitializeSid 3705->3706 3707 1001867 LocalFree 3705->3707 3706->3707 3708 1001833 3706->3708 3707->3704 3709 100185e FreeSid 3708->3709 3710 100183a EqualSid 3708->3710 3711 1001851 3708->3711 3709->3707 3710->3708 3710->3711 3711->3709 3713 1006760 3712->3713 3714 1006782 3713->3714 3716 1006774 CharNextA 3713->3716 3727 10065f6 3713->3727 3714->3636 3716->3713 3718 10066ee 3717->3718 3720 10066e7 3717->3720 3719 10066f6 CharPrevA 3718->3719 3718->3720 3719->3720 3720->3657 3722 1002c64 lstrlenA 3721->3722 3723 1002c70 3721->3723 3722->3723 3723->3657 3725 1003ebe 28 API calls 3724->3725 3726 10019bd 3725->3726 3726->3645 3726->3646 3728 1006604 IsDBCSLeadByte 3727->3728 3729 100660f 3727->3729 3728->3729 3729->3713 3731 1002551 3730->3731 3741 1002432 3730->3741 3733 1002572 3731->3733 3734 1002569 GlobalFree 3731->3734 3733->3681 3734->3733 3735 1002469 GetFileVersionInfoSizeA 3736 1002480 GlobalAlloc 3735->3736 3735->3741 3736->3731 3737 1002494 GlobalLock 3736->3737 3737->3731 3738 10024a5 GetFileVersionInfoA 3737->3738 3739 10024b8 VerQueryValueA 3738->3739 3740 100252a GlobalUnlock 3738->3740 3739->3740 3739->3741 3740->3741 3741->3731 3741->3735 3741->3740 3742 1002579 GlobalUnlock 3741->3742 3743 10022ac 3741->3743 3742->3731 3744 10022db CharUpperA CharNextA CharNextA 3743->3744 3745 10023dc GetSystemDirectoryA 3743->3745 3744->3745 3746 10022ff 3744->3746 3748 10023e6 3745->3748 3749 10023d0 GetWindowsDirectoryA 3746->3749 3750 1002308 lstrcpyA 3746->3750 3747 10023f9 3753 10064de 4 API calls 3747->3753 3748->3747 3751 10066cf 2 API calls 3748->3751 3749->3748 3752 10066cf 2 API calls 3750->3752 3751->3747 3755 1002333 RegOpenKeyExA 3752->3755 3754 1002407 3753->3754 3754->3741 3755->3748 3756 100235b RegQueryValueExA 3755->3756 3757 1002381 3756->3757 3758 10023c2 RegCloseKey 3756->3758 3759 100238a ExpandEnvironmentStringsA 3757->3759 3760 100239d 3757->3760 3758->3748 3759->3760 3760->3758 3762 10016f3 GetProcAddress 3761->3762 3763 100174a 3761->3763 3764 1001740 FreeLibrary 3762->3764 3765 1001706 AllocateAndInitializeSid 3762->3765 3766 10064de 4 API calls 3763->3766 3764->3763 3765->3764 3767 1001730 FreeSid 3765->3767 3768 1001757 3766->3768 3767->3764 3768->3694 3768->3699 3771 1002e55 6 API calls 3770->3771 3772 1004404 LocalAlloc 3771->3772 3773 1004433 3772->3773 3774 1004417 3772->3774 3775 1002e55 6 API calls 3773->3775 3776 1003ebe 28 API calls 3774->3776 3777 100443d 3775->3777 3778 1004427 3776->3778 3779 1004441 3777->3779 3780 1004464 lstrcmpA 3777->3780 3781 1003aa1 3 API calls 3778->3781 3782 1003ebe 28 API calls 3779->3782 3783 1004480 3780->3783 3784 1004474 LocalFree 3780->3784 3789 100442c 3781->3789 3786 1004451 LocalFree 3782->3786 3787 1003ebe 28 API calls 3783->3787 3785 100447b 3784->3785 3785->3568 3785->3570 3785->3597 3786->3785 3788 1004491 LocalFree 3787->3788 3788->3789 3789->3785 3791 1002e55 6 API calls 3790->3791 3792 1004372 3791->3792 3793 1004379 3792->3793 3794 10043af 3792->3794 3795 1003ebe 28 API calls 3793->3795 3796 1002e55 6 API calls 3794->3796 3797 1004389 3795->3797 3798 10043c0 3796->3798 3799 10043de 3797->3799 3959 1003ac7 wsprintfA FindResourceA 3798->3959 3799->3572 3802 10043e2 3802->3572 3803 10043ce 3804 1003ebe 28 API calls 3803->3804 3804->3799 3806 1002e55 6 API calls 3805->3806 3807 1005f46 LocalAlloc 3806->3807 3808 1005f5c 3807->3808 3809 1005f7d 3807->3809 3810 1003ebe 28 API calls 3808->3810 3811 1002e55 6 API calls 3809->3811 3812 1005f6c 3810->3812 3813 1005f85 3811->3813 3814 1003aa1 3 API calls 3812->3814 3815 1005f89 3813->3815 3816 1005fac lstrcmpA 3813->3816 3819 1005f71 3814->3819 3820 1003ebe 28 API calls 3815->3820 3817 1005fc5 LocalFree 3816->3817 3818 1005fbf 3816->3818 3821 1006010 3817->3821 3822 1005fd5 3817->3822 3818->3817 3844 1005f76 3819->3844 3823 1005f99 LocalFree 3820->3823 3824 10061d5 3821->3824 3827 100602a GetTempPathA 3821->3827 3830 10052d4 66 API calls 3822->3830 3823->3844 3825 1004819 32 API calls 3824->3825 3825->3844 3826 10064de 4 API calls 3831 10061fe 3826->3831 3828 100605e 3827->3828 3829 100603f 3827->3829 3834 100606f lstrcpyA 3828->3834 3838 1006082 GetDriveTypeA 3828->3838 3839 10061a7 GetWindowsDirectoryA 3828->3839 3828->3844 3968 10052d4 3829->3968 3833 1005ff7 3830->3833 3831->3580 3831->3597 3836 1005ffb 3833->3836 3833->3844 3834->3828 3837 1003ebe 28 API calls 3836->3837 3837->3819 3841 1006095 GetFileAttributesA 3838->3841 3852 1006090 3838->3852 4007 100456a 3839->4007 3841->3852 3844->3826 3845 10052d4 66 API calls 3845->3828 3846 1002025 29 API calls 3846->3852 3848 1006128 GetWindowsDirectoryA 3848->3852 3849 10066cf 2 API calls 3849->3852 3850 100456a 44 API calls 3850->3852 3852->3828 3852->3841 3852->3844 3852->3846 3852->3848 3852->3849 3852->3850 3853 100616e SetFileAttributesA lstrcpyA 3852->3853 4000 10069ea 3852->4000 4004 1001ff9 GetFileAttributesA 3852->4004 3854 10052d4 66 API calls 3853->3854 3854->3852 3856 10047fa 3855->3856 3857 10047dc 3855->3857 3858 100456a 44 API calls 3856->3858 3859 1003ebe 28 API calls 3857->3859 3860 100480a 3858->3860 3861 10047ec 3859->3861 3862 10064de 4 API calls 3860->3862 3863 1003aa1 3 API calls 3861->3863 3864 1004812 3862->3864 3865 10047f1 3863->3865 3864->3586 3864->3597 3865->3860 3867 1005a3e 3866->3867 3867->3867 3868 1005a85 3867->3868 3869 1005a5e 3867->3869 3870 1005190 84 API calls 3868->3870 3871 1004819 32 API calls 3869->3871 3872 1005a83 3870->3872 3871->3872 3873 1003ac7 13 API calls 3872->3873 3874 1005a8e 3872->3874 3873->3874 3874->3592 3876 1001fa2 3875->3876 3877 1001fcb 3875->3877 3878 1001fa7 3876->3878 3879 1001fbf 3876->3879 4092 1001e53 GetWindowsDirectoryA 3877->4092 3883 1001fbd 3878->3883 4082 1001edf RegOpenKeyExA 3878->4082 4087 1001f37 RegOpenKeyExA 3879->4087 3883->3600 3885 1005af2 3884->3885 3909 1005b2d 3884->3909 3886 1002e55 6 API calls 3885->3886 3887 1005b03 3886->3887 3889 1005b0c 3887->3889 3887->3909 3888 1005c7b lstrcpyA 3888->3909 3890 1003ebe 28 API calls 3889->3890 3895 1005b1c 3890->3895 3892 1005c5a 3893 1003ebe 28 API calls 3892->3893 3893->3895 3894 1005c74 3896 10064de 4 API calls 3894->3896 3895->3894 3897 1005e98 3896->3897 3897->3603 3898 1005e7b 3898->3894 4194 1001cf4 3898->4194 3899 1005cbe lstrcmpiA 3899->3898 3899->3909 3901 1005e9a 3903 1003ebe 28 API calls 3901->3903 3907 1005eaa LocalFree 3903->3907 3904 1005e60 LocalFree 3904->3898 3904->3909 3905 1005f0f LocalFree 3905->3894 3907->3894 3908 1002e55 6 API calls 3908->3909 3909->3888 3909->3892 3909->3894 3909->3898 3909->3899 3909->3901 3909->3904 3909->3905 3909->3908 3914 1005c18 lstrcmpiA 3909->3914 3921 1005d5c 3909->3921 4100 10026e2 3909->4100 4147 1001aa7 RegCreateKeyExA 3909->4147 4170 1004cae 3909->4170 3911 1005d70 GetProcAddress 3913 1005ed7 3911->3913 3911->3921 3912 1005ec1 3915 1003ebe 28 API calls 3912->3915 3917 1003ebe 28 API calls 3913->3917 3914->3909 3916 1005ed5 3915->3916 3918 1005ef2 LocalFree 3916->3918 3919 1005eeb FreeLibrary 3917->3919 3920 1003aa1 3 API calls 3918->3920 3919->3918 3920->3895 3921->3911 3921->3912 3922 1005f09 FreeLibrary 3921->3922 3923 1005e3e FreeLibrary 3921->3923 4185 1003ccc lstrcpyA 3921->4185 3922->3905 3923->3904 3925 1002e55 6 API calls 3924->3925 3926 1004bdc LocalAlloc 3925->3926 3927 1004bf3 3926->3927 3928 1004c0f 3926->3928 3929 1003ebe 28 API calls 3927->3929 3930 1002e55 6 API calls 3928->3930 3931 1004c03 3929->3931 3932 1004c17 3930->3932 3935 1003aa1 3 API calls 3931->3935 3933 1004c43 lstrcmpA 3932->3933 3934 1004c1b 3932->3934 3937 1004c90 LocalFree 3933->3937 3938 1004c58 3933->3938 3936 1003ebe 28 API calls 3934->3936 3941 1004c08 3935->3941 3939 1004c2b LocalFree 3936->3939 3937->3941 3940 1004819 32 API calls 3938->3940 3939->3941 3942 1004c70 LocalFree 3940->3942 3941->3568 3941->3597 3942->3941 3944 1003ab0 GetLastError 3943->3944 3945 1003ab4 GetLastError 3943->3945 3944->3599 3945->3599 3947 1002e55 6 API calls 3946->3947 3948 1004dfd LocalAlloc 3947->3948 3949 1004e12 3948->3949 3950 1004e24 3948->3950 3951 1003ebe 28 API calls 3949->3951 3952 1002e55 6 API calls 3950->3952 3953 1004e22 3951->3953 3954 1004e2c 3952->3954 3953->3597 3955 1004e30 3954->3955 3956 1004e3c lstrcmpA 3954->3956 3958 1003ebe 28 API calls 3955->3958 3956->3955 3957 1004e60 LocalFree 3956->3957 3957->3953 3958->3957 3966 1003b84 3959->3966 3967 1003b15 3959->3967 3960 10064de 4 API calls 3962 1003bad 3960->3962 3961 1003b1a LoadResource LockResource 3963 1003b2f lstrlenA 3961->3963 3961->3966 3962->3802 3962->3803 3963->3967 3964 1003b95 FreeResource 3964->3966 3965 1003b58 FreeResource wsprintfA FindResourceA 3965->3966 3965->3967 3966->3960 3967->3961 3967->3964 3967->3965 3969 10052f8 3968->3969 3970 100537f lstrcpyA 3968->3970 4037 100342e 3969->4037 3989 100537d 3970->3989 3974 1005313 lstrcpyA 3976 1005371 3974->3976 3977 100532f GetSystemInfo 3974->3977 3985 10066cf 2 API calls 3976->3985 3981 1005347 3977->3981 3978 1005399 CreateDirectoryA 3982 10053c3 3978->3982 3983 10053a5 3978->3983 3979 10053ab 3984 100456a 44 API calls 3979->3984 3980 10064de 4 API calls 3986 10053f1 3980->3986 3981->3976 3991 10066cf 2 API calls 3981->3991 3988 1003aa1 3 API calls 3982->3988 3983->3979 3987 10053b5 3984->3987 3985->3989 3986->3844 3994 1002025 GetWindowsDirectoryA 3986->3994 3990 10053b9 3987->3990 3993 10053d7 RemoveDirectoryA 3987->3993 3992 10053c8 3988->3992 4049 10044bd lstrlenA LocalAlloc 3989->4049 3990->3980 3991->3976 3992->3990 3993->3990 3995 100205e 3994->3995 3996 100204e 3994->3996 3998 10064de 4 API calls 3995->3998 3997 1003ebe 28 API calls 3996->3997 3997->3995 3999 1002076 3998->3999 3999->3828 3999->3845 4001 1006a22 4000->4001 4002 1006a07 GetDiskFreeSpaceA 4000->4002 4001->3852 4002->4001 4003 1006a26 MulDiv 4002->4003 4003->4001 4005 1002019 4004->4005 4006 100200c CreateDirectoryA 4004->4006 4005->3852 4006->4005 4008 1004595 4007->4008 4009 100459d GetCurrentDirectoryA SetCurrentDirectoryA 4007->4009 4014 10064de 4 API calls 4008->4014 4010 10045bd 4009->4010 4011 10045de 4009->4011 4012 1003ebe 28 API calls 4010->4012 4059 1006a45 GetDiskFreeSpaceA 4011->4059 4015 10045cd 4012->4015 4017 10047aa 4014->4017 4018 1003aa1 3 API calls 4015->4018 4017->3828 4021 10045d2 4018->4021 4019 10045f5 4022 1003aa1 3 API calls 4019->4022 4020 100464d GetVolumeInformationA 4023 10046d3 SetCurrentDirectoryA lstrcpynA 4020->4023 4024 100466b 4020->4024 4021->4008 4026 1004610 GetLastError FormatMessageA 4022->4026 4025 10046f0 4023->4025 4027 1003aa1 3 API calls 4024->4027 4031 1004707 4025->4031 4035 100471c 4025->4035 4029 10046bf 4026->4029 4028 1004684 GetLastError FormatMessageA 4027->4028 4028->4029 4030 1003ebe 28 API calls 4029->4030 4032 10046c5 SetCurrentDirectoryA 4030->4032 4033 1003ebe 28 API calls 4031->4033 4032->4008 4034 1004717 4033->4034 4034->4035 4035->4008 4062 10020a4 4035->4062 4038 1003458 wsprintfA lstrcpyA 4037->4038 4039 10066cf 2 API calls 4038->4039 4040 100348c RemoveDirectoryA GetFileAttributesA 4039->4040 4041 10034a5 4040->4041 4042 10034af CreateDirectoryA 4040->4042 4041->4038 4043 10034ad GetTempFileNameA 4041->4043 4042->4043 4044 10034b8 4042->4044 4043->4044 4046 10034e7 DeleteFileA CreateDirectoryA 4043->4046 4047 10064de 4 API calls 4044->4047 4046->4044 4048 100350e 4047->4048 4048->3974 4048->3990 4050 10044e4 4049->4050 4051 1004507 lstrcpyA 4049->4051 4053 1003ebe 28 API calls 4050->4053 4052 10066cf 2 API calls 4051->4052 4054 100451d CreateFileA LocalFree 4052->4054 4055 10044f4 4053->4055 4054->4055 4056 1004541 CloseHandle GetFileAttributesA 4054->4056 4057 1003aa1 3 API calls 4055->4057 4058 10044f9 4055->4058 4056->4055 4057->4058 4058->3978 4058->3979 4060 1006a7a MulDiv 4059->4060 4061 10045eb 4059->4061 4060->4061 4061->4019 4061->4020 4063 10020f1 4062->4063 4064 10020cd 4062->4064 4066 1002126 4063->4066 4067 10020f7 4063->4067 4079 100207f wsprintfA 4064->4079 4075 10020ef 4066->4075 4081 100207f wsprintfA 4066->4081 4080 100207f wsprintfA 4067->4080 4068 10020e3 4071 1003ebe 28 API calls 4068->4071 4071->4075 4072 10064de 4 API calls 4076 1002166 4072->4076 4073 100210e 4077 1003ebe 28 API calls 4073->4077 4074 1002140 4078 1003ebe 28 API calls 4074->4078 4075->4072 4076->4008 4077->4075 4078->4075 4079->4068 4080->4073 4081->4074 4083 1001f07 RegQueryValueExA 4082->4083 4084 1001f2a 4082->4084 4085 1001f21 RegCloseKey 4083->4085 4086 1001f1e 4083->4086 4084->3883 4085->4084 4086->4085 4088 1001f86 4087->4088 4089 1001f5f RegQueryInfoKeyA 4087->4089 4088->3883 4090 1001f7a 4089->4090 4091 1001f7d RegCloseKey 4089->4091 4090->4091 4091->4088 4093 1001e81 4092->4093 4094 1001ecc 4092->4094 4096 10066cf 2 API calls 4093->4096 4095 10064de 4 API calls 4094->4095 4098 1001ed8 4095->4098 4097 1001e93 WritePrivateProfileStringA _lopen 4096->4097 4097->4094 4099 1001eb9 _llseek _lclose 4097->4099 4098->3883 4099->4094 4101 1002726 4100->4101 4205 1001942 4101->4205 4106 1002791 lstrcpyA 4108 100278f 4106->4108 4107 1002775 lstrcpyA 4109 10066cf 2 API calls 4107->4109 4110 1006752 2 API calls 4108->4110 4109->4108 4111 10027a1 4110->4111 4112 10027b1 lstrcmpiA 4111->4112 4113 1002959 4111->4113 4112->4113 4114 10027c1 4112->4114 4115 1006752 2 API calls 4113->4115 4116 100672a GetFileAttributesA 4114->4116 4117 1002961 4115->4117 4118 10027cd 4116->4118 4119 10029c2 LocalAlloc 4117->4119 4120 1002965 lstrcmpiA 4117->4120 4121 10027d1 4118->4121 4125 1001942 2 API calls 4118->4125 4119->4121 4123 10029f1 GetFileAttributesA 4119->4123 4120->4119 4122 1002971 lstrlenA lstrlenA LocalAlloc 4120->4122 4128 1003ebe 28 API calls 4121->4128 4122->4121 4124 10029ab wsprintfA 4122->4124 4133 1002a03 4123->4133 4140 1002a29 4123->4140 4126 1002a71 4124->4126 4127 1002803 lstrlenA 4125->4127 4132 10064de 4 API calls 4126->4132 4129 1002840 4127->4129 4130 1002816 4127->4130 4131 10028bb 4128->4131 4134 1002846 LocalAlloc 4129->4134 4136 1001942 2 API calls 4130->4136 4131->4126 4137 1002a8d 4132->4137 4133->4140 4134->4121 4138 1002861 GetPrivateProfileIntA GetPrivateProfileStringA 4134->4138 4139 1002831 4136->4139 4137->3909 4138->4131 4143 10028f3 4138->4143 4139->4134 4142 100283b lstrlenA 4139->4142 4214 1002589 4140->4214 4142->4134 4144 1002903 GetShortPathNameA 4143->4144 4145 1002922 wsprintfA 4143->4145 4144->4145 4145->4126 4148 1001ce2 4147->4148 4152 1001b20 4147->4152 4149 10064de 4 API calls 4148->4149 4153 1001ced 4149->4153 4150 1001b32 wsprintfA RegQueryValueExA 4151 1001b70 4150->4151 4150->4152 4154 1001b90 GetSystemDirectoryA 4151->4154 4155 1001b78 RegCloseKey 4151->4155 4152->4150 4152->4151 4153->3909 4156 10066cf 2 API calls 4154->4156 4155->4148 4157 1001bb7 LoadLibraryA 4156->4157 4158 1001c1a GetModuleFileNameA 4157->4158 4159 1001bce GetProcAddress FreeLibrary 4157->4159 4161 1001c70 RegCloseKey 4158->4161 4162 1001c32 lstrlenA lstrlenA LocalAlloc 4158->4162 4159->4158 4160 1001bf8 GetSystemDirectoryA 4159->4160 4160->4162 4163 1001c06 4160->4163 4161->4148 4164 1001c60 4162->4164 4165 1001c7e wsprintfA lstrlenA RegSetValueExA RegCloseKey LocalFree 4162->4165 4167 10066cf 2 API calls 4163->4167 4168 1003ebe 28 API calls 4164->4168 4165->4148 4169 1001c18 4167->4169 4168->4161 4169->4162 4171 1004cdf CreateProcessA 4170->4171 4182 1004dc5 4170->4182 4172 1004d84 4171->4172 4173 1004d05 WaitForSingleObject GetExitCodeProcess 4171->4173 4176 1003aa1 3 API calls 4172->4176 4180 1004d34 4173->4180 4183 1004d4f 4173->4183 4174 10064de 4 API calls 4175 1004ddc 4174->4175 4175->3909 4178 1004d89 GetLastError FormatMessageA 4176->4178 4179 1003ebe 28 API calls 4178->4179 4179->4182 4180->4183 4182->4174 4241 1002d03 4183->4241 4184 1004d7a 4184->4182 4186 10066cf 2 API calls 4185->4186 4187 1003d07 GetFileAttributesA 4186->4187 4188 1003d30 LoadLibraryA 4187->4188 4189 1003d19 4187->4189 4191 1003d37 4188->4191 4189->4188 4190 1003d1d LoadLibraryExA 4189->4190 4190->4191 4192 10064de 4 API calls 4191->4192 4193 1003d40 4192->4193 4193->3921 4195 1001e03 4194->4195 4196 1001d16 RegOpenKeyExA 4194->4196 4197 10064de 4 API calls 4195->4197 4196->4195 4198 1001d3b RegQueryValueExA 4196->4198 4199 1001e0c 4197->4199 4200 1001d70 GetSystemDirectoryA 4198->4200 4201 1001df6 RegCloseKey 4198->4201 4199->3894 4202 1001d9c 4200->4202 4203 1001dae wsprintfA lstrlenA RegSetValueExA 4200->4203 4201->4195 4204 10066cf 2 API calls 4202->4204 4203->4201 4204->4203 4206 1001953 4205->4206 4208 1001972 4206->4208 4210 100196a 4206->4210 4229 100662b 4206->4229 4211 1001e13 4208->4211 4209 100662b 2 API calls 4209->4210 4210->4208 4210->4209 4212 1001e20 lstrlenA 4211->4212 4213 1001e2c 4211->4213 4212->4213 4213->4106 4213->4107 4215 10025b5 4214->4215 4224 10026a9 4214->4224 4217 10025be GetModuleFileNameA 4215->4217 4215->4224 4216 10064de 4 API calls 4218 10026b7 4216->4218 4217->4224 4227 10025e2 4217->4227 4218->4126 4219 10025e9 IsDBCSLeadByte 4219->4227 4220 1002607 CharNextA CharUpperA 4222 1002656 CharUpperA 4220->4222 4220->4227 4221 100268d CharNextA 4223 1002696 CharNextA 4221->4223 4222->4227 4223->4219 4223->4224 4224->4216 4227->4219 4227->4220 4227->4221 4227->4223 4228 1002681 lstrlenA 4227->4228 4234 1006666 lstrlenA CharPrevA 4227->4234 4228->4223 4230 1006636 4229->4230 4231 1006656 4230->4231 4232 10065f6 IsDBCSLeadByte 4230->4232 4233 1006648 CharNextA 4230->4233 4231->4206 4232->4230 4233->4230 4235 1006692 CharPrevA 4234->4235 4236 100669b 4235->4236 4237 100668c 4235->4237 4238 100262a lstrlenA CharPrevA 4236->4238 4239 10066a4 CharPrevA 4236->4239 4240 10066ad CharNextA 4236->4240 4237->4235 4237->4236 4238->4227 4239->4238 4239->4240 4240->4238 4242 1002d16 4241->4242 4244 1002d11 CloseHandle CloseHandle 4241->4244 4245 100221e 4242->4245 4244->4182 4244->4184 4246 100222d 4245->4246 4247 1002241 4245->4247 4249 1001fd9 4246->4249 4247->4244 4250 1001f93 17 API calls 4249->4250 4251 1001fe6 4250->4251 4251->4247 4253 1001aa0 4252->4253 4254 1001a6a RegOpenKeyExA 4252->4254 4253->3607 4254->4253 4255 1001a89 RegDeleteValueA RegCloseKey 4254->4255 4255->4253 4257 10019f1 LookupPrivilegeValueA AdjustTokenPrivileges 4256->4257 4258 10019e5 4256->4258 4257->4258 4259 1001a30 ExitWindowsEx 4257->4259 4261 1003ebe 28 API calls 4258->4261 4259->4258 4260 1001a4c 4259->4260 4260->3627 4261->4260 4364 100189d 4365 10018e3 GetDesktopWindow 4364->4365 4366 10018be 4364->4366 4367 1002d83 7 API calls 4365->4367 4369 10018d7 EndDialog 4366->4369 4370 10018c1 4366->4370 4368 10018f0 LoadStringA SetDlgItemTextA MessageBeep 4367->4368 4368->4370 4369->4370 4371 10064de 4 API calls 4370->4371 4372 1001939 4371->4372

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 10026e2-100272d call 100160f 3 100273c-1002742 0->3 4 100272f-100273a 0->4 5 1002747-1002773 call 1001942 call 1001e13 3->5 4->5 10 1002791-1002793 lstrcpyA 5->10 11 1002775-100278f lstrcpyA call 10066cf 5->11 12 1002799-10027ab call 1006752 10->12 11->12 17 10027b1-10027bb lstrcmpiA 12->17 18 1002959-1002963 call 1006752 12->18 17->18 19 10027c1-10027cf call 100672a 17->19 24 10029c2-10029d8 LocalAlloc 18->24 25 1002965-100296f lstrcmpiA 18->25 26 10027d1-10027e1 19->26 27 10027e6-1002814 call 1001942 lstrlenA 19->27 29 10029f1-1002a01 GetFileAttributesA 24->29 30 10029da-10029df 24->30 25->24 28 1002971-10029a9 lstrlenA * 2 LocalAlloc 25->28 33 10029e4-10029ec call 1003ebe 26->33 44 1002840 27->44 45 1002816-1002818 27->45 28->30 34 10029ab-10029bd wsprintfA 28->34 31 1002a03-1002a05 29->31 32 1002a4b-1002a59 call 100160f 29->32 30->33 31->32 36 1002a07-1002a23 call 100160f 31->36 43 1002a5e-1002a6c call 1002589 32->43 41 1002a82-1002a8e call 10064de 33->41 37 1002a71-1002a81 34->37 36->43 55 1002a25-1002a27 36->55 37->41 43->37 49 1002846-100285b LocalAlloc 44->49 51 1002820-1002839 call 1001942 45->51 52 100281a 45->52 49->30 56 1002861-100286a 49->56 51->49 61 100283b-100283e lstrlenA 51->61 52->51 55->43 58 1002a29-1002a49 call 10021e6 * 2 55->58 59 100286c 56->59 60 100286e-10028b9 GetPrivateProfileIntA GetPrivateProfileStringA 56->60 58->43 59->60 63 10028f3-1002901 60->63 64 10028bb-10028c4 60->64 61->49 65 1002922 63->65 66 1002903-1002920 GetShortPathNameA 63->66 68 10028c6 64->68 69 10028c8-10028ee call 10021c4 * 2 64->69 70 100292c-100292e 65->70 66->70 68->69 69->37 73 1002930 70->73 74 1002932-1002954 wsprintfA 70->74 73->74 74->37
    APIs
    • lstrcpyA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?,?,0100133C,?,00000104,?,00000001,7622F530,00000000), ref: 0100277B
    • lstrcpyA.KERNEL32(?,?,?,?,0100133C,?,00000104,?,00000001,7622F530,00000000), ref: 01002793
    • lstrcmpiA.KERNEL32(00000000,.INF), ref: 010027B7
    • lstrlenA.KERNEL32(DefaultInstall,?,01001330,?), ref: 01002810
    • lstrlenA.KERNEL32(?,?,0100132C), ref: 0100283C
    • LocalAlloc.KERNEL32(00000040,00000200), ref: 0100284D
    • GetPrivateProfileIntA.KERNEL32(?,Reboot,00000000,?), ref: 0100287C
    • GetPrivateProfileStringA.KERNEL32(Version,AdvancedINF,01001271,?,00000008,?), ref: 010028B1
    • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 0100291A
    • wsprintfA.USER32 ref: 0100294B
    • lstrcmpiA.KERNEL32(00000000,.BAT), ref: 0100296B
    • lstrlenA.KERNEL32(Command.com /c %s), ref: 0100297D
    • lstrlenA.KERNEL32(?), ref: 0100298C
    • LocalAlloc.KERNEL32(00000040,?), ref: 0100299B
    • wsprintfA.USER32 ref: 010029B4
    • LocalAlloc.KERNEL32(00000040,00000400,?,0000002E,?,0000002E), ref: 010029CA
    • GetFileAttributesA.KERNELBASE(?), ref: 010029F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: lstrlen$AllocLocal$PrivateProfilelstrcmpilstrcpywsprintf$AttributesFileNamePathShortString
    • String ID: "$.BAT$.INF$AdvancedINF$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Command.com /c %s$DefaultInstall$Reboot$Version$rundll32.exe %s,InstallHinfSection %s 128 %s$setupapi.dll$setupx.dll
    • API String ID: 1934397216-3060569371
    • Opcode ID: 6c011d49d29e131f740ed8dabe1c808832c5922d73e00483e9065f74cfc82ed7
    • Instruction ID: a376eb2aa62e0528c46e6ae682dde744fbc8027db4852c82fdc9f52ca6896b49
    • Opcode Fuzzy Hash: 6c011d49d29e131f740ed8dabe1c808832c5922d73e00483e9065f74cfc82ed7
    • Instruction Fuzzy Hash: BCA191B5900259ABFF32DB648C48EDA7BBDAB94300F0404D5F6C9A7180DBB19AD48F64

    Control-flow Graph

    APIs
    • GetCurrentDirectoryA.KERNEL32(00000104,?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,762283C0,00000000), ref: 010045AA
    • SetCurrentDirectoryA.KERNELBASE(00000000), ref: 010045B7
    Strings
    • C:\Users\user\AppData\Local\Temp\IXP000.TMP\, xrefs: 0100459D
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CurrentDirectory
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 1611563598-388467436
    • Opcode ID: 6a901a27d976f6ecd6b1b3fb4ef83800b97c89f981ca28cfd4edf11155ac7cbc
    • Instruction ID: 32a5e2e07f0e045be28bc8ef6b6c2a76a4ecc1151fd6d71cf5cc981d67540b80
    • Opcode Fuzzy Hash: 6a901a27d976f6ecd6b1b3fb4ef83800b97c89f981ca28cfd4edf11155ac7cbc
    • Instruction Fuzzy Hash: 48519EB2900258AFFB23DB64DC85FFA77ACEB09300F0044A5B799D61C5D6759E808F65

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 450 10052d4-10052f2 451 10052f8-1005306 call 100342e 450->451 452 100537f-1005386 lstrcpyA 450->452 455 100530b-100530d 451->455 454 100538c-1005397 call 10044bd 452->454 463 1005399-10053a3 CreateDirectoryA 454->463 464 10053ab-10053b0 call 100456a 454->464 457 1005313-100532d lstrcpyA 455->457 458 10053e4 455->458 461 1005371-100537d call 10066cf 457->461 462 100532f-1005345 GetSystemInfo 457->462 460 10053e6-10053f2 call 10064de 458->460 461->454 466 1005365 462->466 467 1005347-1005348 462->467 468 10053c3-10053cd call 1003aa1 463->468 469 10053a5 463->469 475 10053b5-10053b7 464->475 476 100536a-100536c call 10066cf 466->476 473 100534a-100534b 467->473 474 100535e-1005363 467->474 468->458 469->464 479 1005357-100535c 473->479 480 100534d-100534e 473->480 474->476 481 10053b9-10053c1 475->481 482 10053cf-10053d5 475->482 476->461 479->476 480->461 485 1005350-1005355 480->485 481->460 482->458 486 10053d7-10053de RemoveDirectoryA 482->486 485->476 486->458
    APIs
    • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?,00000000,?,00000104,762283C0,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000000), ref: 01005320
    • GetSystemInfo.KERNEL32(?), ref: 01005336
    • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000000,762283C0,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000000), ref: 01005386
    • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000000,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 0100539B
      • Part of subcall function 0100342E: wsprintfA.USER32 ref: 01003465
      • Part of subcall function 0100342E: lstrcpyA.KERNEL32(762283C0,?), ref: 01003476
      • Part of subcall function 0100342E: RemoveDirectoryA.KERNELBASE(762283C0,762283C0,00000104,?), ref: 0100348D
      • Part of subcall function 0100342E: GetFileAttributesA.KERNELBASE(762283C0), ref: 01003494
      • Part of subcall function 0100342E: GetTempFileNameA.KERNEL32(?,IXP,00000000,762283C0), ref: 010034DD
      • Part of subcall function 0100342E: DeleteFileA.KERNEL32(762283C0), ref: 010034F2
      • Part of subcall function 0100342E: CreateDirectoryA.KERNEL32(762283C0,00000000), ref: 010034FB
    • RemoveDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\IXP000.TMP\,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?,00000000,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 010053DE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Directory$Filelstrcpy$CreateRemove$AttributesDeleteInfoNameSystemTempwsprintf
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$alpha$i386$mips$ppc
    • API String ID: 2618030033-1143122538
    • Opcode ID: 5207e9f744ef7db5255fb7e2e18f52085c41d1909f07fa191eb1e1e1ead31f8c
    • Instruction ID: bbe6c97369ec8f106fead77e6623ce3be693c8dab588adb95fac2358924cc935
    • Opcode Fuzzy Hash: 5207e9f744ef7db5255fb7e2e18f52085c41d1909f07fa191eb1e1e1ead31f8c
    • Instruction Fuzzy Hash: 7E31C571904615AAF7239F299C44DEE3BE8BB45355F048069B6C5D60C4DFB9C944CF60

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 487 1006205-1006222 488 1006224-100622a 487->488 489 1006247-100624e call 100435e 487->489 491 100622c call 10043ec 488->491 492 100623e-1006245 call 1004bc8 488->492 497 1006250-1006257 call 1005f21 489->497 498 1006259-100625b 489->498 499 1006231-1006233 491->499 492->489 492->498 497->498 506 1006260-100629d GetSystemDirectoryA call 10066cf LoadLibraryA 497->506 501 100636a-1006374 call 10064de 498->501 499->498 502 1006235-100623c 499->502 502->489 502->492 509 10062b3-10062c0 FreeLibrary 506->509 510 100629f-10062ad GetProcAddress 506->510 511 10062c2-10062c8 509->511 512 10062da-10062e3 SetCurrentDirectoryA 509->512 510->509 513 10062af-10062b1 DecryptFileA 510->513 511->512 514 10062ca call 10047b3 511->514 515 1006301-1006307 512->515 516 10062e5-10062ff call 1003ebe call 1003aa1 512->516 513->509 523 10062cf-10062d1 514->523 519 1006312-1006319 515->519 520 1006309 call 1005a36 515->520 528 10062d3-10062d5 516->528 521 1006330 519->521 522 100631b-1006324 call 1001f93 519->522 530 100630e-1006310 520->530 527 1006336-100633c 521->527 531 1006329-100632e 522->531 523->512 523->528 532 100633e-1006344 527->532 533 100634f-1006356 527->533 534 1006368-1006369 528->534 530->519 530->528 531->527 532->533 536 1006346 call 1005abc 532->536 537 1006365-1006367 533->537 538 1006358-100635e 533->538 534->501 541 100634b-100634d 536->541 537->534 538->537 540 1006360 call 1004de5 538->540 540->537 541->528 541->533
    APIs
    • GetSystemDirectoryA.KERNEL32(?,00000105), ref: 0100626F
    • LoadLibraryA.KERNEL32(?,?,00000105,advapi32.dll), ref: 0100628E
    • GetProcAddress.KERNEL32(00000000,DecryptFileA), ref: 010062A5
    • DecryptFileA.ADVAPI32(C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000000), ref: 010062B1
    • FreeLibrary.KERNEL32(00000000), ref: 010062B4
      • Part of subcall function 010043EC: LocalAlloc.KERNEL32(00000040,00000001,UPROMPT,00000000,00000000,00000000,00000000,?,?,?,01006231), ref: 0100440B
    • SetCurrentDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 010062DB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: DirectoryLibrary$AddressAllocCurrentDecryptFileFreeLoadLocalProcSystem
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DecryptFileA$advapi32.dll
    • API String ID: 2126469477-2712585282
    • Opcode ID: 799601459926c632d555a8d86d08fbf0d875e0935837b017e982ad4550c23b2f
    • Instruction ID: 9140d9ddfa85fbf1d4f936cfa7ace5a96bcd53ce79dc58d3eacbe78f2b8b6b31
    • Opcode Fuzzy Hash: 799601459926c632d555a8d86d08fbf0d875e0935837b017e982ad4550c23b2f
    • Instruction Fuzzy Hash: FB310831900A12AAFB73A775DE409BB37EEEB96351F0441A9E9C1C10C4EF7B8590CB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 634 1004819-1004834 FindResourceA 635 1004836-1004842 LoadResource 634->635 636 100486b-100487b call 1003ebe 634->636 635->636 637 1004844-1004847 635->637 642 100487e-1004884 636->642 640 1004849-100484a 637->640 641 100484c 637->641 643 100484f-1004869 DialogBoxIndirectParamA FreeResource 640->643 641->643 643->636 643->642
    APIs
    • FindResourceA.KERNEL32(00000000,?,00000005), ref: 0100482A
    • LoadResource.KERNEL32(00000000,00000000,?,0100563F,000007D6,00000000,0100189D,00000547,0000083E,?,?,00000000), ref: 01004838
    • DialogBoxIndirectParamA.USER32(00000000,00000000,?,0000083E,00000547), ref: 01004857
    • FreeResource.KERNEL32(00000000,?,0100563F,000007D6,00000000,0100189D,00000547,0000083E,?,?,00000000), ref: 01004860
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$DialogFindFreeIndirectLoadParam
    • String ID: StretchWare
    • API String ID: 1214682469-859621192
    • Opcode ID: b0a883f33820150622e98825acaf097b5103d0973a58d13b59254d27bc385b11
    • Instruction ID: 4d497d838b3866ab934e730ea3745aad8ad4903298c19d052a2ed601619586ec
    • Opcode Fuzzy Hash: b0a883f33820150622e98825acaf097b5103d0973a58d13b59254d27bc385b11
    • Instruction Fuzzy Hash: 3601A2321001AABFEB225FA5AC88CEF7A9DDB85364F010425FB90E3081C6759D10CBE4
    APIs
    • GetDiskFreeSpaceA.KERNELBASE(00000000,00000000,00000000,00000000,00000000), ref: 01006A70
    • MulDiv.KERNEL32(00000000,00000000,00000400), ref: 01006A8B
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: DiskFreeSpace
    • String ID:
    • API String ID: 1705453755-0
    • Opcode ID: 825da8cf926745c3866bbeb836e8d81481314d09f4b5b7f7c70813e4e2df1b9f
    • Instruction ID: b1f9c66608a2b67e4be2bbf4eebceb79f2602f57f0fa110e7db973902b5e4614
    • Opcode Fuzzy Hash: 825da8cf926745c3866bbeb836e8d81481314d09f4b5b7f7c70813e4e2df1b9f
    • Instruction Fuzzy Hash: E0F0E776D00118BFEF05DF95C844BEEBBBCEF15326F118496AA11A6080DB75A749CFA0

    Control-flow Graph

    APIs
    • RegCreateKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000000,00000000,00000000,0002001F,00000000,?,?,00000001), ref: 01001B12
    • wsprintfA.USER32 ref: 01001B3E
    • RegQueryValueExA.KERNELBASE(?,wextract_cleanup0,00000000,00000000,00000000,?), ref: 01001B58
    • RegCloseKey.ADVAPI32(?), ref: 01001B7E
    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 01001BA3
    • LoadLibraryA.KERNELBASE(00000000,00000000,00000104,advpack.dll), ref: 01001BBE
    • GetProcAddress.KERNEL32(00000000,DelNodeRunDLL32), ref: 01001BD4
    • FreeLibrary.KERNELBASE(?), ref: 01001BEE
    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 01001C00
    • GetModuleFileNameA.KERNEL32(00000000,00000104), ref: 01001C28
    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 01001C3E
    • lstrlenA.KERNEL32(00000000), ref: 01001C49
    • LocalAlloc.KERNEL32(00000040,00000050), ref: 01001C52
    • RegCloseKey.ADVAPI32(?), ref: 01001C76
    • wsprintfA.USER32 ref: 01001CAB
    • lstrlenA.KERNEL32(00000000), ref: 01001CB5
    • RegSetValueExA.KERNELBASE(?,wextract_cleanup0,00000000,00000001,00000000,00000001), ref: 01001CC9
    • RegCloseKey.KERNELBASE(?), ref: 01001CD5
    • LocalFree.KERNEL32(00000000), ref: 01001CDC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Closelstrlen$DirectoryFreeLibraryLocalSystemValuewsprintf$AddressAllocCreateFileLoadModuleNameProcQuery
    • String ID: %s /D:%s$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DelNodeRunDLL32$Software\Microsoft\Windows\CurrentVersion\RunOnce$advpack.dll$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup%d$wextract_cleanup0
    • API String ID: 3084642846-607953301
    • Opcode ID: e8e5f3b3c36c9a9120034c916e34edcf0355e3275c331066bd0ee2a15f0c6816
    • Instruction ID: cb456183738a0c10edcd6481a0703a1d73204317f046f42922711a87de10383b
    • Opcode Fuzzy Hash: e8e5f3b3c36c9a9120034c916e34edcf0355e3275c331066bd0ee2a15f0c6816
    • Instruction Fuzzy Hash: 3351737594021CABEB329B65DD88FEA7BBDEB54700F0000D5F689E6185DBB5CA80CF61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 105 1005abc-1005af0 106 1005af2-1005b05 call 1002e55 105->106 107 1005b2d-1005b3a 105->107 113 1005b07-1005b0a 106->113 114 1005b0c-1005b28 call 1003ebe 106->114 109 1005b3b-1005b5e 107->109 111 1005b64-1005b79 call 1002e55 109->111 112 1005c7b-1005c8f lstrcpyA 109->112 124 1005c5a-1005c6a call 1003ebe 111->124 125 1005b7f-1005b82 111->125 115 1005c90-1005c96 112->115 113->107 113->114 128 1005e8f-1005e99 call 10064de 114->128 118 1005cd8-1005cf9 call 10026e2 115->118 119 1005c98-1005cb0 call 1002e55 115->119 131 1005c74-1005c76 118->131 132 1005cff-1005d05 118->132 119->124 135 1005cb2-1005cb8 119->135 124->131 125->124 130 1005b88-1005b91 125->130 136 1005b93-1005b9a 130->136 137 1005b9c-1005ba3 130->137 143 1005e8d-1005e8e 131->143 141 1005d07-1005d0e 132->141 142 1005d2b-1005d31 132->142 145 1005e7e-1005e84 135->145 146 1005cbe-1005cd2 lstrcmpiA 135->146 138 1005bc2 136->138 139 1005bb0-1005bb7 137->139 140 1005ba5-1005bae 137->140 147 1005bc8-1005bce 138->147 139->147 148 1005bb9 139->148 140->138 141->142 149 1005d10-1005d16 141->149 152 1005e46-1005e53 call 1004cae 142->152 153 1005d37-1005d3d 142->153 143->128 150 1005e86 call 1001cf4 145->150 151 1005e8b 145->151 146->118 146->145 147->115 156 1005bd4-1005bdd 147->156 148->138 149->142 154 1005d18-1005d1e 149->154 150->151 151->143 160 1005e58-1005e5a 152->160 157 1005d43-1005d49 153->157 158 1005e9a-1005ebc call 1003ebe LocalFree 153->158 154->153 161 1005d20-1005d26 call 1001aa7 154->161 162 1005c34-1005c3a 156->162 163 1005bdf-1005be1 156->163 157->152 164 1005d4f-1005d56 157->164 158->131 166 1005e60-1005e75 LocalFree 160->166 167 1005f0f-1005f17 LocalFree 160->167 161->142 162->118 168 1005c40-1005c58 call 1002e55 162->168 170 1005be3-1005bed 163->170 171 1005bef-1005bf1 163->171 164->152 172 1005d5c-1005d6a call 1003ccc 164->172 166->109 174 1005e7b-1005e7d 166->174 167->131 168->115 168->124 176 1005bfd-1005c16 call 1002e55 170->176 171->176 177 1005bf3 171->177 183 1005d70-1005d7e GetProcAddress 172->183 184 1005ec1-1005ed5 call 1003ebe 172->184 174->145 176->124 187 1005c18-1005c2c lstrcmpiA 176->187 177->176 185 1005d84-1005dd7 183->185 186 1005ed7-1005eec call 1003ebe FreeLibrary 183->186 194 1005ef2-1005f04 LocalFree call 1003aa1 184->194 190 1005de0-1005de9 185->190 191 1005dd9 185->191 186->194 187->162 193 1005c2e 187->193 195 1005df2-1005df5 190->195 196 1005deb 190->196 191->190 193->162 194->131 199 1005df7 195->199 200 1005dfe-1005e07 195->200 196->195 199->200 202 1005e10-1005e12 200->202 203 1005e09 200->203 204 1005e14 202->204 205 1005e1b-1005e38 202->205 203->202 204->205 207 1005f09 FreeLibrary 205->207 208 1005e3e-1005e44 FreeLibrary 205->208 207->167 208->166
    APIs
    • lstrcpyA.KERNEL32(?,0100CAA2,00000000,00000000,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 01005C87
    • lstrcmpiA.KERNEL32(?,<None>), ref: 01005C24
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • lstrcmpiA.KERNEL32(?,<None>), ref: 01005CCA
    • GetProcAddress.KERNEL32(00000000,DoInfInstall), ref: 01005D76
    • FreeLibrary.KERNEL32(00000000), ref: 01005E3E
    • LocalFree.KERNEL32(?,?,00000044,?,00000104,?,?), ref: 01005E66
    • LocalFree.KERNEL32(?,00000000,000004C7,00000000,00000000,00000010,00000000,?,00000104,?,?), ref: 01005EB0
    • FreeLibrary.KERNEL32(00000000,00000000,000004C9,DoInfInstall,00000000,00000010,00000000), ref: 01005EEC
    • LocalFree.KERNEL32(?,00000000,000004C8,advpack.dll,00000000,00000010,00000000,advpack.dll,?,00000104,?,?), ref: 01005EF8
    • FreeLibrary.KERNEL32(00000000), ref: 01005F09
    • LocalFree.KERNEL32(?,?,00000044,?,00000104,?,?), ref: 01005F15
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Free$Resource$Local$Library$Findlstrcmpi$AddressLoadLockProcSizeoflstrcpy
    • String ID: <None>$ADMQCMD$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$D$DoInfInstall$POSTRUNPROGRAM$REBOOT$RUNPROGRAM$SHOWWINDOW$StretchWare$USRQCMD$advpack.dll
    • API String ID: 770626793-1719712871
    • Opcode ID: cc61a717c1ac84a9bdfc436f46c8520804baf07a4835fa07c55533f653c16650
    • Instruction ID: c2c6c5684892b5d7fa573e4d2de66b3b8837dd926b255ab3696fc0a2f468da05
    • Opcode Fuzzy Hash: cc61a717c1ac84a9bdfc436f46c8520804baf07a4835fa07c55533f653c16650
    • Instruction Fuzzy Hash: 30B1BF7090025C9EFF779B258D85BEA7BB8AB09304F0041EAE6C9A61C0DBB54EC5CF55

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 209 1005f21-1005f5a call 1002e55 LocalAlloc 212 1005f5c-1005f71 call 1003ebe call 1003aa1 209->212 213 1005f7d-1005f87 call 1002e55 209->213 227 1005f76-1005f78 212->227 219 1005f89-1005faa call 1003ebe LocalFree 213->219 220 1005fac-1005fbd lstrcmpA 213->220 219->227 221 1005fc5-1005fd3 LocalFree 220->221 222 1005fbf 220->222 225 1006010-1006018 221->225 226 1005fd5-1005fd7 221->226 222->221 232 10061d5-10061f1 call 1004819 225->232 233 100601e-1006024 225->233 229 1005fe7-1005fe9 226->229 230 1005fd9-1005fdf 226->230 231 10061f3-10061ff call 10064de 227->231 236 1005feb-1005ff9 call 10052d4 229->236 230->229 234 1005fe1-1005fe5 230->234 232->231 233->232 238 100602a-100603d GetTempPathA 233->238 234->236 248 1006062-1006064 236->248 249 1005ffb-100600b call 1003ebe 236->249 239 1006069 238->239 240 100603f-1006043 call 10052d4 238->240 246 100606f-100607d lstrcpyA 239->246 247 1006048-100604a 240->247 250 1006194-10061a1 246->250 247->248 251 100604c-1006054 call 1002025 247->251 248->231 249->227 253 1006082-100608e GetDriveTypeA 250->253 254 10061a7-10061c5 GetWindowsDirectoryA call 100456a 250->254 251->239 267 1006056-1006060 call 10052d4 251->267 257 1006090-1006093 253->257 258 1006095-10060a5 GetFileAttributesA 253->258 254->246 266 10061cb 254->266 257->258 262 10060a7-10060aa 257->262 258->262 263 10060e0-10060f3 call 100456a 258->263 264 10060d5-10060db 262->264 265 10060ac-10060b3 262->265 275 10060f5-1006103 call 1002025 263->275 276 1006118-1006126 call 1002025 263->276 264->250 265->264 269 10060b5-10060bc 265->269 273 10061d0-10061d3 266->273 267->239 267->248 269->264 272 10060be-10060cc call 10069ea 269->272 272->264 285 10060ce-10060d3 272->285 273->231 275->264 286 1006105-1006116 call 100456a 275->286 283 1006128-1006134 GetWindowsDirectoryA 276->283 284 100613a-100615e call 10066cf call 1001ff9 276->284 283->284 293 1006160-100616c 284->293 294 100616e-1006192 SetFileAttributesA lstrcpyA call 10052d4 284->294 285->263 285->264 286->264 286->276 293->250 294->250 294->273
    APIs
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • LocalAlloc.KERNEL32(00000040,00000001,RUNPROGRAM,00000000,00000000,00000000,00000000), ref: 01005F4E
    • lstrcmpA.KERNEL32(00000000,<None>,RUNPROGRAM,00000000,00000000), ref: 01005FB2
    • LocalFree.KERNEL32(00000000), ref: 01005FC6
    • LocalFree.KERNEL32(00000000,00000000,000004B1,00000000,00000000,00000010,00000000,RUNPROGRAM,00000000,00000000), ref: 01005F9A
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
      • Part of subcall function 01003AA1: GetLastError.KERNEL32(76244B00,01004684), ref: 01003AAA
      • Part of subcall function 01003AA1: GetLastError.KERNEL32 ref: 01003AB0
    • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 01006035
    • lstrcpyA.KERNEL32(?,A:\), ref: 0100607B
    • GetDriveTypeA.KERNEL32(0000005A), ref: 01006083
    • GetFileAttributesA.KERNEL32(0000005A), ref: 0100609C
    • GetWindowsDirectoryA.KERNEL32(0000005A,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000001,00000000), ref: 010061AD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$Local$ErrorFindFreeLast$AllocAttributesDirectoryDriveFileLoadLockMessagePathSizeofTempTypeWindowslstrcmplstrcpy
    • String ID: <None>$A:\$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$RUNPROGRAM$Z$msdownld.tmp
    • API String ID: 535033332-1370313076
    • Opcode ID: 72180e447f72e634df863711cb3eef120908db6c341b2da6da5b2c7871772f1b
    • Instruction ID: 567b5bc756c7a10916d387d21bd88499efbec6f747d449020ba67bed0e17c02a
    • Opcode Fuzzy Hash: 72180e447f72e634df863711cb3eef120908db6c341b2da6da5b2c7871772f1b
    • Instruction Fuzzy Hash: 2D71E87064431979FB73E7758C48FEB36AE9F15354F000495FAC5D60C2EABAC9908B60

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 297 100589b-10058a7 298 1005a16-1005a18 297->298 299 10058ad-10058b2 297->299 300 1005a19 298->300 301 10058b8-10058bb 299->301 302 1005a0b-1005a12 299->302 307 1005a1f-1005a24 EndDialog 300->307 303 10058c1-10058c2 301->303 304 1005964-1005983 GetDesktopWindow call 1002d83 301->304 305 1005a14 302->305 306 1005a2a 302->306 308 10058f4-10058fb 303->308 309 10058c4-10058c9 303->309 316 10059c4-10059eb SetWindowTextA CreateThread 304->316 317 1005985-10059c3 GetDlgItem SendMessageA GetDlgItem SendMessageA 304->317 305->300 310 1005a2c-1005a2e 306->310 307->306 308->306 314 1005901-100592b ResetEvent call 1003ebe 308->314 312 10058d2-10058ef TerminateThread KiUserCallbackDispatcher 309->312 313 10058cb-10058cd 309->313 312->310 313->310 323 1005942-100595f SetEvent call 1002c91 314->323 324 100592d-100592f 314->324 319 1005a05-1005a09 316->319 320 10059ed-10059ff call 1003ebe EndDialog 316->320 317->316 319->310 320->319 323->307 324->323 326 1005931-100593d SetEvent 324->326 326->306
    APIs
    • TerminateThread.KERNELBASE(00000000), ref: 010058DA
    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 010058E6
    • ResetEvent.KERNEL32 ref: 01005907
    • SetEvent.KERNEL32(000004B2,01001271,00000000,00000020,00000004), ref: 01005937
    • GetDesktopWindow.USER32 ref: 0100596E
    • GetDlgItem.USER32(?,0000083B), ref: 0100599E
    • SendMessageA.USER32(00000000,?,?,00000000), ref: 010059A7
    • GetDlgItem.USER32(?,0000083B), ref: 010059B9
    • SendMessageA.USER32(00000000,?,?,00000000), ref: 010059BC
    • SetWindowTextA.USER32(?,StretchWare), ref: 010059CA
    • CreateThread.KERNELBASE(00000000,00000000,Function_00005190,00000000,00000000,0100BA48), ref: 010059DE
    • EndDialog.USER32(?,00000000), ref: 010059FF
    • EndDialog.USER32(?,00000000), ref: 01005A24
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: DialogEventItemMessageSendThreadWindow$CallbackCreateDesktopDispatcherResetTerminateTextUser
    • String ID: StretchWare
    • API String ID: 3638050378-859621192
    • Opcode ID: d3500fe9f7f5db743cd9965e837850aa1de798782591f39a44d4ee80d603ffb1
    • Instruction ID: 15f982f993cd47813f1b622385cc2ed99f85bd15372d9b845fe613da468a2202
    • Opcode Fuzzy Hash: d3500fe9f7f5db743cd9965e837850aa1de798782591f39a44d4ee80d603ffb1
    • Instruction Fuzzy Hash: 4C41B135500325BBEB335B689C49EAF3EA8EB4BB61F004111F6C5A50D9C7BA8951CF90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 329 10053fa-1005470 call 1002e55 332 1005476-100547b 329->332 333 100564a-100564f 329->333 332->333 334 1005481-10054aa CreateEventA SetEvent call 1002e55 332->334 335 1005654-1005655 call 1003ebe 333->335 341 10054d3-10054ed call 1003ebe 334->341 342 10054ac-10054b3 334->342 339 100565a 335->339 340 100565c-1005668 call 10064de 339->340 341->339 343 1005563-1005576 call 100359c 342->343 344 10054b9-10054d1 call 1002e55 342->344 353 1005587-100558d 343->353 354 1005578-1005582 343->354 344->341 355 10054f2-1005508 CreateMutexA 344->355 356 100559e-10055b3 FindResourceA 353->356 357 100558f-1005599 call 1002a96 353->357 354->335 355->343 358 100550a-1005515 GetLastError 355->358 361 10055b5-10055c2 LoadResource 356->361 362 10055c8-10055ce 356->362 357->339 358->343 360 1005517-100551e 358->360 364 1005520-1005530 call 1003ebe 360->364 365 1005532-1005546 call 1003ebe 360->365 361->362 366 10055d0 #17 362->366 367 10055d6-10055dc 362->367 375 1005548-100555e CloseHandle 364->375 365->343 365->375 366->367 370 1005646-1005648 367->370 371 10055de-10055eb call 100488c 367->371 370->340 371->339 377 10055ed-10055f6 371->377 375->339 378 1005604-100560b 377->378 379 10055f8-10055fc 377->379 378->370 381 100560d-1005614 378->381 379->378 380 10055fe-1005602 379->380 380->370 380->378 381->370 382 1005616-100561d call 1001760 381->382 382->370 385 100561f-1005644 call 1004819 382->385 385->339 385->370
    APIs
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,TITLE,StretchWare,0000007F,?,00000000), ref: 01005485
    • SetEvent.KERNEL32(00000000,?,00000000), ref: 01005491
      • Part of subcall function 01002E55: FreeResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002EBA
    • CreateMutexA.KERNEL32(00000000,00000001,?,INSTANCECHECK,?,00000104,EXTRACTOPT,0100C494,00000004,?,00000000), ref: 010054FB
    • GetLastError.KERNEL32(?,00000000), ref: 0100550A
    • FindResourceA.KERNEL32(?,VERCHECK,0000000A), ref: 010055AB
    • LoadResource.KERNEL32(?,00000000,?,00000000), ref: 010055BC
    • #17.COMCTL32(?,00000000), ref: 010055D0
    • CloseHandle.KERNEL32(00000000,00000524,StretchWare,00000000,00000020,00000004,?,00000000), ref: 0100554E
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$Find$CreateEventLoad$CloseErrorFreeHandleLastLockMessageMutexSizeof
    • String ID: EXTRACTOPT$INSTANCECHECK$StretchWare$TITLE$VERCHECK
    • API String ID: 612345255-2013581014
    • Opcode ID: dfb335a3e4c0202e28b2d8cb9f104e55799dce7ea0ddd3f3ac42d2f903d32e3e
    • Instruction ID: cbd0a4ee99872fe0b9b450feb2e661f6d2b71e757350258eec7348613e7537f9
    • Opcode Fuzzy Hash: dfb335a3e4c0202e28b2d8cb9f104e55799dce7ea0ddd3f3ac42d2f903d32e3e
    • Instruction Fuzzy Hash: A05128706403496AF7339B28ED85FEA3A9DEB19745F440195F6C5D61C5CBBA8E80CF20

    Control-flow Graph

    APIs
    • wsprintfA.USER32 ref: 01003465
    • lstrcpyA.KERNEL32(762283C0,?), ref: 01003476
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • RemoveDirectoryA.KERNELBASE(762283C0,762283C0,00000104,?), ref: 0100348D
    • GetFileAttributesA.KERNELBASE(762283C0), ref: 01003494
    • CreateDirectoryA.KERNELBASE(762283C0,00000000), ref: 010034B2
    • GetTempFileNameA.KERNEL32(?,IXP,00000000,762283C0), ref: 010034DD
    • DeleteFileA.KERNEL32(762283C0), ref: 010034F2
    • CreateDirectoryA.KERNEL32(762283C0,00000000), ref: 010034FB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: DirectoryFile$Create$AttributesDeleteNameRemoveTemplstrcpylstrlenwsprintf
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$IXP$IXP%03d.TMP
    • API String ID: 2425626272-2562829823
    • Opcode ID: 909a37eeb0d10a258c43e028ade7052fe929c50dff5c231103c15f598a75b725
    • Instruction ID: 79b835e8247eab284df87d354388e64f77954c4bc5d13dbb6f938c802c931663
    • Opcode Fuzzy Hash: 909a37eeb0d10a258c43e028ade7052fe929c50dff5c231103c15f598a75b725
    • Instruction Fuzzy Hash: 22218035A00218AFE7239F649C45FDE7BB8FF19350F008195F6C5E6184CBB99A848FA1

    Control-flow Graph

    APIs
    • lstrlenA.KERNEL32(01005392,762283C0,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,00000000,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 010044C8
    • LocalAlloc.KERNEL32(00000040,-00000014,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 010044D6
    • lstrcpyA.KERNEL32(00000000,01005392,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 0100450B
    • CreateFileA.KERNELBASE(00000000,40000000,00000000,00000000,00000001,04000080,00000000,00000000,-00000014,TMP4351$.TMP,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 0100452D
    • LocalFree.KERNEL32(00000000,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 01004536
    • CloseHandle.KERNEL32(00000000,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 01004542
    • GetFileAttributesA.KERNELBASE(01005392,?,01005392,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 0100454B
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
      • Part of subcall function 01003AA1: GetLastError.KERNEL32(76244B00,01004684), ref: 01003AAA
      • Part of subcall function 01003AA1: GetLastError.KERNEL32 ref: 01003AB0
    Strings
    • TMP4351$.TMP, xrefs: 01004511
    • C:\Users\user\AppData\Local\Temp\IXP000.TMP\, xrefs: 010044C3
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: ErrorFileLastLocal$AllocAttributesCloseCreateFreeHandleMessagelstrcpylstrlen
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$TMP4351$.TMP
    • API String ID: 3688570051-1330067808
    • Opcode ID: 57520002fee6ae4235c75deb696dfb0f82a0d2a6da16ad456c8abe4454f22560
    • Instruction ID: d346d4950023621807eef61a061fb4322b337a095deacce8b095f1f8bab94072
    • Opcode Fuzzy Hash: 57520002fee6ae4235c75deb696dfb0f82a0d2a6da16ad456c8abe4454f22560
    • Instruction Fuzzy Hash: 4611CE722002047FF3235B69AC88EAB3E5DEB857A9F014120FBC5E10C5DBBA8C458B64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 556 1005190-1005197 call 10032ff 559 1005199 556->559 560 100519a-10051a6 556->560 561 10051d2-10051df call 10042a4 560->561 562 10051a8-10051d0 GetDlgItem ShowWindow GetDlgItem ShowWindow 560->562 565 10051e1-10051eb 561->565 566 10051ed-1005223 call 1006aa4 561->566 562->561 567 1005265-1005270 call 1003ebe 565->567 572 1005255-1005264 566->572 573 1005225-1005248 call 1007b2d 566->573 574 1005272-1005279 567->574 572->567 573->574 581 100524a-100524b call 100735b 573->581 576 1005288-100528a 574->576 577 100527b-1005282 FreeResource 574->577 579 10052a4-10052ab 576->579 580 100528c-1005292 576->580 577->576 583 10052c9-10052ce 579->583 584 10052ad-10052b4 579->584 580->579 582 1005294-100529f call 1003ebe 580->582 586 1005250-1005253 581->586 582->579 584->583 588 10052b6-10052c3 SendMessageA 584->588 586->572 586->574 588->583
    APIs
      • Part of subcall function 010032FF: FindResourceA.KERNEL32(00000000,CABINET,0000000A), ref: 0100331B
      • Part of subcall function 010032FF: LoadResource.KERNEL32(00000000,00000000), ref: 01003324
      • Part of subcall function 010032FF: LockResource.KERNEL32(00000000), ref: 0100332B
    • GetDlgItem.USER32(000103F0,00000842), ref: 010051B5
    • ShowWindow.USER32(00000000), ref: 010051BE
    • GetDlgItem.USER32(00000841,00000005), ref: 010051CD
    • ShowWindow.USER32(00000000), ref: 010051D0
    • FreeResource.KERNEL32(00000000,-00000514,00000000,00000000,00000010,00000000,?,00000000,00000000,00000001,01005A8A,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,0100630E), ref: 0100527C
    • SendMessageA.USER32(00000FA1,00000000,00000000,-00000514), ref: 010052C3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$ItemShowWindow$FindFreeLoadLockMessageSend
    • String ID: *MEMCAB
    • API String ID: 3694369891-3211172518
    • Opcode ID: db05329e52dd5ee1d8b23c1b6cf70e12f657115257108f69590474f878c27e53
    • Instruction ID: 2bc75931ab46805ef586b25582dda227c40a14ab93dc7bc1b63351d76fe4d624
    • Opcode Fuzzy Hash: db05329e52dd5ee1d8b23c1b6cf70e12f657115257108f69590474f878c27e53
    • Instruction Fuzzy Hash: B931B9757823157BFA3363669C4AFDB7E9CEF46B61F400054F6C4A90C5D6FA84808BA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 589 1004cae-1004cd9 590 1004dd2-1004ddd call 10064de 589->590 591 1004cdf-1004d03 CreateProcessA 589->591 592 1004d84-1004dc0 call 1003aa1 GetLastError FormatMessageA call 1003ebe 591->592 593 1004d05-1004d32 WaitForSingleObject GetExitCodeProcess 591->593 605 1004dc5 592->605 595 1004d34-1004d3b 593->595 596 1004d55-1004d78 call 1002d03 CloseHandle * 2 593->596 595->596 599 1004d3d-1004d3f 595->599 607 1004d7a-1004d80 596->607 608 1004dcb-1004dd1 596->608 599->596 603 1004d41-1004d4d 599->603 603->596 606 1004d4f 603->606 605->608 606->596 607->608 609 1004d82 607->609 608->590 609->605
    APIs
    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00000104,?,00000001,7622F530,00000000), ref: 01004CFB
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 01004D0D
    • GetExitCodeProcess.KERNEL32(?,?), ref: 01004D20
    • CloseHandle.KERNEL32(?,?), ref: 01004D67
    • CloseHandle.KERNEL32(?), ref: 01004D6F
    • GetLastError.KERNEL32(00000000,?,00000200,00000000), ref: 01004D9C
    • FormatMessageA.KERNEL32(00001000,00000000,00000000), ref: 01004DA9
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CloseHandleProcess$CodeCreateErrorExitFormatLastMessageObjectSingleWait
    • String ID:
    • API String ID: 3183975587-0
    • Opcode ID: 05cf2146d3cb3a1a994f05930313d047acf105d867eac4180c0c86445154b7ef
    • Instruction ID: 5a155537b353c9cd57f3a89634c1b274d3be44dcdf0063c1db90bf3a96692e15
    • Opcode Fuzzy Hash: 05cf2146d3cb3a1a994f05930313d047acf105d867eac4180c0c86445154b7ef
    • Instruction Fuzzy Hash: 22319275541228BEFB33AB64DC48FEA7BBCEB05310F104196F698D2194CA759D81CF64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 610 10043ec-1004415 call 1002e55 LocalAlloc 613 1004433-100443f call 1002e55 610->613 614 1004417-1004431 call 1003ebe call 1003aa1 610->614 619 1004441-1004462 call 1003ebe LocalFree 613->619 620 1004464-1004472 lstrcmpA 613->620 626 10044b1 614->626 619->626 623 1004480-100449d call 1003ebe LocalFree 620->623 624 1004474-1004475 LocalFree 620->624 632 10044a7 623->632 633 100449f-10044a5 623->633 628 100447b-100447e 624->628 630 10044b3-10044b7 626->630 628->630 632->626 633->628
    APIs
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • LocalAlloc.KERNEL32(00000040,00000001,UPROMPT,00000000,00000000,00000000,00000000,?,?,?,01006231), ref: 0100440B
    • LocalFree.KERNEL32(00000000,00000000,000004B1,00000000,00000000,00000010,00000000,UPROMPT,00000000,?,?,?,?,01006231), ref: 01004452
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
      • Part of subcall function 01003AA1: GetLastError.KERNEL32(76244B00,01004684), ref: 01003AAA
      • Part of subcall function 01003AA1: GetLastError.KERNEL32 ref: 01003AB0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$ErrorFindLastLocal$AllocFreeLoadLockMessageSizeof
    • String ID: <None>$UPROMPT
    • API String ID: 226386726-2980973527
    • Opcode ID: 5621df78db6fb9bc4c81758bdbf51104c654e0ae191e744358777e9de4287252
    • Instruction ID: 146d34d373b0198092be5e02ab1a2f1c89f0357a0b6c02c78eefd4d2e1b3e036
    • Opcode Fuzzy Hash: 5621df78db6fb9bc4c81758bdbf51104c654e0ae191e744358777e9de4287252
    • Instruction Fuzzy Hash: EF1184B1640790BAF3336B626C89E6B7AACD7C6B55F014018FAC1E50C5EBB989018774
    APIs
      • Part of subcall function 0100646B: GetSystemTimeAsFileTime.KERNEL32(?), ref: 01006488
      • Part of subcall function 0100646B: GetCurrentProcessId.KERNEL32 ref: 01006494
      • Part of subcall function 0100646B: GetCurrentThreadId.KERNEL32 ref: 0100649C
      • Part of subcall function 0100646B: GetTickCount.KERNEL32 ref: 010064A4
      • Part of subcall function 0100646B: QueryPerformanceCounter.KERNEL32(?), ref: 010064B0
    • GetCommandLineA.KERNEL32 ref: 010063E9
    • GetStartupInfoA.KERNEL32(?), ref: 01006428
    • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,0000000A), ref: 01006443
    • ExitProcess.KERNEL32 ref: 01006450
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CurrentProcessTime$CommandCountCounterExitFileHandleInfoLineModulePerformanceQueryStartupSystemThreadTick
    • String ID:
    • API String ID: 4244892483-0
    • Opcode ID: 8eca9f7f715971f7e939c949c439528cd9193f0ffc909e1846a034fe0de0fca6
    • Instruction ID: 28ebec749969a0dba5d051bd69dfa24efec2f660701a2f3e5969e2e7d4d3e92f
    • Opcode Fuzzy Hash: 8eca9f7f715971f7e939c949c439528cd9193f0ffc909e1846a034fe0de0fca6
    • Instruction Fuzzy Hash: 7A01B1718043949AFB731FAC8449BF97FEB9F16208F650495E9C1D61C2CAB685E383A1
    APIs
      • Part of subcall function 01002EFD: lstrlenA.KERNEL32(00000104,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F0D
      • Part of subcall function 01002EFD: lstrlenA.KERNEL32(?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F14
    • SetFileAttributesA.KERNELBASE(?,00000000,?,?,?,?,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 010050D8
    • SetDlgItemTextA.USER32(000103F0,00000837,?), ref: 010050FD
      • Part of subcall function 010032A1: lstrcpyA.KERNEL32(0100C17C,?,?,?,?,01005180,?), ref: 010032C8
      • Part of subcall function 010032A1: lstrcpyA.KERNEL32(0100C280,?,?,?,?,01005180,?), ref: 010032D2
      • Part of subcall function 010032A1: lstrcpyA.KERNEL32(0100C384,?,?,?,?,01005180,?), ref: 010032DC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: lstrcpy$lstrlen$AttributesFileItemText
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 1052324692-388467436
    • Opcode ID: f19e61d64bcb31124e15a0de3fd3c72425a8ff17acc2b1c39f114b4d5d9fea0a
    • Instruction ID: 90c2899bc6a778b52ee834594eec5cb3686ca2a893eb7b206c14bf922d2a115a
    • Opcode Fuzzy Hash: f19e61d64bcb31124e15a0de3fd3c72425a8ff17acc2b1c39f114b4d5d9fea0a
    • Instruction Fuzzy Hash: E831823650060AAAFB73DB78CD05AEB77E8AB18750F044555BAD5D60C0EE74DA84CFA0
    APIs
    • lstrcmpA.KERNEL32(00000180,*MEMCAB,00000000,00000001,?,01004303,*MEMCAB,00008000,00000180,00000000), ref: 01004221
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: lstrcmp
    • String ID: *MEMCAB$<+
    • API String ID: 1534048567-3398067535
    • Opcode ID: 8d1886825cf7cf1b7fca3806ded3f6736f8ae30cbe39c047e8d4af6a682cd926
    • Instruction ID: 92061fbbc721102d292826fa71bb98d8294175fcbeac33c2f5b1cd223c837d31
    • Opcode Fuzzy Hash: 8d1886825cf7cf1b7fca3806ded3f6736f8ae30cbe39c047e8d4af6a682cd926
    • Instruction Fuzzy Hash: C11175716412049FF7639F18C984AB57B94FB00358F4643E9F6D9CA1E6CBB1C8458B54
    APIs
    • DosDateTimeToFileTime.KERNEL32(?,00000104,00000104), ref: 01003217
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 01003229
    • SetFileTime.KERNELBASE(?,?,?,?), ref: 0100323F
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Time$File$DateLocal
    • String ID:
    • API String ID: 2071732420-0
    • Opcode ID: a85077572743f2c403f9a8a18ce59d41622f36ce07e64cd569effb84dd5ba5dd
    • Instruction ID: 40f91eae84c0d30797b84d3855ee905c98267c5d71123f35ca3de860f136514f
    • Opcode Fuzzy Hash: a85077572743f2c403f9a8a18ce59d41622f36ce07e64cd569effb84dd5ba5dd
    • Instruction Fuzzy Hash: C8F03C7260011AAFAB22DFA4CD45CFB7BACFA44340F000569B9A6D6095EB31D518CBA0
    APIs
    • RegOpenKeyExA.KERNELBASE(80000002,01004D5B,00000000,00020019,01004D5B,00000000,01004D5B,?,01001FBD,System\CurrentControlSet\Control\Session Manager,PendingFileRenameOperations,?,01001FE6,?,?,01002241), ref: 01001EFD
    • RegQueryValueExA.KERNELBASE(01004D5B,?,00000000,00000000,00000000,?,?,01001FBD,System\CurrentControlSet\Control\Session Manager,PendingFileRenameOperations,?,01001FE6,?,?,01002241,00000003), ref: 01001F14
    • RegCloseKey.KERNELBASE(01004D5B,?,01001FBD,System\CurrentControlSet\Control\Session Manager,PendingFileRenameOperations,?,01001FE6,?,?,01002241,00000003,00000000,01002D1B,?,01004D5B,?), ref: 01001F24
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID:
    • API String ID: 3677997916-0
    • Opcode ID: 40f801ecea3a8f97b9f9c960bc3d2ecb8093f2fd098167d5a3c61593dd613369
    • Instruction ID: 2ca24a09e34f2df9065e4514fbcabbf1d6ca945d8222d5e896961b6e325d8fb3
    • Opcode Fuzzy Hash: 40f801ecea3a8f97b9f9c960bc3d2ecb8093f2fd098167d5a3c61593dd613369
    • Instruction Fuzzy Hash: 4DF0B775601128FBEB219F92DD08DDBBE6CEF457A0F108055FD4996110D771DA10DBA0
    APIs
    • CreateFileA.KERNELBASE(00000180,80000000,00000000,00000000,00008000,00000080,00000000,00000000,00000000,00000000,?,?,0100427B,00000180,00008000,?), ref: 010041A8
    • CreateFileA.KERNEL32(00000180,80000000,00000000,00000000,00000003,00000080,00000000,00000180,?,?,0100427B,00000180,00008000,?,?,01004303), ref: 010041CA
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: b69cf7712ea0dd325566fc773e9ea564160eeb22ca95d34820805d5e9552cd5a
    • Instruction ID: ad9754ded69d89190427acfe716f1ac8fe926d72f3e8cb2752d49aa3ea161600
    • Opcode Fuzzy Hash: b69cf7712ea0dd325566fc773e9ea564160eeb22ca95d34820805d5e9552cd5a
    • Instruction Fuzzy Hash: 661173B265410CBAFB124E69CC44FEA7BA8EB613A8F148225FB64D61D0C379CD41DB54
    APIs
      • Part of subcall function 01002C91: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 01002CB7
      • Part of subcall function 01002C91: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 01002CC9
      • Part of subcall function 01002C91: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 01002CEC
    • WriteFile.KERNELBASE(?,?,?,00000000), ref: 010030AA
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: MessagePeek$FileMultipleObjectsWaitWrite
    • String ID:
    • API String ID: 1084409-0
    • Opcode ID: 3e01d822541ebd2f5a5feccbb733383a8b69a22151e5f48031294b1a04767e1f
    • Instruction ID: 5e22b0a0ad35bde250d44ec082465892956c20a04e3cac16195ac4398cecf9f5
    • Opcode Fuzzy Hash: 3e01d822541ebd2f5a5feccbb733383a8b69a22151e5f48031294b1a04767e1f
    • Instruction Fuzzy Hash: C00180352012499FE7378F5EDC49B693BAAF780725F044225F6A58A1F4CBB69855CB00
    APIs
    • lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • CharPrevA.USER32(00000104,0100C89A,0100C89A,?,01003991,0100C89A,00000104,01001271), ref: 010066F8
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CharPrevlstrlen
    • String ID:
    • API String ID: 2709904686-0
    • Opcode ID: e495bcc581d825eadedbe2fa0249395852abc95ba879f853f598c9e8d998fbc5
    • Instruction ID: 01c4db8a04a40ec1d325de77efd8d7371b3f1bfb3a4b2ec35a0bf0181df07810
    • Opcode Fuzzy Hash: e495bcc581d825eadedbe2fa0249395852abc95ba879f853f598c9e8d998fbc5
    • Instruction Fuzzy Hash: 6EF04F35004185EEF7235B18CC88FAA7FAAAB86210F254089F5D98B191D776A861C775
    APIs
      • Part of subcall function 0100672A: GetFileAttributesA.KERNELBASE(010027CD,?,010027CD,?), ref: 01006732
    • SetFileAttributesA.KERNEL32(?,00000080,?,?,?,?,01005130,?,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01005017
      • Part of subcall function 01004819: FindResourceA.KERNEL32(00000000,?,00000005), ref: 0100482A
      • Part of subcall function 01004819: LoadResource.KERNEL32(00000000,00000000,?,0100563F,000007D6,00000000,0100189D,00000547,0000083E,?,?,00000000), ref: 01004838
      • Part of subcall function 01004819: DialogBoxIndirectParamA.USER32(00000000,00000000,?,0000083E,00000547), ref: 01004857
      • Part of subcall function 01004819: FreeResource.KERNEL32(00000000,?,0100563F,000007D6,00000000,0100189D,00000547,0000083E,?,?,00000000), ref: 01004860
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$AttributesFile$DialogFindFreeIndirectLoadParam
    • String ID:
    • API String ID: 2018477427-0
    • Opcode ID: 9fcb4db864238772c7e0f37f4d42fba18ce8b857c712aa4923ee3850bd34ccd9
    • Instruction ID: 29f51442478ac074da39ef7c59ef3f45121b76390a107e31bb9452852c9f7bc5
    • Opcode Fuzzy Hash: 9fcb4db864238772c7e0f37f4d42fba18ce8b857c712aa4923ee3850bd34ccd9
    • Instruction Fuzzy Hash: CDF0C2311513096AF7779B28AC84B6A3AD8EB01764F004166F7C05A0C5DAB64940DF99
    APIs
    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 010047D2
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
      • Part of subcall function 01003AA1: GetLastError.KERNEL32(76244B00,01004684), ref: 01003AAA
      • Part of subcall function 01003AA1: GetLastError.KERNEL32 ref: 01003AB0
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: ErrorLast$DirectoryMessageWindows
    • String ID:
    • API String ID: 824312211-0
    • Opcode ID: 35282c28667d4249282c988ff0902db8e714afbbed6593e0c008549f216fc637
    • Instruction ID: fd3234c94b0ccb30078aef88c93f716d7f268c6b22518fee9330ebb3e3fc8867
    • Opcode Fuzzy Hash: 35282c28667d4249282c988ff0902db8e714afbbed6593e0c008549f216fc637
    • Instruction Fuzzy Hash: E1F08270A403057AF722EB709C46FEA33ACA750700F004460B6C1EB0C1DAB49D848B14
    APIs
    • FindCloseChangeNotification.KERNELBASE(?,00000000,00000000,?,0100433C,00000000,?,?,?,?,?,00000000), ref: 01003145
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: ChangeCloseFindNotification
    • String ID:
    • API String ID: 2591292051-0
    • Opcode ID: ddf299c9d854a60029591bd0d9130fc256d7a927763a6f5153bdca3c177d8727
    • Instruction ID: ddcf91d87cb97e1f61d19a99827c2554d1a57a890e9a07dc5fc143585956e2ac
    • Opcode Fuzzy Hash: ddf299c9d854a60029591bd0d9130fc256d7a927763a6f5153bdca3c177d8727
    • Instruction Fuzzy Hash: 78F03632501B11EEA3A38F1995405EA7BE5FA84350B110669D5EEC6250DB30E4018B50
    APIs
    • GetFileAttributesA.KERNELBASE(010027CD,?,010027CD,?), ref: 01006732
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: fc34f9762965e922ec69309eca6e6d82ef122b58ec165bd24e8a40cd18f7f548
    • Instruction ID: fe60699710c37628f3a1ec2a8e4606557de7a92a1d7bfb60a33c4a11166a432d
    • Opcode Fuzzy Hash: fc34f9762965e922ec69309eca6e6d82ef122b58ec165bd24e8a40cd18f7f548
    • Instruction Fuzzy Hash: EBC0803301440C6767125575DC098763E46F741374F504720F1BBC41D0DF7BD4A1D150
    APIs
      • Part of subcall function 010053FA: CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,TITLE,StretchWare,0000007F,?,00000000), ref: 01005485
      • Part of subcall function 010053FA: SetEvent.KERNEL32(00000000,?,00000000), ref: 01005491
    • CloseHandle.KERNEL32(00000000,00000000,?,?,?,0100644F,00000000), ref: 010063CC
      • Part of subcall function 01003346: SetFileAttributesA.KERNEL32(004FC2A0,00000080,?,00000000), ref: 01003387
      • Part of subcall function 01003346: DeleteFileA.KERNEL32(004FC2A0,?,00000000), ref: 0100338F
      • Part of subcall function 01003346: LocalFree.KERNEL32(004FC2A0,?,00000000), ref: 0100339A
      • Part of subcall function 01003346: LocalFree.KERNEL32(004FC2A0,?,00000000), ref: 0100339D
      • Part of subcall function 01003346: lstrcpyA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 010033CE
      • Part of subcall function 01003346: SetCurrentDirectoryA.KERNEL32(01001344), ref: 010033EE
      • Part of subcall function 01002251: ExitWindowsEx.USER32(00000002,00000000), ref: 01002296
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: EventFileFreeLocal$AttributesCloseCreateCurrentDeleteDirectoryExitHandleWindowslstrcpy
    • String ID:
    • API String ID: 3566781794-0
    • Opcode ID: 360fb856e433d93ef5c6abbea1fa4c6ea4acfdbb5a2bf550e81dc508a18bc19c
    • Instruction ID: a0c14d9bb266869afe735ce61a49557cb3a3a2021fce37bd23befcfbf90a69dd
    • Opcode Fuzzy Hash: 360fb856e433d93ef5c6abbea1fa4c6ea4acfdbb5a2bf550e81dc508a18bc19c
    • Instruction Fuzzy Hash: A4F0893160061557FB33AFA5E904BDB3BD9EB11361F04D450F9C4A6184CB7BD9748B94
    APIs
    • GlobalAlloc.KERNELBASE(00000000,?), ref: 0100327F
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: AllocGlobal
    • String ID:
    • API String ID: 3761449716-0
    • Opcode ID: 7b71b831925a2d90643e7752b1a2709e506846632fe93e76af179d897e7101ca
    • Instruction ID: 4bb07ebccd0d412d478b25c00f2aeddb319c24c1cf8280db505fbd4cc18ddfdc
    • Opcode Fuzzy Hash: 7b71b831925a2d90643e7752b1a2709e506846632fe93e76af179d897e7101ca
    • Instruction Fuzzy Hash: E0B0123214424CB7CB111BD2E809FD53F1DD7C5772F004001F64C05141CAB3D4508791
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: FreeGlobal
    • String ID:
    • API String ID: 2979337801-0
    • Opcode ID: 551bb148dbce71ccb86f60d786338309b3c648a378d05cbb00bb3c74f7e7c821
    • Instruction ID: faa09d8b584007b82b20e1d52ea593548f9e5b6d19939489179b90da4771cbc5
    • Opcode Fuzzy Hash: 551bb148dbce71ccb86f60d786338309b3c648a378d05cbb00bb3c74f7e7c821
    • Instruction Fuzzy Hash: EAB0123100414CF7CF111B42E8088857F2DD6C0360B004010F48C420118F73D81186A0
    APIs
      • Part of subcall function 010016B4: LoadLibraryA.KERNEL32(advapi32.dll,StretchWare,00000000,?,?,?,010017A0,?,00000000,?,?,0100561B,?,?,00000000), ref: 010016E6
      • Part of subcall function 010016B4: GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 010016FA
      • Part of subcall function 010016B4: AllocateAndInitializeSid.ADVAPI32(010017A0,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 01001726
      • Part of subcall function 010016B4: FreeSid.ADVAPI32(?), ref: 0100173A
      • Part of subcall function 010016B4: FreeLibrary.KERNEL32(?,?,?,?,010017A0,?,00000000,?,?,0100561B,?,?,00000000), ref: 01001743
    • GetCurrentProcess.KERNEL32(00000008,0100561B,?,00000000,?,?,0100561B,?,?,00000000), ref: 010017AE
    • OpenProcessToken.ADVAPI32(00000000,?,?,0100561B,?,?,00000000), ref: 010017B5
    • GetTokenInformation.ADVAPI32(0100561B,00000002,00000000,00000000,?,00000001,?,?,0100561B,?,?,00000000), ref: 010017D5
    • GetLastError.KERNEL32(?,?,0100561B,?,?,00000000), ref: 010017DF
    • LocalAlloc.KERNEL32(00000000,?,StretchWare,?,?,0100561B,?,?,00000000), ref: 010017F3
    • GetTokenInformation.ADVAPI32(0100561B,00000002,00000000,?,?,?,?,0100561B,?,?,00000000), ref: 0100180C
    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0100561B,?), ref: 01001829
    • EqualSid.ADVAPI32(00000004,?,?,?,0100561B,?,?,00000000), ref: 0100183F
    • FreeSid.ADVAPI32(?,?,?,0100561B,?,?,00000000), ref: 01001861
    • LocalFree.KERNEL32(00000000,?,?,0100561B,?,?,00000000), ref: 01001868
    • CloseHandle.KERNEL32(0100561B,?,?,0100561B,?,?,00000000), ref: 01001872
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Free$Token$AllocateInformationInitializeLibraryLocalProcess$AddressAllocCloseCurrentEqualErrorHandleLastLoadOpenProc
    • String ID: StretchWare
    • API String ID: 2168512254-859621192
    • Opcode ID: f21df1777e37cdd6f0ec34d387a85b1e37b56b33b539e6758f9be16fc240ee8c
    • Instruction ID: 4672b0472d1bbbfd446eee883f18bb1d65bf3648c25b20912db4fd6b3c782e19
    • Opcode Fuzzy Hash: f21df1777e37cdd6f0ec34d387a85b1e37b56b33b539e6758f9be16fc240ee8c
    • Instruction Fuzzy Hash: E0317E71A0024AAFEB22DFA5DC44AEEBBB9EB04344F544465F6C1E2181D775DB04CB60
    APIs
    • FindFirstFileA.KERNEL32(?,?,?,00000104,0100134C,?,00000104,00000000,StretchWare,00000001), ref: 01002AF2
    • lstrcmpA.KERNEL32(?,01001348,?,00000104,00000000,00000000), ref: 01002B31
    • lstrcmpA.KERNEL32(?,01001344), ref: 01002B43
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • SetFileAttributesA.KERNEL32(?,00000080,?,00000104,?,?,00000104,00000000,00000000), ref: 01002B97
    • DeleteFileA.KERNEL32(?), ref: 01002BA4
    • FindNextFileA.KERNEL32(?,00000010), ref: 01002BB7
    • FindClose.KERNEL32(?), ref: 01002BCB
    • RemoveDirectoryA.KERNEL32(00000000), ref: 01002BD2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: File$Find$lstrcmp$AttributesCloseDeleteDirectoryFirstNextRemovelstrlen
    • String ID: StretchWare
    • API String ID: 1122447120-859621192
    • Opcode ID: 70efa147312cdaad355b06b2a627144247dfa0eae94832973159d089a2d3e043
    • Instruction ID: 3621ff63f4683dfc0afae3feec3247e592be42cb1084b4f5304d675301ecb420
    • Opcode Fuzzy Hash: 70efa147312cdaad355b06b2a627144247dfa0eae94832973159d089a2d3e043
    • Instruction Fuzzy Hash: 80310D76905159ABEB62DBA4DC88EDE77BDAF64300F1041D1B6C9E2084DBB4DAC4CF60
    APIs
    • GetCurrentProcess.KERNEL32(00000028,?,00000000,?,?,0100644F), ref: 010019D2
    • OpenProcessToken.ADVAPI32(00000000,?,0100644F), ref: 010019D9
    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 010019FB
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,00000000,00000000), ref: 01001A1A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
    • String ID: SeShutdownPrivilege
    • API String ID: 2349140579-3733053543
    • Opcode ID: c17b7cf3f8bdb7068d93d2025f9cbb3199983dd50f7b35b7e72ddddd59bfcf11
    • Instruction ID: 6422d8529b1dadd26b9958a069e7ff89d807a817af3ba06e0855e17f5c681b04
    • Opcode Fuzzy Hash: c17b7cf3f8bdb7068d93d2025f9cbb3199983dd50f7b35b7e72ddddd59bfcf11
    • Instruction Fuzzy Hash: D9018071642225BAF7329BA24C0DFEB7EACEF46794F000010BA8AE40C5D6B5D640C6F5
    APIs
    • GetVersionExA.KERNEL32(?,00000001,StretchWare), ref: 010048C3
    • MessageBeep.USER32(00000000), ref: 01004AE5
    • MessageBoxA.USER32(00000000,?,StretchWare,?), ref: 01004B67
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Message$BeepVersion
    • String ID: 3$StretchWare
    • API String ID: 2519184315-4132131136
    • Opcode ID: bbac37c54156140ae347d57a3b35535c524f278f106985dda0b5bbdecba9b7f6
    • Instruction ID: f0403928f5bfd85afffa019898604f23ae46fd7ae9a1f1be602ae879ebbcfb00
    • Opcode Fuzzy Hash: bbac37c54156140ae347d57a3b35535c524f278f106985dda0b5bbdecba9b7f6
    • Instruction Fuzzy Hash: D881AB70A016159EFB739F18C944BEABBF5FF89304F0440E9D6C9D6294E7B19A90CB09
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 01006488
    • GetCurrentProcessId.KERNEL32 ref: 01006494
    • GetCurrentThreadId.KERNEL32 ref: 0100649C
    • GetTickCount.KERNEL32 ref: 010064A4
    • QueryPerformanceCounter.KERNEL32(?), ref: 010064B0
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 1c9a6aecb8a7c21b59f0650fcfd769be0ce501fac9dd4907ed4c08a4f18fdedf
    • Instruction ID: 54730ea4cddf6389e8530bc477ef8a499c223e9ef8984b798b14dd8bf7ea62bb
    • Opcode Fuzzy Hash: 1c9a6aecb8a7c21b59f0650fcfd769be0ce501fac9dd4907ed4c08a4f18fdedf
    • Instruction Fuzzy Hash: 76F0EC76D002189BDB22ABB4D44859FBBF5FF08350F420561E481E7145DB3AE9008B80
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00000000,00000001), ref: 010065CC
    • UnhandledExceptionFilter.KERNEL32(?), ref: 010065D6
    • GetCurrentProcess.KERNEL32(00000502), ref: 010065E1
    • TerminateProcess.KERNEL32(00000000), ref: 010065E8
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
    • String ID:
    • API String ID: 3231755760-0
    • Opcode ID: f1286b280cafa843d75f99a14fc8f82f3d62a7f6c1ba433f05c714c2799dff35
    • Instruction ID: b59ea808f46e4147d566023df9ea61253988435faf81cc8e47133db2c15ee704
    • Opcode Fuzzy Hash: f1286b280cafa843d75f99a14fc8f82f3d62a7f6c1ba433f05c714c2799dff35
    • Instruction Fuzzy Hash: C531AEB9811228DBCB62DF69D9886CDBBB4FF08300F1041EAE90DA7250E7759B80CF44
    APIs
    • ExitWindowsEx.USER32(00000002,00000000), ref: 01002296
      • Part of subcall function 010019C3: GetCurrentProcess.KERNEL32(00000028,?,00000000,?,?,0100644F), ref: 010019D2
      • Part of subcall function 010019C3: OpenProcessToken.ADVAPI32(00000000,?,0100644F), ref: 010019D9
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Process$CurrentExitOpenTokenWindows
    • String ID:
    • API String ID: 2795981589-0
    • Opcode ID: 420c96242fa3157512202e22d0b8ebdcd833ac1dce7af4aa444d86af65753e98
    • Instruction ID: e33f48b50889edb50da26cd91ad888bdbb36bf76c4c41118ded2b148f08d8a8c
    • Opcode Fuzzy Hash: 420c96242fa3157512202e22d0b8ebdcd833ac1dce7af4aa444d86af65753e98
    • Instruction Fuzzy Hash: 6FE09A70A8434932FAB3A2D59C0EF692A845B62B25F208085FBC8684C2CAF49181815B
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 951f3fe9c36bf399cea3b5daee7726a970067545f8f814873e799029eb7aa681
    • Instruction ID: a7c859f818a1c5d7f83a952ccff987e1bf8c78757954649e346333d07fc465ac
    • Opcode Fuzzy Hash: 951f3fe9c36bf399cea3b5daee7726a970067545f8f814873e799029eb7aa681
    • Instruction Fuzzy Hash: 98C179319082959FDB1BCF68C4946EDBBF0BF05318F1985E9D8D96B283C7749A85CB80
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7ab33120750a6cf8d1db9ab5d913f5b74d9f381fdd4bd0252d22a429b75f835f
    • Instruction ID: 2a4e20d8dd08869bc59d0f7a9c7b9ccb62a101cbb563704953a2602d9f9330db
    • Opcode Fuzzy Hash: 7ab33120750a6cf8d1db9ab5d913f5b74d9f381fdd4bd0252d22a429b75f835f
    • Instruction Fuzzy Hash: 10C16431A09695DFDB17CF68C4942EDBBB0BF05314F1981AED9CA5B683C7709A85C780
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 44e1ba9ebfd45170cdbc9c9433d3231e241977a48afbef868eb8f0aea8853ba0
    • Instruction ID: 5fc93633ee571ff39a8677e382d59af8c1c0cea3ee91adbd583a6aeae41621e5
    • Opcode Fuzzy Hash: 44e1ba9ebfd45170cdbc9c9433d3231e241977a48afbef868eb8f0aea8853ba0
    • Instruction Fuzzy Hash: 3BB18031D082959FEB1ACF58C0942EDFBB1BF45314F19C2EED5966B282C7749A85CB80
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1c71b5dec91b09520fdc65a5692a70fade92800ff2ceada316785ebfa9eb4593
    • Instruction ID: f8ae5dd48e3debf24b6725d3ddbfc9255f3a3dfa18b0ea0a8bf8b6824d7edd24
    • Opcode Fuzzy Hash: 1c71b5dec91b09520fdc65a5692a70fade92800ff2ceada316785ebfa9eb4593
    • Instruction Fuzzy Hash: BEB188759086999FDB07CF18C4906EEBBB1FF45310F18C6AFD8965B282C7709685CB90
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cc9e27de92532d430281cbbbf616aa24eb1d9968cc58c166f414955b503d17a5
    • Instruction ID: d6403490cd5a063b4169a535978f95eea43d4b920502812e922906ff9b75bb89
    • Opcode Fuzzy Hash: cc9e27de92532d430281cbbbf616aa24eb1d9968cc58c166f414955b503d17a5
    • Instruction Fuzzy Hash: AC91F631A04696DEEB179F59C8887FDB7B0FB04708F5081AAD58DA62C2D7749A81CF90
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: adc727b130d8a70c901193652c7c29f7f7098ede988ec518b009589487b1a216
    • Instruction ID: 70227f3721590e3e4a8072faacb14836a54763ddc1fb9a3c1eeaf4a681808555
    • Opcode Fuzzy Hash: adc727b130d8a70c901193652c7c29f7f7098ede988ec518b009589487b1a216
    • Instruction Fuzzy Hash: 7061F431A0055E8BEF1ACF6CC4905BE77E2EBC9354F548469D9E6D7382DA309992CB80
    APIs
    • CharNextA.USER32(00000000,00000001,StretchWare,00000000), ref: 01003601
    • GetModuleFileNameA.KERNEL32(0100C99E,00000104,00000001,StretchWare,00000000), ref: 010036CF
    • CharUpperA.USER32(?), ref: 01003716
    • CharUpperA.USER32(-0000004F), ref: 010037A5
    • lstrcmpiA.KERNEL32(RegServer,?), ref: 01003825
    • CharUpperA.USER32(?), ref: 01003856
    • CharUpperA.USER32(-0000004E), ref: 010038BA
    • lstrlenA.KERNEL32(0000002F), ref: 01003921
    • CharUpperA.USER32(?,0000002F,?), ref: 01003952
    • lstrcpyA.KERNEL32(0100C89A,0000002F), ref: 0100397B
    • lstrlenA.KERNEL32(0000002F), ref: 010039E2
    • lstrcpyA.KERNEL32(0100CAA2,0000002F,0000002F,?,0000002F,0000005D,0000002F,0000005B), ref: 01003A57
    • CloseHandle.KERNEL32(00000000), ref: 01003A6E
    • ExitProcess.KERNEL32 ref: 01003A76
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Char$Upper$lstrcpylstrlen$CloseExitFileHandleModuleNameNextProcesslstrcmpi
    • String ID: "$-$:$RegServer$StretchWare
    • API String ID: 497476604-3685444502
    • Opcode ID: 794e446cbad3e2b7cdf7e932ea0521a881f1aef766460360d9a64afcbe4b84b2
    • Instruction ID: bb19260d6a52b5aa4d74d53b6b2143bc91a7fcd92ee9301d96aa0320e1ef3d88
    • Opcode Fuzzy Hash: 794e446cbad3e2b7cdf7e932ea0521a881f1aef766460360d9a64afcbe4b84b2
    • Instruction Fuzzy Hash: D7D1D271D086959EFB778B2C8D083BA7EE4BB16310F0881D9D5C99E1C5CBB886C58F52
    APIs
      • Part of subcall function 01002ECE: LoadStringA.USER32(?,00000001,00000200,LoadString() Error. Could not load string resource.), ref: 01002EEB
    • MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
    • lstrlenA.KERNEL32(00000000,?,?,00000200,00000001,StretchWare,00000000), ref: 01003F7E
    • lstrlenA.KERNEL32(0000007F), ref: 01003F83
    • lstrlenA.KERNEL32(00000000), ref: 01003F8E
    • LocalAlloc.KERNEL32(00000040,00000064), ref: 01003F97
    • wsprintfA.USER32 ref: 01003FB2
    • lstrlenA.KERNEL32(0000007F,?,?,00000200,00000001,StretchWare,00000000), ref: 01003FC8
    • lstrlenA.KERNEL32(00000000), ref: 01003FD3
    • LocalAlloc.KERNEL32(00000040,00000064), ref: 01003FDC
    • wsprintfA.USER32 ref: 01003FF5
    • lstrlenA.KERNEL32(00000000,?,?,00000200,00000001,StretchWare,00000000), ref: 01004007
    • LocalAlloc.KERNEL32(00000040,00000001), ref: 01004011
    • lstrcpyA.KERNEL32(00000000,00000000), ref: 01004029
    • MessageBeep.USER32(?), ref: 01004032
    • MessageBoxA.USER32(?,00000000,StretchWare,00000000), ref: 01004075
    • LocalFree.KERNEL32(00000000), ref: 0100407E
      • Part of subcall function 010068B3: GetVersionExA.KERNEL32(?), ref: 010068FC
      • Part of subcall function 010068B3: GetSystemMetrics.USER32(0000004A), ref: 01006933
      • Part of subcall function 010068B3: RegOpenKeyExA.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,00020019,?), ref: 01006959
      • Part of subcall function 010068B3: RegQueryValueExA.ADVAPI32(?,01001271,00000000,?,?,0000000C,?), ref: 01006983
      • Part of subcall function 010068B3: RegCloseKey.ADVAPI32(?), ref: 01006991
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: lstrlen$Local$AllocMessage$wsprintf$BeepCloseFreeLoadMetricsOpenQueryStringSystemValueVersionlstrcpy
    • String ID: LoadString() Error. Could not load string resource.$StretchWare
    • API String ID: 374963636-1588481853
    • Opcode ID: 6e6d68f176d476745e32004f49a78736f7c082e95af37230175d7f171fa7616c
    • Instruction ID: eea99181f0804644aa289dd1498f83149dc0c4724dca30bca3b9ea1b6c7227c8
    • Opcode Fuzzy Hash: 6e6d68f176d476745e32004f49a78736f7c082e95af37230175d7f171fa7616c
    • Instruction Fuzzy Hash: 27518F71900619ABFB23EB64DD49BAB7BB9FF04340F0400A1FAC5E6180DB75DA508F60
    APIs
    • LoadStringA.USER32(000003E8,0100B640,00000200), ref: 010056CB
    • GetDesktopWindow.USER32 ref: 0100582A
    • SetWindowTextA.USER32(?,StretchWare), ref: 01005840
    • SendDlgItemMessageA.USER32(?,00000835,000000C5,00000103,00000000), ref: 01005859
    • GetDlgItem.USER32(?,00000836), ref: 01005872
    • EnableWindow.USER32(00000000), ref: 01005879
    • EndDialog.USER32(?,00000000), ref: 01005886
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Window$Item$DesktopDialogEnableLoadMessageSendStringText
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$StretchWare
    • API String ID: 2418873061-2242397231
    • Opcode ID: 67c2eb31cf3ab21f20db5c8c852de19d0f9fcb7337bab56cf1edb54243df0e23
    • Instruction ID: bceac7bff489e274393193b6e50ad7b08821bdc7de2992364884c992066ff592
    • Opcode Fuzzy Hash: 67c2eb31cf3ab21f20db5c8c852de19d0f9fcb7337bab56cf1edb54243df0e23
    • Instruction Fuzzy Hash: D151B470240685BAF6731B269C4CFAB3DACEBC6B55F004124BAC5A90C5DBB5CA51CBB4
    APIs
    • LoadLibraryA.KERNEL32(SHELL32.DLL,0100B640,0100B338,?), ref: 01004E83
    • GetProcAddress.KERNEL32(00000000,SHBrowseForFolder), ref: 01004EA4
    • GetProcAddress.KERNEL32(00000000,000000C3), ref: 01004EB7
    • GetProcAddress.KERNEL32(00000000,SHGetPathFromIDList), ref: 01004ECA
    • GetTempPathA.KERNEL32(00000104,0100BA80), ref: 01004EEA
    • lstrlenA.KERNEL32(0100BA80), ref: 01004EF1
    • CharPrevA.USER32(0100BA80,00000000), ref: 01004F01
    • CharPrevA.USER32(0100BA80,00000000), ref: 01004F0D
    • lstrcpyA.KERNEL32(?,0100BA80), ref: 01004F5E
    • FreeLibrary.KERNEL32(?), ref: 01004F6D
    • FreeLibrary.KERNEL32(00000000), ref: 01004F7D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: AddressLibraryProc$CharFreePrev$LoadPathTemplstrcpylstrlen
    • String ID: SHBrowseForFolder$SHELL32.DLL$SHGetPathFromIDList
    • API String ID: 2439948570-1731843650
    • Opcode ID: 2e9765e9f73174fdabd9105ff3870c025ec8e8cc93456301d0d3cae1497260b0
    • Instruction ID: fe0e6358b7e97da39a092ede048a89c2912f00ab584277418b1ac7d42fbd63d6
    • Opcode Fuzzy Hash: 2e9765e9f73174fdabd9105ff3870c025ec8e8cc93456301d0d3cae1497260b0
    • Instruction Fuzzy Hash: 9B318CB1905258BFEB139FA5CC88DFEBFB8EB49340F144069F684E6280C7758941CBA4
    APIs
    • CharUpperA.USER32(00009CF3,?,00000085,00000000), ref: 010022E0
    • CharNextA.USER32(?), ref: 010022EF
    • CharNextA.USER32(00000000), ref: 010022F2
    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,?,?,00000104,00000000), ref: 0100234D
    • RegQueryValueExA.ADVAPI32(?,01001271,00000000,?,-00000004,?), ref: 01002377
    • ExpandEnvironmentStringsA.KERNEL32(-00000004,?,00000104), ref: 01002393
    • RegCloseKey.ADVAPI32(?), ref: 010023C8
    • lstrcpyA.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths), ref: 0100231F
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • GetWindowsDirectoryA.KERNEL32(-00000004,0000054D), ref: 010023D4
    • GetSystemDirectoryA.KERNEL32(-00000004,0000054D), ref: 010023E0
    Strings
    • Software\Microsoft\Windows\CurrentVersion\App Paths, xrefs: 01002308
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Char$DirectoryNext$CloseEnvironmentExpandOpenQueryStringsSystemUpperValueWindowslstrcpylstrlen
    • String ID: Software\Microsoft\Windows\CurrentVersion\App Paths
    • API String ID: 2880253981-2428544900
    • Opcode ID: 7336e8143879b37cb86321436bf8a53eaa814517ff0876aac997468360ad53a5
    • Instruction ID: 1ad0f1247c1ed9861ce20e69da4a43a8ce288dfb09bb26ecbceeb403ef27fb39
    • Opcode Fuzzy Hash: 7336e8143879b37cb86321436bf8a53eaa814517ff0876aac997468360ad53a5
    • Instruction Fuzzy Hash: D7314A75904218AFEF239B64DC49FEE7BBDAF15310F008095F6C5E2081DBB99A948F61
    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000000,0002001F,?,00000000), ref: 01001D2D
    • RegQueryValueExA.ADVAPI32(?,wextract_cleanup0,00000000,00000000,?,?,7622F530), ref: 01001D62
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 01001D92
    • wsprintfA.USER32 ref: 01001DC6
    • lstrlenA.KERNEL32(?), ref: 01001DD6
    • RegSetValueExA.ADVAPI32(?,wextract_cleanup0,00000000,00000001,?,00000001), ref: 01001DEF
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • RegCloseKey.ADVAPI32(?), ref: 01001DFC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Valuelstrlen$CloseDirectoryOpenQuerySystemwsprintf
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Software\Microsoft\Windows\CurrentVersion\RunOnce$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup0
    • API String ID: 2431697979-1264114338
    • Opcode ID: 7ccf2c186cec699dfa9e19b335666aea46083c7a505e779869d620471afed035
    • Instruction ID: ab331a59c0f7b6da72724869899c66218a158f7d6afaae21f27dd4f7a2236e07
    • Opcode Fuzzy Hash: 7ccf2c186cec699dfa9e19b335666aea46083c7a505e779869d620471afed035
    • Instruction Fuzzy Hash: 81210175A00258ABEB33DB55DC49EDE7BBDEB44740F0000A9F689E6045DAB5EB84CB60
    APIs
    • wsprintfA.USER32 ref: 01003AFB
    • FindResourceA.KERNEL32(00000000,?,0000000A), ref: 01003B07
    • LoadResource.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,PACKINSTSPACE,0100C498), ref: 01003B1C
    • LockResource.KERNEL32(00000000,?,?,?,?,?,PACKINSTSPACE,0100C498), ref: 01003B23
    • lstrlenA.KERNEL32(00000008,?,?,?,?,?,PACKINSTSPACE,0100C498), ref: 01003B3E
    • FreeResource.KERNEL32(00000000,?,?,?,?,?,PACKINSTSPACE,0100C498), ref: 01003B58
    • wsprintfA.USER32 ref: 01003B6D
    • FindResourceA.KERNEL32(00000000,?,0000000A), ref: 01003B7A
    • FreeResource.KERNEL32(00000000,?,?,?,?,?,PACKINSTSPACE,0100C498), ref: 01003B99
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$FindFreewsprintf$LoadLocklstrlen
    • String ID: UPDFILE%lu
    • API String ID: 3821519360-2329316264
    • Opcode ID: 576a9d2a41689e10918246a17bc41e24b95d99357cd218a458b2db2c03cc483b
    • Instruction ID: c1f926839f5bccd6bd9dba539fb315616eac7d52b92b8f90cc2973ba09a331c2
    • Opcode Fuzzy Hash: 576a9d2a41689e10918246a17bc41e24b95d99357cd218a458b2db2c03cc483b
    • Instruction Fuzzy Hash: 39313E76A00609EFEB22DFA5D848EEEBBB9FB48705F004019F685E7140D77A9501CFA1
    APIs
    • GlobalFree.KERNEL32(00000000), ref: 0100256C
      • Part of subcall function 010022AC: CharUpperA.USER32(00009CF3,?,00000085,00000000), ref: 010022E0
      • Part of subcall function 010022AC: CharNextA.USER32(?), ref: 010022EF
      • Part of subcall function 010022AC: CharNextA.USER32(00000000), ref: 010022F2
      • Part of subcall function 010022AC: lstrcpyA.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths), ref: 0100231F
      • Part of subcall function 010022AC: RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020019,?,?,00000104,00000000), ref: 0100234D
      • Part of subcall function 010022AC: RegQueryValueExA.ADVAPI32(?,01001271,00000000,?,-00000004,?), ref: 01002377
      • Part of subcall function 010022AC: ExpandEnvironmentStringsA.KERNEL32(-00000004,?,00000104), ref: 01002393
      • Part of subcall function 010022AC: RegCloseKey.ADVAPI32(?), ref: 010023C8
    • GetFileVersionInfoSizeA.VERSION(00000001,?,00000001,?,?,0000054D,-00000004,?,?,00000104,?,?,?,?,?,?), ref: 01002470
    • GlobalAlloc.KERNEL32(00000042,00000000,0000003C,?,0000003C,?,?,00000001,?,00000001,?,?,0000054D,-00000004,?,?), ref: 01002483
    • GlobalLock.KERNEL32(00000000), ref: 01002495
    • GetFileVersionInfoA.VERSION(0000003C,?,?,00000000), ref: 010024AF
    • VerQueryValueA.VERSION(00000000,010012E8,0000003C,0000003C,0000003C,?,?,00000000), ref: 010024C6
    • GlobalUnlock.KERNEL32(00000000,0000003C,?,?,00000000), ref: 0100252D
    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 0100257C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Global$Char$FileInfoNextQueryUnlockValueVersion$AllocCloseEnvironmentExpandFreeLockOpenSizeStringsUpperlstrcpy
    • String ID: <
    • API String ID: 1180996843-4251816714
    • Opcode ID: 013660462c3fc53f77971edf0f57f43c85dba861e1b5c909512125e2574a6732
    • Instruction ID: 8ebd2fc49a21a31b7941948190e1fd36e6f894433b52bb8c886acf6eb3acf91b
    • Opcode Fuzzy Hash: 013660462c3fc53f77971edf0f57f43c85dba861e1b5c909512125e2574a6732
    • Instruction Fuzzy Hash: 7941737190020AEFEF12DF98C898AEDBBF9FF04305F104069EA85A2191D776DA45CF24
    APIs
    • GetModuleFileNameA.KERNEL32(?,00000104,?,00000400), ref: 010025D0
    • IsDBCSLeadByte.KERNEL32(00000000,00000000), ref: 010025EA
    • CharNextA.USER32(00000400), ref: 01002608
    • CharUpperA.USER32(00000000), ref: 01002614
    • lstrlenA.KERNEL32(?,?), ref: 01002631
    • CharPrevA.USER32(?,?), ref: 01002642
    • CharUpperA.USER32(00000000), ref: 0100265A
    • lstrlenA.KERNEL32(?,?,00000000,00000400,?,?), ref: 01002682
    • CharNextA.USER32(?), ref: 0100268E
    • CharNextA.USER32(00000400), ref: 01002697
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Char$Next$Upperlstrlen$ByteFileLeadModuleNamePrev
    • String ID:
    • API String ID: 3967807161-0
    • Opcode ID: a820073371754dc5eeb8d23f47868028148f50acb9d5e774029aed37092d399e
    • Instruction ID: eaaee00f3e00e4901544a9c651e5066a5a093bae46e09448390e21310fb16754
    • Opcode Fuzzy Hash: a820073371754dc5eeb8d23f47868028148f50acb9d5e774029aed37092d399e
    • Instruction Fuzzy Hash: F9317A75804285AEEB739F68CC48BEABFEDAF1A300F140595E5C4D3281DB798981CF61
    APIs
    • EndDialog.USER32(?,00000000), ref: 01003D8E
    • GetDesktopWindow.USER32 ref: 01003D9E
    • SetDlgItemTextA.USER32(?,00000834,?), ref: 01003DBB
    • SetWindowTextA.USER32(?,StretchWare), ref: 01003DC7
    • SetForegroundWindow.USER32(?), ref: 01003DCE
    • GetDlgItem.USER32(?,00000834), ref: 01003DDB
    • SendDlgItemMessageA.USER32(?,00000834,000000B1,000000FF,00000000), ref: 01003E08
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: ItemWindow$Text$DesktopDialogForegroundMessageSend
    • String ID: StretchWare
    • API String ID: 3995847246-859621192
    • Opcode ID: 514f40a5a9973e196b7822fc54060a0ee6dd35ba8ddd69d8be9c4b3aeee3cfc4
    • Instruction ID: 2a05d3dcf79b5e367ffb0c494342458d3375fcf2b230eec5ab74aad8adfe7076
    • Opcode Fuzzy Hash: 514f40a5a9973e196b7822fc54060a0ee6dd35ba8ddd69d8be9c4b3aeee3cfc4
    • Instruction Fuzzy Hash: 3F118F35104245AFFB336FA4EC0CFBA3AA8F745B11F00061AF9D5990C5CBB99591DB90
    APIs
    • LoadLibraryA.KERNEL32(advapi32.dll,StretchWare,00000000,?,?,?,010017A0,?,00000000,?,?,0100561B,?,?,00000000), ref: 010016E6
    • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 010016FA
    • AllocateAndInitializeSid.ADVAPI32(010017A0,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 01001726
    • FreeSid.ADVAPI32(?), ref: 0100173A
    • FreeLibrary.KERNEL32(?,?,?,?,010017A0,?,00000000,?,?,0100561B,?,?,00000000), ref: 01001743
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: FreeLibrary$AddressAllocateInitializeLoadProc
    • String ID: CheckTokenMembership$StretchWare$advapi32.dll
    • API String ID: 4204503880-2885330206
    • Opcode ID: 80048a897bbb716bc6edda70627e0e87ab6d0b634674ff9098072ab894aeef90
    • Instruction ID: 7f32255cd53d54b6266d59a01a2c9f788efc2b6a55c7d064e1075484334130e5
    • Opcode Fuzzy Hash: 80048a897bbb716bc6edda70627e0e87ab6d0b634674ff9098072ab894aeef90
    • Instruction Fuzzy Hash: 63116072A00289AFDB12DFE9D888ADEBFB9FB14340F444059F285E3181C7759A00CB65
    APIs
    • SetFileAttributesA.KERNEL32(004FC2A0,00000080,?,00000000), ref: 01003387
    • DeleteFileA.KERNEL32(004FC2A0,?,00000000), ref: 0100338F
    • LocalFree.KERNEL32(004FC2A0,?,00000000), ref: 0100339A
    • LocalFree.KERNEL32(004FC2A0,?,00000000), ref: 0100339D
    • lstrcpyA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 010033CE
    • SetCurrentDirectoryA.KERNEL32(01001344), ref: 010033EE
    Strings
    • C:\Users\user\AppData\Local\Temp\IXP000.TMP\, xrefs: 010033C2
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: FileFreeLocal$AttributesCurrentDeleteDirectorylstrcpy
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 2574644873-388467436
    • Opcode ID: 6ea3feb0ca6028cf83602c9698947175550dd0a338225f6cb2ccfdd8c559cc3d
    • Instruction ID: 3d978de08161bdf378add94dce6545b53e49bcfa393c6a6d5fd735a2b26ab47d
    • Opcode Fuzzy Hash: 6ea3feb0ca6028cf83602c9698947175550dd0a338225f6cb2ccfdd8c559cc3d
    • Instruction Fuzzy Hash: 0D21D535900215DFFB73EB68E949B9937F8BB04715F0541A5E2C09B284CFBA99C8CB50
    APIs
    • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
    • SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
    • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
    • LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
    • LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • FreeResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002EBA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$Find$FreeLoadLockSizeof
    • String ID: StretchWare
    • API String ID: 468261009-859621192
    • Opcode ID: 7090d6fbcbd5b277e53ff8aa31aa3d5f4a0baf2b3be01dcc482b1e99473e37a0
    • Instruction ID: c58e523c2e5cc4a020a6dc9083853665ab900ca59998c1429a4b95f367ba78fb
    • Opcode Fuzzy Hash: 7090d6fbcbd5b277e53ff8aa31aa3d5f4a0baf2b3be01dcc482b1e99473e37a0
    • Instruction Fuzzy Hash: 8F01F231300188BBEB239BA5EC88C7F7BAAEBC5761F144019FA85C3280C6768C01DB61
    APIs
    • EndDialog.USER32(?,?), ref: 01003E65
    • GetDesktopWindow.USER32 ref: 01003E6F
    • SetWindowTextA.USER32(?,StretchWare), ref: 01003E85
    • SetDlgItemTextA.USER32(?,00000838), ref: 01003E97
    • SetForegroundWindow.USER32(?), ref: 01003E9E
    • EndDialog.USER32(?,00000002), ref: 01003EAB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Window$DialogText$DesktopForegroundItem
    • String ID: StretchWare
    • API String ID: 852535152-859621192
    • Opcode ID: c58225de05bf9ddd7557f29e4dd6395625a24e078d1bf0613a1e21eb476cea98
    • Instruction ID: bbd0fe0418d4f9b27c80c161e9fa2716d7c3f6b950bf98ca077586a846113f40
    • Opcode Fuzzy Hash: c58225de05bf9ddd7557f29e4dd6395625a24e078d1bf0613a1e21eb476cea98
    • Instruction Fuzzy Hash: FF01BC31500195AFEB635BA8D808DAE7AA8FB09751F008610FAC2DA1C5CB79CE51CB90
    APIs
    • lstrlenA.KERNEL32(00000104,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F0D
    • lstrlenA.KERNEL32(?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F14
    • lstrcpyA.KERNEL32(?,00000104,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F2A
    • lstrlenA.KERNEL32(?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F31
    • lstrlenA.KERNEL32(?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F3B
    • lstrlenA.KERNEL32(?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F45
    • lstrlenA.KERNEL32(?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F4C
    • lstrcatA.KERNEL32(?,?,?,?,?,0100511C,?,00000104,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 01002F57
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: lstrlen$lstrcatlstrcpy
    • String ID:
    • API String ID: 2414487701-0
    • Opcode ID: bec1684d548f7f7a66b2a209a78056a6def03e0851b026678931160fd0f5e77e
    • Instruction ID: 3391c5307bafe4b116acb0d74c5fe46b65c44dc66db5e5de76f5420f3b77b05f
    • Opcode Fuzzy Hash: bec1684d548f7f7a66b2a209a78056a6def03e0851b026678931160fd0f5e77e
    • Instruction Fuzzy Hash: BB01A73150829ABEE7139F65DC0CE7F3FE99F85294F044079F58482051CB75D4159BA1
    APIs
    • GetWindowRect.USER32(?,?), ref: 01002D9B
    • GetWindowRect.USER32(?,?), ref: 01002DB0
    • GetDC.USER32(?), ref: 01002DC4
    • GetDeviceCaps.GDI32(00000000,00000008), ref: 01002DD0
    • GetDeviceCaps.GDI32(?,0000000A), ref: 01002DDE
    • ReleaseDC.USER32(?,?), ref: 01002DED
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000005), ref: 01002E43
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Window$CapsDeviceRect$Release
    • String ID:
    • API String ID: 2212493051-0
    • Opcode ID: e87303e51a87c1f3fcc5427d586fd06ff29c73153c48b8601ce90fe903ab1556
    • Instruction ID: 967cba225b93383e2e60847015f29d3632c184523d341bb7e68964bb8c44351d
    • Opcode Fuzzy Hash: e87303e51a87c1f3fcc5427d586fd06ff29c73153c48b8601ce90fe903ab1556
    • Instruction Fuzzy Hash: 6C215932A0010AAFDF12CFBDCD889EEBBBAEB88300F008125F945E7254D675ED058B50
    APIs
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • LocalAlloc.KERNEL32(00000040,00000001,LICENSE,00000000,00000000,00000000,00000000,?,01006243), ref: 01004BE4
    • LocalFree.KERNEL32(00000000,000004B1,00000000,00000000,00000010,00000000,LICENSE,00000000,00000000,?,01006243), ref: 01004C31
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
      • Part of subcall function 01003AA1: GetLastError.KERNEL32(76244B00,01004684), ref: 01003AAA
      • Part of subcall function 01003AA1: GetLastError.KERNEL32 ref: 01003AB0
    • LocalFree.KERNEL32(?,01006243), ref: 01004C96
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$Local$ErrorFindFreeLast$AllocLoadLockMessageSizeof
    • String ID: <None>$LICENSE
    • API String ID: 3899723493-383193767
    • Opcode ID: c73d55a50ddab375b18fca3a874db0a6e8ae128fa329b97c8ffd94b4549e4620
    • Instruction ID: 9697d7adc24e1ebcf24a66d17cc2c8ea39a979045a2e6bc1bc079e37bfc5c796
    • Opcode Fuzzy Hash: c73d55a50ddab375b18fca3a874db0a6e8ae128fa329b97c8ffd94b4549e4620
    • Instruction Fuzzy Hash: 1811B471240695BEF3735B22AD48D6B3AADE7C2B10F004159F6C5D50D8DBBA4801CB34
    APIs
    • GetVersionExA.KERNEL32(?), ref: 010068FC
    • GetSystemMetrics.USER32(0000004A), ref: 01006933
    • RegOpenKeyExA.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,00020019,?), ref: 01006959
    • RegQueryValueExA.ADVAPI32(?,01001271,00000000,?,?,0000000C,?), ref: 01006983
    • RegCloseKey.ADVAPI32(?), ref: 01006991
      • Part of subcall function 0100678F: CharNextA.USER32(010069AC,00000000,?,010069AC,?,00000000), ref: 010067CC
    Strings
    • Control Panel\Desktop\ResourceLocale, xrefs: 0100694F
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CharCloseMetricsNextOpenQuerySystemValueVersion
    • String ID: Control Panel\Desktop\ResourceLocale
    • API String ID: 3346862599-1109908249
    • Opcode ID: cfd22d1cb8363d992addf5a965baf5ad3a7f3b3c896125044328321e3dcf038f
    • Instruction ID: 5c6acbc3d5fc57845e32ec3dff29f7de8e8621ecf2eb8ce39a92ab546f5c8395
    • Opcode Fuzzy Hash: cfd22d1cb8363d992addf5a965baf5ad3a7f3b3c896125044328321e3dcf038f
    • Instruction Fuzzy Hash: 34215E75A00328EFFF72CB54D948BDA77BDBB05315F0040EAE588A5085DB768A94CF12
    APIs
    • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000000), ref: 01001E77
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,?), ref: 01001E9D
    • _lopen.KERNEL32(?,00000040), ref: 01001EAC
    • _llseek.KERNEL32(00000000,00000000,00000002), ref: 01001EBD
    • _lclose.KERNEL32(00000000), ref: 01001EC6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: DirectoryPrivateProfileStringWindowsWrite_lclose_llseek_lopenlstrlen
    • String ID: wininit.ini
    • API String ID: 979776028-4206010578
    • Opcode ID: 37f4b3d508ecab28613d6a97bb6e1095e4a2a3c7db2d8278c91ef0a9ab821e8d
    • Instruction ID: 18cd7f1609499ba71430b944770d53967596a73aa7aa202a5c8f43e0c2a69e76
    • Opcode Fuzzy Hash: 37f4b3d508ecab28613d6a97bb6e1095e4a2a3c7db2d8278c91ef0a9ab821e8d
    • Instruction Fuzzy Hash: 9701D476A00154ABE721EB65DC4CEDF3BBC9F85310F040065F6C4E31C0DAB8DA858B60
    APIs
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • LocalAlloc.KERNEL32(00000040,00000001,FINISHMSG,00000000,00000000,00000000,00000000,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?,?,01006365), ref: 01004E05
    • LocalFree.KERNEL32(?,?,?,01006365), ref: 01004E63
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$FindLocal$AllocFreeLoadLockMessageSizeof
    • String ID: <None>$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$FINISHMSG
    • API String ID: 1166655539-87598203
    • Opcode ID: 945af8c2f13a4e2e23c29a060e4326b8cf96b2cec21a05c610d2a029f1db482c
    • Instruction ID: b86749c0676bc5709347cbb2394c06ae2176a12615ce74ff3a29be4193e97ba7
    • Opcode Fuzzy Hash: 945af8c2f13a4e2e23c29a060e4326b8cf96b2cec21a05c610d2a029f1db482c
    • Instruction Fuzzy Hash: 4E01BC712402C4BAF7236A539D49FAFBE7DDBC2F44F000059B780E50C1D6B58D009278
    APIs
    • lstrcpyA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\), ref: 01003C2C
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000104,?), ref: 01003C5A
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 01003C86
    • CloseHandle.KERNEL32(00000000), ref: 01003CAC
    Strings
    • C:\Users\user\AppData\Local\Temp\IXP000.TMP\, xrefs: 01003C0E
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: File$CloseCreateHandleWritelstrcpylstrlen
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 3630773104-388467436
    • Opcode ID: 71a52d343370c3aad0e8bea5e8c7a1ee89124c22f7d04e4a93e1b4e400077d81
    • Instruction ID: ed493f8371116e651799eec5aa4685a96e44dd350d2c3c94e76b10785d47f5b1
    • Opcode Fuzzy Hash: 71a52d343370c3aad0e8bea5e8c7a1ee89124c22f7d04e4a93e1b4e400077d81
    • Instruction Fuzzy Hash: 7D216F75900118ABD722CF56DC88EDA7BB8EB49320F004595F6C9D7180C7B99AC4CFA0
    APIs
    • lstrcpyA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,7622F530), ref: 01003CEF
      • Part of subcall function 010066CF: lstrlenA.KERNEL32(00000104,0000002F,?,01003991,0100C89A,00000104,01001271), ref: 010066D9
    • GetFileAttributesA.KERNEL32(?,?,00000104,?), ref: 01003D0E
    • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 01003D28
    • LoadLibraryA.KERNEL32(?), ref: 01003D31
    Strings
    • C:\Users\user\AppData\Local\Temp\IXP000.TMP\, xrefs: 01003CE3
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: LibraryLoad$AttributesFilelstrcpylstrlen
    • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
    • API String ID: 2749481120-388467436
    • Opcode ID: efb49a3551e82d2aca852d6b8404bb15e5416ed9f694a26cd63d4ca69129f5e9
    • Instruction ID: f105a43693de67f3e081fcb7c5b90bd09891202ca5bc0fd204553d5dc91105a1
    • Opcode Fuzzy Hash: efb49a3551e82d2aca852d6b8404bb15e5416ed9f694a26cd63d4ca69129f5e9
    • Instruction Fuzzy Hash: B6F0A435904118ABEB22EBA4D808FDD377CAB14310F404481F6C5E71C0DFB8EA848B50
    APIs
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
      • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E6F
      • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
      • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E8F
      • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,StretchWare,0000007F,?,00000000), ref: 01002E96
    • FindResourceA.KERNEL32(00000000,CABINET,0000000A), ref: 0100331B
    • LoadResource.KERNEL32(00000000,00000000), ref: 01003324
    • LockResource.KERNEL32(00000000), ref: 0100332B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Resource$Find$LoadLock$Sizeof
    • String ID: <+$CABINET
    • API String ID: 1933721802-794146689
    • Opcode ID: 1692d02a55cbc160416827321246fe4b7eec14d249b88bc8613a2a7260353126
    • Instruction ID: cc1630d2f2e1415729ed085009dd32ef9f31af51343d2801e4429469f1343b9d
    • Opcode Fuzzy Hash: 1692d02a55cbc160416827321246fe4b7eec14d249b88bc8613a2a7260353126
    • Instruction Fuzzy Hash: 89E08675B417506BF33267B16C1DF873E5C9B05711F040015F386DA1C4C6F98400C751
    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000000,00020006,01003418,?,?,01003418), ref: 01001A7F
    • RegDeleteValueA.ADVAPI32(01003418,wextract_cleanup0,?,?,01003418), ref: 01001A91
    • RegCloseKey.ADVAPI32(01003418,?,?,01003418), ref: 01001A9A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: CloseDeleteOpenValue
    • String ID: Software\Microsoft\Windows\CurrentVersion\RunOnce$wextract_cleanup0
    • API String ID: 849931509-702805525
    • Opcode ID: cd9d913e4fd79f3a06ae71b19d601bebc7f3385b073269ceb231d1a8de7b8e18
    • Instruction ID: 08e6132b78a4405aeda3fa779f53dc0e2de51a409a2e6c94243458a35d58a82b
    • Opcode Fuzzy Hash: cd9d913e4fd79f3a06ae71b19d601bebc7f3385b073269ceb231d1a8de7b8e18
    • Instruction Fuzzy Hash: F8E01A34A40248BBF733DB92DD0AF5A7AA9AB04784F500058B281A0095D7B5D901D714
    APIs
    • EndDialog.USER32(?,0000083E), ref: 010018DB
    • GetDesktopWindow.USER32 ref: 010018E3
    • LoadStringA.USER32(?,?,00000200,?), ref: 0100190C
    • SetDlgItemTextA.USER32(?,0000083F,00000000), ref: 0100191F
    • MessageBeep.USER32(000000FF), ref: 01001927
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: BeepDesktopDialogItemLoadMessageStringTextWindow
    • String ID:
    • API String ID: 1273765764-0
    • Opcode ID: 1fe746244ab481732cb78edc130a925beaacb107ba713200566c6f0ccbcc287c
    • Instruction ID: 55a0027b7669814cd1c96741612cb7e7f9a1a0a3dd5ed6c48cccf5beb83447b2
    • Opcode Fuzzy Hash: 1fe746244ab481732cb78edc130a925beaacb107ba713200566c6f0ccbcc287c
    • Instruction Fuzzy Hash: 8101217150025AEFEB23EF64D908AEE3BA8FB08311F044150F6A5D21C5CB79DB60CBA5
    APIs
    • lstrlenA.KERNEL32(0100262A,?,00000000,76230440,?,?,0100262A), ref: 01006677
    • CharPrevA.USER32(0100262A,00000000,?,?,0100262A), ref: 01006687
    • CharPrevA.USER32(0100262A,00000000,?,?,0100262A), ref: 01006693
    • CharPrevA.USER32(0100262A,00000000,?,?,0100262A), ref: 010066A6
    • CharNextA.USER32(00000000,?,?,0100262A), ref: 010066AE
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Char$Prev$Nextlstrlen
    • String ID:
    • API String ID: 295585802-0
    • Opcode ID: 915a4317a53b45c8286c77a7661bcefff6abe53e7f04113f2cfc660fb61b7cd7
    • Instruction ID: e6858c63049694c3117230d93b982ded723c412c4e62408bc78f3259928df5ea
    • Opcode Fuzzy Hash: 915a4317a53b45c8286c77a7661bcefff6abe53e7f04113f2cfc660fb61b7cd7
    • Instruction Fuzzy Hash: E8F0D1B2900284BFF7228B69CC88F5F7FEDDB893A4F140095E58193182C77A99108B75
    APIs
    • LocalAlloc.KERNEL32(00000040,00000008,?,00000000,?,?,01005168,?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 010040B1
    • lstrlenA.KERNEL32(01005168,?,00000000,?,?,01005168,?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 010040D5
    • LocalAlloc.KERNEL32(00000040,00000001,?,00000000,?,?,01005168,?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 010040DF
    • LocalFree.KERNEL32(00000000,000004B5,00000000,00000000,00000010,00000000,?,00000000,?,?,01005168,?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 010040FD
      • Part of subcall function 01003EBE: MessageBoxA.USER32(?,?,StretchWare,00000000), ref: 01003F5B
    • lstrcpyA.KERNEL32(00000000,01005168,?,00000000,?,?,01005168,?,C:\Users\user\AppData\Local\Temp\IXP000.TMP\,?), ref: 0100410B
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Local$Alloc$FreeMessagelstrcpylstrlen
    • String ID:
    • API String ID: 3247521446-0
    • Opcode ID: c08762a5925630561dce2ba68a971d21afc39e1fb6e013559b2dd62ac13e195b
    • Instruction ID: 484c8a38b1ca8798ae1f4b11a91829ed48787486965810eb3b8ebf67eea7932b
    • Opcode Fuzzy Hash: c08762a5925630561dce2ba68a971d21afc39e1fb6e013559b2dd62ac13e195b
    • Instruction Fuzzy Hash: 860188B52402087FF3239F65AC85FABBA5DE754794F008025F7C5D60C4D7B69C504764
    APIs
    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 01002CB7
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 01002CC9
    • DispatchMessageA.USER32(?), ref: 01002CDE
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 01002CEC
    Memory Dump Source
    • Source File: 00000000.00000002.3342902294.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
    • Associated: 00000000.00000002.3342877939.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342928995.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3342957253.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1000000_StretchInstall.jbxd
    Similarity
    • API ID: Message$Peek$DispatchMultipleObjectsWait
    • String ID:
    • API String ID: 2776232527-0
    • Opcode ID: ecb5dbb63d15ec62f86b3f7d67ae0d9b5a0ddad4c8e295c16c05b27f8062ba49
    • Instruction ID: 39c073168b69b8e79244012e034678836bc036e0dc16367505055d994280760c
    • Opcode Fuzzy Hash: ecb5dbb63d15ec62f86b3f7d67ae0d9b5a0ddad4c8e295c16c05b27f8062ba49
    • Instruction Fuzzy Hash: 2301447290011DBAAF318BDA9D48DEF7AFCEAC5754F14016AFA51E2084D535D905C770

    Execution Graph

    Execution Coverage:8.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:1.2%
    Total number of Nodes:1964
    Total number of Limit Nodes:10
    execution_graph 30484 d32ed2 8 API calls ctype 30485 d5a8d0 RtlUnwind 30486 d47ad3 127 API calls ctype 30488 d4fadd 95 API calls 8 library calls 30489 d2a8d8 66 API calls ctype 30494 d64cca 101 API calls 2 library calls 30496 d2d0f1 FreeLibrary ctype 30503 d306fd 90 API calls 3 library calls 30506 d478e7 168 API calls ctype 30513 d32092 111 API calls ctype 30515 d4689d 72 API calls 2 library calls 28394 d4509a 28838 d4f42b 28394->28838 28396 d450a9 HeapSetInformation 28839 d439a6 28396->28839 28406 d45108 28864 d436f6 28406->28864 28413 d45363 28415 d45376 28413->28415 28416 d4536f 28413->28416 28414 d4524b 28417 d45260 CoUninitialize 28414->28417 28418 d45259 CloseHandle 28414->28418 28420 d4c83e 78 API calls 28415->28420 28969 d4bda0 28416->28969 28422 d45276 moneypunct ctype 28417->28422 28418->28417 28421 d45374 28420->28421 28986 d4c9db 28421->28986 28424 d45297 FreeLibrary 28422->28424 28451 d452a3 ctype 28422->28451 28424->28451 28430 d45406 29018 d4c681 28430->29018 28434 d45625 28436 d4c681 87 API calls 28434->28436 28438 d45633 28436->28438 29037 d492ca 28438->29037 28440 d4544e 29373 d2a9c9 28440->29373 28445 d2a9c9 6 API calls 28447 d4546c 28445->28447 29379 d4d37a 89 API calls __ftelli64_nolock 28447->29379 28450 d456e4 29053 d419c8 28450->29053 29361 d3f58e 69 API calls 3 library calls 28451->29361 28452 d45471 28455 d4547c 28452->28455 28456 d455e9 28452->28456 28460 d4c681 87 API calls 28455->28460 28459 d4c681 87 API calls 28456->28459 28458 d45321 29362 d49407 DeleteObject DeleteObject ctype 28458->29362 28463 d455f4 MessageBoxW 28459->28463 28464 d45487 MessageBoxW 28460->28464 28463->28434 28474 d454c1 28464->28474 28475 d454b8 ExitWindowsEx 28464->28475 28478 d454d6 CoUninitialize 28474->28478 28479 d454cf CloseHandle 28474->28479 28475->28474 28483 d454ef moneypunct ctype 28478->28483 28479->28478 28481 d457a8 28485 d457bb 28481->28485 28487 d4c681 87 API calls 28481->28487 28482 d4534d 28484 d4f496 5 API calls 28482->28484 28491 d4551a FreeLibrary 28483->28491 28510 d45526 ctype 28483->28510 28486 d47cd9 28484->28486 29116 d2b3c2 28485->29116 28487->28485 28491->28510 28494 d45799 29383 d42bd4 77 API calls 28494->29383 28496 d45820 ctype 28497 d4c681 87 API calls 28496->28497 28498 d4588a 28497->28498 28499 d4c681 87 API calls 28498->28499 28500 d4589e 28499->28500 28501 d4c681 87 API calls 28500->28501 28502 d458b1 28501->28502 28503 d4c681 87 API calls 28502->28503 28504 d458c4 28503->28504 29156 d49486 28504->29156 28507 d45917 28511 d4bf95 77 API calls 28507->28511 28508 d45900 29173 d3d29d 28508->29173 29380 d3f58e 69 API calls 3 library calls 28510->29380 28513 d45953 28511->28513 29384 d4a0e5 28513->29384 28514 d455a4 29381 d49407 DeleteObject DeleteObject ctype 28514->29381 28517 d4596e 28519 d459e4 28517->28519 28520 d45973 28517->28520 28523 d3d29d 125 API calls 28519->28523 29389 d392e6 143 API calls 2 library calls 28520->29389 28529 d4590c moneypunct ctype 28523->28529 28527 d459b1 28528 d3d29d 125 API calls 28527->28528 28528->28529 28530 d45a93 28529->28530 28536 d45e19 ctype 28529->28536 29390 d3d679 77 API calls 28530->29390 28533 d45ae8 28539 d4c681 87 API calls 28533->28539 28534 d4724e 28537 d4c681 87 API calls 28534->28537 28535 d45eb5 ctype 28535->28534 28538 d45f20 28535->28538 28717 d466fe ctype 28535->28717 28536->28535 29404 d3d679 77 API calls 28536->29404 28540 d47271 28537->28540 28542 d4c681 87 API calls 28538->28542 28543 d45b03 28539->28543 29196 d4865d 28540->29196 28546 d45f35 28542->28546 29391 d48191 SetDlgItemTextW 28543->29391 28545 d469b5 29446 d4806c GetDlgItem ShowWindow GetDlgItem ShowWindow 28545->29446 29405 d4968d 131 API calls __ftelli64_nolock 28546->29405 28551 d45b20 28555 d45b50 28551->28555 28556 d45b28 28551->28556 28553 d469c1 28557 d4c681 87 API calls 28553->28557 28554 d45f60 29406 d43a7b 195 API calls 2 library calls 28554->29406 28568 d4c681 87 API calls 28555->28568 28561 d4c681 87 API calls 28556->28561 28559 d469cf 28557->28559 29447 d485e2 GetDlgItem ShowWindow 28559->29447 28560 d45f77 28563 d460b2 28560->28563 28564 d45f82 28560->28564 28565 d45b4b 28561->28565 29409 d47e5f ShowWindow 28563->29409 28569 d45f97 28564->28569 28570 d45f90 CloseHandle 28564->28570 29392 d417b2 107 API calls 2 library calls 28565->29392 28566 d4729b 28576 d4c681 87 API calls 28566->28576 28726 d474d6 ctype 28566->28726 28567 d469de 28573 d4865d SetDlgItemTextW 28567->28573 28568->28565 28571 d45fa5 CoUninitialize 28569->28571 28570->28569 28589 d45fb8 moneypunct ctype 28571->28589 28577 d469f7 28573->28577 28575 d460c9 29410 d4806c GetDlgItem ShowWindow GetDlgItem ShowWindow 28575->29410 28581 d472cb 28576->28581 29448 d485e2 GetDlgItem ShowWindow 28577->29448 28579 d45ba3 29393 d49bb5 92 API calls 2 library calls 28579->29393 29477 d48191 SetDlgItemTextW 28581->29477 28583 d4742d CoUninitialize 28729 d47421 moneypunct ctype 28583->28729 28586 d460d5 29411 d485e2 GetDlgItem ShowWindow 28586->29411 28587 d46a05 29449 d485e2 GetDlgItem ShowWindow 28587->29449 28608 d45fe3 FreeLibrary 28589->28608 28691 d45fef ctype 28589->28691 28590 d45bb1 28596 d45c5c 28590->28596 28609 d2ad06 114 API calls 28590->28609 28594 d46a13 29450 d4896e 10 API calls __ftelli64_nolock 28594->29450 28595 d472e4 29478 d417b2 107 API calls 2 library calls 28595->29478 29396 d4806c GetDlgItem ShowWindow GetDlgItem ShowWindow 28596->29396 28598 d460e3 29412 d485e2 GetDlgItem ShowWindow 28598->29412 28604 d460f1 29413 d4896e 10 API calls __ftelli64_nolock 28604->29413 28606 d472f1 28612 d47345 28606->28612 28623 d4c681 87 API calls 28606->28623 28607 d4745e FreeLibrary 28607->28729 28608->28691 28613 d45bdf 28609->28613 28610 d45c68 28614 d4c681 87 API calls 28610->28614 29481 d44e0d 139 API calls 2 library calls 28612->29481 28617 d45c0f 28613->28617 28625 d2ad06 114 API calls 28613->28625 28619 d45c76 28614->28619 28616 d460fd 28629 d4c681 87 API calls 28616->28629 29394 d49bb5 92 API calls 2 library calls 28617->29394 28624 d4865d SetDlgItemTextW 28619->28624 28622 d46a1f 29451 d4227f 88 API calls 2 library calls 28622->29451 28627 d4731e 28623->28627 28628 d45c90 28624->28628 28625->28617 28626 d45c1f 28638 d4c681 87 API calls 28626->28638 29479 d49b51 92 API calls 2 library calls 28627->29479 29397 d485e2 GetDlgItem ShowWindow 28628->29397 28639 d46118 28629->28639 28632 d47359 28633 d473ea ctype 28632->28633 29482 d437a1 116 API calls 2 library calls 28632->29482 29484 d48700 GetDlgItem SendMessageW SendMessageW SendMessageW SendMessageW 28633->29484 28643 d45c42 28638->28643 29414 d48191 SetDlgItemTextW 28639->29414 28641 d45c9d 29398 d485e2 GetDlgItem ShowWindow 28641->29398 29395 d49b51 92 API calls 2 library calls 28643->29395 28644 d47338 29480 d49bb5 92 API calls 2 library calls 28644->29480 28647 d47408 29485 d4868c 6 API calls 28647->29485 28651 d45cab 29399 d4896e 10 API calls __ftelli64_nolock 28651->29399 28656 d46132 28663 d2ad06 114 API calls 28656->28663 28658 d47415 29486 d41c67 121 API calls 2 library calls 28658->29486 28660 d45cb7 29400 d47e5f ShowWindow 28660->29400 28666 d4614f 28663->28666 29415 d41b39 94 API calls 2 library calls 28666->29415 28668 d45cc3 28672 d45cd1 CloseHandle 28668->28672 28673 d45cd8 28668->28673 28669 d47395 ctype 28674 d4bf95 77 API calls 28669->28674 28670 d48119 SetDlgItemTextW 28757 d46a56 ctype 28670->28757 28672->28673 29401 d47f9c 13 API calls 28673->29401 28679 d473c7 28674->28679 28678 d46164 29416 d3e153 152 API calls 2 library calls 28678->29416 29483 d3dc63 149 API calls 2 library calls 28679->29483 28681 d477fc CoUninitialize 28681->28726 28688 d4617e 28697 d2ad06 114 API calls 28688->28697 28837 d46551 ctype 28688->28837 28689 d45cf3 28695 d45d01 CoUninitialize 28689->28695 28690 d4705d Sleep 28690->28757 29407 d3f58e 69 API calls 3 library calls 28691->29407 28694 d46c4c 28699 d2b217 77 API calls 28694->28699 28707 d46c6c 28694->28707 28716 d45d14 moneypunct ctype 28695->28716 28696 d4606d 29408 d49407 DeleteObject DeleteObject ctype 28696->29408 28710 d461a3 28697->28710 28699->28707 28705 d47862 CoUninitialize 28705->28729 28706 d2b217 77 API calls 28706->28757 28711 d4c681 87 API calls 28707->28711 28708 d46bae ctype 28708->28534 29417 d3c9ff 77 API calls 28710->29417 28712 d46ca0 28711->28712 29460 d48191 SetDlgItemTextW 28712->29460 28714 d4c681 87 API calls 28714->28726 28722 d45d4a FreeLibrary 28716->28722 28771 d45d56 ctype 28716->28771 29445 d47e5f ShowWindow 28717->29445 28719 d4c681 87 API calls 28719->28757 28721 d46cbd 29461 d481b3 LoadImageW LoadIconW GetDlgItem SendMessageW 28721->29461 28722->28771 28723 d476e4 MessageBoxW 28723->28726 28725 d461e5 29418 d42e93 171 API calls 2 library calls 28725->29418 28726->28482 28726->28714 28726->28723 28726->28729 29204 d2aafa 28726->29204 29210 d2ac98 28726->29210 29218 d2b4d5 28726->29218 29232 d43638 GetNativeSystemInfo 28726->29232 29238 d2ae5d 28726->29238 29242 d2ab80 28726->29242 29247 d47e5f ShowWindow 28726->29247 29248 d2b669 28726->29248 29358 d47f6f 28726->29358 29493 d2edd0 28726->29493 29497 d3206a 67 API calls 28726->29497 29499 d414e5 77 API calls 28726->29499 28727 d46cca 28730 d46cd2 28727->28730 28731 d46d0f 28727->28731 28728 d466c1 29443 d2ad7d 124 API calls 2 library calls 28728->29443 28729->28607 28729->28726 28733 d2ad06 114 API calls 28729->28733 29487 d41647 CloseHandle 28729->29487 29488 d48191 SetDlgItemTextW 28729->29488 29489 d417b2 107 API calls 2 library calls 28729->29489 29490 d44e0d 139 API calls 2 library calls 28729->29490 29491 d4806c GetDlgItem ShowWindow GetDlgItem ShowWindow 28729->29491 29492 d47f9c 13 API calls 28729->29492 29498 d41647 CloseHandle 28729->29498 29500 d4263a 184 API calls 3 library calls 28729->29500 29501 d41647 CloseHandle 28729->29501 29502 d4b71a 28729->29502 29510 d2aea6 150 API calls 5 library calls 28729->29510 29511 d41647 CloseHandle 28729->29511 28738 d4c681 87 API calls 28730->28738 28734 d4c681 87 API calls 28731->28734 28733->28729 28739 d46d0a 28734->28739 28735 d46fe9 MessageBoxW 28735->28757 28737 d46231 29419 d48119 SetDlgItemTextW 28737->29419 28738->28739 29462 d417b2 107 API calls 2 library calls 28739->29462 28740 d2b3c2 77 API calls 28761 d46608 ctype 28740->28761 28741 d466ea 29444 d4ee98 RaiseException 28741->29444 28744 d2ab80 6 API calls 28744->28757 28747 d47734 CoUninitialize 28747->28729 28750 d2cf83 77 API calls 28750->28761 28751 d46246 28755 d46276 CoUninitialize 28751->28755 28756 d4626f CloseHandle 28751->28756 28793 d462d3 ctype 28751->28793 28751->28837 28752 d46d4d 29463 d49bb5 92 API calls 2 library calls 28752->29463 28753 d48621 2 API calls 28753->28757 28774 d4628f moneypunct ctype 28755->28774 28756->28755 28757->28670 28757->28690 28757->28694 28757->28706 28757->28708 28757->28719 28757->28735 28757->28744 28757->28753 29452 d3cb4d 166 API calls 28757->29452 29453 d3d679 77 API calls 28757->29453 29454 d4c0b9 28757->29454 29459 d4227f 88 API calls 2 library calls 28757->29459 29474 d480b7 12 API calls 28757->29474 29475 d4868c 6 API calls 28757->29475 29476 d4802a SetEvent 28757->29476 28758 d46d5c 29464 d44e0d 139 API calls 2 library calls 28758->29464 28759 d4c681 87 API calls 28762 d4635c 28759->28762 28761->28717 28761->28728 28761->28740 28761->28750 29420 d48191 SetDlgItemTextW 28762->29420 28763 d46d70 28764 d46dba 28763->28764 28768 d4c681 87 API calls 28763->28768 29466 d4806c GetDlgItem ShowWindow GetDlgItem ShowWindow 28764->29466 28767 d46376 29421 d2b217 28767->29421 28772 d46da0 28768->28772 28769 d46dc6 28804 d46e27 ctype 28769->28804 29467 d437a1 116 API calls 2 library calls 28769->29467 29402 d3f58e 69 API calls 3 library calls 28771->29402 29465 d49b51 92 API calls 2 library calls 28772->29465 28773 d4639a 28782 d4c681 87 API calls 28773->28782 28783 d462c7 FreeLibrary 28774->28783 28774->28793 28776 d4c681 87 API calls 28776->28804 28778 d46dd5 28781 d48621 2 API calls 28778->28781 28779 d45dd4 29403 d49407 DeleteObject DeleteObject ctype 28779->29403 28785 d46de4 28781->28785 28786 d463be 28782->28786 28783->28793 29468 d48700 GetDlgItem SendMessageW SendMessageW SendMessageW SendMessageW 28785->29468 29432 d417b2 107 API calls 2 library calls 28786->29432 28788 d4865d SetDlgItemTextW 28788->28804 28791 d46df1 29469 d4868c 6 API calls 28791->29469 28793->28759 28795 d485e2 GetDlgItem ShowWindow 28795->28804 28797 d463d9 29433 d49bb5 92 API calls 2 library calls 28797->29433 28799 d46dfe 29470 d41c67 121 API calls 2 library calls 28799->29470 28801 d48621 2 API calls 28801->28804 28803 d463ea 28806 d4c681 87 API calls 28803->28806 28804->28776 28804->28788 28804->28795 28804->28801 28808 d46e16 CoUninitialize 28804->28808 29472 d41647 CloseHandle 28804->29472 29473 d47f9c 13 API calls 28804->29473 28805 d46e0a 29471 d41647 CloseHandle 28805->29471 28809 d463fe 28806->28809 28808->28804 29434 d49b51 92 API calls 2 library calls 28809->29434 28812 d46418 29435 d49bb5 92 API calls 2 library calls 28812->29435 28815 d46424 28816 d46478 28815->28816 29436 d49bb5 92 API calls 2 library calls 28815->29436 28817 d4c681 87 API calls 28816->28817 28819 d46486 28817->28819 28822 d4865d SetDlgItemTextW 28819->28822 28820 d4643b 28821 d4c681 87 API calls 28820->28821 28823 d4645e 28821->28823 28824 d464a0 28822->28824 29437 d49b51 92 API calls 2 library calls 28823->29437 29438 d485e2 GetDlgItem ShowWindow 28824->29438 28827 d464ad 29439 d485e2 GetDlgItem ShowWindow 28827->29439 28829 d464bb 29440 d4806c GetDlgItem ShowWindow GetDlgItem ShowWindow 28829->29440 28831 d464c7 29441 d47f9c 13 API calls 28831->29441 28833 d464df 28834 d464ed CoUninitialize 28833->28834 28835 d46500 moneypunct ctype 28834->28835 28836 d46545 FreeLibrary 28835->28836 28835->28837 28836->28837 29442 d3ed80 78 API calls 2 library calls 28837->29442 28838->28396 29512 d3c6d6 28839->29512 28841 d439b1 28842 d4826a 28841->28842 28843 d4827d 28842->28843 29560 d47e29 28843->29560 28846 d48c5f 28847 d48c73 28846->28847 28848 d47e29 ctype 2 API calls 28847->28848 28849 d450ea 28848->28849 28850 d49356 28849->28850 28851 d4936a 28850->28851 28852 d47e29 ctype 2 API calls 28851->28852 28853 d450f9 28852->28853 28854 d3f627 28853->28854 28855 d3f633 __EH_prolog3 28854->28855 29565 d3cf0e 28855->29565 28858 d3fc14 77 API calls 28859 d3f672 28858->28859 28860 d3c6d6 84 API calls 28859->28860 28861 d3f67e 28860->28861 29573 d3cfb6 28861->29573 28863 d3f6aa codecvt 28863->28406 28865 d4cda4 81 API calls 28864->28865 28866 d43706 28865->28866 28867 d4371c CoInitialize 28866->28867 29585 d2d435 114 API calls 2 library calls 28866->29585 28869 d41a4b 28867->28869 28870 d41a57 __EH_prolog3_GS 28869->28870 29586 d4b43d 28870->29586 28872 d41a7e ctype 28873 d4f482 ctype 5 API calls 28872->28873 28874 d41aa1 28873->28874 28875 d44509 28874->28875 28876 d44518 __EH_prolog3_GS 28875->28876 29635 d4442c 28876->29635 28878 d447a5 28879 d448e3 28878->28879 28931 d447c9 ctype 28878->28931 29653 d438ec 77 API calls 3 library calls 28878->29653 28881 d44906 28879->28881 29654 d438ec 77 API calls 3 library calls 28879->29654 28883 d44929 28881->28883 29655 d438ec 77 API calls 3 library calls 28881->29655 28885 d44a73 28883->28885 28890 d44955 28883->28890 29657 d49fab 28885->29657 28886 d4486a 29652 d4240a 88 API calls 2 library calls 28886->29652 28893 d41923 85 API calls 28890->28893 28891 d44a80 28896 d4c681 87 API calls 28891->28896 28892 d44ade 28964 d44c6e ctype 28892->28964 29664 d4c774 78 API calls 2 library calls 28892->29664 28894 d4498c 28893->28894 28898 d449a1 28894->28898 28902 d4c681 87 API calls 28894->28902 28895 d41532 78 API calls 28924 d445b1 ctype 28895->28924 28900 d44aa8 28896->28900 28903 d41957 85 API calls 28898->28903 29663 d4c774 78 API calls 2 library calls 28900->29663 28901 d44cb1 29673 d2b33e 77 API calls 28901->29673 28902->28898 28908 d449ad 28903->28908 28904 d44b37 28909 d4b71a 78 API calls 28904->28909 28906 d44ab1 MessageBoxW 28906->28931 28911 d449be 28908->28911 28915 d4c681 87 API calls 28908->28915 28912 d44b40 28909->28912 28910 d44cc5 29674 d43221 107 API calls 4 library calls 28910->29674 28916 d419c8 96 API calls 28911->28916 28917 d4bda0 81 API calls 28912->28917 28915->28911 28922 d449cc 28916->28922 28919 d44b49 28917->28919 28918 d4f482 ctype 5 API calls 28920 d44e07 28918->28920 28921 d4c9db 79 API calls 28919->28921 28920->28413 28920->28414 28923 d44b60 28921->28923 28928 d4c681 87 API calls 28922->28928 28934 d4bf95 77 API calls 28923->28934 28924->28878 28924->28886 28924->28895 28938 d2b217 77 API calls 28924->28938 28965 d2b3c2 77 API calls 28924->28965 28966 d44812 28924->28966 29642 d438ec 77 API calls 3 library calls 28924->29642 28925 d44cca 28927 d44d0a 28925->28927 29675 d42d1b 89 API calls 2 library calls 28925->29675 28926 d44d8a 28926->28931 28929 d44d4a 28927->28929 29676 d42d1b 89 API calls 2 library calls 28927->29676 28932 d44a1b 28928->28932 28929->28926 29677 d42daf 100 API calls 2 library calls 28929->29677 28931->28918 29656 d4c774 78 API calls 2 library calls 28932->29656 28935 d44b8d 28934->28935 29665 d4cb66 93 API calls 3 library calls 28935->29665 28938->28924 28941 d44bad 28942 d2b36d 77 API calls 28941->28942 28943 d44bbd 28942->28943 28944 d44be0 28943->28944 28945 d2c5d3 77 API calls 28943->28945 28946 d44c03 28944->28946 28948 d2c5d3 77 API calls 28944->28948 28947 d44bd7 28945->28947 28949 d44c26 28946->28949 28952 d2c5d3 77 API calls 28946->28952 29666 d2cf83 77 API calls 28947->29666 28951 d44bfa 28948->28951 29669 d2cf83 77 API calls 28949->29669 29667 d2cf83 77 API calls 28951->29667 28955 d44c1d 28952->28955 29668 d2cf83 77 API calls 28955->29668 28956 d44c33 28957 d2c5d3 77 API calls 28956->28957 28959 d44c42 28957->28959 29670 d2cf83 77 API calls 28959->29670 28961 d44c4f 29671 d4a455 9 API calls 2 library calls 28961->29671 29672 d438ec 77 API calls 3 library calls 28964->29672 28965->28924 28966->28878 29643 d2cf83 77 API calls 28966->29643 29644 d2c5d3 28966->29644 28970 d4bdd6 _memset 28969->28970 28971 d4bded GetTempPathW 28970->28971 28972 d4be07 28971->28972 28973 d4be6d 28971->28973 28972->28973 28974 d4be0b GetTempFileNameW 28972->28974 28976 d4ef49 __ftelli64_nolock 5 API calls 28973->28976 28974->28973 28975 d4be2a 28974->28975 28977 d4a0e5 GetFileAttributesW 28975->28977 28978 d4be80 28976->28978 28979 d4be36 28977->28979 28978->28421 28980 d4be54 28979->28980 28981 d4be3b DeleteFileW 28979->28981 28980->28973 28983 d2b36d 77 API calls 28980->28983 28982 d4a0e5 GetFileAttributesW 28981->28982 28982->28980 28984 d4be67 28983->28984 29681 d4b569 77 API calls 28984->29681 28987 d4c9e7 __EH_prolog3_GS 28986->28987 28988 d4ca05 ctype 28987->28988 28990 d2b3c2 77 API calls 28987->28990 28989 d4f482 ctype 5 API calls 28988->28989 28991 d45390 28989->28991 28992 d4ca16 28990->28992 29005 d4bf95 28991->29005 29682 d4be87 28992->29682 28998 d4ca68 28998->28988 29002 d4ca85 ctype 28998->29002 29000 d2c5d3 77 API calls 29000->29002 29001 d4a119 GetFileAttributesW 29001->29002 29002->29000 29002->29001 29003 d4cae8 CreateDirectoryW 29002->29003 29004 d4cb23 ctype 29002->29004 29705 d2d06d 29002->29705 29003->29002 29003->29004 29006 d4bfdb _memset 29005->29006 29736 d49e7f 29006->29736 29009 d4c011 29010 d4ef49 __ftelli64_nolock 5 API calls 29009->29010 29012 d453b0 29010->29012 29011 d2b36d 77 API calls 29011->29009 29013 d4369f CreateFileW 29012->29013 29014 d436d5 SetFilePointer 29013->29014 29015 d436e0 29013->29015 29014->29015 29016 d2b36d 77 API calls 29015->29016 29017 d436eb 29016->29017 29017->28430 29363 d2ad06 29017->29363 29741 d4c569 29018->29741 29021 d4ef49 __ftelli64_nolock 5 API calls 29022 d45433 29021->29022 29022->28434 29023 d42c06 29022->29023 29024 d42c12 __EH_prolog3_GS 29023->29024 29791 d2cd7a 29024->29791 29027 d42d05 ctype 29029 d4f482 ctype 5 API calls 29027->29029 29028 d42cfc RegCloseKey 29028->29027 29031 d42d15 29029->29031 29030 d42c4c 29036 d42cec ctype 29030->29036 29794 d42b90 29030->29794 29031->28434 29031->28440 29033 d42c89 ctype 29034 d2b3c2 77 API calls 29033->29034 29033->29036 29798 d330dc 67 API calls 29033->29798 29034->29033 29036->29027 29036->29028 29816 d49034 29037->29816 29039 d45659 29044 d41923 29039->29044 29040 d492fc SetWindowTextW 29042 d4930d 29040->29042 29043 d4930f SetDlgItemTextW SetForegroundWindow ShowWindow LoadCursorW SetCursor 29040->29043 29042->29043 29043->29039 29045 d41935 29044->29045 29046 d4b43d 85 API calls 29045->29046 29047 d4194d 29046->29047 29048 d41957 29047->29048 29049 d41969 29048->29049 29050 d41979 29049->29050 29051 d4b43d 85 API calls 29049->29051 29050->28450 29052 d4198a 29051->29052 29052->28450 29054 d419d4 __EH_prolog3_GS 29053->29054 29055 d4b43d 85 API calls 29054->29055 29056 d419fe 29055->29056 29059 d41a05 ctype 29056->29059 29924 d4cd18 88 API calls 3 library calls 29056->29924 29058 d41a2e 29060 d2edd0 67 API calls 29058->29060 29061 d4f482 ctype 5 API calls 29059->29061 29060->29059 29062 d41a1a 29061->29062 29063 d43ed6 29062->29063 29064 d43ee5 __EH_prolog3_GS 29063->29064 29065 d4b43d 85 API calls 29064->29065 29066 d43f36 29065->29066 29070 d43f3d ctype 29066->29070 29925 d4fa7f 67 API calls wcstoxl 29066->29925 29068 d4f482 ctype 5 API calls 29069 d443c4 29068->29069 29092 d43728 29069->29092 29070->29068 29071 d41586 66 API calls 29080 d43f70 _memset ctype 29071->29080 29072 d2cf83 77 API calls 29072->29080 29073 d4b43d 85 API calls 29073->29080 29074 d2b36d 77 API calls 29074->29080 29075 d49d45 FindResourceW LoadResource SizeofResource LockResource 29075->29080 29077 d4bf95 77 API calls 29077->29080 29078 d4be87 77 API calls 29078->29080 29079 d4c9db 79 API calls 29079->29080 29080->29070 29080->29071 29080->29072 29080->29073 29080->29074 29080->29075 29080->29077 29080->29078 29080->29079 29081 d44264 CreateFileW 29080->29081 29091 d4425e ctype 29080->29091 29926 d42b59 77 API calls 29080->29926 29082 d44281 WriteFile 29081->29082 29081->29091 29083 d443c5 GetLastError CloseHandle 29082->29083 29082->29091 29085 d443e3 29083->29085 29084 d38ca3 77 API calls 29084->29091 29927 d2ad7d 124 API calls 2 library calls 29085->29927 29087 d44412 29928 d4ee98 RaiseException 29087->29928 29088 d442d3 CloseHandle 29088->29091 29090 d44426 29091->29080 29091->29081 29091->29084 29091->29088 29093 d43734 __EH_prolog3_GS 29092->29093 29094 d4b43d 85 API calls 29093->29094 29095 d4375b 29094->29095 29097 d4377f ctype 29095->29097 29929 d2b608 114 API calls 2 library calls 29095->29929 29100 d4f482 ctype 5 API calls 29097->29100 29098 d43771 29930 d4ee98 RaiseException 29098->29930 29101 d4379b 29100->29101 29102 d4c83e 29101->29102 29103 d4c84a __EH_prolog3_GS 29102->29103 29104 d4b71a 78 API calls 29103->29104 29105 d4c86a 29104->29105 29106 d4be87 77 API calls 29105->29106 29107 d4c86f ctype 29105->29107 29110 d4c8bc 29106->29110 29108 d4f482 ctype 5 API calls 29107->29108 29109 d45726 29108->29109 29112 d344de 29109->29112 29111 d4bf95 77 API calls 29110->29111 29111->29107 29113 d344f4 29112->29113 29114 d3450d 29113->29114 29115 d2edd0 67 API calls 29113->29115 29114->28481 29382 d2b3ee 125 API calls 29114->29382 29115->29113 29117 d2b36d 77 API calls 29116->29117 29118 d2b3e2 29117->29118 29119 d3eb71 29118->29119 29120 d3eb80 __EH_prolog3_GS 29119->29120 29121 d2b217 77 API calls 29120->29121 29122 d3ebc0 29121->29122 29123 d2b217 77 API calls 29122->29123 29124 d3ebd1 29123->29124 29125 d2b217 77 API calls 29124->29125 29126 d3ebe2 29125->29126 29931 d3e406 29126->29931 29129 d3ecb9 29134 d365c3 77 API calls 29129->29134 29132 d3ec06 29133 d2b36d 77 API calls 29132->29133 29135 d3ec2e 29133->29135 29146 d3ecdf 29134->29146 30028 d3d7e2 29135->30028 29137 d3ec3b 30035 d3e359 29137->30035 29138 d3ed2e 30019 d3b58d 29138->30019 29141 d4ee13 _Allocate 77 API calls 29141->29146 29142 d3ec4e 30041 d3e073 29142->30041 29143 d3ed3c ctype 29148 d4f482 ctype 5 API calls 29143->29148 29146->29138 29146->29141 29147 d3ed53 29146->29147 30050 d40e3a 125 API calls 4 library calls 29146->30050 30051 d3fcf3 77 API calls 29146->30051 30052 d2ad7d 124 API calls 2 library calls 29147->30052 29151 d3ed50 29148->29151 29151->28496 29152 d3ed66 30053 d4ee98 RaiseException 29152->30053 29153 d3ec5a ctype 29153->29129 30049 d408da 67 API calls 3 library calls 29153->30049 29155 d3ed7a 29157 d2b217 77 API calls 29156->29157 29158 d494c6 29157->29158 29159 d2b217 77 API calls 29158->29159 29160 d494d5 29159->29160 29161 d49034 114 API calls 29160->29161 29162 d494eb 29161->29162 29163 d494fe GetDlgItem GetWindowRect GetWindowRect 29162->29163 29172 d495f3 29162->29172 30160 d47db3 29163->30160 29164 d4ef49 __ftelli64_nolock 5 API calls 29166 d458f8 29164->29166 29166->28507 29166->28508 29169 d495b0 6 API calls 30164 d47ee0 29169->30164 29170 d495ae 29170->29169 29172->29164 29174 d3d2ac moneypunct __EH_prolog3_GS 29173->29174 29175 d365c3 77 API calls 29174->29175 29187 d3d598 ctype 29174->29187 29178 d3d31a 29175->29178 29176 d4f482 ctype 5 API calls 29179 d3d5bd 29176->29179 29178->29187 29194 d3d333 ctype 29178->29194 29179->28529 29180 d3d53d ctype 29180->29176 29181 d49e5d 77 API calls 29181->29194 29184 d3d654 30220 d35a4d 77 API calls 29184->30220 29187->29180 29187->29184 30171 d40227 29187->30171 30218 d4020d 77 API calls 29187->30218 30219 d35a4d 77 API calls 29187->30219 29188 d2b217 77 API calls 29188->29194 29189 d2ad06 114 API calls 29189->29194 29190 d40227 125 API calls 29190->29194 29193 d3d541 30217 d35a4d 77 API calls 29193->30217 29194->29180 29194->29181 29194->29188 29194->29189 29194->29190 29194->29193 30211 d2ed1a 29194->30211 30215 d4020d 77 API calls 29194->30215 30216 d35a4d 77 API calls 29194->30216 29197 d4728e 29196->29197 29198 d48668 29196->29198 29200 d48621 29197->29200 29198->29197 29199 d48679 SetDlgItemTextW 29198->29199 29199->29197 29201 d48654 29200->29201 29202 d4862c 29200->29202 29201->28566 29202->29201 29203 d48643 GetDlgItem EnableWindow 29202->29203 29203->29201 29205 d2ab09 29204->29205 29207 d2ab24 29204->29207 30439 d3b7cb 78 API calls 29205->30439 30440 d4b672 77 API calls 2 library calls 29207->30440 29208 d2ab22 29208->28726 29211 d2aca4 __EH_prolog3_GS 29210->29211 29212 d4be87 77 API calls 29211->29212 29213 d2accc 29212->29213 30441 d4f63e 29213->30441 29215 d2ace2 ctype 29216 d4f482 ctype 5 API calls 29215->29216 29217 d2acfe 29216->29217 29217->28726 29219 d2b51e _memset 29218->29219 29220 d2b543 #92 29219->29220 29221 d2b555 #78 29220->29221 29222 d2b595 _wcschr 29220->29222 29221->29222 29223 d2b56d #150 29221->29223 29224 d2b5c0 #8 29222->29224 29225 d2b5cb 29222->29225 29223->29222 29224->29225 29226 d2b5d3 #8 29225->29226 29227 d2b5de 29225->29227 29226->29227 29228 d2b36d 77 API calls 29227->29228 29229 d2b5ec 29228->29229 29230 d4ef49 __ftelli64_nolock 5 API calls 29229->29230 29231 d2b5ff 29230->29231 29231->28726 29233 d43660 29232->29233 29234 d2b36d 77 API calls 29233->29234 29235 d4368d 29234->29235 29236 d4ef49 __ftelli64_nolock 5 API calls 29235->29236 29237 d43698 29236->29237 29237->28726 29239 d2ae6b 29238->29239 29241 d2ae96 29238->29241 29240 d2ac98 89 API calls 29239->29240 29239->29241 29240->29241 29241->28726 29243 d2a9c9 6 API calls 29242->29243 29244 d2ab90 29243->29244 29245 d2a9c9 6 API calls 29244->29245 29246 d2ab9c 29245->29246 29246->28726 29247->28726 29249 d2b678 __EH_prolog3_GS 29248->29249 29250 d2b82a ctype 29249->29250 29251 d2b3c2 77 API calls 29249->29251 29252 d4f482 ctype 5 API calls 29250->29252 29254 d2b69e 29251->29254 29253 d2ba96 29252->29253 29253->28726 29255 d2aafa 78 API calls 29254->29255 29256 d2b6cc 29255->29256 29257 d2ac98 89 API calls 29256->29257 29258 d2b6eb 29257->29258 29259 d2ae5d 89 API calls 29258->29259 29320 d2b822 ctype 29258->29320 29261 d2b6fa 29259->29261 29260 d2b89b 29264 d2ac98 89 API calls 29260->29264 29262 d2b73f 29261->29262 29267 d4a0e5 GetFileAttributesW 29261->29267 29265 d4bcb3 85 API calls 29262->29265 29271 d2b8d4 29264->29271 29266 d2b75c 29265->29266 29270 d4bf95 77 API calls 29266->29270 29266->29320 29269 d2b710 29267->29269 29268 d2b90e 29272 d2ac98 89 API calls 29268->29272 29297 d2bcca ctype 29268->29297 29269->29262 30469 d2ad7d 124 API calls 2 library calls 29269->30469 29273 d2b79c 29270->29273 29271->29268 29274 d2ac98 89 API calls 29271->29274 29276 d2b936 29272->29276 29280 d4a0e5 GetFileAttributesW 29273->29280 29285 d2b8f1 29274->29285 29278 d2b93e 29276->29278 29279 d2babf 29276->29279 29277 d2b72e 30470 d4ee98 RaiseException 29277->30470 29282 d2a9c9 6 API calls 29278->29282 29284 d2ac98 89 API calls 29279->29284 29292 d2b7b7 29280->29292 29283 d2b950 29282->29283 29286 d2a9c9 6 API calls 29283->29286 29287 d2bad4 29284->29287 29285->29268 29288 d2ac98 89 API calls 29285->29288 29289 d2b95d 29286->29289 29290 d2bae2 29287->29290 29291 d2bb9a 29287->29291 29288->29268 30472 d4da53 103 API calls 3 library calls 29289->30472 29294 d2a9c9 6 API calls 29290->29294 29295 d2a9c9 6 API calls 29291->29295 29296 d4c0b9 113 API calls 29292->29296 29292->29320 29301 d2baee 29294->29301 29302 d2bbaa 29295->29302 29298 d2b805 29296->29298 29297->29250 29299 d2b0f4 119 API calls 29297->29299 30452 d2b0f4 29298->30452 29305 d2bd17 29299->29305 29300 d2b981 29306 d2b9e2 ctype 29300->29306 29314 d4bf95 77 API calls 29300->29314 29307 d2a9c9 6 API calls 29301->29307 29303 d2a9c9 6 API calls 29302->29303 29308 d2bbbb 29303->29308 29305->29250 30473 d4c19a 79 API calls __ftelli64_nolock 29305->30473 29309 d4cda4 81 API calls 29306->29309 29319 d2ba11 GetProcAddress 29306->29319 29310 d2bafa 29307->29310 29311 d4cda4 81 API calls 29308->29311 29313 d2ba06 29309->29313 29316 d4c0b9 113 API calls 29310->29316 29317 d2bbc5 29311->29317 29313->29319 29340 d2bab4 ctype 29313->29340 29315 d2b9be 29314->29315 29315->29306 29331 d4c3c8 78 API calls 29315->29331 29321 d2bb29 29316->29321 29322 d2bbd4 GetProcAddress 29317->29322 29317->29340 29318 d2bd3e 29318->29250 29323 d2bd48 29318->29323 29324 d2ba2b 29319->29324 29325 d2baad FreeLibrary 29319->29325 29320->29250 29320->29260 30471 d3b0bc 121 API calls 29320->30471 29326 d2b36d 77 API calls 29321->29326 29327 d2bc4a FreeLibrary 29322->29327 29328 d2bbea 29322->29328 29338 d4c681 87 API calls 29323->29338 29329 d2a9c9 6 API calls 29324->29329 29325->29340 29330 d2bb49 29326->29330 29327->29340 29332 d2a9c9 6 API calls 29328->29332 29333 d2ba41 29329->29333 29335 d2b0f4 119 API calls 29330->29335 29331->29306 29337 d2bc00 29332->29337 29334 d2a9c9 6 API calls 29333->29334 29339 d2ba4d 29334->29339 29335->29340 29336 d4c0b9 113 API calls 29341 d2bc91 29336->29341 29342 d2a9c9 6 API calls 29337->29342 29343 d2bd80 29338->29343 29350 d2ba66 FreeLibrary 29339->29350 29351 d2ba99 29339->29351 29340->29250 29340->29297 29340->29336 29344 d2b36d 77 API calls 29341->29344 29345 d2bc0c 29342->29345 30474 d2b608 114 API calls 2 library calls 29343->30474 29347 d2bcb1 29344->29347 29353 d2bc36 29345->29353 29354 d2bc25 FreeLibrary 29345->29354 29349 d2b0f4 119 API calls 29347->29349 29348 d2bd9c 29349->29297 29350->29250 29352 d2ad06 114 API calls 29351->29352 29356 d2baaa 29352->29356 29355 d2ad06 114 API calls 29353->29355 29354->29250 29357 d2bc47 29355->29357 29356->29325 29357->29327 30475 d47e82 29358->30475 29361->28458 29364 d2ad12 __EH_prolog3_GS 29363->29364 29365 d4c024 113 API calls 29364->29365 29366 d2ad3f 29365->29366 29367 d2a9c9 6 API calls 29366->29367 29368 d2ad5a 29367->29368 29369 d2a9c9 6 API calls 29368->29369 29370 d2ad66 ctype 29369->29370 29371 d4f482 ctype 5 API calls 29370->29371 29372 d2ad77 29371->29372 29372->28430 29374 d2aa10 29373->29374 29375 d2a9e5 WriteFile 29373->29375 29376 d4ef49 __ftelli64_nolock 5 API calls 29374->29376 29375->29374 29378 d2aa1b 29376->29378 29378->28445 29379->28452 29380->28514 29382->28494 29383->28481 29385 d4a110 29384->29385 29386 d4a0f1 29384->29386 29385->28517 29386->29385 29387 d4a0f7 GetFileAttributesW 29386->29387 29388 d4a103 29387->29388 29388->28517 29389->28527 29390->28533 29391->28551 29392->28579 29393->28590 29394->28626 29395->28596 29396->28610 29397->28641 29398->28651 29399->28660 29400->28668 29401->28689 29402->28779 29404->28536 29405->28554 29406->28560 29407->28696 29409->28575 29410->28586 29411->28598 29412->28604 29413->28616 29414->28656 29415->28678 29416->28688 29417->28725 29418->28737 29419->28751 29420->28767 29422 d2b238 29421->29422 29423 d2b22e 29421->29423 29425 d2b246 29422->29425 29426 d2b25e 29422->29426 30482 d62972 67 API calls 3 library calls 29423->30482 29428 d2aa74 67 API calls 29425->29428 29427 d2aded 77 API calls 29426->29427 29431 d2b25c _memmove 29427->29431 29429 d2b250 29428->29429 29430 d2aa74 67 API calls 29429->29430 29430->29431 29431->28773 29432->28797 29433->28803 29434->28812 29435->28815 29436->28820 29437->28816 29438->28827 29439->28829 29440->28831 29441->28833 29442->28761 29443->28741 29444->28717 29445->28545 29446->28553 29447->28567 29448->28587 29449->28594 29450->28622 29451->28757 29452->28757 29453->28757 29455 d4c024 113 API calls 29454->29455 29456 d4c0e0 29455->29456 29457 d4ef49 __ftelli64_nolock 5 API calls 29456->29457 29458 d4c0ed 29457->29458 29458->28757 29459->28757 29460->28721 29461->28727 29462->28752 29463->28758 29464->28763 29465->28764 29466->28769 29467->28778 29468->28791 29469->28799 29470->28805 29471->28808 29472->28804 29473->28804 29474->28757 29475->28757 29476->28757 29477->28595 29478->28606 29479->28644 29480->28612 29481->28632 29482->28669 29483->28633 29484->28647 29485->28658 29486->28729 29487->28583 29488->28729 29489->28729 29490->28729 29491->28729 29492->28729 29494 d2eddc 29493->29494 29494->29494 29495 d2ed1a 67 API calls 29494->29495 29496 d2edf9 29495->29496 29496->28726 29497->28726 29498->28747 29499->28726 29500->28729 29501->28681 29503 d4f6d0 _memset 29502->29503 29504 d4b747 GetModuleFileNameW 29503->29504 29505 d4b767 29504->29505 29506 d4b763 29504->29506 29505->29506 29507 d2b36d 77 API calls 29505->29507 29508 d4ef49 __ftelli64_nolock 5 API calls 29506->29508 29507->29506 29509 d4b787 29508->29509 29509->28729 29510->28729 29511->28705 29513 d3c6e2 __EH_prolog3 29512->29513 29518 d3b325 29513->29518 29515 d3c6f7 29526 d3a702 29515->29526 29517 d3c704 codecvt 29517->28841 29519 d4ee13 _Allocate 77 API calls 29518->29519 29520 d3b33b 29519->29520 29521 d3b340 29520->29521 29533 d4ed02 66 API calls std::exception::_Copy_str 29520->29533 29521->29515 29523 d3b376 29534 d4ee98 RaiseException 29523->29534 29525 d3b38b ctype 29525->29515 29535 d4f37d 29526->29535 29528 d3a70e InitializeCriticalSection 29536 d4cda4 29528->29536 29531 d3a787 GetProcAddress GetProcAddress 29532 d3a7ab codecvt 29531->29532 29532->29517 29533->29523 29534->29525 29535->29528 29550 d4f6d0 29536->29550 29538 d4cdd9 GetSystemDirectoryW 29539 d4cdf7 29538->29539 29540 d4ce09 _memset 29538->29540 29552 d4c3c8 29539->29552 29542 d4ce1e GetWindowsDirectoryW 29540->29542 29543 d4ce58 29540->29543 29544 d4ce34 29542->29544 29545 d4ce4c LoadLibraryW 29542->29545 29546 d4ef49 __ftelli64_nolock 5 API calls 29543->29546 29547 d4c3c8 78 API calls 29544->29547 29545->29543 29548 d3a77f 29546->29548 29549 d4ce46 29547->29549 29548->29531 29548->29532 29549->29543 29549->29545 29551 d4f6dc 29550->29551 29551->29538 29551->29551 29553 d4c3d4 __EH_prolog3_GS 29552->29553 29554 d4bf95 77 API calls 29553->29554 29555 d4c3fc 29554->29555 29556 d4c418 ctype 29555->29556 29557 d4c40f LoadLibraryW 29555->29557 29558 d4f482 ctype 5 API calls 29556->29558 29557->29556 29559 d4c42a 29558->29559 29559->29540 29561 d47e42 DeleteObject 29560->29561 29562 d47e49 29560->29562 29561->29562 29563 d450db 29562->29563 29564 d47e50 DeleteObject 29562->29564 29563->28846 29564->29563 29566 d4ee13 _Allocate 77 API calls 29565->29566 29568 d3cf24 29566->29568 29567 d3cf29 29567->28858 29568->29567 29581 d4ed02 66 API calls std::exception::_Copy_str 29568->29581 29570 d3cf5f 29582 d4ee98 RaiseException 29570->29582 29572 d3cf74 29574 d4ee13 _Allocate 77 API calls 29573->29574 29575 d3cfcc 29574->29575 29576 d3cfd1 29575->29576 29583 d4ed02 66 API calls std::exception::_Copy_str 29575->29583 29576->28863 29578 d3d007 29584 d4ee98 RaiseException 29578->29584 29580 d3d01c 29581->29570 29582->29572 29583->29578 29584->29580 29587 d4b449 __EH_prolog3 29586->29587 29588 d4b468 FindResourceW 29587->29588 29598 d4b507 codecvt ctype 29587->29598 29589 d4b48c LoadResource 29588->29589 29588->29598 29590 d4b49d SizeofResource 29589->29590 29589->29598 29591 d4b4b1 LockResource 29590->29591 29592 d4b4ad _memmove 29590->29592 29591->29592 29599 d4b080 29592->29599 29594 d4b4e5 29603 d49d45 29594->29603 29596 d4b500 29596->29598 29610 d2b36d 29596->29610 29598->28872 29600 d4b0ae 29599->29600 29602 d4b09c 29599->29602 29600->29602 29614 d4ad7b 29600->29614 29602->29594 29604 d49d57 29603->29604 29605 d49d60 FindResourceW 29603->29605 29604->29605 29609 d49d5b _memmove 29604->29609 29606 d49d78 LoadResource 29605->29606 29605->29609 29607 d49d89 SizeofResource 29606->29607 29606->29609 29608 d49d9d LockResource 29607->29608 29607->29609 29608->29609 29609->29596 29611 d2b379 29610->29611 29611->29611 29628 d2b2b9 29611->29628 29613 d2b391 29613->29598 29615 d4ad98 29614->29615 29618 d4ada2 29614->29618 29626 d6291b 67 API calls 3 library calls 29615->29626 29617 d4adc0 29617->29602 29618->29617 29620 d4a6f0 29618->29620 29621 d4a701 29620->29621 29622 d4a70b 29620->29622 29627 d6291b 67 API calls 3 library calls 29621->29627 29624 d2a954 _Allocate 77 API calls 29622->29624 29625 d4a723 ctype _memmove 29622->29625 29624->29625 29625->29617 29626->29618 29627->29622 29629 d2b2cb 29628->29629 29630 d2b2cf 29629->29630 29631 d2b2ed 29629->29631 29633 d2b217 77 API calls 29630->29633 29632 d2aded 77 API calls 29631->29632 29634 d2b2eb _memmove 29632->29634 29633->29634 29634->29613 29640 d44438 __EH_prolog3_GS ctype 29635->29640 29636 d444fe 29637 d4f482 ctype 5 API calls 29636->29637 29638 d44503 29637->29638 29638->28924 29640->29636 29641 d3570e 77 API calls 29640->29641 29678 d38ca3 77 API calls 29640->29678 29641->29640 29642->28924 29643->28966 29645 d2c5f1 29644->29645 29646 d2c5e7 29644->29646 29648 d2c613 29645->29648 29680 d6291b 67 API calls 3 library calls 29645->29680 29679 d62972 67 API calls 3 library calls 29646->29679 29650 d2aded 77 API calls 29648->29650 29651 d2c625 _memmove 29648->29651 29650->29651 29651->28966 29652->28931 29653->28879 29654->28881 29655->28883 29656->28931 29658 d4f6d0 _memset 29657->29658 29659 d49fdb GetVersionExW 29658->29659 29660 d49ff9 29659->29660 29661 d4ef49 __ftelli64_nolock 5 API calls 29660->29661 29662 d44a7a 29661->29662 29662->28891 29662->28892 29663->28906 29664->28904 29665->28941 29666->28944 29667->28946 29668->28949 29669->28956 29670->28961 29671->28964 29672->28901 29673->28910 29674->28925 29675->28927 29676->28929 29677->28926 29678->29640 29679->29645 29680->29648 29681->28973 29683 d4bee3 _memset 29682->29683 29708 d51a79 29683->29708 29686 d4bf3f 29688 d4bf55 29686->29688 29690 d2b36d 77 API calls 29686->29690 29687 d2b36d 77 API calls 29687->29686 29689 d4bf6b 29688->29689 29691 d2b36d 77 API calls 29688->29691 29692 d4bf84 29689->29692 29693 d2b36d 77 API calls 29689->29693 29690->29688 29691->29689 29694 d4ef49 __ftelli64_nolock 5 API calls 29692->29694 29693->29692 29695 d4bf8e 29694->29695 29696 d4b199 29695->29696 29697 d4b1ac 29696->29697 29698 d3570e 77 API calls 29697->29698 29699 d4b1c7 29697->29699 29698->29699 29700 d4a119 29699->29700 29701 d4a144 29700->29701 29702 d4a125 29700->29702 29701->28998 29702->29701 29703 d4a12b GetFileAttributesW 29702->29703 29704 d4a137 29703->29704 29704->28998 29733 d2cdac 29705->29733 29709 d51a92 29708->29709 29710 d51b17 29708->29710 29709->29710 29717 d4f77e __wsplitpath_s 66 API calls 29709->29717 29722 d51b03 29709->29722 29711 d51c65 29710->29711 29713 d51c7d 29710->29713 29730 d55429 66 API calls __getptd_noexit 29711->29730 29732 d55429 66 API calls __getptd_noexit 29713->29732 29714 d51c6a 29731 d553cd 11 API calls __stricmp_l 29714->29731 29717->29722 29718 d51be8 29718->29710 29719 d4bf2d 29718->29719 29723 d51bf6 29718->29723 29719->29686 29719->29687 29720 d51ba3 29720->29710 29721 d51bc0 29720->29721 29725 d4f77e __wsplitpath_s 66 API calls 29720->29725 29721->29710 29721->29719 29726 d51bd6 29721->29726 29722->29710 29728 d4f77e __wsplitpath_s 66 API calls 29722->29728 29729 d51b83 29722->29729 29724 d4f77e __wsplitpath_s 66 API calls 29723->29724 29724->29719 29725->29721 29727 d4f77e __wsplitpath_s 66 API calls 29726->29727 29727->29719 29728->29729 29729->29718 29729->29720 29730->29714 29731->29719 29732->29719 29734 d2b217 77 API calls 29733->29734 29735 d2cdd2 29734->29735 29735->29002 29737 d49e95 29736->29737 29739 d49e8e 29736->29739 29737->29739 29740 d5195b 66 API calls __stricmp_l 29737->29740 29739->29009 29739->29011 29740->29739 29742 d4c578 __EH_prolog3_GS 29741->29742 29760 d41586 29742->29760 29745 d4b43d 85 API calls 29746 d4c5d7 29745->29746 29747 d4c5de 29746->29747 29749 d4c5f4 29746->29749 29748 d2b36d 77 API calls 29747->29748 29751 d4c5ea ctype 29748->29751 29763 d4b607 77 API calls 29749->29763 29755 d4f482 ctype 5 API calls 29751->29755 29752 d4c60a 29764 d4b607 77 API calls 29752->29764 29754 d4c620 FormatMessageW 29758 d2b36d 77 API calls 29754->29758 29757 d4c67b 29755->29757 29757->29021 29759 d4c65c LocalFree 29758->29759 29759->29751 29765 d5176f 29760->29765 29763->29752 29764->29754 29766 d5177c 29765->29766 29769 d5168b 29766->29769 29770 d516b0 29769->29770 29771 d5169a 29769->29771 29773 d516b6 29770->29773 29774 d516e6 29770->29774 29775 d516dd 29770->29775 29785 d55429 66 API calls __getptd_noexit 29771->29785 29787 d55429 66 API calls __getptd_noexit 29773->29787 29774->29773 29782 d516f1 29774->29782 29789 d55429 66 API calls __getptd_noexit 29775->29789 29776 d5169f 29786 d553cd 11 API calls __stricmp_l 29776->29786 29781 d4159e 29781->29745 29782->29781 29790 d55429 66 API calls __getptd_noexit 29782->29790 29784 d516bb 29788 d553cd 11 API calls __stricmp_l 29784->29788 29785->29776 29786->29781 29787->29784 29788->29781 29789->29784 29790->29784 29799 d2c59b 29791->29799 29793 d2cda0 RegOpenKeyExW 29793->29030 29793->29036 29795 d42baa 29794->29795 29797 d42bb7 29794->29797 29809 d429c4 29795->29809 29797->29033 29798->29033 29802 d2c095 29799->29802 29801 d2c5ad 29801->29793 29803 d2c0b3 29802->29803 29804 d2c0af 29802->29804 29805 d2c0c5 29803->29805 29808 d6291b 67 API calls 3 library calls 29803->29808 29804->29801 29807 d2a954 _Allocate 77 API calls 29805->29807 29807->29804 29808->29805 29810 d42a20 ctype _memmove 29809->29810 29811 d429db 29809->29811 29810->29797 29813 d429fc 29811->29813 29815 d6291b 67 API calls 3 library calls 29811->29815 29813->29810 29814 d2a954 _Allocate 77 API calls 29813->29814 29814->29810 29815->29813 29817 d49043 __EH_prolog3_GS 29816->29817 29818 d4923c 29817->29818 29820 d49090 SystemParametersInfoW 29817->29820 29819 d4f482 ctype 5 API calls 29818->29819 29821 d4929c 29819->29821 29822 d490ab 29820->29822 29821->29039 29821->29040 29823 d344de 67 API calls 29822->29823 29824 d490c3 29823->29824 29825 d49190 FindResourceW 29824->29825 29842 d365c3 29824->29842 29827 d491a6 LoadResource 29825->29827 29828 d4920f numpunct 29825->29828 29827->29828 29831 d491b4 LockResource SizeofResource 29827->29831 29829 d49235 29828->29829 29830 d49215 CreateDialogParamW 29828->29830 29829->29818 29890 d47ce1 9 API calls __ftelli64_nolock 29829->29890 29830->29829 29870 d394d4 29831->29870 29834 d49181 ctype 29834->29825 29836 d49262 MoveWindow SetForegroundWindow 29836->29818 29838 d491e3 CreateDialogIndirectParamW 29838->29828 29839 d2edd0 67 API calls 29841 d490f3 ctype 29839->29841 29841->29834 29841->29839 29849 d3179e 29841->29849 29852 d48acf 29841->29852 29847 d365f5 moneypunct 29842->29847 29843 d36621 29845 d4ef49 __ftelli64_nolock 5 API calls 29843->29845 29844 d2edd0 67 API calls 29844->29847 29846 d3662e 29845->29846 29846->29841 29847->29843 29847->29844 29891 d35a4d 77 API calls 29847->29891 29892 d4bc4a 29849->29892 29851 d317b2 29851->29841 29913 d4f3f0 29852->29913 29854 d48ade GetDC 29855 d48c47 ctype 29854->29855 29856 d48b08 29854->29856 29857 d4f482 ctype 5 API calls 29855->29857 29914 d49e5d 77 API calls 29856->29914 29859 d48c57 29857->29859 29859->29841 29860 d48b40 29860->29855 29915 d4a574 78 API calls 3 library calls 29860->29915 29862 d48b5d 29862->29855 29916 d4a574 78 API calls 3 library calls 29862->29916 29864 d48b7a 29864->29855 29917 d4a574 78 API calls 3 library calls 29864->29917 29866 d48b97 _memset 29866->29855 29867 d48be9 EnumFontFamiliesExW 29866->29867 29867->29855 29868 d48c08 CreateFontIndirectW 29867->29868 29868->29855 29871 d39511 29870->29871 29879 d3951e numpunct 29870->29879 29871->29879 29918 d393c7 GetDC 29871->29918 29872 d4ef49 __ftelli64_nolock 5 API calls 29873 d39bd6 29872->29873 29873->29828 29873->29838 29876 d3956d SelectObject 29887 d3958d _memset _memmove numpunct 29876->29887 29877 d39b90 DeleteDC 29877->29879 29879->29872 29880 d39490 67 API calls 29880->29887 29881 d39463 67 API calls 29881->29887 29882 d39764 GetDeviceCaps GetObjectW 29882->29887 29883 d39756 lstrlenW 29883->29882 29884 d39a11 MulDiv 29885 d39a37 MulDiv DrawTextW 29884->29885 29884->29887 29885->29887 29886 d39adc MulDiv 29886->29887 29887->29877 29887->29880 29887->29881 29887->29882 29887->29883 29887->29884 29887->29886 29888 d39ab9 GetSystemMetrics 29887->29888 29888->29887 29889 d39ac8 GetSystemMetrics 29888->29889 29889->29887 29890->29836 29891->29847 29893 d4bc56 __EH_prolog3 29892->29893 29894 d2b3c2 77 API calls 29893->29894 29895 d4bc68 29894->29895 29900 d4ae13 29895->29900 29897 d4bc7b ctype 29898 d2b217 77 API calls 29897->29898 29899 d4bca2 codecvt 29897->29899 29898->29899 29899->29851 29907 d4a678 29900->29907 29902 d4ae49 29905 d4ef49 __ftelli64_nolock 5 API calls 29902->29905 29906 d4ae6e 29905->29906 29906->29897 29910 d4a689 29907->29910 29908 d4a6a7 29908->29902 29911 d3206a 67 API calls 29908->29911 29910->29908 29912 d3206a 67 API calls 29910->29912 29911->29902 29912->29910 29913->29854 29914->29860 29915->29862 29916->29864 29917->29866 29919 d39436 GetDialogBaseUnits 29918->29919 29920 d393eb SelectObject GetTextMetricsW GetTextExtentPoint32W SelectObject 29918->29920 29921 d39446 ReleaseDC 29919->29921 29920->29921 29922 d4ef49 __ftelli64_nolock 5 API calls 29921->29922 29923 d3945c CreateCompatibleDC 29922->29923 29923->29876 29923->29879 29924->29058 29925->29080 29926->29080 29927->29087 29928->29090 29929->29098 29930->29097 29932 d3e415 __EH_prolog3_GS 29931->29932 30054 d4d303 29932->30054 29935 d3d73e 77 API calls 29936 d3e49b 29935->29936 29937 d2b36d 77 API calls 29936->29937 29938 d3e4bb 29937->29938 29939 d3d7e2 77 API calls 29938->29939 29940 d3e4e0 29939->29940 29941 d3e359 77 API calls 29940->29941 29942 d3e4f3 29941->29942 29943 d3e073 67 API calls 29942->29943 29944 d3e4ff ctype 29943->29944 29945 d49fab 6 API calls 29944->29945 29946 d3e54d 29945->29946 30064 d4d20f 29946->30064 29951 d3e571 30119 d301ec 77 API calls 29951->30119 29952 d3e59d 30120 d35a4d 77 API calls 29952->30120 29955 d3e5b2 29957 d3e5c4 29955->29957 30121 d35a4d 77 API calls 29955->30121 29956 d3e581 29958 d4c0b9 113 API calls 29956->29958 29960 d4c0b9 113 API calls 29957->29960 29961 d3e598 29958->29961 29960->29961 30091 d3d790 29961->30091 29963 d3e5ea 29964 d3e5f2 29963->29964 29965 d3e63a 29963->29965 29967 d2b36d 77 API calls 29964->29967 29966 d2b36d 77 API calls 29965->29966 29968 d3e657 29966->29968 29969 d3e60f 29967->29969 29970 d3d7e2 77 API calls 29968->29970 29971 d3d7e2 77 API calls 29969->29971 29972 d3e634 29970->29972 29971->29972 29973 d3e359 77 API calls 29972->29973 29974 d3e68f 29973->29974 29975 d3e073 67 API calls 29974->29975 29976 d3e69b ctype 29975->29976 29977 d2b36d 77 API calls 29976->29977 29978 d3e706 29977->29978 29979 d3d7e2 77 API calls 29978->29979 29980 d3e72b 29979->29980 29981 d3e359 77 API calls 29980->29981 29982 d3e73e 29981->29982 29983 d3e073 67 API calls 29982->29983 29984 d3e74a ctype 29983->29984 29985 d3e7f1 29984->29985 29986 d3e799 29984->29986 29987 d3e7f9 29985->29987 29988 d3e84e 29985->29988 29989 d3d73e 77 API calls 29986->29989 29991 d3d73e 77 API calls 29987->29991 29990 d3d73e 77 API calls 29988->29990 29992 d3e7a3 29989->29992 29994 d3e858 29990->29994 29995 d3e803 29991->29995 29993 d2b36d 77 API calls 29992->29993 29996 d3e7c3 29993->29996 29997 d2b36d 77 API calls 29994->29997 29998 d2b36d 77 API calls 29995->29998 30001 d3d7e2 77 API calls 29996->30001 29999 d3e878 29997->29999 30000 d3e823 29998->30000 30003 d3d7e2 77 API calls 29999->30003 30004 d3d7e2 77 API calls 30000->30004 30002 d3e7e8 30001->30002 30005 d3e359 77 API calls 30002->30005 30003->30002 30004->30002 30006 d3e8b0 30005->30006 30007 d3e073 67 API calls 30006->30007 30008 d3e8bc ctype 30007->30008 30009 d2a9c9 6 API calls 30008->30009 30011 d3e97a ctype 30008->30011 30010 d3e914 30009->30010 30012 d2a9c9 6 API calls 30010->30012 30013 d4f482 ctype 5 API calls 30011->30013 30018 d3e920 30012->30018 30014 d3e992 30013->30014 30014->29153 30024 d3d73e 30014->30024 30017 d2a9c9 6 API calls 30017->30018 30018->30011 30018->30017 30095 d3d0ac 30018->30095 30103 d3d863 30018->30103 30020 d3b5f7 30019->30020 30021 d3b5b3 30019->30021 30020->29143 30021->30020 30023 d2b217 77 API calls 30021->30023 30142 d3b440 77 API calls 3 library calls 30021->30142 30023->30021 30025 d3d74a __EH_prolog3 30024->30025 30026 d2b36d 77 API calls 30025->30026 30027 d3d781 codecvt 30026->30027 30027->29132 30029 d3d7ee __EH_prolog3 30028->30029 30030 d3d845 30029->30030 30032 d3d821 30029->30032 30031 d2b217 77 API calls 30030->30031 30033 d3d833 codecvt 30031->30033 30032->30033 30034 d3040b 77 API calls 30032->30034 30033->29137 30034->30033 30036 d3e365 __EH_prolog3_catch 30035->30036 30143 d3cd7b 30036->30143 30040 d3e384 codecvt 30040->29142 30044 d3e09a 30041->30044 30046 d3e0dc 30041->30046 30042 d3206a 67 API calls 30042->30044 30044->30042 30044->30046 30045 d3e0f2 30048 d3e0ff ctype 30045->30048 30158 d3dadd 67 API calls 2 library calls 30045->30158 30046->30045 30159 d3206a 67 API calls 30046->30159 30048->29153 30049->29153 30050->29146 30051->29146 30052->29152 30053->29155 30055 d4cda4 81 API calls 30054->30055 30056 d4d32e 30055->30056 30057 d4d335 GetProcAddress 30056->30057 30058 d4d358 GetSystemInfo 30056->30058 30059 d4d345 GetNativeSystemInfo 30057->30059 30060 d4d34d FreeLibrary 30057->30060 30061 d4d362 30058->30061 30059->30060 30060->30058 30060->30061 30062 d4ef49 __ftelli64_nolock 5 API calls 30061->30062 30063 d3e446 30062->30063 30063->29935 30065 d4d29a 30064->30065 30066 d4d22f 30064->30066 30068 d4ef49 __ftelli64_nolock 5 API calls 30065->30068 30066->30065 30067 d4cda4 81 API calls 30066->30067 30070 d4d243 30067->30070 30069 d3e55b 30068->30069 30081 d4a02a 30069->30081 30071 d4d257 GetProcAddress 30070->30071 30072 d4d270 30070->30072 30071->30072 30073 d4d263 30071->30073 30072->30065 30074 d4cda4 81 API calls 30072->30074 30075 d4d2e4 FreeLibrary 30073->30075 30076 d4d2a8 30074->30076 30075->30065 30077 d4d2d0 FreeLibrary 30076->30077 30078 d4d2b3 GetProcAddress 30076->30078 30080 d4d2de 30077->30080 30079 d4d2bf 30078->30079 30079->30077 30080->30075 30082 d4f6d0 _memset 30081->30082 30083 d4a058 GetVersionExW 30082->30083 30084 d4a074 30083->30084 30085 d4a07e GetVersionExW 30083->30085 30088 d4ef49 __ftelli64_nolock 5 API calls 30084->30088 30086 d4a095 30085->30086 30089 d4a0c8 30085->30089 30087 d4a0a7 CompareStringW 30086->30087 30086->30089 30087->30089 30090 d3e567 30088->30090 30089->30084 30090->29951 30090->29952 30092 d3d79c __EH_prolog3 30091->30092 30122 d3040b 30092->30122 30094 d3d7d3 codecvt 30094->29963 30096 d3d0b8 __EH_prolog3_GS 30095->30096 30127 d4c024 30096->30127 30098 d3d0e5 30099 d2a9c9 6 API calls 30098->30099 30100 d3d100 ctype 30099->30100 30101 d4f482 ctype 5 API calls 30100->30101 30102 d3d111 30101->30102 30102->30018 30104 d3d86f __EH_prolog3_GS 30103->30104 30105 d3d8f3 30104->30105 30106 d3d897 30104->30106 30109 d4c0b9 113 API calls 30105->30109 30107 d3d89a 30106->30107 30108 d3d8ac 30106->30108 30110 d2b36d 77 API calls 30107->30110 30141 d3d022 113 API calls 30108->30141 30112 d3d8a7 ctype 30109->30112 30110->30112 30115 d2a9c9 6 API calls 30112->30115 30113 d3d8c8 30114 d4c0b9 113 API calls 30113->30114 30114->30112 30116 d3d945 ctype 30115->30116 30117 d4f482 ctype 5 API calls 30116->30117 30118 d3d955 30117->30118 30118->30018 30119->29956 30120->29955 30121->29957 30123 d30435 30122->30123 30124 d30419 moneypunct 30122->30124 30123->30094 30126 d2cfb1 77 API calls 30124->30126 30126->30123 30128 d4c030 __EH_prolog3 30127->30128 30129 d2c59b 77 API calls 30128->30129 30130 d4c061 30129->30130 30131 d42b90 77 API calls 30130->30131 30133 d4c097 30130->30133 30136 d4a2af 30130->30136 30131->30130 30134 d2b36d 77 API calls 30133->30134 30135 d4c0a6 codecvt ctype 30133->30135 30134->30135 30135->30098 30137 d4a2bb 30136->30137 30138 d4a2e1 30137->30138 30140 d49cfa 102 API calls _vswprintf_s 30137->30140 30138->30130 30140->30138 30141->30113 30142->30021 30144 d4ee13 _Allocate 77 API calls 30143->30144 30145 d3cd8d 30144->30145 30146 d3cd94 30145->30146 30155 d4ed02 66 API calls std::exception::_Copy_str 30145->30155 30151 d3dc15 30146->30151 30148 d3cdbb 30156 d4ee98 RaiseException 30148->30156 30150 d3cdd0 30152 d3dc21 __EH_prolog3 30151->30152 30154 d3dc3c codecvt 30152->30154 30157 d3d9aa 77 API calls 2 library calls 30152->30157 30154->30040 30155->30148 30156->30150 30157->30154 30158->30048 30159->30045 30161 d47dc0 30160->30161 30163 d47de5 SetWindowTextW 30160->30163 30162 d47dca SendDlgItemMessageW 30161->30162 30161->30163 30162->30162 30162->30163 30163->29169 30163->29170 30165 d47f26 PeekMessageW 30164->30165 30166 d47f35 30165->30166 30167 d47f01 IsDialogMessageW 30165->30167 30168 d4ef49 __ftelli64_nolock 5 API calls 30166->30168 30167->30165 30169 d47f12 TranslateMessage DispatchMessageW 30167->30169 30170 d47f42 30168->30170 30169->30165 30170->29172 30172 d40236 __EH_prolog3_GS 30171->30172 30173 d3d0ac 114 API calls 30172->30173 30174 d40254 30173->30174 30221 d3fa57 30174->30221 30177 d2a9c9 6 API calls 30187 d4026f ctype 30177->30187 30178 d403f1 30180 d40480 30178->30180 30183 d2ad06 114 API calls 30178->30183 30179 d2b217 77 API calls 30179->30187 30181 d404a5 moneypunct 30180->30181 30182 d404d0 30180->30182 30229 d3fe53 30181->30229 30248 d40068 125 API calls 2 library calls 30182->30248 30193 d40416 30183->30193 30186 d2a9c9 6 API calls 30186->30187 30187->30178 30187->30179 30187->30186 30189 d2ad06 114 API calls 30187->30189 30192 d3d863 114 API calls 30187->30192 30203 d3d7e2 77 API calls 30187->30203 30205 d3e359 77 API calls 30187->30205 30207 d3e073 67 API calls 30187->30207 30225 d2c35d 30187->30225 30188 d404ce 30191 d3d0ac 114 API calls 30188->30191 30189->30187 30190 d3d0ac 114 API calls 30190->30193 30195 d4055b 30191->30195 30192->30187 30193->30180 30193->30190 30194 d3d863 114 API calls 30193->30194 30197 d2a9c9 6 API calls 30193->30197 30194->30193 30240 d3f9aa 30195->30240 30197->30193 30199 d2a9c9 6 API calls 30200 d40579 30199->30200 30249 d3fc6a 5 API calls __ftelli64_nolock 30200->30249 30202 d40587 30204 d2b217 77 API calls 30202->30204 30203->30187 30206 d405c1 ctype 30204->30206 30205->30187 30208 d4f482 ctype 5 API calls 30206->30208 30207->30187 30209 d405d4 30208->30209 30209->29187 30212 d2ed2b 30211->30212 30214 d2ed35 30211->30214 30438 d62972 67 API calls 3 library calls 30212->30438 30214->29194 30215->29194 30216->29194 30217->29180 30218->29187 30219->29187 30220->29180 30222 d3fa64 30221->30222 30223 d2a9c9 6 API calls 30222->30223 30224 d3fa9f 30222->30224 30223->30224 30224->30177 30226 d2c369 30225->30226 30250 d2c173 30226->30250 30237 d3fe5f __EH_prolog3_GS ctype 30229->30237 30230 d3feea 30232 d2b217 77 API calls 30230->30232 30235 d3feff ctype 30232->30235 30233 d3ff13 30234 d2b217 77 API calls 30233->30234 30234->30235 30238 d4f482 ctype 5 API calls 30235->30238 30237->30230 30237->30233 30314 d2fbdc 30237->30314 30331 d35a4d 77 API calls 30237->30331 30239 d3ff10 30238->30239 30239->30188 30241 d3fa02 30240->30241 30242 d3f9ba 30240->30242 30243 d2a9c9 6 API calls 30241->30243 30245 d3fa18 30241->30245 30246 d2a9c9 6 API calls 30242->30246 30243->30245 30244 d3fa2e 30244->30199 30245->30244 30247 d2a9c9 6 API calls 30245->30247 30246->30241 30247->30244 30248->30188 30249->30202 30251 d2c180 30250->30251 30252 d2c188 30251->30252 30253 d2c19d 30251->30253 30254 d2ad06 114 API calls 30252->30254 30255 d2ad06 114 API calls 30253->30255 30256 d2c198 30254->30256 30255->30256 30266 d4b78e 30256->30266 30259 d2c204 30260 d2a9c9 6 API calls 30259->30260 30263 d2c216 30260->30263 30261 d2c1ff 30261->30187 30262 d2c1cd 30262->30261 30265 d2ad06 114 API calls 30262->30265 30264 d2a9c9 6 API calls 30263->30264 30264->30261 30265->30261 30267 d4b79d __EH_prolog3_catch_GS 30266->30267 30268 d2b3c2 77 API calls 30267->30268 30269 d4b7b9 30268->30269 30270 d2cd7a 77 API calls 30269->30270 30271 d4b7c9 30270->30271 30272 d2d06d 77 API calls 30271->30272 30295 d4b7e4 ctype 30271->30295 30273 d4b80f 30272->30273 30274 d2d06d 77 API calls 30273->30274 30275 d4b828 30274->30275 30276 d2edd0 67 API calls 30275->30276 30277 d4b839 30276->30277 30280 d2edd0 67 API calls 30277->30280 30313 d4b8b8 30277->30313 30278 d4f496 5 API calls 30279 d2c1c4 30278->30279 30279->30259 30279->30262 30282 d4b84e 30280->30282 30281 d4b906 RegOpenKeyExW 30283 d4b920 RegQueryValueExW 30281->30283 30281->30295 30286 d2edd0 67 API calls 30282->30286 30282->30313 30284 d4b99c RegCloseKey 30283->30284 30285 d4b949 30283->30285 30284->30295 30285->30284 30288 d4b9dd 30285->30288 30290 d4b95e 30285->30290 30287 d4b863 30286->30287 30291 d2edd0 67 API calls 30287->30291 30287->30313 30289 d42b90 77 API calls 30288->30289 30293 d4b9ec RegQueryValueExW 30289->30293 30290->30284 30296 d4b96a RegQueryValueExW 30290->30296 30292 d4b874 30291->30292 30297 d2edd0 67 API calls 30292->30297 30292->30313 30293->30284 30294 d4ba0a 30293->30294 30298 d4ba27 ExpandEnvironmentStringsW 30294->30298 30299 d4ba12 30294->30299 30295->30278 30296->30284 30308 d4b989 ctype 30296->30308 30300 d4b885 30297->30300 30298->30284 30302 d4ba45 30298->30302 30301 d2b36d 77 API calls 30299->30301 30304 d2edd0 67 API calls 30300->30304 30300->30313 30301->30308 30303 d2c59b 77 API calls 30302->30303 30305 d4ba6a ExpandEnvironmentStringsW 30303->30305 30306 d4b896 30304->30306 30307 d4ba86 30305->30307 30305->30308 30310 d2edd0 67 API calls 30306->30310 30306->30313 30309 d2b36d 77 API calls 30307->30309 30308->30284 30309->30308 30311 d4b8a7 30310->30311 30312 d2edd0 67 API calls 30311->30312 30311->30313 30312->30313 30313->30281 30313->30295 30315 d2fbe8 __EH_prolog3_GS 30314->30315 30316 d2ad06 114 API calls 30315->30316 30324 d2fc25 ctype 30316->30324 30318 d2fc95 30319 d2ad06 114 API calls 30318->30319 30320 d2fcae 30319->30320 30321 d2b217 77 API calls 30320->30321 30329 d2fcc6 ctype 30321->30329 30322 d2b217 77 API calls 30322->30324 30323 d2fcda 30325 d2ad06 114 API calls 30323->30325 30324->30318 30324->30322 30324->30323 30332 d30fdb 30324->30332 30326 d2fd04 30325->30326 30327 d2b217 77 API calls 30326->30327 30327->30329 30328 d4f482 ctype 5 API calls 30330 d2fcd7 30328->30330 30329->30328 30330->30237 30331->30237 30334 d30fea __EH_prolog3_GS 30332->30334 30333 d4f482 ctype 5 API calls 30336 d311df 30333->30336 30350 d31078 ctype 30334->30350 30352 d3f928 30334->30352 30336->30324 30338 d3108b 30340 d2b217 77 API calls 30338->30340 30339 d3104a 30344 d2ad06 114 API calls 30339->30344 30341 d310b7 30340->30341 30342 d2b217 77 API calls 30341->30342 30343 d310c9 30342->30343 30345 d31120 30343->30345 30346 d310e0 30343->30346 30344->30350 30348 d2ad06 114 API calls 30345->30348 30347 d2ad06 114 API calls 30346->30347 30349 d3111b ctype 30347->30349 30348->30349 30349->30350 30351 d2b217 77 API calls 30349->30351 30350->30333 30351->30350 30357 d4d1a7 30352->30357 30354 d3f942 30355 d31041 30354->30355 30365 d3d9fd 30354->30365 30355->30338 30355->30339 30358 d4d1b3 __EH_prolog3 30357->30358 30359 d2b3c2 77 API calls 30358->30359 30360 d4d1c5 30359->30360 30378 d4ae77 30360->30378 30362 d4d1d8 ctype 30364 d4d1fb codecvt 30362->30364 30385 d30441 77 API calls 30362->30385 30364->30354 30366 d3da09 __EH_prolog3_GS 30365->30366 30367 d3daa4 30366->30367 30368 d3da49 30366->30368 30369 d4d1a7 77 API calls 30367->30369 30392 d4c908 30368->30392 30377 d3da68 ctype 30369->30377 30373 d4f482 ctype 5 API calls 30375 d3dab6 30373->30375 30374 d3da86 30376 d3040b 77 API calls 30374->30376 30375->30355 30376->30377 30377->30373 30386 d4a6b4 30378->30386 30382 d4ef49 __ftelli64_nolock 5 API calls 30384 d4aed2 30382->30384 30383 d4aead 30383->30382 30384->30362 30385->30364 30389 d4a6c5 30386->30389 30387 d4a6e3 30387->30383 30390 d3206a 67 API calls 30387->30390 30389->30387 30391 d3206a 67 API calls 30389->30391 30390->30383 30391->30389 30393 d4c914 __EH_prolog3_GS 30392->30393 30405 d4bcb3 30393->30405 30396 d4bf95 77 API calls 30397 d4c984 30396->30397 30399 d4a0e5 GetFileAttributesW 30397->30399 30398 d4c949 ctype 30401 d4f482 ctype 5 API calls 30398->30401 30400 d4c999 30399->30400 30400->30398 30417 d4bac9 30400->30417 30402 d3da63 30401->30402 30402->30377 30404 d30486 77 API calls 2 library calls 30402->30404 30404->30374 30406 d4bcc2 __EH_prolog3_GS 30405->30406 30407 d4b78e 84 API calls 30406->30407 30408 d4bd11 30407->30408 30409 d4bd4f GetSystemDirectoryW 30408->30409 30410 d4bd21 30408->30410 30411 d4bd66 30409->30411 30414 d4bd32 ctype 30409->30414 30412 d2b217 77 API calls 30410->30412 30413 d2b36d 77 API calls 30411->30413 30411->30414 30412->30414 30413->30414 30415 d4f482 ctype 5 API calls 30414->30415 30416 d4bd9a 30415->30416 30416->30396 30416->30398 30418 d4bad8 __EH_prolog3_GS 30417->30418 30419 d2cd7a 77 API calls 30418->30419 30420 d4baf9 30419->30420 30421 d4a0e5 GetFileAttributesW 30420->30421 30430 d4bc1f ctype 30420->30430 30424 d4bb1c 30421->30424 30422 d4f482 ctype 5 API calls 30423 d4bc44 30422->30423 30423->30398 30425 d42b90 77 API calls 30424->30425 30424->30430 30426 d4bb49 30425->30426 30427 d4f77e __wsplitpath_s 66 API calls 30426->30427 30428 d4bb58 30427->30428 30429 d4bb77 GlobalAlloc 30428->30429 30428->30430 30429->30430 30432 d4bb8a 30429->30432 30430->30422 30431 d4bc18 GlobalFree 30431->30430 30432->30431 30437 d4a2eb 102 API calls 30432->30437 30434 d4bbf8 30434->30431 30435 d2b36d 77 API calls 30434->30435 30436 d4bc11 30435->30436 30436->30431 30437->30434 30438->30214 30439->29208 30440->29208 30442 d4f6b6 30441->30442 30443 d4f64d 30441->30443 30451 d4f536 78 API calls 3 library calls 30442->30451 30446 d4f664 30443->30446 30449 d55429 66 API calls __getptd_noexit 30443->30449 30446->29215 30447 d4f659 30450 d553cd 11 API calls __stricmp_l 30447->30450 30449->30447 30450->30446 30451->30446 30453 d49fab 6 API calls 30452->30453 30454 d2b11e _memset 30453->30454 30455 d2b18b 30454->30455 30456 d2a9c9 6 API calls 30454->30456 30458 d2ad06 114 API calls 30455->30458 30457 d2b17f 30456->30457 30459 d2a9c9 6 API calls 30457->30459 30460 d2b1b4 ShellExecuteExW 30458->30460 30459->30455 30461 d2b1e5 30460->30461 30462 d2b1c5 GetLastError 30460->30462 30463 d2b1f6 CloseHandle 30461->30463 30464 d2b1eb WaitForSingleObject 30461->30464 30465 d2ad06 114 API calls 30462->30465 30466 d2b1de 30463->30466 30464->30463 30465->30466 30467 d4ef49 __ftelli64_nolock 5 API calls 30466->30467 30468 d2b20e 30467->30468 30468->29320 30469->29277 30470->29262 30471->29260 30472->29300 30473->29318 30474->29348 30476 d47e92 DestroyWindow 30475->30476 30477 d47e9c 30475->30477 30476->30477 30478 d47eb2 DeleteObject 30477->30478 30479 d47eb8 30477->30479 30478->30479 30480 d47ec5 30479->30480 30481 d47ebf DeleteObject 30479->30481 30480->28726 30481->30480 30482->29422 30516 d52a85 73 API calls __calloc_crt 30517 d37882 116 API calls ctype 30520 d5c081 89 API calls 7 library calls 30521 d4e08e GetVersion GetModuleHandleW GetProcAddress 30524 d56cb6 InitializeCriticalSectionAndSpinCount 30527 d2e6b8 138 API calls 30528 d4e0ba 10 API calls ___delayLoadHelper2@8 30531 d366a3 112 API calls 3 library calls 30534 d32ca2 LeaveCriticalSection std::ios_base::_Addstd 30535 d4a8a6 CloseHandle ctype 30536 d338ab 103 API calls 30538 d35aaf 104 API calls 6 library calls 30540 d5c257 87 API calls 5 library calls 30541 d64a54 89 API calls 2 library calls 30542 d53250 6 API calls 3 library calls 30545 d64859 GetLastError SetLastError moneypunct ctype 30547 d36845 111 API calls 3 library calls 30549 d35c45 92 API calls 6 library calls 30551 d47077 130 API calls ctype 30552 d5b67c 85 API calls 5 library calls 30555 d2ac7e RaiseException ctype __CxxThrowException@8 30556 d65278 103 API calls 2 library calls 30557 d31a61 7 API calls 2 library calls 30559 d5ea15 97 API calls 2 library calls 30560 d63812 137 API calls 3 library calls 30564 d31e04 EnterCriticalSection std::_Lockit::_Lockit 30565 d2ac09 77 API calls _Allocate 30571 d3a636 EnterCriticalSection LeaveCriticalSection 30574 d39c23 LoadLibraryW GetProcAddress GetProcAddress 30579 d435d6 117 API calls 30580 d323d5 85 API calls __Tolower 30584 d641c6 SetLastError ctype 30587 d48fc7 94 API calls 30591 d63fc9 GetVersion GetEnvironmentVariableA 30593 d325f1 LCMapStringW __Towlower 30596 d347f4 68 API calls _Ungetc 30597 d339fb 99 API calls 2 library calls 30598 d51ffc 68 API calls IsInExceptionSpec 30599 d4eff9 72 API calls ___InternalCxxFrameHandler 30601 d369eb 110 API calls 3 library calls 30605 d33792 LeaveCriticalSection LeaveCriticalSection __ftelli64 30606 d3ab91 128 API calls 30608 d2c398 130 API calls 2 library calls 28082 d37d83 28083 d37d92 __EH_prolog3_GS 28082->28083 28101 d3fc14 28083->28101 28087 d37dc1 28099 d37de8 _memset ctype numpunct 28087->28099 28120 d2b608 114 API calls 2 library calls 28087->28120 28089 d37eab 28133 d350d6 7 API calls std::ios_base::_Ios_base_dtor 28089->28133 28092 d37ec0 28134 d4f482 28092->28134 28099->28089 28115 d37c42 28099->28115 28121 d4ee98 RaiseException 28099->28121 28122 d4c6bc 77 API calls 2 library calls 28099->28122 28123 d4f77e 28099->28123 28132 d3fcf3 77 API calls 28099->28132 28137 d2ad7d 124 API calls 2 library calls 28099->28137 28138 d4ee13 28101->28138 28104 d37da9 28109 d36637 28104->28109 28106 d3fc4f 28151 d4ee98 RaiseException 28106->28151 28108 d3fc64 28110 d36643 __EH_prolog3 28109->28110 28181 d35e3d 28110->28181 28112 d36675 28185 d34656 28112->28185 28114 d36694 codecvt 28114->28087 28116 d34aaa 114 API calls 28115->28116 28117 d37c59 28116->28117 28319 d37487 28117->28319 28120->28099 28121->28099 28122->28099 28128 d4f790 28123->28128 28124 d4f794 28125 d4f799 28124->28125 28373 d55429 66 API calls __getptd_noexit 28124->28373 28125->28099 28127 d4f7b0 28374 d553cd 11 API calls __stricmp_l 28127->28374 28128->28124 28128->28125 28130 d4f7d7 28128->28130 28130->28125 28375 d55429 66 API calls __getptd_noexit 28130->28375 28132->28099 28133->28092 28135 d4ef49 __ftelli64_nolock 5 API calls 28134->28135 28136 d4f48c 28135->28136 28136->28136 28137->28099 28141 d4ee1d 28138->28141 28140 d3fc2a 28140->28104 28150 d4ed02 66 API calls std::exception::_Copy_str 28140->28150 28141->28140 28145 d4ee39 std::exception::exception 28141->28145 28152 d53605 28141->28152 28169 d53744 _DecodePointerInternal 28141->28169 28143 d4ee77 28171 d4ed9b 66 API calls std::exception::operator= 28143->28171 28145->28143 28170 d51fe0 76 API calls __cinit 28145->28170 28146 d4ee81 28172 d4ee98 RaiseException 28146->28172 28149 d4ee92 28150->28106 28151->28108 28153 d53682 28152->28153 28165 d53613 28152->28165 28179 d53744 _DecodePointerInternal 28153->28179 28155 d53688 28180 d55429 66 API calls __getptd_noexit 28155->28180 28158 d53641 RtlAllocateHeap 28159 d5367a 28158->28159 28158->28165 28159->28141 28161 d5366e 28177 d55429 66 API calls __getptd_noexit 28161->28177 28165->28158 28165->28161 28166 d5366c 28165->28166 28167 d5361e 28165->28167 28176 d53744 _DecodePointerInternal 28165->28176 28178 d55429 66 API calls __getptd_noexit 28166->28178 28167->28165 28173 d52561 66 API calls 2 library calls 28167->28173 28174 d523ad 66 API calls 9 library calls 28167->28174 28175 d52086 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 28167->28175 28169->28141 28170->28143 28171->28146 28172->28149 28173->28167 28174->28167 28176->28165 28177->28166 28178->28159 28179->28155 28180->28159 28182 d35e49 __EH_prolog3 28181->28182 28191 d3536b 28182->28191 28184 d35e93 codecvt 28184->28112 28186 d34662 __EH_prolog3 28185->28186 28290 d31db3 28186->28290 28188 d3466c 28298 d33b0b 28188->28298 28190 d3469c codecvt 28190->28114 28200 d328cc 28191->28200 28195 d3538b 28196 d353a5 28195->28196 28215 d327ec 28195->28215 28199 d353b1 28196->28199 28220 d63200 EnterCriticalSection LeaveCriticalSection std::ios_base::_Addstd std::_Lockit::_Lockit 28196->28220 28199->28184 28201 d327ec std::ios_base::clear 67 API calls 28200->28201 28202 d32901 28201->28202 28203 d4ee13 _Allocate 77 API calls 28202->28203 28204 d32908 28203->28204 28205 d32914 28204->28205 28221 d31974 80 API calls 2 library calls 28204->28221 28207 d34aaa 28205->28207 28208 d34ab6 __EH_prolog3 28207->28208 28222 d31a3b 28208->28222 28214 d34ad8 codecvt 28214->28195 28216 d32870 28215->28216 28217 d32804 std::ios_base::clear 28215->28217 28216->28196 28288 d4ee98 RaiseException 28217->28288 28289 d4ed02 66 API calls std::exception::_Copy_str 28217->28289 28220->28199 28221->28205 28249 d318cd 28222->28249 28225 d343de 28226 d343ea __EH_prolog3_GS 28225->28226 28227 d62c71 std::_Lockit::_Lockit EnterCriticalSection 28226->28227 28228 d343f7 28227->28228 28275 d3187c 28228->28275 28230 d3440e std::locale::_Getfacet 28232 d34420 28230->28232 28283 d340e5 114 API calls 6 library calls 28230->28283 28231 d62c9e std::ios_base::_Addstd LeaveCriticalSection 28233 d34473 28231->28233 28232->28231 28235 d4f482 ctype 5 API calls 28233->28235 28237 d3447a 28235->28237 28236 d3442e 28238 d34450 28236->28238 28284 d4ed68 66 API calls std::exception::exception 28236->28284 28245 d31995 28237->28245 28239 d318cd std::locale::_Init 7 API calls 28238->28239 28241 d34460 28239->28241 28286 d62cd4 77 API calls _Allocate 28241->28286 28242 d34442 28285 d4ee98 RaiseException 28242->28285 28246 d3199b 28245->28246 28247 d319a0 28245->28247 28287 d31911 7 API calls 3 library calls 28246->28287 28247->28214 28256 d62c71 28249->28256 28255 d3190a 28255->28225 28257 d318eb 28256->28257 28258 d62c83 28256->28258 28260 d62c9e 28257->28260 28272 d63903 EnterCriticalSection 28258->28272 28261 d318ff 28260->28261 28262 d62ca5 28260->28262 28264 d4ef49 28261->28264 28273 d63918 LeaveCriticalSection 28262->28273 28265 d4ef51 28264->28265 28266 d4ef53 IsDebuggerPresent 28264->28266 28265->28255 28274 d5a8a7 28266->28274 28269 d5394a SetUnhandledExceptionFilter UnhandledExceptionFilter 28270 d53967 __call_reportfault 28269->28270 28271 d5396f GetCurrentProcess TerminateProcess 28269->28271 28270->28271 28271->28255 28272->28257 28273->28261 28274->28269 28276 d31895 28275->28276 28277 d318b9 28275->28277 28279 d62c71 std::_Lockit::_Lockit EnterCriticalSection 28276->28279 28278 d4ef49 __ftelli64_nolock 5 API calls 28277->28278 28280 d318c6 28278->28280 28281 d3189f 28279->28281 28280->28230 28282 d62c9e std::ios_base::_Addstd LeaveCriticalSection 28281->28282 28282->28277 28283->28236 28284->28242 28285->28238 28286->28232 28287->28247 28288->28217 28289->28217 28291 d31dbf __EH_prolog3 28290->28291 28302 d6329d 28291->28302 28294 d4ee13 _Allocate 77 API calls 28295 d31ddd 28294->28295 28297 d31de9 codecvt ctype 28295->28297 28307 d31974 80 API calls 2 library calls 28295->28307 28297->28188 28299 d33b29 28298->28299 28301 d33b39 _memmove 28298->28301 28299->28301 28309 d2a954 28299->28309 28301->28190 28303 d4ee13 _Allocate 77 API calls 28302->28303 28304 d632a9 28303->28304 28308 d638d9 InitializeCriticalSection 28304->28308 28306 d31dd2 28306->28294 28307->28297 28308->28306 28310 d2a9a0 28309->28310 28311 d2a965 28309->28311 28310->28301 28312 d2a976 28311->28312 28314 d4ee13 _Allocate 77 API calls 28311->28314 28312->28310 28317 d4ed02 66 API calls std::exception::_Copy_str 28312->28317 28314->28312 28315 d2a98b 28318 d4ee98 RaiseException 28315->28318 28317->28315 28318->28310 28320 d37493 __EH_prolog3_catch_GS 28319->28320 28331 d34e9c 28320->28331 28322 d374bd 28327 d374f1 28322->28327 28345 d2aa74 28322->28345 28325 d3753d 28356 d4f496 28325->28356 28355 d34171 67 API calls std::ios_base::clear 28327->28355 28330 d374d6 28330->28327 28349 d3570e 28330->28349 28333 d34ea8 __EH_prolog3_catch 28331->28333 28332 d34f42 28336 d327ec std::ios_base::clear 67 API calls 28332->28336 28339 d34f62 codecvt 28332->28339 28333->28332 28335 d34ecb 28333->28335 28359 d34e5c 67 API calls 28333->28359 28335->28332 28337 d31a3b std::ios_base::getloc 7 API calls 28335->28337 28336->28339 28338 d34ef0 28337->28338 28340 d343de 114 API calls 28338->28340 28339->28322 28341 d34ef9 28340->28341 28342 d31995 std::ios_base::_Ios_base_dtor 7 API calls 28341->28342 28343 d34f04 28342->28343 28343->28332 28344 d327ec std::ios_base::clear 67 API calls 28343->28344 28344->28332 28346 d2aa87 28345->28346 28348 d2aa91 _memmove 28345->28348 28360 d62972 67 API calls 3 library calls 28346->28360 28348->28330 28350 d35726 28349->28350 28352 d35730 28349->28352 28367 d6291b 67 API calls 3 library calls 28350->28367 28354 d35742 28352->28354 28361 d2aded 28352->28361 28354->28330 28355->28325 28357 d4ef49 __ftelli64_nolock 5 API calls 28356->28357 28358 d4f4a0 28357->28358 28358->28358 28359->28335 28360->28348 28362 d2adfe 28361->28362 28364 d2ae08 28361->28364 28372 d6291b 67 API calls 3 library calls 28362->28372 28366 d2ae18 ctype 28364->28366 28368 d2aba6 28364->28368 28366->28354 28367->28352 28369 d2abb2 __EH_prolog3_catch 28368->28369 28370 d2a954 _Allocate 77 API calls 28369->28370 28371 d2ac02 codecvt ctype _memmove 28370->28371 28371->28366 28372->28364 28373->28127 28374->28125 28375->28127 30611 d58984 76 API calls __fassign_l 30613 d5b58c 84 API calls 4 library calls 30621 d485bc DeleteObject DeleteObject ctype 30623 d36dbd 135 API calls 2 library calls 30624 d2e9a2 140 API calls 2 library calls 30626 d62fa7 68 API calls 2 library calls 30629 d2d1a4 135 API calls 3 library calls 30632 d3bf57 88 API calls 2 library calls 30634 d48f45 12 API calls 30635 d4e541 5 API calls ___security_init_cookie 30641 d52975 67 API calls 2 library calls 30642 d5bf75 86 API calls 4 library calls 30646 d34f76 67 API calls 3 library calls 30647 d3377e 67 API calls __lock_file 30648 d33962 80 API calls _Ungetc 28376 d4e161 28377 d4e1c8 RaiseException 28376->28377 28378 d4e1e7 28376->28378 28380 d4e373 28377->28380 28379 d4e250 LoadLibraryA 28378->28379 28378->28380 28381 d4e2a0 InterlockedExchange 28378->28381 28386 d4e2db 28378->28386 28379->28381 28382 d4e25f GetLastError 28379->28382 28383 d4e2d4 FreeLibrary 28381->28383 28384 d4e2ae 28381->28384 28387 d4e271 28382->28387 28388 d4e27f RaiseException 28382->28388 28383->28386 28384->28386 28390 d4e2b4 LocalAlloc 28384->28390 28385 d4e327 GetProcAddress 28385->28380 28389 d4e337 GetLastError 28385->28389 28386->28380 28386->28385 28387->28381 28387->28388 28388->28380 28391 d4e357 RaiseException 28389->28391 28392 d4e349 28389->28392 28390->28386 28393 d4e2c2 28390->28393 28391->28380 28392->28380 28392->28391 28393->28386 30660 d4671b 128 API calls ctype 30661 d2e700 145 API calls 2 library calls 30665 d32133 109 API calls 4 library calls 30667 d3b8e1 152 API calls 2 library calls 30668 d3513b 114 API calls 30669 d6593c LocalFree ctype 30672 d3253e GetStringTypeW __Getwctype 30677 d52120 77 API calls 4 library calls 30679 d6552f 103 API calls 2 library calls
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00D450A4
    • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000,00000904), ref: 00D450BC
      • Part of subcall function 00D3F627: __EH_prolog3.LIBCMT ref: 00D3F62E
    • CoInitialize.OLE32(00000000), ref: 00D45212
      • Part of subcall function 00D41A4B: __EH_prolog3_GS.LIBCMT ref: 00D41A52
      • Part of subcall function 00D44509: __EH_prolog3_GS.LIBCMT ref: 00D44513
    • CloseHandle.KERNEL32(000002D0), ref: 00D4525A
      • Part of subcall function 00D4C83E: __EH_prolog3_GS.LIBCMT ref: 00D4C845
    • CoUninitialize.OLE32 ref: 00D45263
    • FreeLibrary.KERNEL32(?), ref: 00D4529D
    • MessageBoxW.USER32(00000000,?,?,00000044), ref: 00D454AD
    • ExitWindowsEx.USER32(00000002,00000000), ref: 00D454BB
    • CloseHandle.KERNEL32(000002D0), ref: 00D454D0
    • CoUninitialize.OLE32 ref: 00D454D9
    • FreeLibrary.KERNEL32(?), ref: 00D45520
    • MessageBoxW.USER32(00000000,?,?,00000044), ref: 00D4561A
      • Part of subcall function 00D492CA: SetWindowTextW.USER32(?,?), ref: 00D492FE
      • Part of subcall function 00D492CA: SetDlgItemTextW.USER32(?,0000040F,?), ref: 00D49318
      • Part of subcall function 00D492CA: SetForegroundWindow.USER32(?), ref: 00D49321
      • Part of subcall function 00D492CA: ShowWindow.USER32(?,00000005,?,?,?,?), ref: 00D4932C
      • Part of subcall function 00D492CA: LoadCursorW.USER32(00000000,00007F02), ref: 00D49339
      • Part of subcall function 00D492CA: SetCursor.USER32(00000000,?,?,?,?), ref: 00D49340
      • Part of subcall function 00D419C8: __EH_prolog3_GS.LIBCMT ref: 00D419CF
      • Part of subcall function 00D43ED6: __EH_prolog3_GS.LIBCMT ref: 00D43EE0
      • Part of subcall function 00D43728: __EH_prolog3_GS.LIBCMT ref: 00D4372F
      • Part of subcall function 00D43728: __CxxThrowException@8.LIBCMT ref: 00D4377A
    • CloseHandle.KERNEL32(000002D0,00000001), ref: 00D45CD2
    • CoUninitialize.OLE32(00000001), ref: 00D45D01
    • FreeLibrary.KERNEL32(?), ref: 00D45D50
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
      • Part of subcall function 00D3F58E: __EH_prolog3.LIBCMT ref: 00D3F595
    Strings
    • There is a reboot pending, xrefs: 00D45454
    • Package failed with message "%s", xrefs: 00D45BFF
    • Application targets %s platform, installed on %s, xrefs: 00D47716
    • Application, xrefs: 00D45727
    • afterreboot.cfg, xrefs: 00D45940, 00D473B4
    • install.log, xrefs: 00D4539D
    • Download of Application file failed with result %d, xrefs: 00D477DE
    • Launching Application., xrefs: 00D4788D
    • User has cancelled install, xrefs: 00D47004
    • Downloading files to "%s", xrefs: 00D46193
    • -afterreboot="%s" %s, xrefs: 00D46B90
    • Copying files to temporary directory "%s", xrefs: 00D4613F
    • .msi, xrefs: 00D475AF
    • Resuming after a reboot. Original Application location: '%s', xrefs: 00D453F6
    • riched20.dll, xrefs: 00D451A6
    • :, xrefs: 00D4787B
    • A prerequisite failed for Package "%s", xrefs: 00D45BD4
    • Intel, xrefs: 00D47611
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$CloseFreeHandleLibraryUninitializeWindow$CursorH_prolog3MessageText$Exception@8ExitForegroundH_prolog3_catch_HeapInformationInitializeItemLoadShowThrowWindows_memmove
    • String ID: -afterreboot="%s" %s$.msi$:$A prerequisite failed for Package "%s"$Application$Application targets %s platform, installed on %s$Copying files to temporary directory "%s"$Download of Application file failed with result %d$Downloading files to "%s"$Intel$Launching Application.$Package failed with message "%s"$Resuming after a reboot. Original Application location: '%s'$There is a reboot pending$User has cancelled install$afterreboot.cfg$install.log$riched20.dll
    • API String ID: 337884292-3509691487
    • Opcode ID: d32f78b7b683d6c8be754539b128d779f74d8ee987cd41a18856e37d3c5aa411
    • Instruction ID: 53f38e2c934b8f1627710ff4e29e62e8e6021e7214fe7b1f25f6e930ccbadff5
    • Opcode Fuzzy Hash: d32f78b7b683d6c8be754539b128d779f74d8ee987cd41a18856e37d3c5aa411
    • Instruction Fuzzy Hash: 07231A71800228ABDB65EB54DC85EEEB7B8EF25304F4041DAE54AA2191EF305F89CF71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1888 d2b0f4-d2b13e call d49fab call d4f6d0 1893 d2b140-d2b145 1888->1893 1894 d2b147 1888->1894 1895 d2b14a-d2b14e 1893->1895 1894->1895 1896 d2b150-d2b155 1895->1896 1897 d2b157 1895->1897 1898 d2b15a-d2b165 1896->1898 1897->1898 1899 d2b192-d2b196 1898->1899 1900 d2b167-d2b16b 1898->1900 1902 d2b19a-d2b19e 1899->1902 1903 d2b198 1899->1903 1900->1899 1901 d2b16d-d2b18b call d2a9c9 * 2 1900->1901 1901->1899 1905 d2b1a2-d2b1c3 call d2ad06 ShellExecuteExW 1902->1905 1906 d2b1a0 1902->1906 1903->1902 1912 d2b1e5-d2b1e9 1905->1912 1913 d2b1c5-d2b1e3 GetLastError call d2ad06 1905->1913 1906->1905 1914 d2b1f6-d2b1ff CloseHandle 1912->1914 1915 d2b1eb-d2b1f0 WaitForSingleObject 1912->1915 1917 d2b201-d2b20f call d4ef49 1913->1917 1914->1917 1915->1914
    APIs
      • Part of subcall function 00D49FAB: _memset.LIBCMT ref: 00D49FD6
      • Part of subcall function 00D49FAB: GetVersionExW.KERNEL32(?,?,?), ref: 00D49FEF
    • _memset.LIBCMT ref: 00D2B128
    • ShellExecuteExW.SHELL32(?), ref: 00D2B1BB
    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000008), ref: 00D2B1C5
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00D2B1F0
    • CloseHandle.KERNEL32(00000000), ref: 00D2B1F9
    Strings
    • Running command '%s' with arguments '%s', xrefs: 00D2B1A4
    • runas, xrefs: 00D2B18B
    • Will attempt to elevate process., xrefs: 00D2B173
    • ShellExecuteEx failed with error code %d, xrefs: 00D2B1CE
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memset$CloseErrorExecuteHandleLastObjectShellSingleVersionWait
    • String ID: Running command '%s' with arguments '%s'$ShellExecuteEx failed with error code %d$Will attempt to elevate process.$runas
    • API String ID: 2595187793-1521493396
    • Opcode ID: 88687dfe12d4db6680ac8082a42f143fb5c78a7a4f8c231c7ba3f188fae87d4b
    • Instruction ID: 1906e0b34f61f210558c83b6caf48e79bd8828908c92d04d4809ee45521a2d6f
    • Opcode Fuzzy Hash: 88687dfe12d4db6680ac8082a42f143fb5c78a7a4f8c231c7ba3f188fae87d4b
    • Instruction Fuzzy Hash: 5C31A275900328EFCB11DF98EC49A8DBBB5FF24329F10442AF555E6290D7B099A4CB71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1102 d2b669-d2b68c call d4f3f0 1105 d2b692-d2b6d6 call d2b3c2 call d2aafa 1102->1105 1106 d2ba91-d2ba96 call d4f482 1102->1106 1113 d2b6d8-d2b6da 1105->1113 1114 d2b6dc 1105->1114 1115 d2b6de-d2b6ed call d2ac98 1113->1115 1114->1115 1118 d2b6f3-d2b6fc call d2ae5d 1115->1118 1119 d2b87f-d2b885 1115->1119 1129 d2b6fe-d2b705 1118->1129 1130 d2b73f-d2b75f call d4bcb3 1118->1130 1121 d2b887-d2b88e 1119->1121 1122 d2b8bb-d2b8bf 1119->1122 1124 d2b893-d2b89d call d3b0bc 1121->1124 1125 d2b890 1121->1125 1126 d2b8c1-d2b8c3 1122->1126 1127 d2b8c5 1122->1127 1124->1122 1140 d2b89f-d2b8a6 1124->1140 1125->1124 1128 d2b8c7-d2b8d6 call d2ac98 1126->1128 1127->1128 1143 d2b916-d2b921 1128->1143 1144 d2b8d8-d2b8dc 1128->1144 1133 d2b707 1129->1133 1134 d2b70a-d2b70b call d4a0e5 1129->1134 1141 d2b870-d2b87a call d2aa24 1130->1141 1142 d2b765-d2b783 1130->1142 1133->1134 1145 d2b710-d2b713 1134->1145 1146 d2b8ab-d2b8b1 1140->1146 1147 d2b8a8 1140->1147 1141->1119 1151 d2b785 1142->1151 1152 d2b788-d2b7a9 call d4bf95 1142->1152 1148 d2b923-d2b925 1143->1148 1149 d2b927 1143->1149 1153 d2b8e2 1144->1153 1154 d2b8de-d2b8e0 1144->1154 1145->1130 1155 d2b715-d2b719 1145->1155 1146->1122 1147->1146 1156 d2b929-d2b938 call d2ac98 1148->1156 1149->1156 1151->1152 1166 d2b7b1-d2b7ba call d4a0e5 1152->1166 1167 d2b7ab 1152->1167 1158 d2b8e4-d2b8f3 call d2ac98 1153->1158 1154->1158 1159 d2b71b 1155->1159 1160 d2b71d-d2b73a call d2ad7d call d4ee98 1155->1160 1170 d2b93e-d2b985 call d2a9c9 * 2 call d4da53 1156->1170 1171 d2babf-d2bac3 1156->1171 1158->1143 1173 d2b8f5-d2b8f9 1158->1173 1159->1160 1160->1130 1183 d2b862-d2b86b call d2aa24 1166->1183 1184 d2b7c0-d2b7e1 1166->1184 1167->1166 1211 d2b987-d2b9a5 1170->1211 1212 d2b9fc-d2ba0b call d4cda4 1170->1212 1176 d2bac7-d2badc call d2ac98 1171->1176 1177 d2bac5 1171->1177 1179 d2b8fb-d2b8fd 1173->1179 1180 d2b8ff 1173->1180 1193 d2bae2-d2bb15 call d2a9c9 * 2 1176->1193 1194 d2bb9a-d2bbce call d2a9c9 * 2 call d4cda4 1176->1194 1177->1176 1185 d2b901-d2b910 call d2ac98 1179->1185 1180->1185 1183->1141 1189 d2b7e3 1184->1189 1190 d2b7e9-d2b7f0 1184->1190 1185->1143 1202 d2bcfd-d2bd1b call d2b0f4 1185->1202 1189->1190 1195 d2b7f2 1190->1195 1196 d2b7f5-d2b81d call d4c0b9 call d2b0f4 1190->1196 1222 d2bb17 1193->1222 1223 d2bb1a-d2bb80 call d4c0b9 call d2b36d call d2b0f4 call d2aa24 1193->1223 1243 d2bc56-d2bc5c 1194->1243 1244 d2bbd4-d2bbe8 GetProcAddress 1194->1244 1195->1196 1215 d2b822-d2b828 1196->1215 1216 d2bd21-d2bd42 call d4c19a 1202->1216 1217 d2ba78-d2ba84 call d2aa24 1202->1217 1219 d2b9a7 1211->1219 1220 d2b9aa-d2b9c3 call d4bf95 1211->1220 1237 d2ba11-d2ba25 GetProcAddress 1212->1237 1238 d2bab4-d2baba 1212->1238 1225 d2b82a-d2b842 call d2aa24 * 2 1215->1225 1226 d2b85b-d2b85d call d2aa24 1215->1226 1247 d2bd48-d2bd5f 1216->1247 1248 d2ba6d-d2ba73 call d2aa24 1216->1248 1249 d2ba86-d2ba8c call d2aa24 1217->1249 1219->1220 1240 d2b9e6-d2b9fa call d2aa24 1220->1240 1241 d2b9c5-d2b9cf 1220->1241 1222->1223 1246 d2bb86-d2bb95 call d2aa24 1223->1246 1282 d2b845-d2b856 call d2aa24 * 2 1223->1282 1225->1282 1226->1183 1250 d2ba2b-d2ba54 call d2a9c9 * 2 1237->1250 1251 d2baad-d2baae FreeLibrary 1237->1251 1238->1246 1240->1212 1240->1237 1252 d2b9d1 1241->1252 1253 d2b9d7-d2b9e4 call d4c3c8 1241->1253 1243->1202 1255 d2bc62-d2bc7d 1243->1255 1256 d2bc4a-d2bc50 FreeLibrary 1244->1256 1257 d2bbea-d2bc13 call d2a9c9 * 2 1244->1257 1246->1243 1261 d2bd61 1247->1261 1262 d2bd64-d2bd6b 1247->1262 1248->1217 1249->1106 1290 d2ba56 1250->1290 1291 d2ba59-d2ba64 1250->1291 1251->1238 1252->1253 1253->1240 1267 d2bc82-d2bce8 call d4c0b9 call d2b36d call d2b0f4 call d2aa24 1255->1267 1268 d2bc7f 1255->1268 1256->1243 1301 d2bc15 1257->1301 1302 d2bc18-d2bc23 1257->1302 1261->1262 1274 d2bd70-d2bd8a call d4c681 1262->1274 1275 d2bd6d 1262->1275 1267->1282 1320 d2bcee-d2bcf7 call d2aa24 1267->1320 1268->1267 1296 d2bd8f-d2bda1 call d2b608 1274->1296 1297 d2bd8c 1274->1297 1275->1274 1282->1249 1290->1291 1308 d2ba66-d2ba67 FreeLibrary 1291->1308 1309 d2ba99-d2baaa call d2ad06 1291->1309 1297->1296 1301->1302 1314 d2bc36-d2bc47 call d2ad06 1302->1314 1315 d2bc25-d2bc31 FreeLibrary 1302->1315 1308->1248 1309->1251 1314->1256 1315->1217 1320->1202
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2B673
    • __CxxThrowException@8.LIBCMT ref: 00D2B73A
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
      • Part of subcall function 00D2AD06: __EH_prolog3_GS.LIBCMT ref: 00D2AD0D
    • FreeLibrary.KERNEL32(00000000), ref: 00D2BAAE
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$Exception@8FreeLibraryThrow_memmove
    • String ID: "%s"$ -I "%s" %s$"%s"$.application$.msi$.vsto$.xbap$Application appears to be a VSTO manifest$Application appears to be a WPF Browser Application$Application appears to be an application manifest$CommonFilesFolder$InstallSolution$InstallSolution failed with HRESULT '%d'$Installing VSTO solution via vstoee$LaunchApplication$LaunchApplication failed with HRESULT '%d'$Launching application manifest via dfshim$Microsoft Shared\VSTO$dfshim.dll$iexplore.exe$msiexec.exe$vstoee.dll
    • API String ID: 2841979529-2877636624
    • Opcode ID: adb103dffb0175afc5cceda4b7627b4e37fa12bf69de8dc1f12b518ae7666886
    • Instruction ID: f41289f8790f1a8c64e07d105b2b4d0398b0dc4815f5f79cd9326d8077610b8f
    • Opcode Fuzzy Hash: adb103dffb0175afc5cceda4b7627b4e37fa12bf69de8dc1f12b518ae7666886
    • Instruction Fuzzy Hash: 88227074D00368AFCF10DBA8ED85BDEBBB8EF65318F14405AE545A7141DBB05A88CB71

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1323 d3e406-d3e44b call d4f3f0 call d4d303 1328 d3e48a 1323->1328 1329 d3e44d-d3e44e 1323->1329 1332 d3e48f-d3e56f call d3d73e call d2b36d call d37c9e call d3d7e2 call d3e359 call d3e073 call d2cf63 call d2aa24 * 2 call d2c13b call d2aa24 call d49fab call d4d20f call d4a02a 1328->1332 1330 d3e483-d3e488 1329->1330 1331 d3e450-d3e451 1329->1331 1330->1332 1333 d3e453-d3e454 1331->1333 1334 d3e47c-d3e481 1331->1334 1369 d3e571-d3e59b call d301ec call d4c0b9 1332->1369 1370 d3e59d-d3e5b6 call d35a4d 1332->1370 1336 d3e456-d3e459 1333->1336 1337 d3e475-d3e47a 1333->1337 1334->1332 1340 d3e45b-d3e45e 1336->1340 1341 d3e46e-d3e473 1336->1341 1337->1332 1343 d3e460-d3e465 1340->1343 1344 d3e467-d3e46c 1340->1344 1341->1332 1343->1332 1344->1332 1382 d3e5db-d3e5f0 call d3d790 1369->1382 1375 d3e5c4-d3e5d8 call d4c0b9 1370->1375 1376 d3e5b8-d3e5bf call d35a4d 1370->1376 1375->1382 1376->1375 1385 d3e5f2-d3e638 call d2b36d call d37c9e call d3d7e2 1382->1385 1386 d3e63a-d3e67c call d2b36d call d37c9e call d3d7e2 1382->1386 1399 d3e680-d3e797 call d3e359 call d3e073 call d2cf63 call d2aa24 * 2 call d2c13b call d2aa24 call d3d25c call d2b36d call d37c9e call d3d7e2 call d3e359 call d3e073 call d2cf63 call d2aa24 * 2 call d2c13b call d2aa24 1385->1399 1386->1399 1436 d3e7f1-d3e7f7 1399->1436 1437 d3e799-d3e7ec call d3d73e call d2b36d call d37c9e call d3d7e2 1399->1437 1438 d3e7f9-d3e84c call d3d73e call d2b36d call d37c9e call d3d7e2 1436->1438 1439 d3e84e-d3e89d call d3d73e call d2b36d call d37c9e call d3d7e2 1436->1439 1462 d3e8a1-d3e906 call d3e359 call d3e073 call d2cf63 call d2aa24 * 2 call d2c13b call d2aa24 1437->1462 1438->1462 1439->1462 1479 d3e97a-d3e992 call d2c13b call d2aa24 call d4f482 1462->1479 1480 d3e908-d3e92a call d2a9c9 * 2 1462->1480 1480->1479 1490 d3e92c-d3e933 1480->1490 1492 d3e937-d3e965 call d3d0ac call d3d863 call d2a9c9 1490->1492 1493 d3e935 1490->1493 1499 d3e96a-d3e978 call d3cc15 1492->1499 1493->1492 1499->1479 1499->1490
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3E410
      • Part of subcall function 00D4D303: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D4D33B
      • Part of subcall function 00D4D303: GetNativeSystemInfo.KERNEL32(?), ref: 00D4D349
      • Part of subcall function 00D4D303: FreeLibrary.KERNEL32(00000000), ref: 00D4D34E
      • Part of subcall function 00D4D303: GetSystemInfo.KERNEL32(?), ref: 00D4D35C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: InfoSystem$AddressFreeH_prolog3_LibraryNativeProc
    • String ID: %d.%d$%d.%d.%d$AMD64$AdminUser$Alpha$HomeSite$IA64$InstallMode$Intel$Mips$PPC$ProcessorArchitecture$Property: [%s] = $SameSite$SpecificSite$The following properties have been set:$Unknown$Version9x$VersionNT
    • API String ID: 1816300761-3446401881
    • Opcode ID: c643385a21c2adb0df1252448f22d50e99a62174c469187f131039ccd1a5ae6d
    • Instruction ID: 013cd74b3b8034db6c61d8527660660fb758a9b44404ff2539111cd310cdea3e
    • Opcode Fuzzy Hash: c643385a21c2adb0df1252448f22d50e99a62174c469187f131039ccd1a5ae6d
    • Instruction Fuzzy Hash: 8DF12670C1026CAECB11EBE4D991BEDBBB5FF24304F54409AE015A7292DBB05A49DF72

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1502 d2aea6-d2aedf call d4f3f0 1505 d2aee1-d2aee3 1502->1505 1506 d2aee5 1502->1506 1507 d2aee7-d2aef5 call d3b7cb 1505->1507 1506->1507 1510 d2b09a-d2b0a0 1507->1510 1511 d2aefb-d2af01 1507->1511 1512 d2b0a2 1510->1512 1513 d2b0a5-d2b0a8 1510->1513 1514 d2af03 1511->1514 1515 d2af06-d2af0f call d4a0e5 1511->1515 1512->1513 1516 d2b0aa-d2b0ac 1513->1516 1517 d2b0ae 1513->1517 1514->1515 1515->1510 1522 d2af15-d2af2c call d4cda4 1515->1522 1519 d2b0b0-d2b0c8 call d2ad06 1516->1519 1517->1519 1525 d2b0ca 1519->1525 1526 d2b0cc-d2b13e call d2ad7d call d4ee98 call d49fab call d4f6d0 1519->1526 1528 d2af57-d2af7c GetProcAddress * 2 1522->1528 1529 d2af2e-d2af54 call d2ad06 call d2aa24 call d4f482 1522->1529 1525->1526 1568 d2b140-d2b145 1526->1568 1569 d2b147 1526->1569 1532 d2af82-d2af84 1528->1532 1533 d2b071-d2b094 call d2ad06 FreeLibrary 1528->1533 1532->1533 1536 d2af8a-d2afa2 call d4d524 1532->1536 1533->1510 1548 d2afc4-d2afcc 1536->1548 1549 d2afa4-d2afc2 call d2a9c9 * 2 1536->1549 1550 d2b021-d2b023 1548->1550 1551 d2afce-d2afd5 1548->1551 1570 d2b040-d2b043 1549->1570 1559 d2b024-d2b02b 1550->1559 1555 d2afd7 1551->1555 1556 d2afda-d2aff0 call d4d524 1551->1556 1555->1556 1556->1549 1572 d2aff2-d2affa 1556->1572 1560 d2b030-d2b03e call d4d524 1559->1560 1561 d2b02d 1559->1561 1560->1570 1561->1560 1573 d2b14a-d2b14e 1568->1573 1569->1573 1574 d2b045 1570->1574 1575 d2b04b-d2b04e 1570->1575 1572->1550 1576 d2affc-d2b001 1572->1576 1577 d2b150-d2b155 1573->1577 1578 d2b157 1573->1578 1574->1575 1579 d2b050 1575->1579 1580 d2b056-d2b06a FreeLibrary call d2aa24 1575->1580 1576->1550 1581 d2b003-d2b008 1576->1581 1582 d2b15a-d2b165 1577->1582 1578->1582 1579->1580 1580->1533 1581->1550 1585 d2b00a-d2b01a 1581->1585 1583 d2b192-d2b196 1582->1583 1584 d2b167-d2b16b 1582->1584 1588 d2b19a-d2b19e 1583->1588 1589 d2b198 1583->1589 1584->1583 1587 d2b16d-d2b18b call d2a9c9 * 2 1584->1587 1585->1550 1597 d2b01c-d2b01f 1585->1597 1587->1583 1592 d2b1a2-d2b1c3 call d2ad06 ShellExecuteExW 1588->1592 1593 d2b1a0 1588->1593 1589->1588 1601 d2b1e5-d2b1e9 1592->1601 1602 d2b1c5-d2b1e3 GetLastError call d2ad06 1592->1602 1593->1592 1597->1559 1603 d2b1f6-d2b1ff CloseHandle 1601->1603 1604 d2b1eb-d2b1f0 WaitForSingleObject 1601->1604 1606 d2b201-d2b20f call d4ef49 1602->1606 1603->1606 1604->1603
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2AEAD
    • GetProcAddress.KERNEL32(00000000,CertCompareCertificate), ref: 00D2AF64
    • GetProcAddress.KERNEL32(?,CertFreeCertificateContext), ref: 00D2AF72
    • FreeLibrary.KERNEL32(?), ref: 00D2B059
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    • FreeLibrary.KERNEL32(?), ref: 00D2B08E
    • __CxxThrowException@8.LIBCMT ref: 00D2B0E9
    • _memset.LIBCMT ref: 00D2B128
    • ShellExecuteExW.SHELL32(?), ref: 00D2B1BB
      • Part of subcall function 00D4D524: _memset.LIBCMT ref: 00D4D589
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AddressFreeLibraryProc_memset$Exception@8ExecuteFileH_prolog3_ShellThrowWrite
    • String ID: CertCompareCertificate$CertFreeCertificateContext$Running command '%s' with arguments '%s'$ShellExecuteEx failed with error code %d$Unable to find functions '%s' and '%s' in '%s'$Unable to find local path for '%s' at '%s'$Unable to load Crypto dll '%s'$Will attempt to elevate process.$Wintrust not found on machine$crypt32.dll$runas
    • API String ID: 2146536375-805390676
    • Opcode ID: dd500de75ce281b151c79d910dcd3a15d0d730a19d26ede82307de6ed73350cb
    • Instruction ID: 50ec8de4bb3088214a6f866dd855c38d54a0c316a02e3cb8aced54286ad973d9
    • Opcode Fuzzy Hash: dd500de75ce281b151c79d910dcd3a15d0d730a19d26ede82307de6ed73350cb
    • Instruction Fuzzy Hash: 56A1CF71D00228EBCF21DFA8EC45A9EBBB5FF24718F14842AF505A7241D7B19984CBB1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1610 d394d4-d3950b 1611 d39511-d39514 1610->1611 1612 d39bc4 1610->1612 1611->1612 1614 d3951a-d3951c 1611->1614 1613 d39bc9-d39bd7 call d4ef49 1612->1613 1616 d39528-d39561 call d393c7 CreateCompatibleDC 1614->1616 1617 d3951e-d39523 1614->1617 1621 d39563-d39568 1616->1621 1622 d3956d-d39587 SelectObject 1616->1622 1617->1613 1621->1613 1623 d3958d-d3959b 1622->1623 1624 d395c9-d395e6 1623->1624 1625 d3959d-d395ae call d50a64 1623->1625 1627 d39617-d3962e 1624->1627 1628 d395e8-d395f0 1624->1628 1632 d39b92 1625->1632 1633 d395b4-d395c7 call d4f6d0 1625->1633 1631 d39631-d39660 1627->1631 1628->1627 1630 d395f2-d39615 1628->1630 1630->1631 1634 d39666-d396eb 1631->1634 1635 d396ed 1631->1635 1637 d39b9c-d39bae DeleteDC 1632->1637 1633->1624 1638 d396f4-d39743 call d39490 * 2 call d39463 1634->1638 1635->1638 1640 d39bc0-d39bc2 1637->1640 1641 d39bb0-d39bb5 1637->1641 1651 d39745-d39751 1638->1651 1652 d39764-d397a7 GetDeviceCaps GetObjectW 1638->1652 1640->1613 1641->1640 1643 d39bb7-d39bbf call d4ff2e 1641->1643 1643->1640 1653 d39753 1651->1653 1654 d39756-d39761 lstrlenW 1651->1654 1655 d397e2 1652->1655 1656 d397a9-d397e0 1652->1656 1653->1654 1654->1652 1657 d397e9-d3980a call d39463 1655->1657 1656->1657 1660 d3981a-d39826 1657->1660 1661 d3980c-d39818 1657->1661 1662 d3982c-d39832 1660->1662 1661->1662 1663 d39b65-d39b70 1662->1663 1664 d39837-d3984a 1663->1664 1665 d39b76-d39b8a 1663->1665 1666 d39891-d398c5 1664->1666 1667 d3984c-d3988f 1664->1667 1665->1623 1668 d39b90 1665->1668 1669 d398c7-d398d1 1666->1669 1667->1669 1668->1637 1670 d39943 1669->1670 1671 d398d3-d39941 1669->1671 1672 d3994a-d3998b call d39490 * 2 1670->1672 1671->1672 1677 d399cb-d399d2 1672->1677 1678 d3998d-d3998f 1672->1678 1679 d399d8-d399df 1677->1679 1680 d39aed-d39afc 1677->1680 1678->1677 1681 d39991-d39996 1678->1681 1679->1680 1682 d399e5-d399ed 1679->1682 1683 d39b09 1680->1683 1684 d39afe-d39b07 1680->1684 1685 d39998-d3999e 1681->1685 1686 d399f9-d39a01 1682->1686 1687 d399ef 1682->1687 1688 d39b0f-d39b12 1683->1688 1684->1688 1689 d399a0-d399a3 1685->1689 1690 d399be-d399c0 1685->1690 1686->1680 1692 d39a07-d39a0b 1686->1692 1687->1686 1693 d39b14-d39b1d 1688->1693 1694 d39b39-d39b40 1688->1694 1695 d399a5-d399ad 1689->1695 1696 d399ba-d399bc 1689->1696 1691 d399c3-d399c5 1690->1691 1691->1677 1691->1680 1692->1680 1699 d39a11-d39a31 MulDiv 1692->1699 1700 d39b31 1693->1700 1701 d39b1f-d39b2f call d4e590 1693->1701 1697 d39b42-d39b4e 1694->1697 1698 d39b50-d39b5c 1694->1698 1695->1690 1702 d399af-d399b8 1695->1702 1696->1691 1704 d39b62 1697->1704 1698->1704 1699->1680 1705 d39a37-d39a7e MulDiv DrawTextW 1699->1705 1703 d39b37 1700->1703 1701->1703 1702->1685 1702->1696 1703->1694 1704->1663 1708 d39a80-d39a8b 1705->1708 1709 d39ad4-d39ada 1705->1709 1708->1709 1711 d39a8d-d39a99 1708->1711 1709->1680 1710 d39adc-d39aea MulDiv 1709->1710 1710->1680 1712 d39a9b-d39a9e 1711->1712 1713 d39ab9-d39ac6 GetSystemMetrics 1711->1713 1712->1713 1716 d39aa0-d39aa2 1712->1716 1714 d39ac8-d39acc GetSystemMetrics 1713->1714 1715 d39ace 1713->1715 1717 d39ad1 1714->1717 1715->1717 1716->1713 1718 d39aa4-d39aa7 1716->1718 1717->1709 1718->1713 1719 d39aa9-d39aac 1718->1719 1719->1713 1720 d39aae-d39ab1 1719->1720 1720->1713 1721 d39ab3-d39ab7 1720->1721 1721->1709
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 00D39553
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CompatibleCreate
    • String ID: @$msctls_trackbar32
    • API String ID: 3111197059-876234929
    • Opcode ID: 7865519057143df84dd724dfc8b4b483e1ca6a43d091bd7ee3e902d6beec9b92
    • Instruction ID: 442f31ea0f007255f5e6b23e8309834fa4bbb2e4fb7bf09bf88f0421f1d04a9d
    • Opcode Fuzzy Hash: 7865519057143df84dd724dfc8b4b483e1ca6a43d091bd7ee3e902d6beec9b92
    • Instruction Fuzzy Hash: 8E321575D00228CFDB20CF69C991BADF7B1BF49314F2842AAD449A7292D7749E81CF20

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1722 d4b78e-d4b7e2 call d4f42b call d2b3c2 call d2cd7a call d2bf53 1731 d4b7e4-d4b7fc call d2c13b call d2aa24 1722->1731 1732 d4b801-d4b83b call d2d06d * 2 call d2edd0 1722->1732 1741 d4b9d7-d4b9dc call d4f496 1731->1741 1745 d4b841-d4b850 call d2edd0 1732->1745 1746 d4b8ec 1732->1746 1745->1746 1755 d4b856-d4b865 call d2edd0 1745->1755 1748 d4b8f1-d4b901 1746->1748 1750 d4b906-d4b91a RegOpenKeyExW 1748->1750 1751 d4b903 1748->1751 1753 d4b9a5-d4b9d1 call d2aa24 * 2 call d2c13b call d2aa24 1750->1753 1754 d4b920-d4b947 RegQueryValueExW 1750->1754 1751->1750 1753->1741 1757 d4b99c-d4b99f RegCloseKey 1754->1757 1758 d4b949-d4b94c 1754->1758 1766 d4b8e5-d4b8ea 1755->1766 1767 d4b867-d4b876 call d2edd0 1755->1767 1757->1753 1758->1757 1761 d4b94e-d4b952 1758->1761 1764 d4b9dd-d4ba08 call d42b90 RegQueryValueExW 1761->1764 1765 d4b958-d4b95c 1761->1765 1764->1757 1777 d4ba0a-d4ba10 1764->1777 1765->1764 1770 d4b95e-d4b962 1765->1770 1766->1748 1767->1766 1776 d4b878-d4b887 call d2edd0 1767->1776 1770->1757 1775 d4b964-d4b968 1770->1775 1775->1757 1779 d4b96a-d4b987 RegQueryValueExW 1775->1779 1790 d4b8de-d4b8e3 1776->1790 1791 d4b889-d4b898 call d2edd0 1776->1791 1782 d4ba27-d4ba3f ExpandEnvironmentStringsW 1777->1782 1783 d4ba12-d4ba22 call d2b36d 1777->1783 1779->1757 1780 d4b989-d4b992 1779->1780 1785 d4b995 1780->1785 1782->1757 1788 d4ba45-d4ba84 call d2c59b ExpandEnvironmentStringsW 1782->1788 1783->1785 1785->1757 1797 d4ba86-d4ba9a call d2b36d 1788->1797 1798 d4baa1-d4baac call d2c13b 1788->1798 1790->1748 1791->1790 1799 d4b89a-d4b8a9 call d2edd0 1791->1799 1797->1798 1798->1757 1806 d4b8d7-d4b8dc 1799->1806 1807 d4b8ab-d4b8ba call d2edd0 1799->1807 1806->1748 1807->1806 1810 d4b8bc-d4b8d2 call d2aa24 * 2 1807->1810 1810->1731
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00D4B798
    • RegOpenKeyExW.KERNEL32(80000002,?,00000000,00020019,?,HKLM,?,00000001), ref: 00D4B912
    • RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,?), ref: 00D4B943
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000004,?,?), ref: 00D4B983
    • RegCloseKey.KERNEL32(?), ref: 00D4B99F
    • RegQueryValueExW.KERNEL32(?,?,00000000,00000001,?,?,?,00000000), ref: 00D4BA04
    • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000), ref: 00D4BA35
    • ExpandEnvironmentStringsW.KERNEL32(?,?,?,00000000,?), ref: 00D4BA80
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: QueryValue$EnvironmentExpandStrings$CloseH_prolog3_catch_Open
    • String ID: HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
    • API String ID: 342522750-1642377470
    • Opcode ID: 73a3ec0d7f457e242c27e6be392fbde62e3de4743fa2060fb1af922cd87911bf
    • Instruction ID: 047b66a80b5006bb0f75f071ab97971cf28077b5577e33010e1f5903a3ad6277
    • Opcode Fuzzy Hash: 73a3ec0d7f457e242c27e6be392fbde62e3de4743fa2060fb1af922cd87911bf
    • Instruction Fuzzy Hash: 98913A70900218AFDB20EBA4DD91BEDB779FF20318F54406AE549A3152EB719E89CF31

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1815 d49034-d49071 call d4f3f0 1819 d49077-d49084 1815->1819 1820 d49291-d49295 1815->1820 1822 d4908a-d4908e 1819->1822 1821 d49297-d4929c call d4f482 1820->1821 1822->1822 1824 d49090-d490a9 SystemParametersInfoW 1822->1824 1826 d490b7-d490c5 call d344de 1824->1826 1827 d490ab-d490b1 1824->1827 1830 d49190-d491a4 FindResourceW 1826->1830 1831 d490cb-d490f9 call d365c3 1826->1831 1827->1826 1833 d491a6-d491b2 LoadResource 1830->1833 1834 d49210-d49213 1830->1834 1841 d49175-d4917b 1831->1841 1833->1834 1838 d491b4-d491e1 LockResource SizeofResource call d394d4 1833->1838 1835 d49235-d4923a 1834->1835 1836 d49215-d49232 CreateDialogParamW 1834->1836 1839 d49240-d4928b call d47ce1 MoveWindow SetForegroundWindow 1835->1839 1840 d4923c-d4923e 1835->1840 1836->1835 1838->1834 1850 d491e3-d4920a CreateDialogIndirectParamW call d4ff2e 1838->1850 1839->1820 1840->1821 1844 d49181-d4918b call d2c13b 1841->1844 1845 d490fb-d49127 call d3179e 1841->1845 1844->1830 1854 d49167-d49172 call d2aa24 1845->1854 1855 d49129-d49138 call d2edd0 1845->1855 1853 d4920f 1850->1853 1853->1834 1854->1841 1860 d4913f-d4914e call d2edd0 1855->1860 1861 d4913a-d4913d 1855->1861 1860->1854 1866 d49150 1860->1866 1862 d49153-d49162 call d48acf 1861->1862 1862->1854 1866->1862
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4903E
    • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00D490A1
    • FindResourceW.KERNEL32(?,?,00000005,Fonts,?,?), ref: 00D4919A
    • LoadResource.KERNEL32(?,00000000,?,?), ref: 00D491AA
    • LockResource.KERNEL32(00000000,?,?), ref: 00D491B5
    • SizeofResource.KERNEL32(?,00000000,00000000,?,?,?,?), ref: 00D491D0
    • CreateDialogIndirectParamW.USER32(?,?,?,?,?), ref: 00D491FB
    • CreateDialogParamW.USER32(?,?,?,?,?), ref: 00D4922C
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00D49282
    • SetForegroundWindow.USER32(?), ref: 00D4928B
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$CreateDialogParamWindow$FindForegroundH_prolog3_IndirectInfoLoadLockMoveParametersSizeofSystem
    • String ID: BaseFont$BoldFont$Font$Fonts$Name
    • API String ID: 1124334105-2070303938
    • Opcode ID: 25f2a8f97d7752a891cefb79c0ecd265c132e83508668db0f2748f856e32a406
    • Instruction ID: f7a753b2230352e61e2759c48d11ef5e2cfcb84243d4c2c07031ac97913a49a3
    • Opcode Fuzzy Hash: 25f2a8f97d7752a891cefb79c0ecd265c132e83508668db0f2748f856e32a406
    • Instruction Fuzzy Hash: 0E615F71900715EFCB209FA5DD89AAEBBB5FF18300F1484A9F54AA2661D7319E94CF30

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1867 d49486-d494ed call d2b217 * 2 call d49034 1874 d495f7 1867->1874 1875 d494f3-d494f8 1867->1875 1876 d495f9-d49607 call d4ef49 1874->1876 1875->1874 1877 d494fe-d49597 GetDlgItem GetWindowRect * 2 call d47db3 1875->1877 1882 d49599 1877->1882 1883 d4959b-d495ac SetWindowTextW 1877->1883 1882->1883 1884 d495b0-d495ee SetDlgItemTextW GetDlgItem ShowWindow GetDlgItem ShowWindow * 2 call d47ee0 1883->1884 1885 d495ae 1883->1885 1887 d495f3-d495f5 1884->1887 1885->1884 1887->1876
    APIs
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D2B217: _memmove.LIBCMT ref: 00D2B28E
      • Part of subcall function 00D49034: __EH_prolog3_GS.LIBCMT ref: 00D4903E
      • Part of subcall function 00D49034: SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00D490A1
      • Part of subcall function 00D49034: FindResourceW.KERNEL32(?,?,00000005,Fonts,?,?), ref: 00D4919A
      • Part of subcall function 00D49034: LoadResource.KERNEL32(?,00000000,?,?), ref: 00D491AA
      • Part of subcall function 00D49034: LockResource.KERNEL32(00000000,?,?), ref: 00D491B5
      • Part of subcall function 00D49034: SizeofResource.KERNEL32(?,00000000,00000000,?,?,?,?), ref: 00D491D0
      • Part of subcall function 00D49034: CreateDialogIndirectParamW.USER32(?,?,?,?,?), ref: 00D491FB
    • GetDlgItem.USER32(?,0000040B), ref: 00D49520
    • GetWindowRect.USER32(00000000), ref: 00D4952D
    • GetWindowRect.USER32(?,?), ref: 00D49536
      • Part of subcall function 00D47DB3: SendDlgItemMessageW.USER32(?,?,00000030,?,?), ref: 00D47DD9
    • SetWindowTextW.USER32(00000429,?), ref: 00D4959F
    • SetDlgItemTextW.USER32(00000429,00000410,?), ref: 00D495B9
    • GetDlgItem.USER32(00000429,00000069), ref: 00D495C4
    • ShowWindow.USER32(00000000), ref: 00D495D1
    • GetDlgItem.USER32(00000429,000003F0), ref: 00D495DD
    • ShowWindow.USER32(00000000), ref: 00D495E4
    • ShowWindow.USER32(00000429,00000000), ref: 00D495EA
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Window$Item$Resource$Show$RectText$CreateDialogFindH_prolog3_IndirectInfoLoadLockMessageParamParametersSendSizeofSystemXinvalid_argument_memmovestd::_
    • String ID: f$h
    • API String ID: 2112275004-26895948
    • Opcode ID: 7754da234c347768cff165ce7cd10db9095ec546f9c11dc38f0b7dfea5682707
    • Instruction ID: fcaad86a41ff76d848f5098872a9a02efbf2bc625986bebfc35e9eb52c118adf
    • Opcode Fuzzy Hash: 7754da234c347768cff165ce7cd10db9095ec546f9c11dc38f0b7dfea5682707
    • Instruction Fuzzy Hash: F14127B0900208EFDB20DF9ADC89E9EBBB9FF58310F10451AF515A62A0CB71A955CB74

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1921 d40227-d4023f call d4f3f0 1924 d40241 1921->1924 1925 d40243-d40287 call d3d0ac call d3fa57 call d2a9c9 call d3e32b 1921->1925 1924->1925 1934 d403f1-d403f9 1925->1934 1935 d4028d-d402d8 call d2b217 call d2c35d 1925->1935 1937 d40480-d404a3 1934->1937 1938 d403ff-d40406 1934->1938 1951 d402de-d40304 call d2a9c9 call d3d863 1935->1951 1952 d4039f-d403a6 1935->1952 1940 d404a5-d404c9 call d3fb7e call d3fe53 1937->1940 1941 d404d0-d404e3 call d40068 1937->1941 1942 d40408 1938->1942 1943 d4040a-d40429 call d2ad06 1938->1943 1961 d404ce 1940->1961 1950 d404e8-d404ef 1941->1950 1942->1943 1943->1937 1954 d4042b-d40432 1943->1954 1955 d404f4-d404f6 1950->1955 1979 d40306 1951->1979 1980 d40309-d40315 call d2ad06 1951->1980 1959 d403a8 1952->1959 1960 d403ab-d403bc call d2ad06 1952->1960 1962 d40434 1954->1962 1963 d40436-d40462 call d3d0ac call d3d863 call d2a9c9 1954->1963 1956 d404f1-d404f3 1955->1956 1957 d404f8-d40546 1955->1957 1956->1955 1964 d40548 1957->1964 1965 d4054a-d40574 call d3d0ac call d3f9aa call d2a9c9 1957->1965 1959->1960 1976 d403bf-d403eb call d2aa24 call d2c13b call d2aa24 1960->1976 1961->1950 1962->1963 1987 d40467-d4047e call d3cc15 1963->1987 1964->1965 1992 d40579-d405d4 call d3fc6a call d2b217 call d2aa24 call d4f482 1965->1992 1976->1934 1976->1935 1979->1980 1989 d4031a-d4039d call d2b217 call d3d7e2 call d3e359 call d3e073 call d2cf63 call d2aa24 1980->1989 1987->1937 1987->1954 1989->1976
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D40231
      • Part of subcall function 00D40068: __EH_prolog3_GS.LIBCMT ref: 00D4006F
    Strings
    • Not setting value for property '%s', xrefs: 00D403AC
    • Setting value ', xrefs: 00D402E4
    • ' for property '%s', xrefs: 00D4030A
    • '%s' RunCheck result: , xrefs: 00D4054B
    • Running checks for package '%s', phase , xrefs: 00D40244
    • The following properties have been set for package '%s':, xrefs: 00D4040B
    • Property: [%s] = , xrefs: 00D40437
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: ' for property '%s'$'%s' RunCheck result: $Not setting value for property '%s'$Property: [%s] = $Running checks for package '%s', phase $Setting value '$The following properties have been set for package '%s':
    • API String ID: 2427045233-2478332948
    • Opcode ID: 32b5ffb707c3dcd69f44f526437d6ea6b326300439c78dc5c21ff6402f086538
    • Instruction ID: 2625b8a9f38fc0dc62fc89fb10be843548be09065fc0f7c3fce9f1e901baebba
    • Opcode Fuzzy Hash: 32b5ffb707c3dcd69f44f526437d6ea6b326300439c78dc5c21ff6402f086538
    • Instruction Fuzzy Hash: C7B11571900218DFCB14DFA8D881BDEBBB5FF58304F50816AE55AE7291DB30AA85CB74

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2017 d30fdb-d30fff call d4f3f0 2020 d31005-d31030 2017->2020 2021 d311da-d311df call d4f482 2017->2021 2023 d31032 2020->2023 2024 d31034-d31044 call d3f928 2020->2024 2023->2024 2028 d31046-d31048 2024->2028 2029 d3108b-d310de call d2b217 * 2 2024->2029 2028->2029 2030 d3104a-d31051 2028->2030 2043 d31120-d31127 2029->2043 2044 d310e0-d310e7 2029->2044 2032 d31053 2030->2032 2033 d31058-d31062 2030->2033 2032->2033 2036 d31066-d31086 call d2ad06 call d2c13b 2033->2036 2037 d31064 2033->2037 2048 d311d2-d311d5 call d2aa24 2036->2048 2037->2036 2049 d31129 2043->2049 2050 d3112e-d31135 2043->2050 2046 d310e9 2044->2046 2047 d310ee-d310f8 2044->2047 2046->2047 2053 d310fa 2047->2053 2054 d310fc-d31103 2047->2054 2048->2021 2049->2050 2051 d31137 2050->2051 2052 d3113a-d31144 2050->2052 2051->2052 2056 d31146 2052->2056 2057 d31148-d3114f 2052->2057 2053->2054 2058 d31105 2054->2058 2059 d31108-d3111e call d2ad06 2054->2059 2056->2057 2060 d31151 2057->2060 2061 d31154-d31163 call d2ad06 2057->2061 2058->2059 2066 d3116b-d31189 call d2aa24 * 2 2059->2066 2060->2061 2065 d31168 2061->2065 2065->2066 2071 d3118b-d3118c 2066->2071 2072 d311b8-d311be 2066->2072 2074 d311c8-d311d1 call d2c13b 2071->2074 2075 d3118e-d31194 2071->2075 2073 d311c0-d311c6 2072->2073 2072->2074 2073->2074 2074->2048 2075->2074 2077 d31196-d311a5 2075->2077 2077->2074 2078 d311a7-d311b6 call d2b217 2077->2078 2078->2074
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D30FE5
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D2B217: _memmove.LIBCMT ref: 00D2B28E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_Xinvalid_argument_memmovestd::_
    • String ID: ByPassIf$FailIf$Result of running operator '%s' on property '%s' and value '%s': %s$Result of running operator '%s' on property '%s': %s$Skipping %s because Property '%s' was not defined$false$true
    • API String ID: 874089573-871101263
    • Opcode ID: 6a195252ddaab257cef901c4d5c53a6b6f3a2356097b899cd210162c5470f0d4
    • Instruction ID: 28532dc4e7ee5250c57887e7edd92282f0a29ebcda956cd242feb15a17d8d8fe
    • Opcode Fuzzy Hash: 6a195252ddaab257cef901c4d5c53a6b6f3a2356097b899cd210162c5470f0d4
    • Instruction Fuzzy Hash: 90619BB4900359AFCB24DF98D8809EEBBB4FF65304F548069E559A7251DA309E89CB30

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2082 d2b4d5-d2b53f call d4f6d0 2085 d2b543-d2b553 #92 2082->2085 2086 d2b541 2082->2086 2087 d2b555-d2b56b #78 2085->2087 2088 d2b5b8-d2b5be 2085->2088 2086->2085 2087->2088 2089 d2b56d-d2b593 #150 2087->2089 2090 d2b5c0-d2b5c6 #8 2088->2090 2091 d2b5cb-d2b5d1 2088->2091 2089->2088 2092 d2b595-d2b5b1 call d4e560 2089->2092 2090->2091 2093 d2b5d3-d2b5d9 #8 2091->2093 2094 d2b5de-d2b600 call d2b36d call d4ef49 2091->2094 2092->2088 2100 d2b5b3-d2b5b5 2092->2100 2093->2094 2100->2088
    APIs
    • _memset.LIBCMT ref: 00D2B519
    • #92.MSI(?,00000000,?), ref: 00D2B54C
    • #78.MSI(?,00000000,00000000,?,?,00000000,?), ref: 00D2B564
    • #150.MSI(?,00000007,0000001E,00000000,00000000,?,00000040,?,00000000,00000000,?,?,00000000,?), ref: 00D2B58C
    • _wcschr.LIBCMT ref: 00D2B5A8
    • #8.MSI(?,?,00000000,?), ref: 00D2B5C6
    • #8.MSI(?,?,00000000,?), ref: 00D2B5D9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: #150_memset_wcschr
    • String ID: @
    • API String ID: 605335943-2766056989
    • Opcode ID: f7992ef131ce89b998dc07e78e607e4c44ad49d415fc5c78e19b393c9cfa5a9c
    • Instruction ID: 3238e5b0b66544556397b3367f057bb2f85a7a08361976f63e769824d365bc7f
    • Opcode Fuzzy Hash: f7992ef131ce89b998dc07e78e607e4c44ad49d415fc5c78e19b393c9cfa5a9c
    • Instruction Fuzzy Hash: 10314D71900128ABDB20DB65DC41F9AB7B8FF44714F4081EAF54CE6156EB709E888F30

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2102 d3d863-d3d88b call d4f3f0 2105 d3d891-d3d892 2102->2105 2106 d3d914-d3d91b 2102->2106 2107 d3d894-d3d895 2105->2107 2108 d3d90a-d3d912 2105->2108 2109 d3d91f-d3d920 2106->2109 2110 d3d91d 2106->2110 2111 d3d8f3-d3d8fb 2107->2111 2112 d3d897-d3d898 2107->2112 2113 d3d925-d3d92e call d4c0b9 2108->2113 2109->2113 2110->2109 2114 d3d902-d3d908 2111->2114 2115 d3d8fd 2111->2115 2116 d3d89a-d3d8a7 call d2b36d 2112->2116 2117 d3d8ac-d3d8cf call d3d022 2112->2117 2124 d3d931-d3d938 2113->2124 2114->2113 2115->2114 2116->2124 2127 d3d8d1 2117->2127 2128 d3d8d4-d3d8f1 call d4c0b9 call d2aa24 2117->2128 2125 d3d93a 2124->2125 2126 d3d93d-d3d955 call d2a9c9 call d2aa24 call d4f482 2124->2126 2125->2126 2127->2128 2128->2124
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: %d {int}$%s {boolean}$%s {string}$%s {version}$false$true${empty}
    • API String ID: 2427045233-4233488036
    • Opcode ID: 74de02cecdf8289fd32869c4139df781ef41b8042527275a86b837ed71c199d8
    • Instruction ID: b9a71c668578d42112e7695383eee2bc9f464b7fb9bb90754f6327db79884281
    • Opcode Fuzzy Hash: 74de02cecdf8289fd32869c4139df781ef41b8042527275a86b837ed71c199d8
    • Instruction Fuzzy Hash: D8216071D052189FCB04EFA8F881EEDB7B5EF28304F54402AF145A7192DA709A49CF75

    Control-flow Graph

    APIs
    • GetDC.USER32(00000000), ref: 00D393DE
    • SelectObject.GDI32(00000000), ref: 00D393F3
    • GetTextMetricsW.GDI32(?,?), ref: 00D393FF
    • GetTextExtentPoint32W.GDI32(?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,?), ref: 00D39413
    • SelectObject.GDI32(?,?), ref: 00D39432
    • GetDialogBaseUnits.USER32 ref: 00D39436
    • ReleaseDC.USER32(00000000,?), ref: 00D3944B
    Strings
    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00D3940B
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ObjectSelectText$BaseDialogExtentMetricsPoint32ReleaseUnits
    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
    • API String ID: 1972319055-222967699
    • Opcode ID: 9fdb0660e642fda4ed6efe65dc790a0e073f76402dfdaa2bffd6fdbd8113d974
    • Instruction ID: 4acf0850330a6526f97d83b613decf1735d528e62890f3c77fdf864185626005
    • Opcode Fuzzy Hash: 9fdb0660e642fda4ed6efe65dc790a0e073f76402dfdaa2bffd6fdbd8113d974
    • Instruction Fuzzy Hash: 73113675D01219EBCB21AFA4DC06AADBBB8FF28300F044126F951EA250DA70A8128B64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2164 d429c4-d429d5 2165 d42b4e-d42b51 2164->2165 2166 d429db-d429f0 2164->2166 2167 d429f2-d429f7 call d6291b 2166->2167 2168 d429fc-d42a07 2166->2168 2167->2168 2170 d42a0d-d42a1b call d4170a call d2a954 2168->2170 2171 d42a98-d42aa3 2168->2171 2182 d42a20-d42a79 call d2bee9 call d4e900 * 2 2170->2182 2172 d42af5-d42b38 call d4e900 call d415df 2171->2172 2173 d42aa5-d42ae3 call d4e900 call d2bee9 2171->2173 2189 d42b49-d42b4b 2172->2189 2187 d42aef-d42af1 2173->2187 2198 d42a82-d42a93 2182->2198 2199 d42a7b-d42a81 call d4e550 2182->2199 2190 d42ae5-d42aec 2187->2190 2191 d42af3 2187->2191 2193 d42b4d 2189->2193 2194 d42b3a-d42b47 2189->2194 2190->2187 2191->2193 2193->2165 2194->2189 2198->2193 2199->2198
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D429F7
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    • _Allocate.LIBCPMT ref: 00D42A1B
    • _memmove.LIBCMT ref: 00D42A47
    • _memmove.LIBCMT ref: 00D42A64
    • _memmove.LIBCMT ref: 00D42AB9
    • _memmove.LIBCMT ref: 00D42B15
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$AllocateException@8ThrowXinvalid_argumentstd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 2152629851-3788999226
    • Opcode ID: 117e75b7a0c2b982e881ab0fa2ab8f6e9eaeadb1ed70c989b6ca5f391d905ee3
    • Instruction ID: 11e7b3a881451a2768da7e4f726b650fa4dcd57b4bad7bbba1a9a65939264ed0
    • Opcode Fuzzy Hash: 117e75b7a0c2b982e881ab0fa2ab8f6e9eaeadb1ed70c989b6ca5f391d905ee3
    • Instruction Fuzzy Hash: 3B516175A00609EFCB14DF6CCD868AEB7F5EF54304754892DF955D7254EA30EA40CB60
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3D2A7
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D2B217: _memmove.LIBCMT ref: 00D2B28E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_Xinvalid_argument_memmovestd::_
    • String ID: Code$Installed$Package$Package '%s' has been installed$Package '%s' has not been installed
    • API String ID: 874089573-4160827312
    • Opcode ID: 0e09c1097341c98d9f06563af68a6a5c0b78c25c428f597b348057e8798a0e64
    • Instruction ID: d75a68ec479bd945e06705b609ec592c28e0462a37d2f5b3da65abdfb8cbc914
    • Opcode Fuzzy Hash: 0e09c1097341c98d9f06563af68a6a5c0b78c25c428f597b348057e8798a0e64
    • Instruction Fuzzy Hash: D4B12771901228DFDB24DBA4DC81BEDB7B5EF15308F1445AAE50AA7291DB706E88CF31
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: Bypass$Fail$Result of checks for command '%s' is '%s'$Result of checks for command '%s' is 'Install'$Running checks for command '%s'
    • API String ID: 2427045233-1246856847
    • Opcode ID: 23acf7b93ac8d69e4d93adc4316193046314a4f12e254033b119c10e0453c0ff
    • Instruction ID: 3f3453142a9fff24c356bf64e7b7ce24791a31e569fc9de48c6a0d3966d66df1
    • Opcode Fuzzy Hash: 23acf7b93ac8d69e4d93adc4316193046314a4f12e254033b119c10e0453c0ff
    • Instruction Fuzzy Hash: 6E417C30910228EFDB11DFA8EC86B9DB7B4FF25318F108525F855AB291EB706954CBB1
    APIs
    • _memset.LIBCMT ref: 00D4BDD1
    • _memset.LIBCMT ref: 00D4BDE8
    • GetTempPathW.KERNEL32(00000104,?), ref: 00D4BDFD
    • GetTempFileNameW.KERNEL32(?,VSD,00000000,?), ref: 00D4BE20
      • Part of subcall function 00D4A0E5: GetFileAttributesW.KERNEL32(00D2E067,?,00D2E067,?), ref: 00D4A0F8
    • DeleteFileW.KERNEL32(?), ref: 00D4BE42
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: File$Temp_memset$AttributesDeleteNamePath
    • String ID: VSD
    • API String ID: 1299154628-2002190350
    • Opcode ID: 19ce347d85bb5640f554e66adc16965d37e6d322b96a9fc978229b68831c431f
    • Instruction ID: dad318c3069f1efc97d5624607717c00d3a4954a8c90b3b1e308c42cc27761e1
    • Opcode Fuzzy Hash: 19ce347d85bb5640f554e66adc16965d37e6d322b96a9fc978229b68831c431f
    • Instruction Fuzzy Hash: 06219FB5901318ABDF20DB64DC49BEA73BCDF69720F1444B2B208E3142DB34DA868B75
    APIs
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D4D33B
    • GetNativeSystemInfo.KERNEL32(?), ref: 00D4D349
    • FreeLibrary.KERNEL32(00000000), ref: 00D4D34E
    • GetSystemInfo.KERNEL32(?), ref: 00D4D35C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: System$DirectoryInfoLibrary_memset$AddressFreeLoadNativeProcWindows
    • String ID: GetNativeSystemInfo$kernel32.dll
    • API String ID: 3576978690-192647395
    • Opcode ID: 777dd5278ca37ccc0227e70b92030bfc3cb9bf2ca95b2fac2fdd85f8da8eda08
    • Instruction ID: adedfdb882bb233d683b6086e5a318f6ad82f2bc6a51b91fea0850e6869cacf4
    • Opcode Fuzzy Hash: 777dd5278ca37ccc0227e70b92030bfc3cb9bf2ca95b2fac2fdd85f8da8eda08
    • Instruction Fuzzy Hash: 17F0F936A41348AB8724EF71EC099DE7BB8EF95724B080415F901F3180DA34D949C670
    APIs
    • __EH_prolog3.LIBCMT ref: 00D4B444
    • FindResourceW.KERNEL32(00000000,?,?,00000024,00D4C5D7,0000002B,00000000,?,Files,?), ref: 00D4B47C
    • LoadResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B490
    • SizeofResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B4A1
    • LockResource.KERNEL32(?,?,Files,?), ref: 00D4B4B4
    • _memmove.LIBCMT ref: 00D4B4C1
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$FindH_prolog3LoadLockSizeof_memmove
    • String ID:
    • API String ID: 825505968-0
    • Opcode ID: 14bc4ecc7d84bba6b4e571bc8fe56084930dc3b14b29640fe9979f9c685cad0d
    • Instruction ID: 67687106dc98c9cccb522fb7171d64298daf438aacaa95f807f6de9aab365061
    • Opcode Fuzzy Hash: 14bc4ecc7d84bba6b4e571bc8fe56084930dc3b14b29640fe9979f9c685cad0d
    • Instruction Fuzzy Hash: 3A2119B5D00228ABCF11AFA4DC858EEFBB9FF68714B188516E805A3225E7718D51DB70
    APIs
      • Part of subcall function 00D49034: __EH_prolog3_GS.LIBCMT ref: 00D4903E
      • Part of subcall function 00D49034: SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00D490A1
      • Part of subcall function 00D49034: FindResourceW.KERNEL32(?,?,00000005,Fonts,?,?), ref: 00D4919A
      • Part of subcall function 00D49034: LoadResource.KERNEL32(?,00000000,?,?), ref: 00D491AA
      • Part of subcall function 00D49034: LockResource.KERNEL32(00000000,?,?), ref: 00D491B5
      • Part of subcall function 00D49034: SizeofResource.KERNEL32(?,00000000,00000000,?,?,?,?), ref: 00D491D0
      • Part of subcall function 00D49034: CreateDialogIndirectParamW.USER32(?,?,?,?,?), ref: 00D491FB
    • SetWindowTextW.USER32(?,?), ref: 00D492FE
    • SetDlgItemTextW.USER32(?,0000040F,?), ref: 00D49318
    • SetForegroundWindow.USER32(?), ref: 00D49321
    • ShowWindow.USER32(?,00000005,?,?,?,?), ref: 00D4932C
    • LoadCursorW.USER32(00000000,00007F02), ref: 00D49339
    • SetCursor.USER32(00000000,?,?,?,?), ref: 00D49340
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$Window$CursorLoadText$CreateDialogFindForegroundH_prolog3_IndirectInfoItemLockParamParametersShowSizeofSystem
    • String ID:
    • API String ID: 2553933429-0
    • Opcode ID: cad5e4eb5a9630826846512017f617090064448c950a2718cf828617d7c311fa
    • Instruction ID: 9c41508033ab129b08c19a767869b9fbd02c79eb1e38271f9f29607e3372c444
    • Opcode Fuzzy Hash: cad5e4eb5a9630826846512017f617090064448c950a2718cf828617d7c311fa
    • Instruction Fuzzy Hash: 08011335100205EFDB209F96DC5EE9B7BA6EF26342B018168FA16DA2B1C731D852DB74
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D42C0D
    • RegOpenKeyExW.KERNEL32(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce,00000000,00000001,?,00000000,00000000,00000044), ref: 00D42C3E
    • RegCloseKey.KERNEL32(?), ref: 00D42CFF
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    Strings
    • vsbootstrapper, xrefs: 00D42CC0
    • SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce, xrefs: 00D42C31
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CloseH_prolog3_Open_memmove
    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce$vsbootstrapper
    • API String ID: 416362967-3239284363
    • Opcode ID: 59706308a86a245ead19285dc313c4f6cfc61efa307e79d34bb0a9c6b8f14400
    • Instruction ID: e0306198055046529659dfdcbad9668ee09ba5852a223fbe06f31799f5cbf523
    • Opcode Fuzzy Hash: 59706308a86a245ead19285dc313c4f6cfc61efa307e79d34bb0a9c6b8f14400
    • Instruction Fuzzy Hash: C231F5B1D11258BFDF11AFA8EDC5AEEBB78EF14348F54402AF905A2191DA304D45DB30
    APIs
    • _memset.LIBCMT ref: 00D4CDD4
    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
    • _memset.LIBCMT ref: 00D4CE19
    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
    • LoadLibraryW.KERNEL32(?), ref: 00D4CE52
      • Part of subcall function 00D4C3C8: __EH_prolog3_GS.LIBCMT ref: 00D4C3CF
      • Part of subcall function 00D4C3C8: LoadLibraryW.KERNEL32(00000000,?,00000020,00D4CE46,?,?), ref: 00D4C410
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: DirectoryLibraryLoad_memset$H_prolog3_SystemWindows
    • String ID:
    • API String ID: 2112805268-0
    • Opcode ID: 1cce22b75dfa3f9c366cb79daad9266a04effe21162afc11bb0fe0579cc3a0f6
    • Instruction ID: 292fdb6edf6d6687668aaf5f5b7e5524d9aaa0c5e826063964bccdc4f8e0a1ff
    • Opcode Fuzzy Hash: 1cce22b75dfa3f9c366cb79daad9266a04effe21162afc11bb0fe0579cc3a0f6
    • Instruction Fuzzy Hash: 671151BA94131CABDB20AB64EC89BCEB7BCEB24710F1045A5F515E3151EA709E848A70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3EB7B
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D2B217: _memmove.LIBCMT ref: 00D2B28E
      • Part of subcall function 00D3E406: __EH_prolog3_GS.LIBCMT ref: 00D3E410
    • __CxxThrowException@8.LIBCMT ref: 00D3ED75
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$Exception@8ThrowXinvalid_argument_memmovestd::_
    • String ID: ApplicationName$Package
    • API String ID: 3998058384-86433421
    • Opcode ID: cdb17c510e56944af93beff8cae167791fe2140d1fb5c3297c0ca330fae479e8
    • Instruction ID: 8845d6622e2cdde255fea4b533dc6f91dd733d847a69546e884b90ea3ce20035
    • Opcode Fuzzy Hash: cdb17c510e56944af93beff8cae167791fe2140d1fb5c3297c0ca330fae479e8
    • Instruction Fuzzy Hash: 88516771900218AFCB14EFA8D891AEDB7B5FF58314F244169E41AB32C1DB706E44CB71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D37D8D
      • Part of subcall function 00D36637: __EH_prolog3.LIBCMT ref: 00D3663E
    • _memset.LIBCMT ref: 00D37E56
      • Part of subcall function 00D2B608: __EH_prolog3.LIBCMT ref: 00D2B60F
    • __CxxThrowException@8.LIBCMT ref: 00D37DF1
      • Part of subcall function 00D4EE98: RaiseException.KERNEL32(?,?,00D2A9A0,?,?,?,?,?,00D2A9A0,?,00D6A6A8,00000000), ref: 00D4EEDA
      • Part of subcall function 00D2AD7D: __EH_prolog3_GS.LIBCMT ref: 00D2AD84
    Strings
    • Could not open configuration file., xrefs: 00D37DD9
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_$ExceptionException@8RaiseThrow_memset
    • String ID: Could not open configuration file.
    • API String ID: 528018053-2987739602
    • Opcode ID: 49c5c7cc7fc82c042a2f772450edfa290757a9277300787ac8ba7f34c678a81d
    • Instruction ID: a2a16773896b4e3de98eb88cf0f78fd44d934df0bcfbdf055e193679d134511a
    • Opcode Fuzzy Hash: 49c5c7cc7fc82c042a2f772450edfa290757a9277300787ac8ba7f34c678a81d
    • Instruction Fuzzy Hash: 24414D71D00208AFDB20DBA8D982FEEB7F8EF04704F108069F515B7291DA749E458B70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4BAD3
      • Part of subcall function 00D4A0E5: GetFileAttributesW.KERNEL32(00D2E067,?,00D2E067,?), ref: 00D4A0F8
    • GlobalAlloc.KERNEL32(00000040,00000000,?,?), ref: 00D4BB7A
    • GlobalFree.KERNEL32(00000000), ref: 00D4BC19
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Global$AllocAttributesFileFreeH_prolog3_
    • String ID: %d.%d.%d.%d
    • API String ID: 965710651-3491811756
    • Opcode ID: 217356ad1c7eb216c7b33a0472cc81af6857f2525f32e2c6e349eea3a5ea2e17
    • Instruction ID: 605d8e0504398f7a44189c0b1fb1ac636fde6e35a495dbd515af2277beb06974
    • Opcode Fuzzy Hash: 217356ad1c7eb216c7b33a0472cc81af6857f2525f32e2c6e349eea3a5ea2e17
    • Instruction Fuzzy Hash: 034180718411296BCF20AFA4DCC9AEEB778EB69310F5441E9F909A7152DB309E85CF70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4BCBD
      • Part of subcall function 00D4B78E: __EH_prolog3_catch_GS.LIBCMT ref: 00D4B798
    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4BD5C
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
    Strings
    • InstallerLocation, xrefs: 00D4BCFF
    • HKLM\Software\Microsoft\Windows\CurrentVersion\Installer, xrefs: 00D4BD04
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: DirectoryH_prolog3_H_prolog3_catch_SystemXinvalid_argumentstd::_
    • String ID: HKLM\Software\Microsoft\Windows\CurrentVersion\Installer$InstallerLocation
    • API String ID: 3161095846-3782479466
    • Opcode ID: 8703f0ec9c19935f8defc5abeb0a654e815c603a07d10d993088cccb5735ae15
    • Instruction ID: fcf03f7299e249070d5e71d9f175320eec5d73a95acaa3d437449c1928fa2f11
    • Opcode Fuzzy Hash: 8703f0ec9c19935f8defc5abeb0a654e815c603a07d10d993088cccb5735ae15
    • Instruction Fuzzy Hash: 2B213E70D02238ABCB60EF54DC89BDD7778EF68714F1005D6A00AA6152DB749A85CF71
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D4A706
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    • _Allocate.LIBCPMT ref: 00D4A71E
    • _memmove.LIBCMT ref: 00D4A733
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateException@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 1114612255-3788999226
    • Opcode ID: ef6934d57392faa53df6cf70e6171ad2c67e90b08afff4674dcb139d3fd3a51d
    • Instruction ID: e630cc4df3a47def811664b1842d7c3eafa7017e3343371c39a439fd92e16cfa
    • Opcode Fuzzy Hash: ef6934d57392faa53df6cf70e6171ad2c67e90b08afff4674dcb139d3fd3a51d
    • Instruction Fuzzy Hash: 4101B171100605AFCB20EFADC8C5D6AB7E8EF843107548A2DF59AD7284EA70FD408BB0
    APIs
    • _malloc.LIBCMT ref: 00D4EE2D
      • Part of subcall function 00D53605: __FF_MSGBANNER.LIBCMT ref: 00D5361E
      • Part of subcall function 00D53605: __NMSG_WRITE.LIBCMT ref: 00D53625
      • Part of subcall function 00D53605: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00D56B38,00000000,00000001,00000000,?,00D56DCA,00000018,00D6DEB0,0000000C,00D56E5F), ref: 00D5364A
    • std::exception::exception.LIBCMT ref: 00D4EE62
    • __CxxThrowException@8.LIBCMT ref: 00D4EE8D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateException@8HeapThrow_mallocstd::exception::exception
    • String ID: bad allocation
    • API String ID: 1264268182-2104205924
    • Opcode ID: 0e397afc8316763b4ef8cbceef65b9ad44e1a5eaf565d0bc02abb777e9cc31c9
    • Instruction ID: ae0da5d30fa143418bb9537abe573e2fc4aa8cd19c80fd6d6c6b54c26ef31429
    • Opcode Fuzzy Hash: 0e397afc8316763b4ef8cbceef65b9ad44e1a5eaf565d0bc02abb777e9cc31c9
    • Instruction Fuzzy Hash: A0F0A476900319BBDF10FB68DC02A9DBBA4FF40754F180529F804E6291EB70DA4AC675
    APIs
    • GetNativeSystemInfo.KERNEL32(?), ref: 00D43652
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: InfoNativeSystem
    • String ID: Intel$Intel64$x64
    • API String ID: 1721193555-2803704216
    • Opcode ID: a1acb4fad835436af346eec8580d3bec4666dcfca549ed348a349e01412f01f1
    • Instruction ID: dda26697a1c08328a27a0a1593fde0c0c95938840b88974d245bd736e905753a
    • Opcode Fuzzy Hash: a1acb4fad835436af346eec8580d3bec4666dcfca549ed348a349e01412f01f1
    • Instruction Fuzzy Hash: 55F0E93070131AFB8E08DB58A805CBD77A4EB68B55B5A401AF842E7390DA60DE4987B9
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4372F
      • Part of subcall function 00D4B43D: __EH_prolog3.LIBCMT ref: 00D4B444
      • Part of subcall function 00D4B43D: FindResourceW.KERNEL32(00000000,?,?,00000024,00D4C5D7,0000002B,00000000,?,Files,?), ref: 00D4B47C
      • Part of subcall function 00D4B43D: LoadResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B490
      • Part of subcall function 00D4B43D: SizeofResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B4A1
      • Part of subcall function 00D2B608: __EH_prolog3.LIBCMT ref: 00D2B60F
    • __CxxThrowException@8.LIBCMT ref: 00D4377A
      • Part of subcall function 00D4EE98: RaiseException.KERNEL32(?,?,00D2A9A0,?,?,?,?,?,00D2A9A0,?,00D6A6A8,00000000), ref: 00D4EEDA
    Strings
    • An error occurred attempting to extract setup configuration file., xrefs: 00D43762
    • SETUPCFG, xrefs: 00D4374F
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$H_prolog3$ExceptionException@8FindH_prolog3_LoadRaiseSizeofThrow
    • String ID: An error occurred attempting to extract setup configuration file.$SETUPCFG
    • API String ID: 3704036767-3123322425
    • Opcode ID: 404cd633a51b5d354513878acb11d2e5c7891aa1bcd4ca202cfe205392afeeb8
    • Instruction ID: 6be2075c65ca79ef94e0282f8c90bd96cb999d165c48b1f005544c0484cb1dc4
    • Opcode Fuzzy Hash: 404cd633a51b5d354513878acb11d2e5c7891aa1bcd4ca202cfe205392afeeb8
    • Instruction Fuzzy Hash: E8F0FF71E402186BDF00EBE8D857BEDB3B4EF14719F408025F515B6185DBB466098B75
    APIs
    • IsDialogMessageW.USER32(?,?), ref: 00D47F08
    • TranslateMessage.USER32(?), ref: 00D47F16
    • DispatchMessageW.USER32(?), ref: 00D47F20
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D47F2F
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Message$DialogDispatchPeekTranslate
    • String ID:
    • API String ID: 1266772231-0
    • Opcode ID: c425570f73b61869430c28274aeec57e68b91696e118b3373182606e7840ff9d
    • Instruction ID: 6bded8b85c46e2659bde8755993b19659732912322f80634a4b2c46a2dd53bea
    • Opcode Fuzzy Hash: c425570f73b61869430c28274aeec57e68b91696e118b3373182606e7840ff9d
    • Instruction Fuzzy Hash: E9F01976A00219EBDF209BA59C89DEAB7BDEFA87047044169F501E2110E664D9098B74
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateH_prolog3_catch_memmove
    • String ID:
    • API String ID: 1361164945-0
    • Opcode ID: 1912feb3f7fc286e3e65b25c3f6e970c22a42919580fbb700d997db6f268ee79
    • Instruction ID: fbd224d912b37e541afa0fb590ed291d163988cb443cc21b8d2a2bd18ffbc98f
    • Opcode Fuzzy Hash: 1912feb3f7fc286e3e65b25c3f6e970c22a42919580fbb700d997db6f268ee79
    • Instruction Fuzzy Hash: DC21CD31B002119BDB28DF2CE88176D77A2FFA4314F28451DF445DB290DB70AA44CBB2
    APIs
    • DestroyWindow.USER32(?,00000001,?,00000000,00D47F79,00000008,00D478E2,?,.msi), ref: 00D47E93
    • DeleteObject.GDI32(?), ref: 00D47EB3
    • DeleteObject.GDI32(?), ref: 00D47EC0
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: DeleteObject$DestroyWindow
    • String ID:
    • API String ID: 409195656-0
    • Opcode ID: 969c542ca09b775333d0438b2b4b29bd5bf59f8ecc835fe73853b59acfe7b220
    • Instruction ID: 80e0233272b16440bde12c404180708a56be733887485c0a719b990cb0ac3a05
    • Opcode Fuzzy Hash: 969c542ca09b775333d0438b2b4b29bd5bf59f8ecc835fe73853b59acfe7b220
    • Instruction Fuzzy Hash: 01F0FEBA5057419F87309F6AD8C4817FBF8BFA82103558A7EE559D3710C374EC498A70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4C90F
      • Part of subcall function 00D4BCB3: __EH_prolog3_GS.LIBCMT ref: 00D4BCBD
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$_memmove
    • String ID: msi.dll
    • API String ID: 2992230404-3974507041
    • Opcode ID: 2a2b05e8c7c5c38cf9528d31007ce029bbf3971ffbcfaef7d6017ca4e873aeda
    • Instruction ID: bc8c7c844daf5eb443c7ec942e8f880edb8248d5d838ddac75e950b8c0063c05
    • Opcode Fuzzy Hash: 2a2b05e8c7c5c38cf9528d31007ce029bbf3971ffbcfaef7d6017ca4e873aeda
    • Instruction Fuzzy Hash: 5C213B71D15208AFDF00DFE8E891AEEBBB8EF18314F54542AE115B7181D6309A49CBB5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: VersionMsi
    • API String ID: 2427045233-3588216237
    • Opcode ID: 5524a8cd5d66dc77512da11a96a9077674c57dd8d714e7bb1d35570624aac1be
    • Instruction ID: faf278c77f940e6b3766d7816ac5158c874d1f89b604204045987d25972b8eae
    • Opcode Fuzzy Hash: 5524a8cd5d66dc77512da11a96a9077674c57dd8d714e7bb1d35570624aac1be
    • Instruction Fuzzy Hash: 4A21E431944205DBCF00EFA4E8426EEB376EF34324F548129E555AB291EB329A05DF70
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D2AE03
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
    • String ID: string too long
    • API String ID: 2884196479-2556327735
    • Opcode ID: aac7e24399c3e6733fcfbae0d03f32a2aaa398fb5b6e0cc9051c2e09bc3448b4
    • Instruction ID: 32d72c50f6ee8493e151f48536a4860ac60e16cee78c89c0f60c1e9f26a9a62e
    • Opcode Fuzzy Hash: aac7e24399c3e6733fcfbae0d03f32a2aaa398fb5b6e0cc9051c2e09bc3448b4
    • Instruction Fuzzy Hash: DCF0C2327402306BCB21A92CA8449BA368AEF7576DB324955F4A1DF181C622CC4387F7
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D3572B
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
    • String ID: string too long
    • API String ID: 2884196479-2556327735
    • Opcode ID: f4a9f5dba6590d77015c762a5943866391a101e765e0708d7d84b21d0240382c
    • Instruction ID: 0510ddb5148186cac05d6b1d2f24c6a6938a359272f8a43611ea8512fb73c92c
    • Opcode Fuzzy Hash: f4a9f5dba6590d77015c762a5943866391a101e765e0708d7d84b21d0240382c
    • Instruction Fuzzy Hash: 80F02871300B10ABCB306E6DE98191AF7F9FF54B20F14062EF492D7690CB61AC0483B4
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D4AD9D
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 2884196479-3788999226
    • Opcode ID: 296a64463a11e834763c86e68a6f6a23ff2bd2b6edfb08427e4f7c80c820a802
    • Instruction ID: 5851db5d9e9afe01dd1cd7bb2527fe1a463d4474cf01470b03d3b1a94925d8c6
    • Opcode Fuzzy Hash: 296a64463a11e834763c86e68a6f6a23ff2bd2b6edfb08427e4f7c80c820a802
    • Instruction Fuzzy Hash: 79E0ED327408106B4708EE6EC88281E3BCA9BD8311329C228F129C3288DE30A84146B9
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D41A52
      • Part of subcall function 00D4B43D: __EH_prolog3.LIBCMT ref: 00D4B444
      • Part of subcall function 00D4B43D: FindResourceW.KERNEL32(00000000,?,?,00000024,00D4C5D7,0000002B,00000000,?,Files,?), ref: 00D4B47C
      • Part of subcall function 00D4B43D: LoadResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B490
      • Part of subcall function 00D4B43D: SizeofResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B4A1
      • Part of subcall function 00D392E6: __EH_prolog3_GS.LIBCMT ref: 00D391FE
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$H_prolog3_$FindH_prolog3LoadSizeof
    • String ID: SETUPRES
    • API String ID: 1574261694-336410042
    • Opcode ID: b31903846497ffaf8cd4b610170bfd0a131780bffabbe42a857a0f93a25aad58
    • Instruction ID: 015a217999c4833435ec833c7c6c1e16785960ecd45b26fab69090f5cbea6799
    • Opcode Fuzzy Hash: b31903846497ffaf8cd4b610170bfd0a131780bffabbe42a857a0f93a25aad58
    • Instruction Fuzzy Hash: 97F03072E502099BDB00EBA8D817BEE73B4DF08718F40C015E505BA182DB7596088BB1
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4C9E2
      • Part of subcall function 00D2C5D3: std::_Xinvalid_argument.LIBCPMT ref: 00D2C5EC
      • Part of subcall function 00D2C5D3: std::_Xinvalid_argument.LIBCPMT ref: 00D2C60E
      • Part of subcall function 00D2C5D3: _memmove.LIBCMT ref: 00D2C652
    • CreateDirectoryW.KERNEL32(?,00000000,?,00000000,000000FF,?,?,00000001,?,?,?,?,00000058,00D3AF8B,?), ref: 00D4CAEA
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$CreateDirectoryH_prolog3__memmove
    • String ID:
    • API String ID: 3408557616-0
    • Opcode ID: 93c03dfa69619ab36c6d80aa3a4f46d1005aa043855f571bf81dbd91f8248a90
    • Instruction ID: 0d18cd2c400d60563839da0e39dbc78113f2d01f8f2947955b655a3e4f350e7b
    • Opcode Fuzzy Hash: 93c03dfa69619ab36c6d80aa3a4f46d1005aa043855f571bf81dbd91f8248a90
    • Instruction Fuzzy Hash: F541AE31D51218ABCF10EBACDC56EEEBBB8EF25354F148015F512B7181D670AA45CBB1
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4C3CF
      • Part of subcall function 00D4BF95: _memset.LIBCMT ref: 00D4BFD6
    • LoadLibraryW.KERNEL32(00000000,?,00000020,00D4CE46,?,?), ref: 00D4C410
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_LibraryLoad_memset
    • String ID:
    • API String ID: 463936710-0
    • Opcode ID: 03137f6a0abe2e4a1196001359c90ec5efd7295092e96ab471cdd0dd46ce5212
    • Instruction ID: 55ab6e4798cb2059c3386e1574134f7cbacd45f704782fed871a21930b5c686a
    • Opcode Fuzzy Hash: 03137f6a0abe2e4a1196001359c90ec5efd7295092e96ab471cdd0dd46ce5212
    • Instruction Fuzzy Hash: 08F04971D112189BDB10DFA9C855AFFBBB8EF58390F508025F919AB241DB34AA05CBF1
    APIs
    • CreateFileW.KERNEL32(?,40000000,00000001,00000000,?,08000080,00000000), ref: 00D436C8
    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 00D436DA
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: File$CreatePointer
    • String ID:
    • API String ID: 2024441833-0
    • Opcode ID: ab36d9791897b723a7a0fec51e9d5d8c70b4d04439f6f68aca53067ef1da5a28
    • Instruction ID: 2ea6d227f18ad7fed72244d52cc7200bf7d72ac7debedd1045a72dabc8789db2
    • Opcode Fuzzy Hash: ab36d9791897b723a7a0fec51e9d5d8c70b4d04439f6f68aca53067ef1da5a28
    • Instruction Fuzzy Hash: CBF0E5B20002087FE7205F64EC8AFA7BB5DFB50378F15C525F555CA1A1D6719E988BB0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3FE5A
      • Part of subcall function 00D2FBDC: __EH_prolog3_GS.LIBCMT ref: 00D2FBE3
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID:
    • API String ID: 2427045233-0
    • Opcode ID: da297a0216476f25fbdaa2931ea7131f8db0a6ed4348f2f945ddaca9d0c7d63e
    • Instruction ID: f6dbe9aebfcae7795e7ed3561cd05538a9902dfcafad1cda1107862b3c500c7c
    • Opcode Fuzzy Hash: da297a0216476f25fbdaa2931ea7131f8db0a6ed4348f2f945ddaca9d0c7d63e
    • Instruction Fuzzy Hash: 1D312971D40259EFDB10EFA4D841BDEB7B4EF18314F108129E515BB291DBB46948CB71
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00D3748E
      • Part of subcall function 00D34E9C: __EH_prolog3_catch.LIBCMT ref: 00D34EA3
      • Part of subcall function 00D34E9C: std::ios_base::getloc.LIBCPMT ref: 00D34EEB
      • Part of subcall function 00D34E9C: std::ios_base::clear.LIBCPMT ref: 00D34F3D
      • Part of subcall function 00D2AA74: std::_Xinvalid_argument.LIBCPMT ref: 00D2AA8C
      • Part of subcall function 00D2AA74: _memmove.LIBCMT ref: 00D2AACA
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_catchH_prolog3_catch_Xinvalid_argument_memmovestd::_std::ios_base::clearstd::ios_base::getloc
    • String ID:
    • API String ID: 661421567-0
    • Opcode ID: c9987fef65f47ad14933333143d18177357295ae821db653d758ee9265dfe777
    • Instruction ID: f709c75056a0f6a552bf5110d57e0ea12dae4a235225d26d09dc155deab06bb5
    • Opcode Fuzzy Hash: c9987fef65f47ad14933333143d18177357295ae821db653d758ee9265dfe777
    • Instruction Fuzzy Hash: FF317C74A04659DFCB24EF98C551BBDBBB0EF14314F648198E4926B2D2CB34AE00DB74
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D392F0
      • Part of subcall function 00D37F9D: __EH_prolog3.LIBCMT ref: 00D37FA4
      • Part of subcall function 00D37F9D: std::ios_base::clear.LIBCPMT ref: 00D38027
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_std::ios_base::clear
    • String ID:
    • API String ID: 3738461641-0
    • Opcode ID: f6f558db60a1c4cf35a3f8c9abbe2eb4b8f28c8bd1b14c118ca9f715ffab57e5
    • Instruction ID: f6edb91079596f7796e9b7d0c7a28634917926a98a7c7b3a34ca10cca297f2d5
    • Opcode Fuzzy Hash: f6f558db60a1c4cf35a3f8c9abbe2eb4b8f28c8bd1b14c118ca9f715ffab57e5
    • Instruction Fuzzy Hash: 862132B1D4425DABDB24DFA8D891FEEB7B8EF14304F1081A9F419A3191EE705A48DB30
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 3cfe98217aa5096d1ca9ea3fd296ca66c1879ea702fcae0b43656ac4080a30db
    • Instruction ID: f4ab9d39651079f907271583c8299ff6aa9b0df5a67a95717623e7e497da7981
    • Opcode Fuzzy Hash: 3cfe98217aa5096d1ca9ea3fd296ca66c1879ea702fcae0b43656ac4080a30db
    • Instruction Fuzzy Hash: 1201A131200324E78A209E5DB84499EBBB9EFA1769710091BF48687210D7B1ED458BB5
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3
    • String ID:
    • API String ID: 431132790-0
    • Opcode ID: 42fda15481426558db52440f74d529470cba169f2d60e2186ea16686200156f1
    • Instruction ID: 30aa15f77ea1ff5d7c0ba3bf24f0285052c4765af50f028cb60e6542a1aab17c
    • Opcode Fuzzy Hash: 42fda15481426558db52440f74d529470cba169f2d60e2186ea16686200156f1
    • Instruction Fuzzy Hash: 8B11E5B1D0021A9FDF01EFD4C8819EEBBB4FF18310F54502AF515B2261EA39AA11CBB5
    APIs
    • WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: ca17ff7b81c5ef342d0d5091841c831f3bf3fc077583ad58da6719b9ff42ae7b
    • Instruction ID: 0e359fc00dc48d86e617aad27c7f7befcf317b8f06e7b79e885a09766c30d4e0
    • Opcode Fuzzy Hash: ca17ff7b81c5ef342d0d5091841c831f3bf3fc077583ad58da6719b9ff42ae7b
    • Instruction Fuzzy Hash: 38F0F072600204BFC304CB1CCC06EFFB7A9DFA9720F46425AF801D72A0E770AE0486A0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2AD0D
      • Part of subcall function 00D4C024: __EH_prolog3.LIBCMT ref: 00D4C02B
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_
    • String ID:
    • API String ID: 3355343447-0
    • Opcode ID: e8f4dbdd8970770a4a072012152f06566ab2b970156ca6b55cefe86c8553ee3a
    • Instruction ID: f5f152732cabda6320d5cb41a648d2883fcd9f9e9db0935bf77520a07dc2b25f
    • Opcode Fuzzy Hash: e8f4dbdd8970770a4a072012152f06566ab2b970156ca6b55cefe86c8553ee3a
    • Instruction Fuzzy Hash: 5101F671E10219ABDF00EBA8D846BEEB3B8EF18319F408025E515A6281DB7496088BB5
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3D0B3
      • Part of subcall function 00D4C024: __EH_prolog3.LIBCMT ref: 00D4C02B
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_
    • String ID:
    • API String ID: 3355343447-0
    • Opcode ID: b93915396aff260871dbc5a263ebebfaa2f15df7de24d7f02ee1e36ea67cb627
    • Instruction ID: 7149017397b94b20ae7844408e4e1cf1a49d284afaddb02c4075d92a094b7d85
    • Opcode Fuzzy Hash: b93915396aff260871dbc5a263ebebfaa2f15df7de24d7f02ee1e36ea67cb627
    • Instruction Fuzzy Hash: E8F0C471D10259ABDF00DFA8D846BEEB3B8EF08319F508025E615A6281DB7496198BB5
    APIs
    • GetFileAttributesW.KERNEL32(00D2E067,?,00D2E067,?), ref: 00D4A0F8
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: 4097636394bc73e0d5a1cdbf790619d8f3ec86daf6fed833b00051deaa00fdf4
    • Instruction ID: 4f6ff66175733199b538a611a7b9e5bad5cd22b607529197e97d6acbe63d80a3
    • Opcode Fuzzy Hash: 4097636394bc73e0d5a1cdbf790619d8f3ec86daf6fed833b00051deaa00fdf4
    • Instruction Fuzzy Hash: B8D05E31AD43585BBF205ABCA809662339C9B86338F1C4A51F82CC25D1E635EC92D472
    APIs
    • GetFileAttributesW.KERNEL32(00D2DFA4,?,00D2DFA4,?), ref: 00D4A12C
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AttributesFile
    • String ID:
    • API String ID: 3188754299-0
    • Opcode ID: 104a9306f072389a47d85270d583ca449698b8c1afa97adb43f690d98ca7380b
    • Instruction ID: 690a949cbc5e8a4998f281ccdf906552b22594b2002dc2b99bd29734246c72c8
    • Opcode Fuzzy Hash: 104a9306f072389a47d85270d583ca449698b8c1afa97adb43f690d98ca7380b
    • Instruction Fuzzy Hash: B3D05E315D030A5BBF205ABDAD095A6339C8B8232CF1C4692F43CE60D5E638DC92D072
    APIs
    • SetDlgItemTextW.USER32(000000FF,00000000,?), ref: 00D4867D
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ItemText
    • String ID:
    • API String ID: 3367045223-0
    • Opcode ID: 6231a0cf2c80df0eedfbe6e369683991bc7f3249fb453dbf67fc3475a84800a7
    • Instruction ID: e54a66b414fd06f55f6b3371503d0f7321b79fb3d4fa771b156af2289d9525a3
    • Opcode Fuzzy Hash: 6231a0cf2c80df0eedfbe6e369683991bc7f3249fb453dbf67fc3475a84800a7
    • Instruction Fuzzy Hash: FAD05E31001608BFDF212F58DC08AA97F19EB603A4F2D8255B86C480B1CB3289A7EB64
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ShowWindow
    • String ID:
    • API String ID: 1268545403-0
    • Opcode ID: 748091bfedb43bf0e2c10c2eefb908cf42257f19380f436ca8e5f43acd9a02e5
    • Instruction ID: 77f9c0a6164af93980dfa6beb4d5101192d2cb88525158d298e2d15b2e824624
    • Opcode Fuzzy Hash: 748091bfedb43bf0e2c10c2eefb908cf42257f19380f436ca8e5f43acd9a02e5
    • Instruction Fuzzy Hash: 90C08C320A428DAA87000A75DC0ACB67FECCBA06023198061B518C1091E62AD852D574
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00D4322B
    • GetCurrentProcessId.KERNEL32(00000294), ref: 00D43245
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D43250
    • __CxxThrowException@8.LIBCMT ref: 00D43278
    • _memset.LIBCMT ref: 00D4328C
    • Process32FirstW.KERNEL32(00000000,?), ref: 00D432A2
    • Process32NextW.KERNEL32(00000000,?), ref: 00D432D2
    • Process32FirstW.KERNEL32(00000000,?), ref: 00D4330E
    • Process32NextW.KERNEL32(00000000,?), ref: 00D43341
    • OpenProcess.KERNEL32(00000400,00000000,?,?), ref: 00D43424
      • Part of subcall function 00D51840: __towlower_l.LIBCMT ref: 00D5184A
    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 00D43465
    • Sleep.KERNEL32(00000064), ref: 00D4349D
    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 00D434AB
    Strings
    • Timed out waiting to open destination file for writing - ERROR_SHARING_VIOLATION, xrefs: 00D43576
    • Unable to find current process, xrefs: 00D432DB
    • Unable to open parent process, xrefs: 00D43436
    • Unable to create system snapshot, xrefs: 00D43262
    • Unknown error trying to open destination file for writing, xrefs: 00D4358B
    • Unable to get exit code for parent process (first time), xrefs: 00D4346B
    • Unable to access process information (2nd time), xrefs: 00D43317
    • Timed out waiting for parent process to finish., xrefs: 00D434EE
    • Unable to get exit code for parent process, xrefs: 00D434B1
    • Unable to find parent process, xrefs: 00D4334A
    • Unable to access process information, xrefs: 00D432AB
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ProcessProcess32$CodeExitFirstNext$CreateCurrentException@8H_prolog3_catch_OpenSleepSnapshotThrowToolhelp32__towlower_l_memset
    • String ID: Timed out waiting for parent process to finish.$Timed out waiting to open destination file for writing - ERROR_SHARING_VIOLATION$Unable to access process information$Unable to access process information (2nd time)$Unable to create system snapshot$Unable to find current process$Unable to find parent process$Unable to get exit code for parent process$Unable to get exit code for parent process (first time)$Unable to open parent process$Unknown error trying to open destination file for writing
    • API String ID: 420453142-2110499973
    • Opcode ID: 605647c3eafe368bb9fb834cad4b1160c7bf5286b599f81df7a48833e07539ea
    • Instruction ID: 158e8ac252a08d7adca94382878a15942e7e7e809c6010aac6e96481a6a5854c
    • Opcode Fuzzy Hash: 605647c3eafe368bb9fb834cad4b1160c7bf5286b599f81df7a48833e07539ea
    • Instruction Fuzzy Hash: E4A17970905329EBDF20DFA8DC89AEDB7B8BF10744F5440A6E549A6180DB709F858F70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2DEA9
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    • FindFirstFileW.KERNEL32(?,?), ref: 00D2E1A7
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D2E23D
    • FindClose.KERNEL32(00000000), ref: 00D2E24C
    • FindClose.KERNEL32(00000000), ref: 00D2E267
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    Strings
    • Error constructing path: The pathname principles exceed _MAX_PATH., xrefs: 00D2E01F
    • Unable to find special folder, xrefs: 00D2DF26
    • Could not find file '%s' in folder '%s', xrefs: 00D2E12D
    • Running check with folder '%s' and file '%s', xrefs: 00D2DF80
    • ., xrefs: 00D2E1C1
    • Looking up path for special folder '%s', xrefs: 00D2DEFF
    • %s\*.*, xrefs: 00D2E17C
    • File version is '%s', xrefs: 00D2E0B4
    • Attempting to find file '%s', xrefs: 00D2E043
    • Unable to find directory '%s', xrefs: 00D2DFB5
    • Could not determine file version, xrefs: 00D2E0DB
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Find$File$Close$FirstH_prolog3_NextWrite_memmove
    • String ID: %s\*.*$.$Attempting to find file '%s'$Could not determine file version$Could not find file '%s' in folder '%s'$Error constructing path: The pathname principles exceed _MAX_PATH.$File version is '%s'$Looking up path for special folder '%s'$Running check with folder '%s' and file '%s'$Unable to find directory '%s'$Unable to find special folder
    • API String ID: 1808150035-2904976425
    • Opcode ID: 58ef90e91bad985804b9497c85de94a333d3ca71e25e69fe175f0d272259bf91
    • Instruction ID: 3582bebc062b2d31ab1e37481fdafa168c46f315b686324be2744f8e5ee28191
    • Opcode Fuzzy Hash: 58ef90e91bad985804b9497c85de94a333d3ca71e25e69fe175f0d272259bf91
    • Instruction Fuzzy Hash: E5B16B31D40229AFDF11DBA8ED82BEDB7B8EF28308F548065F505A7281E7709A44CB75
    APIs
    • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,00D5C4DB,?,00D55A00,?,000000BC,?,00000001,?,00000000), ref: 00D5BEAB
    • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,00D5C4DB,?,00D55A00,?,000000BC,?,00000001,?,00000000), ref: 00D5BED4
    • GetACP.KERNEL32(?,?,00D5C4DB,?,00D55A00,?,000000BC,?,00000001), ref: 00D5BEE8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID: ACP$OCP
    • API String ID: 2299586839-711371036
    • Opcode ID: 9300b34e69d783ceef9b2c662bcbff74156cecbc531b47c76a4aba2fa5271a0a
    • Instruction ID: 96639b3ab064ea6cd44a668a1f3878b954afdc6efc4f96a717aa6c7ad53886e6
    • Opcode Fuzzy Hash: 9300b34e69d783ceef9b2c662bcbff74156cecbc531b47c76a4aba2fa5271a0a
    • Instruction Fuzzy Hash: 0B017531605706BEEF219B64AC47B9B77A8AF2176AF284016FF01E1180DB70CA499774
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 00D53938
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D5394D
    • UnhandledExceptionFilter.KERNEL32(00D2732C), ref: 00D53958
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00D53974
    • TerminateProcess.KERNEL32(00000000), ref: 00D5397B
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 409a88596b38b1f50158453fd7319d34881ac99b8884fd197e65ecb5471d1cf1
    • Instruction ID: 1b7ff080265120b790cacc97d92e928fd391c9384fd54f93837b10d4399e87a8
    • Opcode Fuzzy Hash: 409a88596b38b1f50158453fd7319d34881ac99b8884fd197e65ecb5471d1cf1
    • Instruction Fuzzy Hash: 4621BDB8842388DBD755DF29EC456643BE0FB28311F98801AEA1CC2361F7B15AC58F76
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D311F1
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
    • __CxxThrowException@8.LIBCMT ref: 00D316B3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8H_prolog3_ThrowXinvalid_argumentstd::_
    • String ID: BypassIf$Compare$Could not determine Compare operator '%s' for Package '%s'.$Could not determine Condition Type '%s' for Package '%s'.$Could not determine Property of '%s' Condition for Package '%s'.$FailIf$No Compare value specified in '%s' Condition for Package '%s'.$Property$Schedule$Text$Value$ValueEqualTo$ValueExists$ValueGreaterThan$ValueGreaterThanOrEqualTo$ValueLessThan$ValueLessThanOrEqualTo$ValueNotEqualTo$ValueNotExists$VersionEqualTo$VersionGreaterThan$VersionGreaterThanOrEqualTo$VersionLessThan$VersionLessThanOrEqualTo$VersionNotEqualTo
    • API String ID: 4175701135-3657231789
    • Opcode ID: 0b1b47020e0a593f80f1fdca6fb4a06d12a0f875aaa1b534b8a2ab37eef1f710
    • Instruction ID: ee12220edcadb9aec20a0d06b7f705936a6abc65df91559f1b6f5d5733abc425
    • Opcode Fuzzy Hash: 0b1b47020e0a593f80f1fdca6fb4a06d12a0f875aaa1b534b8a2ab37eef1f710
    • Instruction Fuzzy Hash: 52F18175A04319ABDF14DBA8DD42BADBBF4AF24304F14846DF449E7181EB709A48CB35
    APIs
    • _memset.LIBCMT ref: 00D4D589
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • GetProcAddress.KERNEL32(00000000,WinVerifyTrust), ref: 00D4D5FE
    • GetProcAddress.KERNEL32(00000000,WTHelperProvDataFromStateData), ref: 00D4D60C
    • GetProcAddress.KERNEL32(00000000,WTHelperGetProvSignerFromChain), ref: 00D4D61A
    • GetProcAddress.KERNEL32(00000000,WTHelperGetProvCertFromChain), ref: 00D4D628
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AddressProc$_memset$Directory$FileLibraryLoadSystemWindowsWrite
    • String ID: CertDuplicateCertificateContext$Could not get procedures out of Wintrust.$File not signed$File not trusted$File trusted$Subject form unknown$WTHelperGetProvCertFromChain$WTHelperGetProvSignerFromChain$WTHelperProvDataFromStateData$WinVerifyTrust$WinVerifyTrust returned %d$Wintrust not found on machine.$Wintrust not on machine$crypt32.dll$wintrust.dll
    • API String ID: 268569407-3272105283
    • Opcode ID: d0b0355f4b048b8392744398a47a1a4f9e3bf8b3de11752dc5a29a2889e8fc8f
    • Instruction ID: dd4b275d51d30482d4a87e30d38f9338dd3318a5022e8c88b8c022bc8fb311b6
    • Opcode Fuzzy Hash: d0b0355f4b048b8392744398a47a1a4f9e3bf8b3de11752dc5a29a2889e8fc8f
    • Instruction Fuzzy Hash: B2A15B75A00328AFDB209FA5DC85BAEBBB6EF64304F1440A9E149E7251DB708D85CF71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4DA5A
    • __wcsicoll.LIBCMT ref: 00D4DA96
    • __wcsicoll.LIBCMT ref: 00D4DAB4
    • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000,0000005C,00D2DF19,?,?,Looking up path for special folder '%s',?,000002EC,00D2E6F3,?,?,?,?,?), ref: 00D4DBE4
    • GetEnvironmentVariableW.KERNEL32(?,?,00000000,00000000,?), ref: 00D4DC1E
    • __wcsicoll.LIBCMT ref: 00D4DC61
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __wcsicoll$EnvironmentVariable$H_prolog3_
    • String ID: APPDATA$AppDataFolder$CommonAppDataFolder$CommonFilesFolder$CommonProgramFilesFolder$LocalAppDataFolder$ProgramFiles$ProgramFilesFolder$StartupFolder$SystemFolder$WindowsFolder$WindowsVolume$windir
    • API String ID: 3619938276-201842807
    • Opcode ID: b96515e962f8c331a74ba1d6af17ea000acd96b681dcbd8b226e2c8ac69ff95a
    • Instruction ID: 5096cc82e4b71b6ef1e42dd897d67e93fc15345afe589c34e15c09733ede359a
    • Opcode Fuzzy Hash: b96515e962f8c331a74ba1d6af17ea000acd96b681dcbd8b226e2c8ac69ff95a
    • Instruction Fuzzy Hash: 1D619571944359AFDF10EBA8EC82EEDBBB9EF25724F14001AF100BB191EA709949C775
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D40E44
      • Part of subcall function 00D3FC14: std::exception::exception.LIBCMT ref: 00D3FC4A
      • Part of subcall function 00D3FC14: __CxxThrowException@8.LIBCMT ref: 00D3FC5F
      • Part of subcall function 00D3CF0E: std::exception::exception.LIBCMT ref: 00D3CF5A
      • Part of subcall function 00D3CF0E: __CxxThrowException@8.LIBCMT ref: 00D3CF6F
      • Part of subcall function 00D40998: __EH_prolog3_GS.LIBCMT ref: 00D4099F
      • Part of subcall function 00D4A5EC: __EH_prolog3_GS.LIBCMT ref: 00D4A5F3
      • Part of subcall function 00D2AD7D: __EH_prolog3_GS.LIBCMT ref: 00D2AD84
    • __CxxThrowException@8.LIBCMT ref: 00D413AE
      • Part of subcall function 00D4EE98: RaiseException.KERNEL32(?,?,00D2A9A0,?,?,?,?,?,00D2A9A0,?,00D6A6A8,00000000), ref: 00D4EEDA
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$Exception@8Throw$std::exception::exception$ExceptionRaise
    • String ID: AfterPackage$BeforePackage$BuildList$Command$Commands$CopyAllPackageFiles$IfNotHomeSite$InstallChecks$LicenseAgreement$Name$PackageCode$PackageFile$PackageFiles$Schedule$Schedules
    • API String ID: 2151410129-3733023836
    • Opcode ID: 41ad287a3414f06939e587bf25a3a1a5f004d26901456a21d2d7751039b2884f
    • Instruction ID: 9f9306ae4a4c55e0983f48f739ca7e680011c8df3a2a7e504f38ad16f6f0f942
    • Opcode Fuzzy Hash: 41ad287a3414f06939e587bf25a3a1a5f004d26901456a21d2d7751039b2884f
    • Instruction Fuzzy Hash: 1AF10A719006589FDB20DFA9D881BDEBBB4FF18304F1484AEE55AA3241DB706A84CF71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2C39F
      • Part of subcall function 00D4BCB3: __EH_prolog3_GS.LIBCMT ref: 00D4BCBD
    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000048), ref: 00D2C415
    • GetProcAddress.KERNEL32(?,MsiQueryProductStateW), ref: 00D2C4A3
    • GetProcAddress.KERNEL32(?,MsiQueryFeatureStateW), ref: 00D2C4F6
    • FreeLibrary.KERNEL32(00000000), ref: 00D2C579
    Strings
    • MsiQueryFeatureStateW, xrefs: 00D2C4EE
    • No ProductCode specified in MsiProductCheck, xrefs: 00D2C437
    • Could not find MsiQueryProductState function, xrefs: 00D2C4B0
    • Could not load msi.dll, xrefs: 00D2C470
    • Running MsiFeatureCheck with ProductCode '%s' and FeatureCode '%s', xrefs: 00D2C52D
    • Could not find MsiQueryFeatureState function, xrefs: 00D2C503
    • Running MsiProductCheck with ProductCode '%s', xrefs: 00D2C4C7
    • msi.dll, xrefs: 00D2C3CD, 00D2C3F9, 00D2C45C
    • MsiQueryProductStateW, xrefs: 00D2C49B
    • MsiQueryProductState returned '%d', xrefs: 00D2C4E7
    • MsiQueryFeatureState returned '%d', xrefs: 00D2C556
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AddressH_prolog3_LibraryProc$FreeLoad
    • String ID: Could not find MsiQueryFeatureState function$Could not find MsiQueryProductState function$Could not load msi.dll$MsiQueryFeatureState returned '%d'$MsiQueryFeatureStateW$MsiQueryProductState returned '%d'$MsiQueryProductStateW$No ProductCode specified in MsiProductCheck$Running MsiFeatureCheck with ProductCode '%s' and FeatureCode '%s'$Running MsiProductCheck with ProductCode '%s'$msi.dll
    • API String ID: 3583740701-465683338
    • Opcode ID: ec65dbfd043d909d4121eed821b380986e9b84a0b79034d8291e51245673b1e7
    • Instruction ID: 3ea761ca59f468c2804b655b0b18a52d382c58181818af1231037f173f413b12
    • Opcode Fuzzy Hash: ec65dbfd043d909d4121eed821b380986e9b84a0b79034d8291e51245673b1e7
    • Instruction Fuzzy Hash: 72518C31A10234DFCB21EBA8EC45AAEBBB1FF34709F509019E445A7250D770AD59CBB1
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2F59F
    • GetLastError.KERNEL32 ref: 00D2F991
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
    • WaitForSingleObject.KERNEL32(?,00000000,0000010C,00D40745,?), ref: 00D2FA8B
    • GetExitCodeProcess.KERNEL32(?,?), ref: 00D2FAB9
    • __CxxThrowException@8.LIBCMT ref: 00D2FB43
    • CloseHandle.KERNEL32(?), ref: 00D2FB73
    • GetTickCount.KERNEL32 ref: 00D2FB7B
    Strings
    • Unable to run create process. GetLastError returned: %d, xrefs: 00D2F998
    • -I "%s" -q %s, xrefs: 00D2F7D3
    • .msi, xrefs: 00D2F729
    • Process exited with code %d, xrefs: 00D2FACD
    • Installing with log file '%s', xrefs: 00D2F918
    • Unable to get process exitcode., xrefs: 00D2FB55
    • msiexec.exe, xrefs: 00D2F778
    • Installing using command '%s' and parameters '%s', xrefs: 00D2F861
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CloseCodeCountErrorException@8ExitH_prolog3_HandleLastObjectProcessSingleThrowTickWaitXinvalid_argument_memmovestd::_
    • String ID: -I "%s" -q %s$.msi$Installing using command '%s' and parameters '%s'$Installing with log file '%s'$Process exited with code %d$Unable to get process exitcode.$Unable to run create process. GetLastError returned: %d$msiexec.exe
    • API String ID: 1951572231-3914699998
    • Opcode ID: 01b4f4378e568b5f1b440eb9d7b58478f5539dcc140bdf3612bba461a4deca06
    • Instruction ID: fd0f1f707002327eaa78bcc840112aeceb4788255c86a046c766d4c7925c4f5d
    • Opcode Fuzzy Hash: 01b4f4378e568b5f1b440eb9d7b58478f5539dcc140bdf3612bba461a4deca06
    • Instruction Fuzzy Hash: 4A022CB1900228EFDB25DF98DD81AEEB7B8EF25308F4045A9E54AA3151DB705E84CF31
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _free$__calloc_crt$___freetlocinfo___removelocaleref$Sleep__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
    • String ID:
    • API String ID: 888903860-0
    • Opcode ID: 83d2f6e5141d541a24a6b2aa3fd16a4eb6cb8a7a6cc754af66ffec33763964ac
    • Instruction ID: 645fc0451250cafedfd4f7ef5842157ea4e730257a6d870fe20d8feabed2734f
    • Opcode Fuzzy Hash: 83d2f6e5141d541a24a6b2aa3fd16a4eb6cb8a7a6cc754af66ffec33763964ac
    • Instruction Fuzzy Hash: 7021E235104A01ABDF227F69E853D1BBBE4DF40752B648429FC89972A2EF31D8488A70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2E9A9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • FreeLibrary.KERNEL32(00000000,00000064), ref: 00D2E9DA
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    • GetProcAddress.KERNEL32(00000000,CreateAssemblyCache), ref: 00D2EA00
    • GetProcAddress.KERNEL32(?,CreateAssemblyNameObject), ref: 00D2EA10
    • FreeLibrary.KERNEL32(?), ref: 00D2EA1C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Library$AddressDirectoryFreeProc_memset$FileH_prolog3_LoadSystemWindowsWrite
    • String ID: Could not Create AssemblyName$Could not get AssemblyCache$CreateAssemblyCache$CreateAssemblyNameObject$Unable to find assembly in GAC$fusion.dll$mscoree.dll$msil
    • API String ID: 1877927997-3920661512
    • Opcode ID: 0bd5412755d241742c7a8f767eebfdd027d89954ef5dccbd051bdde9e167c4e2
    • Instruction ID: d0f7a24de8bfdf815c80079b31eb4b46b2ef765a4d6cb7d2e19ccc943882874b
    • Opcode Fuzzy Hash: 0bd5412755d241742c7a8f767eebfdd027d89954ef5dccbd051bdde9e167c4e2
    • Instruction Fuzzy Hash: 67616C71D40328AFCF11DBA8E8929EDB7B9FF28308F54442AF116A7291DB709945CB71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3A270
      • Part of subcall function 00D4A574: __EH_prolog3_GS.LIBCMT ref: 00D4A57B
      • Part of subcall function 00D2B608: __EH_prolog3.LIBCMT ref: 00D2B60F
    • __CxxThrowException@8.LIBCMT ref: 00D3A2EF
      • Part of subcall function 00D4EE98: RaiseException.KERNEL32(?,?,00D2A9A0,?,?,?,?,?,00D2A9A0,?,00D6A6A8,00000000), ref: 00D4EEDA
    • __EH_prolog3.LIBCMT ref: 00D3A3A3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_$ExceptionException@8RaiseThrow
    • String ID: Could not determine Result '%s' for Exit Code.$Fail$FailReboot$FormatMessageFromSystem$No Result value found specified for Exit Code.$Result$Success$SuccessReboot$Text$Value
    • API String ID: 4273899721-3249030018
    • Opcode ID: 5cc5ce2183474c080b54a714ea03510a485fdf8a8ca2407e7d964d9ccaaced17
    • Instruction ID: d37be4d365bdd541b375a36219857c8e7cbbc7de69b2e67942c547a7856ebe46
    • Opcode Fuzzy Hash: 5cc5ce2183474c080b54a714ea03510a485fdf8a8ca2407e7d964d9ccaaced17
    • Instruction Fuzzy Hash: 6F419471E40214AFDB10EFA8ED02BDDBBB4EF24704F104025F655A7191EBB49A48CB76
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D43EE0
      • Part of subcall function 00D4B43D: __EH_prolog3.LIBCMT ref: 00D4B444
      • Part of subcall function 00D4B43D: FindResourceW.KERNEL32(00000000,?,?,00000024,00D4C5D7,0000002B,00000000,?,Files,?), ref: 00D4B47C
      • Part of subcall function 00D4B43D: LoadResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B490
      • Part of subcall function 00D4B43D: SizeofResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B4A1
    • __fassign.LIBCMT ref: 00D43F6B
    • _memset.LIBCMT ref: 00D43F93
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$FindH_prolog3H_prolog3_LoadSizeof__fassign_memmove_memset
    • String ID: COUNT$FILEDATA$FILEKEY
    • API String ID: 105933430-4046824674
    • Opcode ID: 9f4ab530564a06fc097f1b82fcf6341baac9c7e3371c2c3b75171d9a5088058f
    • Instruction ID: 793f4dd6e291acc69659451d80311b9c48a6a4d2e77e134012cdb1abff73d232
    • Opcode Fuzzy Hash: 9f4ab530564a06fc097f1b82fcf6341baac9c7e3371c2c3b75171d9a5088058f
    • Instruction Fuzzy Hash: 70E1E4B19412699BDB24DB68CC81AEDB7F8FF54304F4481EAE589A2141EE705F84CFA1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$Xinvalid_argumentstd::_
    • String ID: invalid string position$string too long
    • API String ID: 1771113911-4289949731
    • Opcode ID: 1613292236fc9a9754a79708cff46637c65c7101cb03d30fa52a9fcb6ebde2ab
    • Instruction ID: 6aa17d725a0f03d12756aea0201e09b2bc913fb87c91f7050ba7d8660838b16b
    • Opcode Fuzzy Hash: 1613292236fc9a9754a79708cff46637c65c7101cb03d30fa52a9fcb6ebde2ab
    • Instruction Fuzzy Hash: 8FB137707405199BCB28CF4CD8D08AAB3F7FF84705724892EE4928B655EB30E955CBB6
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2D513
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    Strings
    • AssemblyCheck: error setting public key token: %d, xrefs: 00D2D6D1
    • AssemblyCheck: Error setting assembly name: %d, xrefs: 00D2D5A4
    • AssemblyCheck: Error getting display name: %d, xrefs: 00D2D77E
    • Could not Create AssemblyName, xrefs: 00D2D538
    • AssemblyCheck: error setting culture: %d, xrefs: 00D2D701
    • AssemblyCheck: Error setting culture: %d, xrefs: 00D2D720
    • AssemblyCheck: error setting minor version number: %d, xrefs: 00D2D633
    • AssemblyCheck: error setting major version number: %d, xrefs: 00D2D5F5
    • AssemblyCheck: Error creating assembly name object, xrefs: 00D2D564
    • AssemblyCheck: error setting build number: %d, xrefs: 00D2D671
    • AssemblyCheck: error setting revision number: %d, xrefs: 00D2D6AF
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: FileH_prolog3_Write
    • String ID: AssemblyCheck: Error creating assembly name object$AssemblyCheck: Error getting display name: %d$AssemblyCheck: Error setting assembly name: %d$AssemblyCheck: Error setting culture: %d$AssemblyCheck: error setting build number: %d$AssemblyCheck: error setting culture: %d$AssemblyCheck: error setting major version number: %d$AssemblyCheck: error setting minor version number: %d$AssemblyCheck: error setting public key token: %d$AssemblyCheck: error setting revision number: %d$Could not Create AssemblyName
    • API String ID: 4181851173-3855258871
    • Opcode ID: 27c513fdd35d758decdfb162954fe936e488688305f9065a08ca2a4987c27953
    • Instruction ID: ad0bd6f2f5b9eab950fbbc944f93e631b77649e4d847bebf5df048f601451995
    • Opcode Fuzzy Hash: 27c513fdd35d758decdfb162954fe936e488688305f9065a08ca2a4987c27953
    • Instruction Fuzzy Hash: F19166B0A00215AFDB04EF94E885DBEB7BAEF69708F604459F502E7281D770AD458BB1
    APIs
    • GetDlgItem.USER32(00000002,0000042F), ref: 00D487E7
    • ShowWindow.USER32(00000000), ref: 00D487EA
    • GetDlgItem.USER32(00000002,00000430), ref: 00D487F9
    • ShowWindow.USER32(00000000), ref: 00D487FC
    • GetDlgItem.USER32(00000002,0000042C), ref: 00D4880B
    • ShowWindow.USER32(00000000), ref: 00D4880E
    • GetDlgItem.USER32(00000002,00000431), ref: 00D4881D
    • ShowWindow.USER32(00000000), ref: 00D48820
    • GetDlgItem.USER32(00000002,0000042F), ref: 00D48856
    • GetWindowRect.USER32(00000000), ref: 00D48859
    • GetDlgItem.USER32(00000002,00000432), ref: 00D4886B
    • GetWindowRect.USER32(00000000), ref: 00D48874
    • GetWindowRect.USER32(00000002,?), ref: 00D4887D
      • Part of subcall function 00D482EA: GetDlgItem.USER32(?,?), ref: 00D48308
      • Part of subcall function 00D482EA: GetWindowRect.USER32(00000000,?), ref: 00D48327
      • Part of subcall function 00D482EA: ScreenToClient.USER32(?,?), ref: 00D48344
      • Part of subcall function 00D482EA: MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00D48368
    • MoveWindow.USER32(00000002,?,?,?,?,00000001), ref: 00D488EB
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Window$Item$RectShow$Move$ClientScreen
    • String ID:
    • API String ID: 4252227071-0
    • Opcode ID: be739ec9bd443125831ef13cbbeebd2b374c9f765381f70b5ac0634be620a5b8
    • Instruction ID: d97b48412b22d3fe1ae9a5c8e8b14c105c05f437488cede74b089359872e543e
    • Opcode Fuzzy Hash: be739ec9bd443125831ef13cbbeebd2b374c9f765381f70b5ac0634be620a5b8
    • Instruction Fuzzy Hash: 8E41B9B1A00209FFDF10AFA9DD85CAEBBB9FF58341F518429F205E2260CB715951DB68
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Version_memset
    • String ID: AdjustTokenPrivileges$LookupPrivilegeValueW$OpenProcessToken$SeShutdownPrivilege$advapi32.dll
    • API String ID: 963298953-3661999180
    • Opcode ID: 4f600102c906eb8b220803c3849ca904815717af2badfe0617daa5d4069f9d42
    • Instruction ID: 6beb221039d6854c001b0ca3238491cbf78cd47345beeb6a647e204a3fa0a18f
    • Opcode Fuzzy Hash: 4f600102c906eb8b220803c3849ca904815717af2badfe0617daa5d4069f9d42
    • Instruction Fuzzy Hash: 80219D71E00318ABCF20AFA59C4A9BFBBBDEF99714B14401AF505F3240DA7599468B72
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$Xinvalid_argumentstd::_
    • String ID: invalid string position$string too long
    • API String ID: 1771113911-4289949731
    • Opcode ID: 09ea912037106e1902b8d6d5a38302a99851c62abf8f0dd9d0c23baa915479b3
    • Instruction ID: ee35a65389c16723affd8fde4fc1d06c93e7bb781d0bc87b47a4a5b87e0abaa9
    • Opcode Fuzzy Hash: 09ea912037106e1902b8d6d5a38302a99851c62abf8f0dd9d0c23baa915479b3
    • Instruction Fuzzy Hash: 45719F31700214ABCB24DF5CDC8496AB7E6EFC4704B65492DE8C29B241EB70ED56CBB2
    APIs
    • ____lc_handle_func.LIBCMT ref: 00D6346C
    • ____lc_codepage_func.LIBCMT ref: 00D63474
    • __GetLocaleForCP.LIBCPMT ref: 00D6349C
    • ____mb_cur_max_l_func.LIBCMT ref: 00D634B2
    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000002,?,00000000,?,?,?,?,00D320E0,?,?,?,?,?), ref: 00D634D1
    • ____mb_cur_max_l_func.LIBCMT ref: 00D634DF
    • ___pctype_func.LIBCMT ref: 00D63504
    • ____mb_cur_max_l_func.LIBCMT ref: 00D6352A
    • ____mb_cur_max_l_func.LIBCMT ref: 00D63542
    • ____mb_cur_max_l_func.LIBCMT ref: 00D6355A
    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,?,00000000,?,?,?,?,00D320E0,?,?,?,?,?), ref: 00D63567
    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,?,00D320E0,?,?,?,?,?), ref: 00D63598
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ____mb_cur_max_l_func$ByteCharMultiWide$Locale____lc_codepage_func____lc_handle_func___pctype_func
    • String ID:
    • API String ID: 3819326198-0
    • Opcode ID: 65f82e74a93acbb74766fd48f3b8d48a19dd31805f15c5404c04f128ac16e75b
    • Instruction ID: aced9a0625c6287d46c00befff41dee77c01ebd81b6a1b1db34e607f4f7eb280
    • Opcode Fuzzy Hash: 65f82e74a93acbb74766fd48f3b8d48a19dd31805f15c5404c04f128ac16e75b
    • Instruction Fuzzy Hash: 3B41C631504255AFDB225F35DC45B6ABBA4EF11361F288429FC55CA1A2EF30EA90D770
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2E293
      • Part of subcall function 00D2D49E: __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2D49E: __CxxThrowException@8.LIBCMT ref: 00D2D4F8
    Strings
    • No Name value specified for Assembly Check '%s', xrefs: 00D2E32C
    • ProcessorArchitecture, xrefs: 00D2E445
    • Name, xrefs: 00D2E305
    • PublicKeyToken, xrefs: 00D2E35D
    • No PublicKeyToken value specified for Assembly Check '%s'., xrefs: 00D2E4CC
    • No Version value specified for Assembly Check '%s'., xrefs: 00D2E3D0
    • Culture, xrefs: 00D2E3FF
    • Version, xrefs: 00D2E3A9
    • neutral, xrefs: 00D2E419
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8H_prolog3H_prolog3_Throw
    • String ID: Culture$Name$No Name value specified for Assembly Check '%s'$No PublicKeyToken value specified for Assembly Check '%s'.$No Version value specified for Assembly Check '%s'.$ProcessorArchitecture$PublicKeyToken$Version$neutral
    • API String ID: 3648411918-1850210091
    • Opcode ID: 2fe941ce24de51147b5deb4b097cd12c9a0a4d8d5904eece98644a6e0489ae53
    • Instruction ID: 5351a80694e764a38de4e38abde3aea8da4bab7cd6f8d2af07eb2f57ec2f7035
    • Opcode Fuzzy Hash: 2fe941ce24de51147b5deb4b097cd12c9a0a4d8d5904eece98644a6e0489ae53
    • Instruction Fuzzy Hash: A4715D709103289FCB21DFA8D981AEEB7F4FF25718F50456AE449A3251E770AA48CB71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D48DA5
    • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,?,?,00000002), ref: 00D48E0E
    • MessageBoxW.USER32(?,?,?,00000010), ref: 00D48E5F
    • WriteFile.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00000002,?,00000000), ref: 00D48E96
    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00D48EB8
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00D48ED8
    • CloseHandle.KERNEL32(?), ref: 00D48EE1
    • SetEvent.KERNEL32(?,00000048,00D49003,00000002), ref: 00D48F32
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: File$Write$CloseCreateEventH_prolog3_HandleMessage
    • String ID: eula.rtf$open
    • API String ID: 3097060125-387166277
    • Opcode ID: 03f1cdae3ee7abeecfa8fea58ccf9822bb283718714b6913944878feeab0c109
    • Instruction ID: f4c9d11b0356b568544187dc286746cade69bfe2ebc3fbcec9be82206d7e63b7
    • Opcode Fuzzy Hash: 03f1cdae3ee7abeecfa8fea58ccf9822bb283718714b6913944878feeab0c109
    • Instruction Fuzzy Hash: F9512871900208AFDB14CFA8DC85EEEBBB9EF54740F508429F116AB1A0DB71A949DB74
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2FD61
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_Xinvalid_argumentstd::_
    • String ID: Arguments$EstimatedInstallSeconds$EstimatedInstalledBytes$EstimatedTempBytes$ExitCodes$InstallConditions$Log$No PackageFile specified for package '%s'.$PackageFile
    • API String ID: 4049434844-3536121905
    • Opcode ID: 48ad77e249a8f80bfb025dbe071ea7632ebc48fb1f4ddb97a14c1674ee9470bf
    • Instruction ID: 756c5677b75dc593a95b763372cabac3ebaf54a8050688072e552bf74f184a84
    • Opcode Fuzzy Hash: 48ad77e249a8f80bfb025dbe071ea7632ebc48fb1f4ddb97a14c1674ee9470bf
    • Instruction Fuzzy Hash: 22519EB1900754AFCB10DFA9D842B9EBBB4FF24304F10482EF55AA3252DB74A609CB75
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D48AD9
    • GetDC.USER32(?), ref: 00D48AF4
      • Part of subcall function 00D4A574: __EH_prolog3_GS.LIBCMT ref: 00D4A57B
      • Part of subcall function 00D4A574: __fassign.LIBCMT ref: 00D4A5D7
    • _memset.LIBCMT ref: 00D48BAC
    • _memset.LIBCMT ref: 00D48BB8
    • EnumFontFamiliesExW.GDI32(?,?,Function_00027F49,?,00000000), ref: 00D48BFD
    • CreateFontIndirectW.GDI32(?), ref: 00D48C39
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: FontH_prolog3__memset$CreateEnumFamiliesIndirect__fassign
    • String ID: CharSet$FontName$Height$Weight
    • API String ID: 3771659125-1759768386
    • Opcode ID: b34237791a28dd94dcdce4732d0213667cd490699929a1c5f797be638f69d9e9
    • Instruction ID: f542bba31802379ff5ef0f0c3e8a05b69ed394b89622697cd598a4ccdfa00431
    • Opcode Fuzzy Hash: b34237791a28dd94dcdce4732d0213667cd490699929a1c5f797be638f69d9e9
    • Instruction Fuzzy Hash: 0A415E70D40258AFDF10DF688D81FAEB7B8EF19304F0484A9E548E7252D7349A889F31
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4099F
      • Part of subcall function 00D2AD7D: __EH_prolog3_GS.LIBCMT ref: 00D2AD84
    • __CxxThrowException@8.LIBCMT ref: 00D40BC2
      • Part of subcall function 00D4EE98: RaiseException.KERNEL32(?,?,00D2A9A0,?,?,?,?,?,00D2A9A0,?,00D6A6A8,00000000), ref: 00D4EEDA
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$ExceptionException@8RaiseThrow
    • String ID: AssemblyCheck$Could not determine Check type '%s' for Package '%s'.$ExternalCheck$FileCheck$MsiProductCheck$RegistryCheck$RegistryFileCheck
    • API String ID: 2193040975-1850567849
    • Opcode ID: 33585c7dbd53934f3ba72a75e2658b85b0e411a9e7df1d00bc2f576ba47fa526
    • Instruction ID: 8c76597e1514edd10a327318b56e88e0e9264978d612a0ad56c7bfc56ef4f71d
    • Opcode Fuzzy Hash: 33585c7dbd53934f3ba72a75e2658b85b0e411a9e7df1d00bc2f576ba47fa526
    • Instruction Fuzzy Hash: F871B631A04218AFDB14EFA8E992EAEBBF5EF54308F14402DF645A7181DB709944CB76
    APIs
    Strings
    • 0, xrefs: 00D44F70
    • Status of package '%s' after install is 'Installing', xrefs: 00D44F97
    • Status of package '%s' after install is 'InstallNeeded', xrefs: 00D44FAB
    • Status of package '%s' after install is 'InstallFailed', xrefs: 00D44F24
    • Status of package '%s' after install is 'InstallUnknown', xrefs: 00D44F38
    • Status of package '%s' after install is 'InstallSucceeded', xrefs: 00D44F5D
    • Status of package '%s' after install is 'Fail', xrefs: 00D44EE8
    • Status of package '%s' after install is 'LaunchConditionFailed', xrefs: 00D44F10
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: 0$Status of package '%s' after install is 'Fail'$Status of package '%s' after install is 'InstallFailed'$Status of package '%s' after install is 'InstallNeeded'$Status of package '%s' after install is 'InstallSucceeded'$Status of package '%s' after install is 'InstallUnknown'$Status of package '%s' after install is 'Installing'$Status of package '%s' after install is 'LaunchConditionFailed'
    • API String ID: 2427045233-2489974127
    • Opcode ID: 19832e9400cfc41ba66cdfb16303fa4a06e8d19538787a8efef0275c36245d78
    • Instruction ID: 8f63f5cb0d0964187e436bcbd97aa6a43529413626fce8b16e8bde11e1b114c4
    • Opcode Fuzzy Hash: 19832e9400cfc41ba66cdfb16303fa4a06e8d19538787a8efef0275c36245d78
    • Instruction Fuzzy Hash: A861E970D106199BDF11DFA8D982BEDB7B8FF15304F9080A9E549B6181EB705A88CF71
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D4A93C
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    • _Allocate.LIBCPMT ref: 00D4A95E
    • _memmove.LIBCMT ref: 00D4A983
    • _memmove.LIBCMT ref: 00D4A99B
    • _memmove.LIBCMT ref: 00D4A9E3
    • _memset.LIBCMT ref: 00D4AA17
    • _memmove.LIBCMT ref: 00D4AA3A
    • _memmove.LIBCMT ref: 00D4AA52
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$AllocateException@8ThrowXinvalid_argument_memsetstd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 3468635988-3788999226
    • Opcode ID: 5e4305da8e177b1631597833beb96e12c036c2459bedf7bb2e6b05cc2a572a53
    • Instruction ID: 135ba5cf2a8a44873e68922a977b45806f30febdd77877e469850e6e5b7523de
    • Opcode Fuzzy Hash: 5e4305da8e177b1631597833beb96e12c036c2459bedf7bb2e6b05cc2a572a53
    • Instruction Fuzzy Hash: D3414C75A40209BFCF14DFACC9998AEBBA9EF54344B14892DF899D7341D630EA44CB70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4999D
    • GetDC.USER32(?), ref: 00D499B5
    • ShowScrollBar.USER32(?,00000001,00000000,?,?,?,00D49B9C,?,?,?,?,?,?,?,00000020,00D4151A), ref: 00D499C7
    • GetClientRect.USER32(?,?), ref: 00D499DE
    • GetSystemMetrics.USER32(00000002), ref: 00D499E6
      • Part of subcall function 00D4DF3D: __EH_prolog3_GS.LIBCMT ref: 00D4DF44
    • ReleaseDC.USER32(?,?), ref: 00D49AA6
    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00D49AB6
    • GetStockObject.GDI32(0000000D), ref: 00D49AC2
    • GetObjectW.GDI32(00000000,0000005C,?), ref: 00D49AD3
    • ShowScrollBar.USER32(?,00000001,00000001), ref: 00D49AFA
      • Part of subcall function 00D48907: GetTextExtentPoint32W.GDI32(?,?,?,?), ref: 00D48947
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_ObjectScrollShow$ClientExtentMessageMetricsPoint32RectReleaseSendStockSystemText
    • String ID:
    • API String ID: 1108648939-0
    • Opcode ID: b8cad9e2e3dfd0754b00a7db94211a8717dfb3121e82b54bcf1398d1cf6eeb26
    • Instruction ID: 0344dc49454587b484fe96b219d9a6792eb2fcb536f5c21018c7297df1d8df69
    • Opcode Fuzzy Hash: b8cad9e2e3dfd0754b00a7db94211a8717dfb3121e82b54bcf1398d1cf6eeb26
    • Instruction Fuzzy Hash: 3141E475D00269DFDF209FA9CD46B9EBBB9FF54300F14809AE109E2251CA715A85CF34
    APIs
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • GetProcAddress.KERNEL32(00000000,IsUserAnAdmin), ref: 00D4D25D
    • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 00D4D2B9
    • FreeLibrary.KERNEL32(?), ref: 00D4D2D3
    • FreeLibrary.KERNEL32(?), ref: 00D4D2E7
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Library$AddressDirectoryFreeProc_memset$LoadSystemWindows
    • String ID: CheckTokenMembership$IsUserAnAdmin$advapi32.dll$shell32.dll
    • API String ID: 2049529260-4205908389
    • Opcode ID: 52d1773c9b833a77158fad08d9f8ce235cd4cc10a8395c45978d5a252f3b0d1f
    • Instruction ID: 51e03524b90964fa810cb5bd131530c19f7557463613040266fa9c000a303f04
    • Opcode Fuzzy Hash: 52d1773c9b833a77158fad08d9f8ce235cd4cc10a8395c45978d5a252f3b0d1f
    • Instruction Fuzzy Hash: B221AC71A00319AFCF10DFE0EDC69AEBBB9EF54304B14453AE101E3190E6B0DA499B78
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: Hash$HomeSite$Name$PublicKey$Size$TargetPath$UrlName
    • API String ID: 2427045233-2227013664
    • Opcode ID: 399ffc79609a4b43a1c64a445b3da019ded7fa2abe6d96df62273ccca2e86558
    • Instruction ID: 3c0bfd3f407bb87b8cdbb746d1c3b3a0cc763271853acffbc95876478f2bcdef
    • Opcode Fuzzy Hash: 399ffc79609a4b43a1c64a445b3da019ded7fa2abe6d96df62273ccca2e86558
    • Instruction Fuzzy Hash: 883148B0900704AFC710DFA9D841A9BFBE8FF69714F00492EF89AA3651D770A504CB35
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D343E5
    • std::_Lockit::_Lockit.LIBCPMT ref: 00D343F2
      • Part of subcall function 00D3187C: std::_Lockit::_Lockit.LIBCPMT ref: 00D3189A
    • std::locale::_Getfacet.LIBCPMT ref: 00D34411
    • ctype.LIBCPMT ref: 00D34429
    • std::bad_exception::bad_exception.LIBCMT ref: 00D3443D
    • __CxxThrowException@8.LIBCMT ref: 00D3444B
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00D34461
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: LockitLockit::_std::_$Exception@8Facet_GetfacetH_prolog3_RegisterThrowctypestd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_
    • String ID: bad cast
    • API String ID: 894495367-3145022300
    • Opcode ID: f949e1a5c127b5ed25e6fa64f18abdac6d6825736cbf9f158c309b96dbe18a4d
    • Instruction ID: 6015256d91fd60001229158ae00ec5b59ce7d0874219668ca382ade609a8c0de
    • Opcode Fuzzy Hash: f949e1a5c127b5ed25e6fa64f18abdac6d6825736cbf9f158c309b96dbe18a4d
    • Instruction Fuzzy Hash: 4E0184396003055BCB14EBB499426AE7374EF54320F644539E211A72D2DF78AE448BB0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D34343
    • std::_Lockit::_Lockit.LIBCPMT ref: 00D34350
      • Part of subcall function 00D3187C: std::_Lockit::_Lockit.LIBCPMT ref: 00D3189A
    • std::locale::_Getfacet.LIBCPMT ref: 00D3436F
    • ctype.LIBCPMT ref: 00D34387
    • std::bad_exception::bad_exception.LIBCMT ref: 00D3439B
    • __CxxThrowException@8.LIBCMT ref: 00D343A9
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00D343BF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: LockitLockit::_std::_$Exception@8Facet_GetfacetH_prolog3_RegisterThrowctypestd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_
    • String ID: bad cast
    • API String ID: 894495367-3145022300
    • Opcode ID: 5a50c0a6d08912fc9b75c388e9e88fad7755118c95e3724bc44c140b5d646e68
    • Instruction ID: 4afe3fef3dc12df808321379725ef705abe661f08f9af1e834d91d08e3e926b6
    • Opcode Fuzzy Hash: 5a50c0a6d08912fc9b75c388e9e88fad7755118c95e3724bc44c140b5d646e68
    • Instruction Fuzzy Hash: B7015275A403096BCB14FBB4C993AAEB774EF54320F640629E211A72D2DF74AE4497B0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D34C10
    • std::_Lockit::_Lockit.LIBCPMT ref: 00D34C1D
      • Part of subcall function 00D3187C: std::_Lockit::_Lockit.LIBCPMT ref: 00D3189A
    • std::locale::_Getfacet.LIBCPMT ref: 00D34C3C
    • codecvt.LIBCPMT ref: 00D34C54
    • std::bad_exception::bad_exception.LIBCMT ref: 00D34C68
    • __CxxThrowException@8.LIBCMT ref: 00D34C76
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00D34C8C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: LockitLockit::_std::_$Exception@8Facet_GetfacetH_prolog3_RegisterThrowcodecvtstd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_
    • String ID: bad cast
    • API String ID: 2707858659-3145022300
    • Opcode ID: 30d632a3d6657920fc83611cf17915ad2e1f8f7ed3c517b69d9693593c0960a8
    • Instruction ID: 3dd2276758ad899492a3b9653496a02ee08f883ffca737402972900d7b14d97b
    • Opcode Fuzzy Hash: 30d632a3d6657920fc83611cf17915ad2e1f8f7ed3c517b69d9693593c0960a8
    • Instruction Fuzzy Hash: 57019635A013056BCB04FBB4C9929BE7774EF54320F640928F211A72D2DF749E4497B0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D355D1
    • std::_Lockit::_Lockit.LIBCPMT ref: 00D355DE
      • Part of subcall function 00D3187C: std::_Lockit::_Lockit.LIBCPMT ref: 00D3189A
    • std::locale::_Getfacet.LIBCPMT ref: 00D355FD
    • messages.LIBCPMT ref: 00D35615
    • std::bad_exception::bad_exception.LIBCMT ref: 00D35629
    • __CxxThrowException@8.LIBCMT ref: 00D35637
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00D3564D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: LockitLockit::_std::_$Exception@8Facet_GetfacetH_prolog3_RegisterThrowmessagesstd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_
    • String ID: bad cast
    • API String ID: 2776438353-3145022300
    • Opcode ID: 619fbdbefe380ff15a41a607bd60b8f30a138ba1cd041e90a6b2b571233ae78d
    • Instruction ID: c19f2bb190e1318700760aacf6746c1357aeada52af386b501c8878d568c4d2c
    • Opcode Fuzzy Hash: 619fbdbefe380ff15a41a607bd60b8f30a138ba1cd041e90a6b2b571233ae78d
    • Instruction Fuzzy Hash: 5D018075A00605ABCB04FBB4D993AAEB774EF54320F640A28F111A72D2DF749E4497B0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3552F
    • std::_Lockit::_Lockit.LIBCPMT ref: 00D3553C
      • Part of subcall function 00D3187C: std::_Lockit::_Lockit.LIBCPMT ref: 00D3189A
    • std::locale::_Getfacet.LIBCPMT ref: 00D3555B
    • codecvt.LIBCPMT ref: 00D35573
    • std::bad_exception::bad_exception.LIBCMT ref: 00D35587
    • __CxxThrowException@8.LIBCMT ref: 00D35595
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00D355AB
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: LockitLockit::_std::_$Exception@8Facet_GetfacetH_prolog3_RegisterThrowcodecvtstd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_
    • String ID: bad cast
    • API String ID: 2707858659-3145022300
    • Opcode ID: 440bc1b8699718d6e41429932540d65aecdc384b02d7d162f017aa59a1f4cadd
    • Instruction ID: d0f637914c00f2b8e053ccc5970ebf8be7468ae7432846ec9299324715a53588
    • Opcode Fuzzy Hash: 440bc1b8699718d6e41429932540d65aecdc384b02d7d162f017aa59a1f4cadd
    • Instruction Fuzzy Hash: FD0184356017055BCB04FBB4D9525AEB374EF58320F640528F112A72D2EF74AE449770
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D35673
    • std::_Lockit::_Lockit.LIBCPMT ref: 00D35680
      • Part of subcall function 00D3187C: std::_Lockit::_Lockit.LIBCPMT ref: 00D3189A
    • std::locale::_Getfacet.LIBCPMT ref: 00D3569F
    • numpunct.LIBCPMT ref: 00D356B7
    • std::bad_exception::bad_exception.LIBCMT ref: 00D356CB
    • __CxxThrowException@8.LIBCMT ref: 00D356D9
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00D356EF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: LockitLockit::_std::_$Exception@8Facet_GetfacetH_prolog3_RegisterThrownumpunctstd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_
    • String ID: bad cast
    • API String ID: 3998126553-3145022300
    • Opcode ID: c3d91123321fbc6422ee953a7f2a5ca1bb99f2afc3cf98a5fd3d9c408ce05907
    • Instruction ID: 96cf4652ca37694275e1a9f2eba8f9ae3b4b02658f73378b826c5637b4ad2c0d
    • Opcode Fuzzy Hash: c3d91123321fbc6422ee953a7f2a5ca1bb99f2afc3cf98a5fd3d9c408ce05907
    • Instruction Fuzzy Hash: 7F01963AA0070557CB04FBB4D9536AEB374EF18320F640528F111A72D6DF749E459BB0
    APIs
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D2B217: _memmove.LIBCMT ref: 00D2B28E
      • Part of subcall function 00D49034: __EH_prolog3_GS.LIBCMT ref: 00D4903E
      • Part of subcall function 00D49034: SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00D490A1
      • Part of subcall function 00D49034: FindResourceW.KERNEL32(?,?,00000005,Fonts,?,?), ref: 00D4919A
      • Part of subcall function 00D49034: LoadResource.KERNEL32(?,00000000,?,?), ref: 00D491AA
      • Part of subcall function 00D49034: LockResource.KERNEL32(00000000,?,?), ref: 00D491B5
      • Part of subcall function 00D49034: SizeofResource.KERNEL32(?,00000000,00000000,?,?,?,?), ref: 00D491D0
      • Part of subcall function 00D49034: CreateDialogIndirectParamW.USER32(?,?,?,?,?), ref: 00D491FB
    • SetWindowTextW.USER32(?,?), ref: 00D49712
    • LoadImageW.USER32(?,0000006B,00000001,00000000,00000000,00008000), ref: 00D49726
    • SetClassLongW.USER32(?,000000DE,00000000), ref: 00D49736
    • GetDlgItem.USER32(00000433,00000434), ref: 00D497C7
    • GetWindowRect.USER32(00000000), ref: 00D497CA
    • LoadImageW.USER32(?,0000006C,00000001,?,?,00000000), ref: 00D497E6
    • SendDlgItemMessageW.USER32(00000433,0000042C,000000F7,00000001,00000000), ref: 00D497FC
    • GetDlgItem.USER32(00000433,00000434), ref: 00D4980B
    • ShowWindow.USER32(00000000), ref: 00D4980E
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$ItemLoadWindow$Image$ClassCreateDialogFindH_prolog3_IndirectInfoLockLongMessageParamParametersRectSendShowSizeofSystemTextXinvalid_argument_memmovestd::_
    • String ID:
    • API String ID: 2976025800-0
    • Opcode ID: 788393c1fe351e04a891b9fc98db3e71fbd370d1aecef7298771fbc3ef5bd33f
    • Instruction ID: 5a685c3930350d1b7611e332fa2187604362b4816a9dc04a4c19eb1a419c6e80
    • Opcode Fuzzy Hash: 788393c1fe351e04a891b9fc98db3e71fbd370d1aecef7298771fbc3ef5bd33f
    • Instruction Fuzzy Hash: 2B515BB0A00209EFDB20DF95DC89EAFBBBAFF58710F004519F651A62A1C7719945CB74
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D43A85
      • Part of subcall function 00D3F7A2: __EH_prolog3_GS.LIBCMT ref: 00D3F7A9
    • MessageBoxW.USER32(00000000,?,?,00000040), ref: 00D43D51
      • Part of subcall function 00D4201F: __EH_prolog3_GS.LIBCMT ref: 00D42026
      • Part of subcall function 00D482CB: SetDlgItemTextW.USER32(?,0000042E,00D216C0), ref: 00D482DE
      • Part of subcall function 00D4993B: __EH_prolog3_GS.LIBCMT ref: 00D49942
    Strings
    • EULA for components '%s' was accepted., xrefs: 00D43BC8
    • EULA for components '%s' was declined., xrefs: 00D43E0C
    • Installation of components '%s' was declined., xrefs: 00D43D6C
    • Installation of components '%s' was accepted., xrefs: 00D43E68
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$ItemMessageText
    • String ID: EULA for components '%s' was accepted.$EULA for components '%s' was declined.$Installation of components '%s' was accepted.$Installation of components '%s' was declined.
    • API String ID: 3858461166-97280692
    • Opcode ID: 45e7cc0c934c0cfc19ad476b4498cb7ccb359724ec4791c80e2235fc7b8bce43
    • Instruction ID: 8ee62cbf749012ef7255e84806f2d78f20af4f631feb6c7e9d656b4205e97303
    • Opcode Fuzzy Hash: 45e7cc0c934c0cfc19ad476b4498cb7ccb359724ec4791c80e2235fc7b8bce43
    • Instruction Fuzzy Hash: 5DD14871E00218AFDB15EFA9D992BEDBBB8EF18704F504069F209A7182DB705A44CF75
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$Xinvalid_argumentstd::_
    • String ID: invalid string position$string too long
    • API String ID: 1771113911-4289949731
    • Opcode ID: d45ad543010d92d2a3e511e0cff09a8ded37cfd97cf328fc013d814b9174cc88
    • Instruction ID: cfaa9551056ca147d6c61089d816c64b3369738f02c056b34c7ff2750216a8bd
    • Opcode Fuzzy Hash: d45ad543010d92d2a3e511e0cff09a8ded37cfd97cf328fc013d814b9174cc88
    • Instruction Fuzzy Hash: 5A41BF70200108ABCF24CF1CD8848ABB7B6EF91715B24492EF8568B251DB31ED19CBB5
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D437A8
    • GetCurrentProcessId.KERNEL32(00000064), ref: 00D437D5
      • Part of subcall function 00D4C774: __EH_prolog3_GS.LIBCMT ref: 00D4C77B
    Strings
    • vsbootstrapper, xrefs: 00D437DB
    • Unable to set RunOnce key. RegSetValue failed with error code '%d', xrefs: 00D438A0
    • SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce, xrefs: 00D43851
    • Unable to set RunOnce key. RegCreateKey failed with error code '%d', xrefs: 00D43869
    • %s_%d, xrefs: 00D437E3
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$CurrentProcess
    • String ID: %s_%d$SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce$Unable to set RunOnce key. RegCreateKey failed with error code '%d'$Unable to set RunOnce key. RegSetValue failed with error code '%d'$vsbootstrapper
    • API String ID: 2139083982-46394189
    • Opcode ID: 10478a78d81db7292a044a754d6eca37fd2c25ef9b75c44489d52a6d86414e07
    • Instruction ID: eb1b976e72eaefa71333a7fcd080f2ca34113be3457dd0f08e799c2b3259cef9
    • Opcode Fuzzy Hash: 10478a78d81db7292a044a754d6eca37fd2c25ef9b75c44489d52a6d86414e07
    • Instruction Fuzzy Hash: 584125B1D01228ABDF20DBE8EC859EEFBB8EF59714F10402AF409A7111D7705A49CBB0
    APIs
      • Part of subcall function 00D49FAB: _memset.LIBCMT ref: 00D49FD6
      • Part of subcall function 00D49FAB: GetVersionExW.KERNEL32(?,?,?), ref: 00D49FEF
    • _memset.LIBCMT ref: 00D4A48C
    • ShellExecuteExW.SHELL32(0000003C), ref: 00D4A4E4
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    • CloseHandle.KERNEL32(?,?,00000001), ref: 00D4A505
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memset$CloseExecuteFileHandleShellVersionWrite
    • String ID: <$@$Will attempt to elevate process.$runas
    • API String ID: 2938871625-2395962226
    • Opcode ID: 18b83dbec241336e1d28994f5731b2728e5fa7286cd9ab3ee7cc162c514b0f2c
    • Instruction ID: 4418d82d735df31953a4f38c83fbb8bbc8276ef5dfdb8b07cba76b55428f5fb4
    • Opcode Fuzzy Hash: 18b83dbec241336e1d28994f5731b2728e5fa7286cd9ab3ee7cc162c514b0f2c
    • Instruction Fuzzy Hash: 9E216D75A00318EFDF10DF98D845B8EBBB8EF54304F55405AE905EB290D7B4AA45CB71
    APIs
    • __EH_prolog3.LIBCMT ref: 00D3A709
    • InitializeCriticalSection.KERNEL32(?,00000004,00D3C704,0000000C,00D439B1), ref: 00D3A763
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • GetProcAddress.KERNEL32(00000000,URLDownloadToFileW), ref: 00D3A793
    • GetProcAddress.KERNEL32(?,URLDownloadToCacheFileW), ref: 00D3A7A3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AddressDirectoryProc_memset$CriticalH_prolog3InitializeLibraryLoadSectionSystemWindows
    • String ID: URLDownloadToCacheFileW$URLDownloadToFileW$urlmon.dll
    • API String ID: 1362827196-2432372630
    • Opcode ID: 8f85652ff12d7958aa9b5dabb1de0b5ae83ddb9052d747a30a629ebfab21db70
    • Instruction ID: 2c0cb2a7273285812926fb70caba993ecc12540004c6036d4e4cd2c22370431b
    • Opcode Fuzzy Hash: 8f85652ff12d7958aa9b5dabb1de0b5ae83ddb9052d747a30a629ebfab21db70
    • Instruction Fuzzy Hash: 7C21EFB1901B508FD371DF7A9985606FAF0BF28700B908D2EE29EC3B21DB70A044CB64
    APIs
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • GetProcAddress.KERNEL32(00000000,SHGetFolderPathW), ref: 00D4D498
    • FreeLibrary.KERNEL32(00000000,?,00D4D9E6,00000000,?,00000000,00000001,?,?), ref: 00D4D49F
    • GetProcAddress.KERNEL32(00000000,SHGetFolderPathW), ref: 00D4D4B8
    • FreeLibrary.KERNEL32(00000000,?,00D4D9E6,00000000,?,00000000,00000001,?,?), ref: 00D4D4D3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Library$AddressDirectoryFreeProc_memset$LoadSystemWindows
    • String ID: SHGetFolderPathW$shell32.dll$shfolder.dll
    • API String ID: 2049529260-240897930
    • Opcode ID: 3fd24abac9e0e8afe05ec90cd90ff7c15c5618b1b85fc2cfa3c3e4e3d24b708a
    • Instruction ID: 64ab8462a9cb2e4fc3a67563e5b1c6395e01ac9a8ea8d7108d4acd59f00c9744
    • Opcode Fuzzy Hash: 3fd24abac9e0e8afe05ec90cd90ff7c15c5618b1b85fc2cfa3c3e4e3d24b708a
    • Instruction Fuzzy Hash: EC01DF32600346FB9F119FE5DD80C9B3FADEFA93107048029FA00E6510CB72D8118B70
    APIs
    Strings
    • Copying from '%s' to '%s', xrefs: 00D3BA20
    • File '%s' not found. Skipping file copy., xrefs: 00D3B9C2
    • File '%s' already copied. Skipping file copy., xrefs: 00D3B9ED
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ErrorException@8H_prolog3_catch_LastThrow
    • String ID: Copying from '%s' to '%s'$File '%s' already copied. Skipping file copy.$File '%s' not found. Skipping file copy.
    • API String ID: 3568844311-1508121953
    • Opcode ID: 3d4bf32e8750bc3046cfa143265aa96c1f765d96f30b8225900e836ae9ee19f2
    • Instruction ID: dd715e382fbead8251ddbc550a428b08a420491063c932b5565095a5e60c925d
    • Opcode Fuzzy Hash: 3d4bf32e8750bc3046cfa143265aa96c1f765d96f30b8225900e836ae9ee19f2
    • Instruction Fuzzy Hash: 34815971910218ABCF15DB98DC86EEEBBB8FF55320F40805AE649A7141EB709A45CF71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3AC18
      • Part of subcall function 00D4CE6C: __EH_prolog3_GS.LIBCMT ref: 00D4CE76
      • Part of subcall function 00D4CE6C: GetComputerObjectNameW.SECUR32 ref: 00D4CE95
    • RegQueryValueExW.ADVAPI32 ref: 00D3ACB7
      • Part of subcall function 00D4D036: __EH_prolog3_GS.LIBCMT ref: 00D4D03D
      • Part of subcall function 00D4D036: _memset.LIBCMT ref: 00D4D070
      • Part of subcall function 00D4D036: InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00D4D0AD
      • Part of subcall function 00D4CF99: __EH_prolog3_GS.LIBCMT ref: 00D4CFA0
      • Part of subcall function 00D4CF99: _memset.LIBCMT ref: 00D4CFD3
      • Part of subcall function 00D4CF99: InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00D4D010
      • Part of subcall function 00D4D0D3: InternetCombineUrlW.WININET(?,?,?,00000825,20000000), ref: 00D4D167
      • Part of subcall function 00D2D096: _memmove.LIBCMT ref: 00D2D0BF
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$Internet$Crack_memmove_memset$CombineComputerNameObjectQueryValue
    • String ID: DownloadManager$Downloading "%s" instead of "%s"$Software\Microsoft\VisualStudio\Setup$http://
    • API String ID: 551540626-1408139357
    • Opcode ID: 967d24384b54e0c4a81082a96e73ef172dda7c6d432478e7f0cd97dd89285d46
    • Instruction ID: 69c832b4594dcb2138040267ac69577645e667ecea4cfead67ba77ddfc2abd4f
    • Opcode Fuzzy Hash: 967d24384b54e0c4a81082a96e73ef172dda7c6d432478e7f0cd97dd89285d46
    • Instruction Fuzzy Hash: EB510971901268AACB61EB55DD45EEEB7FCFF65304F0480DAB489A2141DE345B88CFB1
    APIs
    Strings
    • Attempting to find '%s' in the Global Assembly Cache, xrefs: 00D2E542
    • AssemblyCheck: Error creating assembly cache: %d, xrefs: 00D2E58B
    • AssemblyCheck: Error querying assembly info: %d, xrefs: 00D2E5D1
    • Could not get AssemblyCache, xrefs: 00D2E562
    • Assembly found at '%s', xrefs: 00D2E5F0
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: Assembly found at '%s'$AssemblyCheck: Error creating assembly cache: %d$AssemblyCheck: Error querying assembly info: %d$Attempting to find '%s' in the Global Assembly Cache$Could not get AssemblyCache
    • API String ID: 2427045233-1108112992
    • Opcode ID: e656b905ebf18cec6a5d628c8fe948eecd366ac0116b11b04e066f7a337ecacb
    • Instruction ID: 4385664d868586e604b97853f939b270f817d27d3e6b2f2bdbd2a5563052971c
    • Opcode Fuzzy Hash: e656b905ebf18cec6a5d628c8fe948eecd366ac0116b11b04e066f7a337ecacb
    • Instruction Fuzzy Hash: 52516D70944328DFDF10DFA8E881AEDBBB4EF28308F508459F509A7291DB705A88CB71
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00D4B322
    • std::_Xinvalid_argument.LIBCPMT ref: 00D4B352
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    • _Allocate.LIBCPMT ref: 00D4B376
    • _memmove.LIBCMT ref: 00D4B395
    • _memmove.LIBCMT ref: 00D4B3C2
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$AllocateException@8H_prolog3_catchThrowXinvalid_argumentstd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 453418590-3788999226
    • Opcode ID: e988b28cbb86b583e76735ff98d62a79fac0949539f173dfcee193b258933138
    • Instruction ID: adbc92765bfa834e7760ab126af947f59e5e8a92538e1455c60583271cf7c5b2
    • Opcode Fuzzy Hash: e988b28cbb86b583e76735ff98d62a79fac0949539f173dfcee193b258933138
    • Instruction Fuzzy Hash: 9631A07160060AAFCB14DFB8CC86D7E77A5EF54314B14892DF99A97281EB71E9108B70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3DC6D
      • Part of subcall function 00D2AD06: __EH_prolog3_GS.LIBCMT ref: 00D2AD0D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: Code$Installed$Package$True$Writing Reboot Information to '%s'
    • API String ID: 2427045233-1329836656
    • Opcode ID: add495db35092dab360b963bed216d7c6b1b7f5763ff4951c9bd6918448adfc9
    • Instruction ID: 9d454350341418343f95e037cdab923986460a7c57e949ccad74489cc02487f4
    • Opcode Fuzzy Hash: add495db35092dab360b963bed216d7c6b1b7f5763ff4951c9bd6918448adfc9
    • Instruction Fuzzy Hash: BD310670D002289FCB14EF68E882BDDB7B1EF25304F5081A9E559B3292DB706A48CF71
    APIs
    • __EH_prolog3.LIBCMT ref: 00D2D9FA
      • Part of subcall function 00D2D49E: __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2D49E: __CxxThrowException@8.LIBCMT ref: 00D2D4F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8Throw
    • String ID: FileName$Key$No Key value specified for Registry File Check '%s'.$SearchDepth$Value
    • API String ID: 2489616738-425042624
    • Opcode ID: b48799aeb1769a8a6eb5906f2ce5cee3b2a3a6eebec7b77474a8f44c47bfe751
    • Instruction ID: 8f04c2c956397e59bb549eea39a3fba55e34267d3b5bcaddd90bec7c6bde1758
    • Opcode Fuzzy Hash: b48799aeb1769a8a6eb5906f2ce5cee3b2a3a6eebec7b77474a8f44c47bfe751
    • Instruction Fuzzy Hash: D721DF70904704BFCB08EF65E841A5ABBE1FF69B04B008469F8089B271D7B0E645CBB5
    APIs
    • __EH_prolog3.LIBCMT ref: 00D2D7D2
      • Part of subcall function 00D2D49E: __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2D49E: __CxxThrowException@8.LIBCMT ref: 00D2D4F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8Throw
    • String ID: FileName$No FileName value specified for File Check '%s'.$SearchDepth$SearchPath$SpecialFolder
    • API String ID: 2489616738-2343128853
    • Opcode ID: c62601a5a6c216cb502322e3601522addc22f0c744040e9918549cb9bf83e973
    • Instruction ID: 7991584f49009abdf0b81f875a98a6fa923c74b82fe02c1dcbafe68651f4d74b
    • Opcode Fuzzy Hash: c62601a5a6c216cb502322e3601522addc22f0c744040e9918549cb9bf83e973
    • Instruction Fuzzy Hash: 5321CD71940704BFCB18EF65E801A5ABBE5FF68704B008469F4488B261D7B0E644CBB5
    APIs
    • __getptd_noexit.LIBCMT ref: 00D65B13
      • Part of subcall function 00D52E75: GetLastError.KERNEL32(?,?,00D5542E,00D4FAC4,?,?,00D4ECF2,?,?,00D2A8F8), ref: 00D52E79
      • Part of subcall function 00D52E75: ___set_flsgetvalue.LIBCMT ref: 00D52E87
      • Part of subcall function 00D52E75: __calloc_crt.LIBCMT ref: 00D52E9B
      • Part of subcall function 00D52E75: _DecodePointerInternal@4.SETUP(00000000,?,?,00D5542E,00D4FAC4,?,?,00D4ECF2,?,?,00D2A8F8), ref: 00D52EB5
      • Part of subcall function 00D52E75: __initptd.LIBCMT ref: 00D52EC4
      • Part of subcall function 00D52E75: GetCurrentThreadId.KERNEL32 ref: 00D52ECB
      • Part of subcall function 00D52E75: SetLastError.KERNEL32(00000000,?,?,00D5542E,00D4FAC4,?,?,00D4ECF2,?,?,00D2A8F8), ref: 00D52EE3
    • __calloc_crt.LIBCMT ref: 00D65B35
    • __get_sys_err_msg.LIBCMT ref: 00D65B53
    • _strcpy_s.LIBCMT ref: 00D65B5B
    • __invoke_watson.LIBCMT ref: 00D65B70
    Strings
    • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00D65B20, 00D65B43
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ErrorLast__calloc_crt$CurrentDecodeInternal@4PointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__initptd__invoke_watson_strcpy_s
    • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
    • API String ID: 2148361204-798102604
    • Opcode ID: 4c292cd1841b442c56ab2f6e9199d7c7e943b195b5d8e7cde46d7d4c5042352c
    • Instruction ID: 7ed427e929352da367787fd413c02daa268429bf7aa795a18652cb9b220df623
    • Opcode Fuzzy Hash: 4c292cd1841b442c56ab2f6e9199d7c7e943b195b5d8e7cde46d7d4c5042352c
    • Instruction Fuzzy Hash: A2F02422600A106BDB30792D7CC2E2BB29CDB65B65F18003AFD0A97209F921DC8542B4
    APIs
    • __getptd.LIBCMT ref: 00D53A49
      • Part of subcall function 00D52EF3: __getptd_noexit.LIBCMT ref: 00D52EF6
      • Part of subcall function 00D52EF3: __amsg_exit.LIBCMT ref: 00D52F03
    • __getptd.LIBCMT ref: 00D53A5A
    • __getptd.LIBCMT ref: 00D53A68
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: MOC$RCC$csm
    • API String ID: 803148776-2671469338
    • Opcode ID: 74257bb0f9998e6f45ce478ddcbee54ba1a33af80dc38de670e750f0a549a9c8
    • Instruction ID: 38fbc0b5a1435181f5cfbdd9b12e754540bb59f107b22d60229d1147cd127d1e
    • Opcode Fuzzy Hash: 74257bb0f9998e6f45ce478ddcbee54ba1a33af80dc38de670e750f0a549a9c8
    • Instruction Fuzzy Hash: A4E012301002448FDF14A764C0CA77833D4FB4935AF1A10A1ED8DC7662CB78DD5D59B2
    APIs
    • LoadLibraryW.KERNEL32(kernel32.dll,?,00D39C2D), ref: 00D39BEC
    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00D39C03
    • GetProcAddress.KERNEL32(DecodePointer), ref: 00D39C15
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad
    • String ID: DecodePointer$EncodePointer$kernel32.dll
    • API String ID: 2238633743-1525541703
    • Opcode ID: a41605b6708998fd1673f0f879937987835274e4c9d6a8f0c6a3ef255d09e3bb
    • Instruction ID: 3cbf9d14ee0908bdf3d73736efb20abbd36062d44a01ff7981e2e6f96579a3ae
    • Opcode Fuzzy Hash: a41605b6708998fd1673f0f879937987835274e4c9d6a8f0c6a3ef255d09e3bb
    • Instruction Fuzzy Hash: 77E0EC7ED64324AECB109F79BD08949BEB4AF28755B004256E508D23A0E3740494CF70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D36FFB
    • std::ios_base::getloc.LIBCPMT ref: 00D3703C
      • Part of subcall function 00D3566C: __EH_prolog3_GS.LIBCMT ref: 00D35673
      • Part of subcall function 00D3566C: std::_Lockit::_Lockit.LIBCPMT ref: 00D35680
      • Part of subcall function 00D3566C: std::locale::_Getfacet.LIBCPMT ref: 00D3569F
    • _localeconv.LIBCMT ref: 00D370A3
    • _strcspn.LIBCMT ref: 00D371AB
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$GetfacetLockitLockit::__localeconv_strcspnstd::_std::ios_base::getlocstd::locale::_
    • String ID: e
    • API String ID: 2496886237-4024072794
    • Opcode ID: 0b256931cd7022728db9ce39cfbe471f841bc76d78d698d38c9007dff4477cd6
    • Instruction ID: fc67a8bb2664b03893dc6537748be4b91c7c6551848e576e2426183d101604fc
    • Opcode Fuzzy Hash: 0b256931cd7022728db9ce39cfbe471f841bc76d78d698d38c9007dff4477cd6
    • Instruction Fuzzy Hash: D90226B1D04249AFDF15DFE8C980AEDBBB5FF08300F048069E905AB262D771AA55CF60
    APIs
    • __CreateFrameInfo.LIBCMT ref: 00D53D3B
      • Part of subcall function 00D4F264: __getptd.LIBCMT ref: 00D4F272
      • Part of subcall function 00D4F264: __getptd.LIBCMT ref: 00D4F280
    • __getptd.LIBCMT ref: 00D53D45
      • Part of subcall function 00D52EF3: __getptd_noexit.LIBCMT ref: 00D52EF6
      • Part of subcall function 00D52EF3: __amsg_exit.LIBCMT ref: 00D52F03
    • __getptd.LIBCMT ref: 00D53D53
    • __getptd.LIBCMT ref: 00D53D61
    • __getptd.LIBCMT ref: 00D53D6C
    • _CallCatchBlock2.LIBCMT ref: 00D53D92
      • Part of subcall function 00D4F318: __CallSettingFrame@12.LIBCMT ref: 00D4F364
      • Part of subcall function 00D53E39: __getptd.LIBCMT ref: 00D53E48
      • Part of subcall function 00D53E39: __getptd.LIBCMT ref: 00D53E56
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
    • String ID:
    • API String ID: 1602911419-0
    • Opcode ID: e4de470c17cd6959889b4769de72ff785a44a2e30b04ca665f8f65c44db4607e
    • Instruction ID: d261a70ba3f1842df456a3731b8dc0953bbe4c0d976def55e9a9dc1d90899d82
    • Opcode Fuzzy Hash: e4de470c17cd6959889b4769de72ff785a44a2e30b04ca665f8f65c44db4607e
    • Instruction Fuzzy Hash: 1111D3B1C00249DFDF04EFA4D886BAD7BB0FB09311F108469FC14A7251DB789A199B60
    APIs
    • __getptd.LIBCMT ref: 00D54A0F
      • Part of subcall function 00D52EF3: __getptd_noexit.LIBCMT ref: 00D52EF6
      • Part of subcall function 00D52EF3: __amsg_exit.LIBCMT ref: 00D52F03
    • __amsg_exit.LIBCMT ref: 00D54A2F
    • __lock.LIBCMT ref: 00D54A3F
    • InterlockedDecrement.KERNEL32(?), ref: 00D54A5C
    • _free.LIBCMT ref: 00D54A6F
    • InterlockedIncrement.KERNEL32(02351878), ref: 00D54A87
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: 14a20b1b0803a558a9402c897eef7ede7600e348182ccd842c063f5f95236d19
    • Instruction ID: 1dcb6c3682d3445410f73e344590d703bae02133e000cb4efff45a8f937e776f
    • Opcode Fuzzy Hash: 14a20b1b0803a558a9402c897eef7ede7600e348182ccd842c063f5f95236d19
    • Instruction Fuzzy Hash: 0601A131A81711EBCF61AB64940A7597760FB0475EF084215EC04A7691DB3499C9CBFA
    APIs
    • GetFocus.USER32 ref: 00D486A2
    • GetDlgItem.USER32(000000FF,00000066), ref: 00D486B5
    • GetDlgItem.USER32(000000FF,000003EF), ref: 00D486C3
    • GetDlgItem.USER32(000000FF,0000040A), ref: 00D486D1
    • GetDlgItem.USER32(000000FF,00000000), ref: 00D486E7
    • SetFocus.USER32(00000000), ref: 00D486EE
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Item$Focus
    • String ID:
    • API String ID: 2803794159-0
    • Opcode ID: 2f6d1a5589f5fbddd342ee7149fb99fec0196b13270eb2d08b64cb1ebf93e404
    • Instruction ID: 968e1bcb9572e6c4fc3dc464002914ecf086b23dbf9be0a2120285b75e60fc49
    • Opcode Fuzzy Hash: 2f6d1a5589f5fbddd342ee7149fb99fec0196b13270eb2d08b64cb1ebf93e404
    • Instruction Fuzzy Hash: E0F0FF31500304BBDB712B60DC45A6E7A98EB603E1F1A8231F651E15B0DFB29892AA78
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4DCBE
      • Part of subcall function 00D4A0E5: GetFileAttributesW.KERNEL32(00D2E067,?,00D2E067,?), ref: 00D4A0F8
    • __CxxThrowException@8.LIBCMT ref: 00D4DDC2
    Strings
    • Verifying file hash, xrefs: 00D4DD5D
    • No hash or public key info found., xrefs: 00D4DEFB
    • Verifying file integrity of %s, xrefs: 00D4DCE6
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AttributesException@8FileH_prolog3_Throw
    • String ID: No hash or public key info found.$Verifying file hash$Verifying file integrity of %s
    • API String ID: 5089079-10929890
    • Opcode ID: 06d03d9edea51e8768c85c78654c9d91f7b7bc495fc37132657dff18a088e308
    • Instruction ID: 545267d887a71da4bd4226d73c430212175a0aad7cf0a3e2eea5368d5292993c
    • Opcode Fuzzy Hash: 06d03d9edea51e8768c85c78654c9d91f7b7bc495fc37132657dff18a088e308
    • Instruction Fuzzy Hash: F6617E31E00219AFDF10EBD8DC41AEE77B6EF28704F188425E541BB295D7B19A48CB70
    APIs
    Strings
    • Running external check with command '%s' and parameters '%s', xrefs: 00D2D288
    • Process exited with code %d, xrefs: 00D2D3B3
    • Running external check, and writing to log file '%s', xrefs: 00D2D346
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8H_prolog3_Throw
    • String ID: Process exited with code %d$Running external check with command '%s' and parameters '%s'$Running external check, and writing to log file '%s'
    • API String ID: 2985221223-1766360806
    • Opcode ID: ec495bbcd24e06ad8360f935d8b0190093606f3ab7be8421b70bf1a3b2830c75
    • Instruction ID: ea33c85688a867c1e74d9c43a997518f91484d2259b0ebcb5046c93aa6a74442
    • Opcode Fuzzy Hash: ec495bbcd24e06ad8360f935d8b0190093606f3ab7be8421b70bf1a3b2830c75
    • Instruction Fuzzy Hash: 8B710971D00228EFCB10DF98D945AEEBBB9FF29305F50405AE149A7141E770AA84CBB6
    APIs
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
    • MessageBoxW.USER32(00000000,?,?,00000010), ref: 00D47B82
    • CloseHandle.KERNEL32(000002D0), ref: 00D47B97
    • CoUninitialize.OLE32 ref: 00D47BA0
    Strings
    • The following error occurred initializing the bootstrapper: "%s", xrefs: 00D47B3F
    • , xrefs: 00D47B0D
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CloseHandleMessageUninitializeXinvalid_argumentstd::_
    • String ID: $The following error occurred initializing the bootstrapper: "%s"
    • API String ID: 699698131-886081036
    • Opcode ID: 6a5a4daa0e170a9ab98740f5404ab9ceba70fe0b8b39b601084eeeebad292590
    • Instruction ID: d79cdc725afb8713b74ec9c5ffb022f01f223eced9119ca323e3c01dc4c777b3
    • Opcode Fuzzy Hash: 6a5a4daa0e170a9ab98740f5404ab9ceba70fe0b8b39b601084eeeebad292590
    • Instruction Fuzzy Hash: 1731F4759002689BDB20DFA8DD85B9DB7B8FB24324F5082DAE159E3291DB705A84CF30
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D357CB
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
    • std::_Xinvalid_argument.LIBCPMT ref: 00D357E1
    • _memmove.LIBCMT ref: 00D35822
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
    • String ID: invalid string position$string too long
    • API String ID: 1253240057-4289949731
    • Opcode ID: 8af3e073b77629bda0e59d7b432fc441f0248354830804f8afde528ed84bf4b6
    • Instruction ID: a519fac22809e328c6328645fbc69aa86c5f2cb6a39b58298c6f965d6f966a32
    • Opcode Fuzzy Hash: 8af3e073b77629bda0e59d7b432fc441f0248354830804f8afde528ed84bf4b6
    • Instruction Fuzzy Hash: B8110471700A00ABDB249E1CEC81A2EB7EAEF95750F184A1DF48287685DB70DC0087B0
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D2C5EC
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
    • std::_Xinvalid_argument.LIBCPMT ref: 00D2C60E
    • _memmove.LIBCMT ref: 00D2C652
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
    • String ID: invalid string position$string too long
    • API String ID: 1253240057-4289949731
    • Opcode ID: d9c0d29a82c9dd1951672279cdc75e3cbbe7f5f40ce7bc9c19e6feb1b814f894
    • Instruction ID: 37dbb548525fdd783501f05ff9603fa187d1e2b879091464fa0b210fe2346e00
    • Opcode Fuzzy Hash: d9c0d29a82c9dd1951672279cdc75e3cbbe7f5f40ce7bc9c19e6feb1b814f894
    • Instruction Fuzzy Hash: F111A5312106249BCB24DE5CE881D5EB3F6FFA4B197241A1DF4568B660EB30ED05CBB4
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D354A0
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
    • std::_Xinvalid_argument.LIBCPMT ref: 00D354C2
    • _memmove.LIBCMT ref: 00D354FF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
    • String ID: invalid string position$string too long
    • API String ID: 1253240057-4289949731
    • Opcode ID: eb20661a9e842517a8e8f2123260bb3c1918f95b470d8e106c253462537f68e7
    • Instruction ID: 2d7434cb34831c68f0dddad0eaf3dd89965766bd302b29f08a90b96429c3f7cd
    • Opcode Fuzzy Hash: eb20661a9e842517a8e8f2123260bb3c1918f95b470d8e106c253462537f68e7
    • Instruction Fuzzy Hash: 0C119031300B509FDB28DE5CE881D5AB7E5EB54711F144929F452CB685D7B0EE40CBB0
    APIs
    • _memset.LIBCMT ref: 00D4A053
    • GetVersionExW.KERNEL32(?), ref: 00D4A06E
    • GetVersionExW.KERNEL32(?), ref: 00D4A08F
    • CompareStringW.KERNEL32(00000409,00000001,?,000000FF,Service Pack 6,000000FF), ref: 00D4A0BE
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Version$CompareString_memset
    • String ID: Service Pack 6
    • API String ID: 3284293846-3350390674
    • Opcode ID: ca392bfc5f22871e6f50dd954451b549542ab0e2988952167dc350fe92699bf7
    • Instruction ID: 805b6d359abdcf5ab8309222850a615e14d4bcb7e9f6bb3b2908189644b8fd11
    • Opcode Fuzzy Hash: ca392bfc5f22871e6f50dd954451b549542ab0e2988952167dc350fe92699bf7
    • Instruction Fuzzy Hash: 8511C875940218ABDF208F54AC01BDAB7B8AB19710F1402A1E919E32C5E770DE45DFB1
    APIs
    • __EH_prolog3.LIBCMT ref: 00D2DC03
      • Part of subcall function 00D2D49E: __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2D49E: __CxxThrowException@8.LIBCMT ref: 00D2D4F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8Throw
    • String ID: Arguments$Log$No PackageFile specified for External Check '%s'.$PackageFile
    • API String ID: 2489616738-3336131490
    • Opcode ID: 16da5d57e7f6ea15b12604ca36280337971bbfed8c9999d0bb7b827f82c6a5a7
    • Instruction ID: 228b74d538fa061b5bfa45011e8627d38baf3572a8f30342c13e665e33573a69
    • Opcode Fuzzy Hash: 16da5d57e7f6ea15b12604ca36280337971bbfed8c9999d0bb7b827f82c6a5a7
    • Instruction Fuzzy Hash: 49119D70904714AFDB18EF69E84195ABBF2FF68704B00847DF4489B262E7B0E604CBB1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: Defer$Force$None$Reboot
    • API String ID: 2427045233-1250134800
    • Opcode ID: 9aaae796466e97400b86acc94f64d6c549939279756183fd92a48fd38aae5081
    • Instruction ID: 9bd2e245c8c312630544a619504481cd6f7404a6c069007c965b8a30449f76db
    • Opcode Fuzzy Hash: 9aaae796466e97400b86acc94f64d6c549939279756183fd92a48fd38aae5081
    • Instruction Fuzzy Hash: A4019E72D402099BDB04DBB4E866BEEB3B0DF24318F108438F922B6181EBB5954CCB75
    APIs
    • GetVersion.KERNEL32 ref: 00D4E08E
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 00D4E09D
    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00D4E0A9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AddressHandleModuleProcVersion
    • String ID: KERNEL32.DLL$SetProcessDEPPolicy
    • API String ID: 3310240892-1809394400
    • Opcode ID: 0cf80858a7c72d4fb46a5adb645a147e4d86a07f90c75f10375028877f3fac14
    • Instruction ID: ae73320fe0fe8c6b341adeb7d3f3becefc8c4664ba081aacf22bcb8d35ec0db7
    • Opcode Fuzzy Hash: 0cf80858a7c72d4fb46a5adb645a147e4d86a07f90c75f10375028877f3fac14
    • Instruction Fuzzy Hash: ADD012346803407FCB202BF27D0DBA93656BB70B4AF08C414BA52D25D8DAB2C4868636
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D42644
    • MessageBoxW.USER32(00000000,?,?,00000035), ref: 00D427D7
    • Sleep.KERNEL32(00000064,?,?,?,0000040F,000000D0), ref: 00D42800
    • MessageBoxW.USER32(00000000,?,?,00000034), ref: 00D4287E
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    • __CxxThrowException@8.LIBCMT ref: 00D42957
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Message$Exception@8H_prolog3_SleepThrow_memmove
    • String ID:
    • API String ID: 484813404-0
    • Opcode ID: 90453fb10ed9fa9806ce69ab20f5eff32ff5d46da35ca89db5b5e722f585331b
    • Instruction ID: 55160c3fcf2609729c80de50c799849ec2ff15c81c220236ab8ec467e97d6e76
    • Opcode Fuzzy Hash: 90453fb10ed9fa9806ce69ab20f5eff32ff5d46da35ca89db5b5e722f585331b
    • Instruction Fuzzy Hash: 35911B70A40258AFDF15DBA8CC92BEDB7B9EF14704F40409AF209B7182DB755A85CB72
    APIs
    • GetDlgItem.USER32(?,0000040B), ref: 00D489BF
    • GetWindowRect.USER32(00000000), ref: 00D489CC
    • GetWindowRect.USER32(?,?), ref: 00D489D5
    • SetDlgItemTextW.USER32(?,0000040A,?), ref: 00D48A2D
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00D48A40
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Window$ItemRect$MoveText
    • String ID:
    • API String ID: 739774251-0
    • Opcode ID: ad610344b68932176c5f4b400840e92508f47130f25d57528ce63c232a091b96
    • Instruction ID: 68dea6cf13c474a0002c14a0fc42d54303fa481afd59353b4a725585f2ec5301
    • Opcode Fuzzy Hash: ad610344b68932176c5f4b400840e92508f47130f25d57528ce63c232a091b96
    • Instruction Fuzzy Hash: 4C312A71900349AFCB14DFB9C885AEEBBF5BF48300F14856EE55AE3211C770AA45DB64
    APIs
    • _malloc.LIBCMT ref: 00D5DDD8
      • Part of subcall function 00D53605: __FF_MSGBANNER.LIBCMT ref: 00D5361E
      • Part of subcall function 00D53605: __NMSG_WRITE.LIBCMT ref: 00D53625
      • Part of subcall function 00D53605: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00D56B38,00000000,00000001,00000000,?,00D56DCA,00000018,00D6DEB0,0000000C,00D56E5F), ref: 00D5364A
    • _free.LIBCMT ref: 00D5DDEB
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateHeap_free_malloc
    • String ID:
    • API String ID: 1020059152-0
    • Opcode ID: 8fcad7211c67f11b35cd2805a6d5faf50630e49214c55c3447e46b6062652a72
    • Instruction ID: 9af8d7a1e26d17f55d466f10c6405ff3f601e269142cde60f3aacf8029f84b0b
    • Opcode Fuzzy Hash: 8fcad7211c67f11b35cd2805a6d5faf50630e49214c55c3447e46b6062652a72
    • Instruction Fuzzy Hash: 5E11CA32404712ABCF322BB4BC0665E37A6DF643E3F244426FD88DA250EF34C8998674
    APIs
    • FindResourceW.KERNEL32(?,?,?,00000000,00000001,00000000,?,00D4B500), ref: 00D49D6C
    • LoadResource.KERNEL32(?,00000000,?,00D4B500), ref: 00D49D7C
    • SizeofResource.KERNEL32(?,00000000,?,00D4B500), ref: 00D49D8D
    • LockResource.KERNEL32(00D4B500,?,00D4B500), ref: 00D49DA0
    • _memmove.LIBCMT ref: 00D49DAF
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$FindLoadLockSizeof_memmove
    • String ID:
    • API String ID: 886470670-0
    • Opcode ID: 541ace0be8583ecace388d1b5cc4100444af59e47efc39b4fe89fc4cfd563e3d
    • Instruction ID: d81a8df73822c7b673f550d5dd2157c9ada4b02bd7a4238476f3fd092d3c83aa
    • Opcode Fuzzy Hash: 541ace0be8583ecace388d1b5cc4100444af59e47efc39b4fe89fc4cfd563e3d
    • Instruction Fuzzy Hash: 2011A57590028AEFCB201F26DD19A6BBBA8EFA4351F180839FD45C6250E730CC91DBB0
    APIs
    • __getptd.LIBCMT ref: 00D551BD
      • Part of subcall function 00D52EF3: __getptd_noexit.LIBCMT ref: 00D52EF6
      • Part of subcall function 00D52EF3: __amsg_exit.LIBCMT ref: 00D52F03
    • __getptd.LIBCMT ref: 00D551D4
    • __amsg_exit.LIBCMT ref: 00D551E2
    • __lock.LIBCMT ref: 00D551F2
    • __updatetlocinfoEx_nolock.LIBCMT ref: 00D55206
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: b57ba2dc3636827368b8a0853fb7f220de892174fe32fa8cd2f509cd888a037b
    • Instruction ID: f9ea9a7219e042e079122f3d6f72450988257bd23cde7dde74ced8a5ba3cdc9c
    • Opcode Fuzzy Hash: b57ba2dc3636827368b8a0853fb7f220de892174fe32fa8cd2f509cd888a037b
    • Instruction Fuzzy Hash: 9DF09632A44F00DBDF2677786803B1D3B90EF01713F144209FC09A72D6CB64594C9AB5
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D42E9D
      • Part of subcall function 00D42344: __EH_prolog3_GS.LIBCMT ref: 00D4234B
      • Part of subcall function 00D47F9C: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,00000001,?,?,00D41DCE,?,?,?,?,?,?,00000020), ref: 00D47FAF
      • Part of subcall function 00D47F9C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 00D47FC2
      • Part of subcall function 00D47F9C: CloseHandle.KERNEL32(?,?,00D41DCE,?,?,?,?,?,?,00000020), ref: 00D47FDA
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    • Sleep.KERNEL32(00000064), ref: 00D430B1
    • MessageBoxW.USER32(00000000,?,?,00000034), ref: 00D4314C
    Strings
    • Downloading failed with HRESULT=%d, xrefs: 00D42F02
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$CloseCreateEventHandleMessageMultipleObjectsSleepWait_memmove
    • String ID: Downloading failed with HRESULT=%d
    • API String ID: 54450717-1419425134
    • Opcode ID: 560a0b14028032bd1db7cc3dd6f9a8ebd02678080e1d631b0fec02afbdb99d8d
    • Instruction ID: ab373b6f8ec4a6d04636c53a2445b9c5d676c5ad27fff1beac24242a009ab37b
    • Opcode Fuzzy Hash: 560a0b14028032bd1db7cc3dd6f9a8ebd02678080e1d631b0fec02afbdb99d8d
    • Instruction Fuzzy Hash: 5EA18D70A10218AFDB11EBA8CC82FEDB7B8EF14304F504159F519AB2D2DB745A95CB72
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D41DF9
      • Part of subcall function 00D4DA53: __EH_prolog3_GS.LIBCMT ref: 00D4DA5A
      • Part of subcall function 00D4DA53: __wcsicoll.LIBCMT ref: 00D4DA96
    • GetDiskFreeSpaceExW.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D41E6B
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    • MessageBoxW.USER32(00000000,?,?,00000031), ref: 00D41FD9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$DiskFreeMessageSpace__wcsicoll_memmove
    • String ID: WindowsVolume
    • API String ID: 2057594507-3823324423
    • Opcode ID: 939154f1090b9615c69a169653c43224d2288295a7a72a9a1aef0da44d13ae73
    • Instruction ID: 6d94dc0a187485495ce6a103e60885c5ef9b71c16d293e274f69bf1b67ea39b3
    • Opcode Fuzzy Hash: 939154f1090b9615c69a169653c43224d2288295a7a72a9a1aef0da44d13ae73
    • Instruction Fuzzy Hash: AD610375D002589BEF20DFA8DC81BEDB7B9EF14304F5081AAE509A7251DB709A85CF71
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID:
    • API String ID: 2427045233-3916222277
    • Opcode ID: 800e6f9a0583d2367cd88818c3bc58d9a2d40bcdbf38e1b71858e83ab5461c20
    • Instruction ID: 8bd4799aa04bff6827fdb754600d70c347532779ebbe1bdee0d2e5c83da3c47c
    • Opcode Fuzzy Hash: 800e6f9a0583d2367cd88818c3bc58d9a2d40bcdbf38e1b71858e83ab5461c20
    • Instruction Fuzzy Hash: 1C5161B5900609ABDF20DFA8C4819EEB7F4EF18744F548829E55267680D774E945CB70
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Fputc$H_prolog3_
    • String ID:
    • API String ID: 2569218679-3916222277
    • Opcode ID: 95c6361a6c4d4d42fb760db1ca0378ca35f42a8eae48c28bf47afddfe8b3dab1
    • Instruction ID: d8823e1234022f1ae5765477be96e1cdb805e2cd121cc10f8f7b24c160caa1ca
    • Opcode Fuzzy Hash: 95c6361a6c4d4d42fb760db1ca0378ca35f42a8eae48c28bf47afddfe8b3dab1
    • Instruction Fuzzy Hash: D2415D31900609AFCF21DFA8C8819AEBBF5EF59754F24C51AE552B7280DB71E944CB70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D3A3E6
      • Part of subcall function 00D4EE13: _malloc.LIBCMT ref: 00D4EE2D
    • __CxxThrowException@8.LIBCMT ref: 00D3A4B6
      • Part of subcall function 00D3A269: __EH_prolog3_GS.LIBCMT ref: 00D3A270
      • Part of subcall function 00D3A269: __CxxThrowException@8.LIBCMT ref: 00D3A2EF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8H_prolog3_Throw$_malloc
    • String ID: DefaultExitCode$ExitCode
    • API String ID: 1828507218-3933766663
    • Opcode ID: 35b350e079b0884845159e59c349968f63f2894edd27e78821e0eada9845c2b5
    • Instruction ID: df36b2fc61761c0aeae695e0433aa652afc213805696449ef01eabc1dafe87b5
    • Opcode Fuzzy Hash: 35b350e079b0884845159e59c349968f63f2894edd27e78821e0eada9845c2b5
    • Instruction Fuzzy Hash: 70315072E002599FCF10EFE894859ADB7F4EF18300F19447EE589B7241DAB45D458B72
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4CE76
    • GetComputerObjectNameW.SECUR32 ref: 00D4CE95
      • Part of subcall function 00D2D096: _memmove.LIBCMT ref: 00D2D0BF
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memmove$ComputerH_prolog3_NameObject
    • String ID: /$microsoft.com
    • API String ID: 2359728167-3454454201
    • Opcode ID: 2eef40c433044369e9dc46050f6112289200af3cc29730eddf98cea5935bc861
    • Instruction ID: 61ba2bba9552483279b61e0a31c852ee25af17a8b75e58c20d7fefe1ad39771a
    • Opcode Fuzzy Hash: 2eef40c433044369e9dc46050f6112289200af3cc29730eddf98cea5935bc861
    • Instruction Fuzzy Hash: 97314D70846268AADB60EB64DC89BEAB378DF14318F1001D5B149AA191DB795FC9CF31
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D42DB6
      • Part of subcall function 00D4CD18: __EH_prolog3.LIBCMT ref: 00D4CD1F
    • EndUpdateResourceW.KERNEL32(?,00000000,?,?,?,?,?,?,00000040), ref: 00D42E61
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_ResourceUpdate
    • String ID: false$true
    • API String ID: 338534718-2658103896
    • Opcode ID: 2bb7c65de1e9466c413028fa0a60d591c6c1c42e34c2e7fc82edffbbb9acd79e
    • Instruction ID: 2bf3c9e71df7be621742fb477685189bd914862534938c0e0b5bf1be6a603022
    • Opcode Fuzzy Hash: 2bb7c65de1e9466c413028fa0a60d591c6c1c42e34c2e7fc82edffbbb9acd79e
    • Instruction Fuzzy Hash: BC21A474D012189FCB10EFA5DC45EEFBB78EF28744F548029F415A6251EB705A45CBB0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4C573
    • FormatMessageW.KERNEL32(00000500,?,00000000,00000000,?,00000000,?), ref: 00D4C649
    • LocalFree.KERNEL32(?,?), ref: 00D4C662
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: FormatFreeH_prolog3_LocalMessage
    • String ID: \r\n
    • API String ID: 2435402305-1273924927
    • Opcode ID: 2e6e6a4a01b05d3f3403348b6db885dd80f02431fcd4fbab3c48d92f89823006
    • Instruction ID: 3603da5f9df9f4050631ac066ec3bdd97eced3b46b965758dfa395ae3bfc05ac
    • Opcode Fuzzy Hash: 2e6e6a4a01b05d3f3403348b6db885dd80f02431fcd4fbab3c48d92f89823006
    • Instruction Fuzzy Hash: 14212D719102689FDB20EB609C45AAD76B8FF28704F44C0E5E588A6151DA719F89CFF1
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4D03D
    • _memset.LIBCMT ref: 00D4D070
    • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00D4D0AD
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CrackH_prolog3_Internet_memset
    • String ID: <
    • API String ID: 509944592-4251816714
    • Opcode ID: a5fd26d49658bd474a8f12dbaa41a2b90e1c0ddbf0912e6901427d3cf65ee0ba
    • Instruction ID: 661ce6f83e960105fe03fbfcd2a2b627b6f41e6d662296bca8285245abcdae0f
    • Opcode Fuzzy Hash: a5fd26d49658bd474a8f12dbaa41a2b90e1c0ddbf0912e6901427d3cf65ee0ba
    • Instruction Fuzzy Hash: 56115EB1900208DFDF109FA8D841A9DBBB8FF08304F40402EE505EB250D7B95A058BB1
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4CFA0
    • _memset.LIBCMT ref: 00D4CFD3
    • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00D4D010
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CrackH_prolog3_Internet_memset
    • String ID: <
    • API String ID: 509944592-4251816714
    • Opcode ID: f8376954fa25542199e6b5df0e8eb2d73b8d599a19c77940d5a2e0d4553ad23d
    • Instruction ID: 12742a26d5f412b2998300802179612cb63de9c1b3b2791317baa902e812f599
    • Opcode Fuzzy Hash: f8376954fa25542199e6b5df0e8eb2d73b8d599a19c77940d5a2e0d4553ad23d
    • Instruction Fuzzy Hash: 191161B1D00208EFDB109FA8E841A5DBBB8FF08304F50802EF515EB250DBB55A058B71
    APIs
    • __EH_prolog3.LIBCMT ref: 00D2D904
      • Part of subcall function 00D2D49E: __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2D49E: __CxxThrowException@8.LIBCMT ref: 00D2D4F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8Throw
    • String ID: Key$No Key value specified for Registry Check '%s'.$Value
    • API String ID: 2489616738-103778900
    • Opcode ID: 0aa3108bb584bca9f57ad20dc790cbaa0ea47f3e507d21e2d04e933cc788a9d4
    • Instruction ID: 1028868d217b65fd3a6ec20cd36be15d7b5c33c8a4febe268545c4d893e34f60
    • Opcode Fuzzy Hash: 0aa3108bb584bca9f57ad20dc790cbaa0ea47f3e507d21e2d04e933cc788a9d4
    • Instruction Fuzzy Hash: F901D271504314AFDB08DF55E806A5ABBE1FF64704F008069F848AB261D7B0E655CBB9
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D4A77F
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    • _Allocate.LIBCPMT ref: 00D4A795
    • _memmove.LIBCMT ref: 00D4A7A6
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateException@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 1114612255-3788999226
    • Opcode ID: d3e117cc191e5480d7a3ad5497f397802d3c43f0f00357930089fd22ab96548d
    • Instruction ID: 230bc00b9176fe91805c77a97c369e444165b4cc9b72260114fedc32101f072c
    • Opcode Fuzzy Hash: d3e117cc191e5480d7a3ad5497f397802d3c43f0f00357930089fd22ab96548d
    • Instruction Fuzzy Hash: C801AD72200605AFD720AF6DCCC5D26BBE8EF84350B24892DF499C7641DA30EC418BB4
    APIs
    • LoadLibraryW.KERNEL32(mscoree.dll), ref: 00D2C6A1
    • GetLastError.KERNEL32 ref: 00D2C6AD
    • InterlockedCompareExchange.KERNEL32(00D71EF0,00000000,00000000), ref: 00D2C6E0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CompareErrorExchangeInterlockedLastLibraryLoad
    • String ID: mscoree.dll
    • API String ID: 318279569-1912557249
    • Opcode ID: d3d3cc6b586965e1932e18280317f2c28adc6eb04214d864b13ea851a6046301
    • Instruction ID: d513270ed1e7b833242f4c9f58e5a6caef9792edebfa064a60808032bf9c3c27
    • Opcode Fuzzy Hash: d3d3cc6b586965e1932e18280317f2c28adc6eb04214d864b13ea851a6046301
    • Instruction Fuzzy Hash: 95018C39510325AED7209B69EC09B993FA9EF70398F144165E808E33A1E7B199458BB1
    APIs
    • __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2B608: __EH_prolog3.LIBCMT ref: 00D2B60F
    • __CxxThrowException@8.LIBCMT ref: 00D2D4F8
      • Part of subcall function 00D4EE98: RaiseException.KERNEL32(?,?,00D2A9A0,?,?,?,?,?,00D2A9A0,?,00D6A6A8,00000000), ref: 00D4EEDA
    Strings
    • Property, xrefs: 00D2D4CC
    • Property not specified for Install Check., xrefs: 00D2D4E0
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3$ExceptionException@8RaiseThrow
    • String ID: Property$Property not specified for Install Check.
    • API String ID: 1412866469-1977767295
    • Opcode ID: 016bcc4bbb69c4b2cc3350466b332eb65a58139237e6bdf2331bc350b1654785
    • Instruction ID: addda2a83d8c6b8ab5cf83e2d08fa375c9935ade0da99ecf09b2e189fc125e6a
    • Opcode Fuzzy Hash: 016bcc4bbb69c4b2cc3350466b332eb65a58139237e6bdf2331bc350b1654785
    • Instruction Fuzzy Hash: 00F0B471940314AFDB00EF90E806F6D77A0FF21708F00486AF540A72A1DBB49A09CB75
    APIs
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CDD4
      • Part of subcall function 00D4CDA4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00D4CDE9
      • Part of subcall function 00D4CDA4: _memset.LIBCMT ref: 00D4CE19
      • Part of subcall function 00D4CDA4: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00D4CE29
      • Part of subcall function 00D4CDA4: LoadLibraryW.KERNEL32(?), ref: 00D4CE52
    • GetProcAddress.KERNEL32(00000000,crypt32.dll), ref: 00D4D506
    • FreeLibrary.KERNEL32(00000000,?,00D4DEA8,00000000,00000000,?), ref: 00D4D516
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: DirectoryLibrary_memset$AddressFreeLoadProcSystemWindows
    • String ID: CertFreeCertificateContext$crypt32.dll
    • API String ID: 286598593-2264772026
    • Opcode ID: c21347aa0c8cabc0bdf2476995460b91753435b73ca4e20dc36e3e44d0b0c9b8
    • Instruction ID: a33b6b6a6956429bd84b3e831477d316bf22de2553e7a90ed8030d5925e7e0be
    • Opcode Fuzzy Hash: c21347aa0c8cabc0bdf2476995460b91753435b73ca4e20dc36e3e44d0b0c9b8
    • Instruction Fuzzy Hash: E5E0C234801324ABC7213B61EC0DAEE3EA8DFA1398F04C020F90CC2611DF318A52C6B1
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D4C204
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 00D4C2B7
    • ReadFile.KERNEL32(000000FF,?,00004000,?,00000000,00004000), ref: 00D4C2F5
    • CloseHandle.KERNEL32(000000FF), ref: 00D4C3A4
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: File$CloseCreateH_prolog3_HandleRead
    • String ID:
    • API String ID: 3561040463-0
    • Opcode ID: b56831e2ec28a1ed1b381754d13ec5b9f8fd28d078062edb38e80b246919a2b9
    • Instruction ID: f07d1e7dc2338548947b496ace3c8450f22892bb529e684361658722ea1d1197
    • Opcode Fuzzy Hash: b56831e2ec28a1ed1b381754d13ec5b9f8fd28d078062edb38e80b246919a2b9
    • Instruction Fuzzy Hash: 975123B1D12259AFDF209FE8CC85AEEBB78FF05344F588129E505B62A4D7309942DB70
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
    • String ID:
    • API String ID: 2782032738-0
    • Opcode ID: a812d0d0a5c6481c98b1a04a781b8e7b7a4a9f9683a8f812520d858c1e4d2253
    • Instruction ID: f5a18166fa02e56dd6a24308c4e479f232b21a057023951fb4105c1aca6bc73c
    • Opcode Fuzzy Hash: a812d0d0a5c6481c98b1a04a781b8e7b7a4a9f9683a8f812520d858c1e4d2253
    • Instruction Fuzzy Hash: 1041F435A00744DBDF358FA9C88169EBBB5EF80322F28856DEC5597180D770DE898B70
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00D56FE5
    • __isleadbyte_l.LIBCMT ref: 00D57018
    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,00000000,00000000,?,?,?,?,?,00000000), ref: 00D57049
    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,00000000,00000000,?,?,?,?,?,00000000), ref: 00D570B7
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: 8013ccbc3d4a7d5c954c5ffd84c20243a90fa7d38912324ec75b56381a05e983
    • Instruction ID: 6850bd993e67bd25584d518ca1af85b563f9ccc75219bdeefd317823f64d6454
    • Opcode Fuzzy Hash: 8013ccbc3d4a7d5c954c5ffd84c20243a90fa7d38912324ec75b56381a05e983
    • Instruction Fuzzy Hash: 5531A031904255EFDF20DF68E8909AA7BF5BF01312F688569EC618B2D1D731D948DB70
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: _memset$__wsplitpath_s
    • String ID:
    • API String ID: 599571650-0
    • Opcode ID: f813671892c58667d39e7d105d63a28e539b3ec51db76419f1292d2187606a0b
    • Instruction ID: 44c5a5038c1101c7774d75443344cad2a7b10dda1045fca008c400fc4c0f17a6
    • Opcode Fuzzy Hash: f813671892c58667d39e7d105d63a28e539b3ec51db76419f1292d2187606a0b
    • Instruction Fuzzy Hash: 07312DB590021CABCB10DF94CC85EDEB3BEEF98310F1441A6B519E3141D671AE588F74
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00D34EA3
    • std::ios_base::getloc.LIBCPMT ref: 00D34EEB
    • std::ios_base::clear.LIBCPMT ref: 00D34F3D
    • std::ios_base::clear.LIBCPMT ref: 00D34FC3
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: std::ios_base::clear$H_prolog3_catchstd::ios_base::getloc
    • String ID:
    • API String ID: 4272078015-0
    • Opcode ID: 381955e5070d77d6f3a4c9fdb76ab2c35a4728012fcc17791aab72bdb3333a0d
    • Instruction ID: ccf06e50b535afccb035f6c5ef633067fc6a60efdac6826a3452b28f9bcfb1ff
    • Opcode Fuzzy Hash: 381955e5070d77d6f3a4c9fdb76ab2c35a4728012fcc17791aab72bdb3333a0d
    • Instruction Fuzzy Hash: 07314F746001018FDB24EF58C5A1A79B7A1EF54314F6885ADE18A9B392CB79ED42CB70
    APIs
    • GetWindowRect.USER32(?,?), ref: 00D47D1E
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00D47D40
    • GetSystemMetrics.USER32(00000000), ref: 00D47D57
    • GetSystemMetrics.USER32(00000001), ref: 00D47D5E
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: System$Metrics$InfoParametersRectWindow
    • String ID:
    • API String ID: 1941969595-0
    • Opcode ID: aaeebe4c78ee7efc08d1056f63edf2e288118e8d28874631474b96b3645c54a1
    • Instruction ID: 4054688779cac8a8dad47f58bbc9fa582942411a85a0c2387b0dc45b8bb2c046
    • Opcode Fuzzy Hash: aaeebe4c78ee7efc08d1056f63edf2e288118e8d28874631474b96b3645c54a1
    • Instruction Fuzzy Hash: 643190B5E0020ADFCB00CFA9C9859EEBBF8FF58344F54856AE915E7240D730AA018F64
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D49847
    • GetDlgItem.USER32(?,00000430), ref: 00D49866
    • SendMessageW.USER32(?,00000461,?,?), ref: 00D498FF
    • SendMessageA.USER32(?,00000461,?,?), ref: 00D4991C
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: MessageSend$H_prolog3_Item
    • String ID:
    • API String ID: 4098331016-0
    • Opcode ID: 731a09458ca8f9a6aeca07a04129aa68ff837ef07c3101013cabe90d5ee7a7c7
    • Instruction ID: ee99d6fc7e82e9aebad46aed66b8cc41c9f4b41bfce7e47811158f8a13ee88b2
    • Opcode Fuzzy Hash: 731a09458ca8f9a6aeca07a04129aa68ff837ef07c3101013cabe90d5ee7a7c7
    • Instruction Fuzzy Hash: 39318DB0800308EFDF24DFA8D884B9EBBB9FF45300F14851AF552AA2A1CB705545CB71
    APIs
    • GetDlgItem.USER32(?,?), ref: 00D48308
    • GetWindowRect.USER32(00000000,?), ref: 00D48327
    • ScreenToClient.USER32(?,?), ref: 00D48344
    • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00D48368
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Window$ClientItemMoveRectScreen
    • String ID:
    • API String ID: 646222375-0
    • Opcode ID: e579ee27c86d108d970e404b28c199e10d2135348e12d4531bf132425f6e4add
    • Instruction ID: 5667c9b4615386da40e493447cecba0875c2251fee0a9c4c23be04e37fa52dd4
    • Opcode Fuzzy Hash: e579ee27c86d108d970e404b28c199e10d2135348e12d4531bf132425f6e4add
    • Instruction Fuzzy Hash: 7F11C97590020AEFCB10DFA9C9859BFBBB8FF58314B144169F515E3210DB30A945CB64
    APIs
    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 00D49E0E
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D49E24
    • TranslateMessage.USER32(?), ref: 00D49E32
    • DispatchMessageW.USER32(?), ref: 00D49E3C
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Message$DispatchMultipleObjectsPeekTranslateWait
    • String ID:
    • API String ID: 2231909638-0
    • Opcode ID: 933ab9f0bd6bde9aa61ff55527a2aa55b99c045c0bb17782fe560164c6212ab1
    • Instruction ID: c5943f5b9bdfa534d81c9712f52f97734ce2ea0583d8c50b8b3ace2cbbd22989
    • Opcode Fuzzy Hash: 933ab9f0bd6bde9aa61ff55527a2aa55b99c045c0bb17782fe560164c6212ab1
    • Instruction Fuzzy Hash: D3016D72A01218EBCF10DBA59C49DEFBBACEF59714B104125F505E7180DA34DA05C6B4
    APIs
      • Part of subcall function 00D48168: GetDlgItem.USER32(?,00000000), ref: 00D4817E
    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00D48725
    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00D48736
    • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00D48747
    • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00D4875E
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: MessageSend$Item
    • String ID:
    • API String ID: 3888421826-0
    • Opcode ID: 576d9ba4e78401231094fb7ca5a695d8b80806eb933a0ee2e210a421ad9cde93
    • Instruction ID: 32858423402b571b8de7a73fe141d376181bdd7f05aeb142345f033c36a9b2fe
    • Opcode Fuzzy Hash: 576d9ba4e78401231094fb7ca5a695d8b80806eb933a0ee2e210a421ad9cde93
    • Instruction Fuzzy Hash: F9F031A1A403187FE620A7A58C8AF6F7A2CDB957A5F14002A7205A61C0C9709D02E670
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: 7885726e51710dfb409d83f47fda806ed7f39660f26e99df1c6e86efa9305941
    • Instruction ID: 4b69e85a222f2a3f57733939318d0e8d95eea388e90fefbf318965c32a5cf852
    • Opcode Fuzzy Hash: 7885726e51710dfb409d83f47fda806ed7f39660f26e99df1c6e86efa9305941
    • Instruction Fuzzy Hash: B811893200014EFBCF166E84CC52CEE7F62BB19352F998414FE2859031D732C9B6ABA1
    APIs
    • __EH_prolog3.LIBCMT ref: 00D49616
    • GetDlgItem.USER32(?,0000040B), ref: 00D4962B
    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D49641
    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D4966B
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: MessageSend$H_prolog3Item
    • String ID:
    • API String ID: 2559409407-0
    • Opcode ID: d49be20b0b1881ebd31c88a204897c6d62b6f5b0b13dd5ecdb158501dfdbdcaa
    • Instruction ID: 2f3d994e28ce0e7d45b7098c2eb321efbbe6277829d3e9e255a7e3d9a99de46a
    • Opcode Fuzzy Hash: d49be20b0b1881ebd31c88a204897c6d62b6f5b0b13dd5ecdb158501dfdbdcaa
    • Instruction Fuzzy Hash: 2001D3B5D00219ABDB10DFA5D845DEEBAB9EFA8300F00405AF504B7261CA759A01CA74
    APIs
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,00000007,?,00000000,00D43CD0,?,?,000000A0), ref: 00D48397
    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 00D483AA
    • CloseHandle.KERNEL32(?), ref: 00D483C2
      • Part of subcall function 00D47EE0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D47F2F
    • CloseHandle.KERNEL32(?), ref: 00D483CF
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CloseHandle$CreateEventMessageMultipleObjectsPeekWait
    • String ID:
    • API String ID: 1746628939-0
    • Opcode ID: 18f9cf3022826fb35d203c4b8a7382c25c366de71414f61492a48a503023c227
    • Instruction ID: f86ee7e956a33029e889b41774f4db163f93f6b3eb5aff4bc262d85070cb96a3
    • Opcode Fuzzy Hash: 18f9cf3022826fb35d203c4b8a7382c25c366de71414f61492a48a503023c227
    • Instruction Fuzzy Hash: 58F03639200241ABD7301F259C4CD5BBEB9FBE1BA1B248639B995C52A4CE714805D630
    APIs
    • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,00000001,?,?,00D41DCE,?,?,?,?,?,?,00000020), ref: 00D47FAF
    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 00D47FC2
    • CloseHandle.KERNEL32(?,?,00D41DCE,?,?,?,?,?,?,00000020), ref: 00D47FDA
      • Part of subcall function 00D47EE0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D47F2F
    • CloseHandle.KERNEL32(?,?,00D41DCE,?,?,?,?,?,?,00000020), ref: 00D47FE7
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CloseHandle$CreateEventMessageMultipleObjectsPeekWait
    • String ID:
    • API String ID: 1746628939-0
    • Opcode ID: 5ce1fce32e39c91490d30fc55c9da35898efa21ba4a2d8560352fb53dbe8131d
    • Instruction ID: d8e73709c5f764706321aace4275d4fc677e000898e8e7e860ac6d5a336b2f0f
    • Opcode Fuzzy Hash: 5ce1fce32e39c91490d30fc55c9da35898efa21ba4a2d8560352fb53dbe8131d
    • Instruction Fuzzy Hash: 31F03039204246ABE7301F26DC48D66BEB9FFE2761B248639BA95D62E4CB314805C630
    APIs
    • LoadImageW.USER32(?,000000FF,00000001,00000000,00000000,00008000), ref: 00D481DA
    • LoadIconW.USER32(00000000,00007F03), ref: 00D481E8
    • GetDlgItem.USER32(000000FF,00000065), ref: 00D481FE
    • SendMessageW.USER32(00000000), ref: 00D48205
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Load$IconImageItemMessageSend
    • String ID:
    • API String ID: 1259760789-0
    • Opcode ID: dc7c974f95b5539609e50cf199d1ce1f150a504ae1b498d776c241ade850bf1f
    • Instruction ID: 58495f551f6da4a3ab4820f7aeb107c2ea191b9d452ad619e8d72258bb7942e7
    • Opcode Fuzzy Hash: dc7c974f95b5539609e50cf199d1ce1f150a504ae1b498d776c241ade850bf1f
    • Instruction Fuzzy Hash: 17F0E2B2104749FFE7300B609C8AEBB3A2EFF10791F148525F656D41E0CBB19C4696B8
    APIs
    • GetDlgItem.USER32(?,00000069), ref: 00D4808F
    • ShowWindow.USER32(00000000), ref: 00D48098
    • GetDlgItem.USER32(?,00000429), ref: 00D480A6
    • ShowWindow.USER32(00000000), ref: 00D480A9
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ItemShowWindow
    • String ID:
    • API String ID: 3351165006-0
    • Opcode ID: 6c9fd4cf2424763bd61a0281c0e8904d8e62e54ec3bee8086b31a64a25fcf803
    • Instruction ID: 73971e63f8f13c0a8cec09a202d7840745fd373e82cfbd4b142bda6be8a28092
    • Opcode Fuzzy Hash: 6c9fd4cf2424763bd61a0281c0e8904d8e62e54ec3bee8086b31a64a25fcf803
    • Instruction Fuzzy Hash: 45E0ED76A00228BAC72097AACC49C8BFFACDF95260B164062F648E3260C571EC01C6F4
    APIs
      • Part of subcall function 00D3D0AC: __EH_prolog3_GS.LIBCMT ref: 00D3D0B3
    • CloseHandle.KERNEL32(?), ref: 00D435FF
    • CloseHandle.KERNEL32(?), ref: 00D43613
    • CloseHandle.KERNEL32(?), ref: 00D43627
    Strings
    • Failed to wait for parent process to end before creating new setup.exe.This is not a fatal error - however, setup.exe may not be a, xrefs: 00D435DC
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: CloseHandle$H_prolog3_
    • String ID: Failed to wait for parent process to end before creating new setup.exe.This is not a fatal error - however, setup.exe may not be a
    • API String ID: 4086437536-596111041
    • Opcode ID: 2ff9e168391a089f960062668a1584dd7105e94f5150854e022bd307da164f33
    • Instruction ID: 8da3e75c425b2a046c93dcffeb85bc99e972a6bb909e6a75ca4cece693db49bc
    • Opcode Fuzzy Hash: 2ff9e168391a089f960062668a1584dd7105e94f5150854e022bd307da164f33
    • Instruction Fuzzy Hash: D3E0C938805329DBCF726B14EC09658BA32FB11B05F9681E1F549A0274D6330EA1DF75
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00D3BB8E
      • Part of subcall function 00D4C434: GetDateFormatW.KERNEL32(00000400,00000001,00000000,00000000,?,000003FF), ref: 00D4C4D3
      • Part of subcall function 00D4C434: GetTimeFormatW.KERNEL32(00000400,00000000,00000000,00000000,?,000003FF), ref: 00D4C4E9
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D2B217: _memmove.LIBCMT ref: 00D2B28E
    Strings
    • (%s) Downloading '%s' from '%s' to '%s', xrefs: 00D3BD2C
    • Download completed at %s, xrefs: 00D3BE4F
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Format$DateH_prolog3_catch_TimeXinvalid_argument_memmovestd::_
    • String ID: (%s) Downloading '%s' from '%s' to '%s'$Download completed at %s
    • API String ID: 655749115-967203076
    • Opcode ID: 1bfc63b713cb7824fd9e313df7eac85136757b73a4c619d60506a0defbd721bd
    • Instruction ID: 462c798c063812241449a74ba51c063438776da85fc0bf0934621dea9709330b
    • Opcode Fuzzy Hash: 1bfc63b713cb7824fd9e313df7eac85136757b73a4c619d60506a0defbd721bd
    • Instruction Fuzzy Hash: BBC16971900259DFDB24DF68D980BEAB7B5FF14314F10896EE15AA7241EB30AA84CF71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D2C8EE
      • Part of subcall function 00D2C84E: __EH_prolog3_GS.LIBCMT ref: 00D2C855
      • Part of subcall function 00D2C84E: InterlockedCompareExchange.KERNEL32(00D71EF8,?,00000000), ref: 00D2C8A5
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$CompareExchangeInterlocked
    • String ID: GetRequestedRuntimeInfo$v4.0.0
    • API String ID: 2107565278-1665928025
    • Opcode ID: e61068ff833fdf0b75c659e728720aa1e1586ac866454d34ed39613a030813bd
    • Instruction ID: 678c7657db5bd769c2c39ee1ab5f48432b275e3bd2c04b38fa0278c404fe3fc0
    • Opcode Fuzzy Hash: e61068ff833fdf0b75c659e728720aa1e1586ac866454d34ed39613a030813bd
    • Instruction Fuzzy Hash: 7971E7B19116389FCF60DF54DC85ADDB7B6EBA8314F1401EAE509A3210DA329EE4CF60
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D38DE4
    • __CxxThrowException@8.LIBCMT ref: 00D38E22
      • Part of subcall function 00D2B217: std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D38AFD: __EH_prolog3_catch.LIBCMT ref: 00D38B04
      • Part of subcall function 00D2AA24: _memmove.LIBCMT ref: 00D2AA49
      • Part of subcall function 00D2AD7D: __EH_prolog3_GS.LIBCMT ref: 00D2AD84
    Strings
    • Reached the end of the file., xrefs: 00D38E0A
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$Exception@8H_prolog3_catchThrowXinvalid_argument_memmovestd::_
    • String ID: Reached the end of the file.
    • API String ID: 1775207536-1700886240
    • Opcode ID: d299e70e318635884dd342fa80d6dda20528593c5ea9039182f2c3dc5ba613be
    • Instruction ID: b0d0dda104ec5c988746125a5ac2cabd9201dfdbbc6f60b883bd16e9fe6b38b0
    • Opcode Fuzzy Hash: d299e70e318635884dd342fa80d6dda20528593c5ea9039182f2c3dc5ba613be
    • Instruction Fuzzy Hash: EC513D71900248DFCB10DFA8D891EDEB7B9EF18314F14846AF15AE7281DB74AA48DB71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D304CD
    • __fassign.LIBCMT ref: 00D30566
      • Part of subcall function 00D30486: __EH_prolog3.LIBCMT ref: 00D3048D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3___fassign
    • String ID: true
    • API String ID: 4285383889-4261170317
    • Opcode ID: b9a24ddbd52d71707c0022f2e78fd8a46fd74f3c7bbebfb3b1b1ca52956657b5
    • Instruction ID: baba227462e476409b0ec3fcd78e721a599e58e08463b1a0f8e8ef403ad5f16e
    • Opcode Fuzzy Hash: b9a24ddbd52d71707c0022f2e78fd8a46fd74f3c7bbebfb3b1b1ca52956657b5
    • Instruction Fuzzy Hash: FD216070C04208ABCB14EFA9D8619DEBBB8EF64714F50851DF066A32A2DF749A04CB71
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D30636
      • Part of subcall function 00D304C6: __EH_prolog3_GS.LIBCMT ref: 00D304CD
    • __wcsicoll.LIBCMT ref: 00D306E7
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    Strings
    • Invalid comparison type, xrefs: 00D30684
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$FileWrite__wcsicoll
    • String ID: Invalid comparison type
    • API String ID: 1110922125-70441815
    • Opcode ID: 6c308fb52b5c8562582200b3c8e015652e0013654ce6c2c334d45a92a28f83fd
    • Instruction ID: b39b1fe03a11b4ff4d2946d4bed2ecaaa5f49e5252a03534a5dcdb88ae305e39
    • Opcode Fuzzy Hash: 6c308fb52b5c8562582200b3c8e015652e0013654ce6c2c334d45a92a28f83fd
    • Instruction Fuzzy Hash: 8321D471A442189FCF18EFA8D4629EDBBB5FFA4304F54001DE042A7290CB74AE45CB70
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argument_memmovestd::_
    • String ID: string too long
    • API String ID: 256744135-2556327735
    • Opcode ID: 647e5d73adc14ca6f0058b87f97e80b78713d538aee7b147f48c0ff8d23e4855
    • Instruction ID: 3a03066b4139977599a20e33f7ec210e555f7014a4216ae356902e97f620ab0c
    • Opcode Fuzzy Hash: 647e5d73adc14ca6f0058b87f97e80b78713d538aee7b147f48c0ff8d23e4855
    • Instruction Fuzzy Hash: 2B11B431210720ABCB309E5DF84495EBBF9EFA5B18710092EF8868B251DB71ED08C7B5
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D35875
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
      • Part of subcall function 00D35061: std::_Xinvalid_argument.LIBCPMT ref: 00D35074
    • _memmove.LIBCMT ref: 00D358D0
    Strings
    • invalid string position, xrefs: 00D35870
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
    • String ID: invalid string position
    • API String ID: 1253240057-1799206989
    • Opcode ID: 9874417bfad93f34e3936e10391739eacfea256cb30442b84eb83aeeb90e1d81
    • Instruction ID: 114392575263ac68abe8a60124eb26e7c8356577e205292af1da80229c294bdb
    • Opcode Fuzzy Hash: 9874417bfad93f34e3936e10391739eacfea256cb30442b84eb83aeeb90e1d81
    • Instruction Fuzzy Hash: 4311E331704A10ABDF289E1CEC41A6AB7B9EB94720F14092EF8528B385DBB1DD00D7F1
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D2B233
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
      • Part of subcall function 00D2ADED: std::_Xinvalid_argument.LIBCPMT ref: 00D2AE03
    • _memmove.LIBCMT ref: 00D2B28E
    Strings
    • invalid string position, xrefs: 00D2B22E
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
    • String ID: invalid string position
    • API String ID: 1253240057-1799206989
    • Opcode ID: 397486aa419c61a5781f0b733d3d4f8252935bea6a864be2e336c03970c98327
    • Instruction ID: f61f080ea70f6749a8304f5a007edd88fabfd136e2081210e4f68d16ccc0620d
    • Opcode Fuzzy Hash: 397486aa419c61a5781f0b733d3d4f8252935bea6a864be2e336c03970c98327
    • Instruction Fuzzy Hash: 74116331604324EBCB109E5CE88196EB7A9FFA576DB10065AF8514B241E7B0E914C7B9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Xinvalid_argument_memmovestd::_
    • String ID: string too long
    • API String ID: 256744135-2556327735
    • Opcode ID: 4fd9c9da08e3fc428a6732dc00d2b2e2b52d0d65302565d5da26d1ef71f18f94
    • Instruction ID: 2dd97818aaba003e42bcd23cc82ae360c84a2b9ba2c65a10a3f16560519f8c3e
    • Opcode Fuzzy Hash: 4fd9c9da08e3fc428a6732dc00d2b2e2b52d0d65302565d5da26d1ef71f18f94
    • Instruction Fuzzy Hash: A211E732300650BBDB349E6D994196FB7F9EF41750F18492DF4828B241CBB2E90487B4
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D30752
      • Part of subcall function 00D304C6: __EH_prolog3_GS.LIBCMT ref: 00D304CD
    • __wcsicoll.LIBCMT ref: 00D307F8
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    Strings
    • Unrecognized comparison type, xrefs: 00D3079D
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$FileWrite__wcsicoll
    • String ID: Unrecognized comparison type
    • API String ID: 1110922125-3874077786
    • Opcode ID: 66db039c26286be6c279530517589321a142e9362416aa89aa58fafddf641f4f
    • Instruction ID: bd53dd4b4349feabaea310638de91c413a4052952c2ba20199ac5db2abae49f6
    • Opcode Fuzzy Hash: 66db039c26286be6c279530517589321a142e9362416aa89aa58fafddf641f4f
    • Instruction Fuzzy Hash: 83217271A012149FDB18DF98D451D9EBBB5FF68304F54041EE006A7291DB74A945CF70
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D30812
      • Part of subcall function 00D304C6: __EH_prolog3_GS.LIBCMT ref: 00D304CD
    • __wcsicoll.LIBCMT ref: 00D308B8
      • Part of subcall function 00D2A9C9: WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00D2AA09
    Strings
    • Invalid comparison type, xrefs: 00D3085D
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_$FileWrite__wcsicoll
    • String ID: Invalid comparison type
    • API String ID: 1110922125-70441815
    • Opcode ID: 486c8aeeb7e12dd371d0b834a442097638863e053dd271a2e53988aeaa701004
    • Instruction ID: 565fd69811505fc98169f8d126d8185f285c804ef88ceb687f8684a8465e1b5d
    • Opcode Fuzzy Hash: 486c8aeeb7e12dd371d0b834a442097638863e053dd271a2e53988aeaa701004
    • Instruction Fuzzy Hash: F911B471A00218DFDF08EF98D85199EBBB4FF64304F10041EE046E7291DB34AA45CBB0
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00D38B51
    • std::_Xinvalid_argument.LIBCPMT ref: 00D38B68
      • Part of subcall function 00D6291B: std::exception::exception.LIBCMT ref: 00D62930
      • Part of subcall function 00D6291B: __CxxThrowException@8.LIBCMT ref: 00D62945
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8H_prolog3_catchThrowXinvalid_argumentstd::_std::exception::exception
    • String ID: vector<T> too long
    • API String ID: 1905828624-3788999226
    • Opcode ID: 96801e8e741e68ae81d96702b8ce573f3d0aef093942d69346fbb0d281ff1582
    • Instruction ID: ef641b9b1be90dcb2100e53bfdcfe36871c100db9434880e7e8f1e5102fe8ce9
    • Opcode Fuzzy Hash: 96801e8e741e68ae81d96702b8ce573f3d0aef093942d69346fbb0d281ff1582
    • Instruction Fuzzy Hash: 7A1102B6600705AFDB24EF68C882E1AFBE5EF54700F15882DF5898B651DA71E940DB70
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3
    • String ID: BypassIf$FailIf
    • API String ID: 431132790-582475531
    • Opcode ID: aeb56f0f1804e9a6184942c8920b039870ea966cd3dc23316475e058e9c2166e
    • Instruction ID: 37fb2d1ca521ea9386c164baa98546a1dbc168a21e77a28c6b0260d2eed04457
    • Opcode Fuzzy Hash: aeb56f0f1804e9a6184942c8920b039870ea966cd3dc23316475e058e9c2166e
    • Instruction Fuzzy Hash: AC110A7190022A9FDB10EFA4E9819EEB7F0FF28308F544879E545A7251EB74AA04CB71
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D2AA8C
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
    • _memmove.LIBCMT ref: 00D2AACA
    Strings
    • invalid string position, xrefs: 00D2AA87
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
    • String ID: invalid string position
    • API String ID: 22950630-1799206989
    • Opcode ID: 088048c42ee0f5419a0ffb51082ba7819ab670780443e98e591c1a218008b8a9
    • Instruction ID: dc9f55ce227e46f419958eb7f2ebb0443a90c9a21786262f017370bb07009bcf
    • Opcode Fuzzy Hash: 088048c42ee0f5419a0ffb51082ba7819ab670780443e98e591c1a218008b8a9
    • Instruction Fuzzy Hash: D51144323046259BC725CE6CEA8486BB3FAFFE4758324492AD096CB605DA30ED45C7B5
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00D338FB
      • Part of subcall function 00D62972: std::exception::exception.LIBCMT ref: 00D62987
      • Part of subcall function 00D62972: __CxxThrowException@8.LIBCMT ref: 00D6299C
    • _memmove.LIBCMT ref: 00D33934
    Strings
    • invalid string position, xrefs: 00D338F6
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
    • String ID: invalid string position
    • API String ID: 22950630-1799206989
    • Opcode ID: 1f3594661b649c5b3f9b1d99f23efc1a0d189e66df1ad22e7777560d913d8858
    • Instruction ID: 9177552b0724992923719bd08eded2a860918fd015515c71815f9c881251ec85
    • Opcode Fuzzy Hash: 1f3594661b649c5b3f9b1d99f23efc1a0d189e66df1ad22e7777560d913d8858
    • Instruction Fuzzy Hash: E801F131300755DBD7248E6CDA84A2AB7EAEBC0710B24493DE4D2CB601CBB0EE458BB0
    APIs
    • RegQueryValueExW.ADVAPI32(?,IsInCorpnetHook,00000000,?,?,?), ref: 00D4A1DE
    Strings
    • Software\Microsoft\VisualStudio\Setup, xrefs: 00D4A1A5
    • IsInCorpnetHook, xrefs: 00D4A1C9
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: QueryValue
    • String ID: IsInCorpnetHook$Software\Microsoft\VisualStudio\Setup
    • API String ID: 3660427363-2117743171
    • Opcode ID: 488105adb4d42b0c6ecf9d5c26bb057b4ef63a75573203819a17efcdd5529205
    • Instruction ID: aef11d7e9e941423f554c65daf14e2a271e0b3813226eeb7b7098776f2972040
    • Opcode Fuzzy Hash: 488105adb4d42b0c6ecf9d5c26bb057b4ef63a75573203819a17efcdd5529205
    • Instruction Fuzzy Hash: 5C111B75A40309AFDF10DF99CC85DEEBBB8EB14304F10416AE906A2240E7719A888B71
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3_
    • String ID: false$true
    • API String ID: 2427045233-2658103896
    • Opcode ID: 25f134e25fd8e2525e8f4cc54a48923fc4022c2b483bfe4a7d8f2eb0def0773c
    • Instruction ID: e6d264caf0a8347a09f87b6a172dce837dcb7a8e7127dbb1eef2502844f4041d
    • Opcode Fuzzy Hash: 25f134e25fd8e2525e8f4cc54a48923fc4022c2b483bfe4a7d8f2eb0def0773c
    • Instruction Fuzzy Hash: FF017570D402089FDF10DFA8D851AEEB3B4EF68708F498028F55167281E7759A08CB72
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00D419CF
      • Part of subcall function 00D4B43D: __EH_prolog3.LIBCMT ref: 00D4B444
      • Part of subcall function 00D4B43D: FindResourceW.KERNEL32(00000000,?,?,00000024,00D4C5D7,0000002B,00000000,?,Files,?), ref: 00D4B47C
      • Part of subcall function 00D4B43D: LoadResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B490
      • Part of subcall function 00D4B43D: SizeofResource.KERNEL32(?,00000000,?,Files,?), ref: 00D4B4A1
      • Part of subcall function 00D4CD18: __EH_prolog3.LIBCMT ref: 00D4CD1F
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: Resource$H_prolog3$FindH_prolog3_LoadSizeof
    • String ID: HOMESITE$false
    • API String ID: 2490267952-2800361685
    • Opcode ID: 82a599103403ad27129a7905123bd408bb9851022c59051f8a283c65580f67f9
    • Instruction ID: e6e17a324d70574ccca68d05f8a4c9b715cdae3d2716adfdc73aba7715a9df5e
    • Opcode Fuzzy Hash: 82a599103403ad27129a7905123bd408bb9851022c59051f8a283c65580f67f9
    • Instruction Fuzzy Hash: FF018B35E812489BDB00DFA4E4127EEB7B4DF24314F149429E480A7282DB799289CBB1
    APIs
      • Part of subcall function 00D4F2C1: __getptd.LIBCMT ref: 00D4F2C7
      • Part of subcall function 00D4F2C1: __getptd.LIBCMT ref: 00D4F2D7
    • __getptd.LIBCMT ref: 00D53E48
      • Part of subcall function 00D52EF3: __getptd_noexit.LIBCMT ref: 00D52EF6
      • Part of subcall function 00D52EF3: __amsg_exit.LIBCMT ref: 00D52F03
    • __getptd.LIBCMT ref: 00D53E56
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: csm
    • API String ID: 803148776-1018135373
    • Opcode ID: f765c13f2024c244edcbd7894a507c0d896ffb8dca77b20a828ea37c089f6d47
    • Instruction ID: 441417ca491245145a1f4b888fe7f1d33971d17cd454d8a7fa9039705e14ad61
    • Opcode Fuzzy Hash: f765c13f2024c244edcbd7894a507c0d896ffb8dca77b20a828ea37c089f6d47
    • Instruction Fuzzy Hash: 5E0128758002858BCF389F65C48ABADB7F6AF50352F18452EFC40A6661CB718A89DA71
    APIs
      • Part of subcall function 00D2C687: LoadLibraryW.KERNEL32(mscoree.dll), ref: 00D2C6A1
      • Part of subcall function 00D2C687: GetLastError.KERNEL32 ref: 00D2C6AD
    • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 00D2C745
    • GetLastError.KERNEL32 ref: 00D2C74F
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: ErrorLast$AddressLibraryLoadProc
    • String ID: CLRCreateInstance
    • API String ID: 1866314245-2576948145
    • Opcode ID: f166e8666646a1d8b271ef85d078d7339cac7f51c47d7537f17fbff17fdd9a58
    • Instruction ID: c6eb89822b16adea1fd881194db0dbb628c3f9390e5a5f339279939a5707bf8c
    • Opcode Fuzzy Hash: f166e8666646a1d8b271ef85d078d7339cac7f51c47d7537f17fbff17fdd9a58
    • Instruction Fuzzy Hash: 3AF0E23266022ABBDB109BA6ED45A9E77ACEFB0B6AF204025F611E3150D335DE004B70
    APIs
    • __EH_prolog3.LIBCMT ref: 00D2DB2C
      • Part of subcall function 00D2D49E: __EH_prolog3.LIBCMT ref: 00D2D4A5
      • Part of subcall function 00D2D49E: __CxxThrowException@8.LIBCMT ref: 00D2D4F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8Throw
    • String ID: Feature$Product
    • API String ID: 2489616738-1411323232
    • Opcode ID: 4459ef91de267c7dc0d9a192cc0813df75c9d7f7eec6c879f1d8da8f8d570118
    • Instruction ID: b66207f84503f5ae5a3c1a460a74ca91aa727f7d735e6bd23a1820b00622893a
    • Opcode Fuzzy Hash: 4459ef91de267c7dc0d9a192cc0813df75c9d7f7eec6c879f1d8da8f8d570118
    • Instruction Fuzzy Hash: E4F0DC71909210EBCB08EF69D80195ABBA1FF48300F00803AF40897661DBB0960087B5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 2387514879-3788999226
    • Opcode ID: 5ff1464335f6082c07cc92f4c914475a1efe4aadd4fe18760c3d19a6914c9532
    • Instruction ID: f1f020a4bd2eee3312a29e2624c87c28b62b2347e30d19be4f82888c8e87655a
    • Opcode Fuzzy Hash: 5ff1464335f6082c07cc92f4c914475a1efe4aadd4fe18760c3d19a6914c9532
    • Instruction Fuzzy Hash: 64F0A7725043159F87209F2DF54146BB7E9DBA9724321843FF4ADC3250EE3098419BB0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: AllocateXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 2387514879-3788999226
    • Opcode ID: 266ebd81166d4c026314b9ff77b76662880004f94b26923169eb69624ed07e6d
    • Instruction ID: 3a4767d50d14491dc20f6abad3d0aebc694b4757d520b03e9a3478dbb3436b2b
    • Opcode Fuzzy Hash: 266ebd81166d4c026314b9ff77b76662880004f94b26923169eb69624ed07e6d
    • Instruction Fuzzy Hash: E3F0E5B65047006F83209F3EE80157ABBE8EAD9730324883FF4A8C3380E53094828770
    APIs
    • GetVersion.KERNEL32(00D63FBE,00D63FD3), ref: 00D63F76
    • GetEnvironmentVariableA.KERNEL32(VSD_FORCE_ANSI,00000000,00000000), ref: 00D63F89
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.3342575243.0000000000D21000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D20000, based on PE: true
    • Associated: 00000002.00000002.3342541015.0000000000D20000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342641793.0000000000D70000.00000004.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.3342677834.0000000000D75000.00000002.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d20000_setup.jbxd
    Similarity
    • API ID: EnvironmentVariableVersion
    • String ID: VSD_FORCE_ANSI
    • API String ID: 2186837676-2962394276
    • Opcode ID: 522aff597e15c081988692fb580bae5ef68b448c3ff84ceb04f0b15040092d54
    • Instruction ID: 29a3e78fa9c847a70aefd9b9e4b900b94b655862f7aa1aea9b625e5aa8d8a3c7
    • Opcode Fuzzy Hash: 522aff597e15c081988692fb580bae5ef68b448c3ff84ceb04f0b15040092d54
    • Instruction Fuzzy Hash: 11D052343483C08AF3314732AC0CB50BEA20B30B0AF084094EA88C83E1EAF1E1C48335

    Execution Graph

    Execution Coverage:2.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:1.7%
    Total number of Nodes:1486
    Total number of Limit Nodes:56
    execution_graph 84699 ff29ff 84700 ff2a0b __EH_prolog3 ctype 84699->84700 84707 f61ad0 84700->84707 84702 ff2af9 84712 ff2627 342 API calls 4 library calls 84702->84712 84704 ff2b8b ~_Task_impl 84705 ff2a66 84705->84702 84711 f7e0d1 RaiseException __CxxThrowException@8 84705->84711 84708 f61ae7 84707->84708 84709 f61add 84707->84709 84708->84705 84713 f61000 84709->84713 84712->84704 84714 f61012 84713->84714 84715 f6100d 84713->84715 84720 f71483 79 API calls 5 library calls 84714->84720 84719 f720ef RaiseException __CxxThrowException@8 84715->84719 84718 f61018 84720->84718 84721 f9a2ba 84723 f9a2c6 __EH_prolog3_GS 84721->84723 84722 f9a30b 84724 f9a313 GetParent 84722->84724 84725 f9a347 84722->84725 84723->84722 84723->84724 84843 f97ae0 11 API calls __crtLCMapStringA_stat 84723->84843 84844 f754bf 84724->84844 84727 f9a3c0 84725->84727 84733 f9a34c 84725->84733 84823 f95cd0 LocalAlloc PtInRect RaiseException moneypunct 84727->84823 84731 f9a386 84738 f9a3ab 84731->84738 84739 f9a39f SetCursor 84731->84739 84733->84731 84853 f97ae0 11 API calls __crtLCMapStringA_stat 84733->84853 84734 f9a32f 84734->84725 84737 f9a335 GetParent 84734->84737 84742 f754bf ctype 110 API calls 84737->84742 84854 ff60eb 105 API calls ctype 84738->84854 84739->84738 84740 f9a37d UpdateWindow 84740->84731 84746 f9a340 84742->84746 84744 f9a3ca 84745 f9a437 84744->84745 84752 f9a405 GetAsyncKeyState 84744->84752 84793 f9a4fb 84744->84793 84749 f9a820 84745->84749 84751 f9a463 84745->84751 84852 f79813 114 API calls ctype 84746->84852 84747 f9a3bb 84747->84793 84867 f95e30 LocalAlloc PtInRect RaiseException 84749->84867 84756 f9a4a0 84751->84756 84855 f97ae0 11 API calls __crtLCMapStringA_stat 84751->84855 84752->84745 84754 f9a417 84752->84754 84753 f9a831 84755 f9a846 84753->84755 84868 f840e3 LocalAlloc RaiseException moneypunct 84753->84868 84754->84745 84755->84793 84869 f97ae0 11 API calls __crtLCMapStringA_stat 84755->84869 84824 f95cd0 LocalAlloc PtInRect RaiseException moneypunct 84756->84824 84761 f9a867 UpdateWindow 84763 f9a87d 84761->84763 84762 f9a4ad 84764 f9a4c3 84762->84764 84856 f72127 84762->84856 84766 f9a8d1 SetCapture 84763->84766 84773 f9a88a ctype 84763->84773 84767 f9a4da 84764->84767 84768 f9a500 84764->84768 84769 f754bf ctype 110 API calls 84766->84769 84767->84793 84861 f97ae0 11 API calls __crtLCMapStringA_stat 84767->84861 84825 f97ae0 11 API calls __crtLCMapStringA_stat 84768->84825 84797 f9a810 84769->84797 84771 f9a50a UpdateWindow 84774 f9a51e ctype 84771->84774 84870 f97ae0 11 API calls __crtLCMapStringA_stat 84773->84870 84779 f9a53c 84774->84779 84780 f9a59b 84774->84780 84776 f9a900 RedrawWindow 84776->84793 84778 f9a8c6 UpdateWindow 84778->84797 84782 f9a573 SetCapture 84779->84782 84783 f9a562 InflateRect 84779->84783 84780->84797 84826 1006166 109 API calls 84780->84826 84784 f754bf ctype 110 API calls 84782->84784 84783->84782 84785 f9a582 SetCursor 84784->84785 84785->84797 84786 f9a5c9 84827 10064c5 84786->84827 84789 f9a661 GetCursorPos ScreenToClient 84791 f9a68a PtInRect 84789->84791 84822 f9a7ad 84789->84822 84790 f9a636 84862 1006193 10 API calls 4 library calls 84790->84862 84798 f9a6a2 84791->84798 84791->84822 84872 1062eee 84793->84872 84794 f9a7bf 84796 f9a7c9 InvalidateRect 84794->84796 84794->84822 84796->84822 84797->84793 84871 f9826b 111 API calls 2 library calls 84797->84871 84798->84794 84799 f9a6dc 84798->84799 84863 f95b7a LocalAlloc RaiseException moneypunct 84799->84863 84801 f9a6eb RedrawWindow 84803 f9a71a GetParent 84801->84803 84804 f754bf ctype 110 API calls 84803->84804 84805 f9a72b 84804->84805 84806 f9a74f 84805->84806 84807 f9a734 GetParent 84805->84807 84808 f9a771 GetParent 84806->84808 84813 f9a761 RedrawWindow 84806->84813 84810 f754bf ctype 110 API calls 84807->84810 84809 f754bf ctype 110 API calls 84808->84809 84811 f9a77c 84809->84811 84812 f9a73f RedrawWindow 84810->84812 84864 f840e3 LocalAlloc RaiseException moneypunct 84811->84864 84812->84806 84813->84808 84815 f9a788 84816 f9a78c GetParent 84815->84816 84815->84822 84817 f754bf ctype 110 API calls 84816->84817 84818 f9a797 GetParent 84817->84818 84819 f754bf ctype 110 API calls 84818->84819 84820 f9a7a2 84819->84820 84865 f8412c LocalAlloc RaiseException ctype 84820->84865 84866 1006193 10 API calls 4 library calls 84822->84866 84823->84744 84824->84762 84825->84771 84826->84786 84828 10064d1 __EH_prolog3_GS 84827->84828 84875 1006413 84828->84875 84830 10064e2 84831 1006502 GetCursorPos SetRect 84830->84831 84832 10064f5 CopyRect 84830->84832 84833 1006528 84831->84833 84832->84833 84834 1006533 84833->84834 84835 100653c IsRectEmpty 84833->84835 84885 f61f30 109 API calls ctype 84834->84885 84835->84834 84836 1006547 InflateRect 84835->84836 84836->84834 84838 100655c ctype 84839 1006566 moneypunct 84838->84839 84840 1006599 DoDragDrop 84838->84840 84841 1062eee ctype 5 API calls 84839->84841 84840->84839 84842 f9a628 IsWindow 84841->84842 84842->84789 84842->84790 84843->84722 84951 f7544b 84844->84951 84846 f754cd 84959 f891e1 84846->84959 84848 f754d9 84971 f7987e 84848->84971 84851 f8412c LocalAlloc RaiseException ctype 84851->84734 84852->84725 84853->84740 84854->84747 84855->84756 85020 1062553 84856->85020 84858 f72142 __EH_prolog3 85023 f84736 LocalAlloc 84858->85023 84860 f72159 moneypunct ~_Task_impl 84860->84764 84861->84793 84862->84793 84863->84801 84864->84815 84865->84822 84866->84797 84867->84753 84868->84755 84869->84761 84870->84778 84871->84776 85028 1060bbe 84872->85028 84874 1062ef8 84874->84874 84876 100641f __EH_prolog3 84875->84876 84886 f790fa 84876->84886 84880 1006457 84881 1006495 84880->84881 84882 100645f GetProfileIntA GetProfileIntA 84880->84882 84899 f8912b LocalAlloc LeaveCriticalSection RaiseException moneypunct 84881->84899 84882->84881 84884 100649c ~_Task_impl 84884->84830 84885->84838 84900 f72a87 84886->84900 84889 f890b9 84890 f890c9 84889->84890 84891 f890ce 84889->84891 84892 f72127 moneypunct 2 API calls 84890->84892 84893 f890dc 84891->84893 84950 f89050 InitializeCriticalSection 84891->84950 84892->84891 84895 f89118 EnterCriticalSection 84893->84895 84896 f890ee EnterCriticalSection 84893->84896 84895->84880 84897 f890fa InitializeCriticalSection 84896->84897 84898 f8910d LeaveCriticalSection 84896->84898 84897->84898 84898->84895 84899->84884 84905 f84cae 84900->84905 84902 f72a96 84903 f72ab9 84902->84903 84916 f847d5 8 API calls 3 library calls 84902->84916 84903->84889 84912 f84cba __EH_prolog3 84905->84912 84906 f84d08 84936 f84769 EnterCriticalSection 84906->84936 84907 f72127 moneypunct 2 API calls 84907->84912 84912->84906 84912->84907 84917 f849df TlsAlloc 84912->84917 84921 f848c7 EnterCriticalSection 84912->84921 84913 f84d1b 84943 f84a86 87 API calls 5 library calls 84913->84943 84914 f84d2e ~_Task_impl 84914->84902 84916->84902 84918 f84a0b 84917->84918 84919 f84a10 InitializeCriticalSection 84917->84919 84944 f720ef RaiseException __CxxThrowException@8 84918->84944 84919->84912 84923 f848ea 84921->84923 84922 f849a9 _memset 84924 f849c0 LeaveCriticalSection 84922->84924 84923->84922 84925 f84938 GlobalHandle GlobalUnlock 84923->84925 84926 f84923 84923->84926 84924->84912 84928 f7b437 ctype 79 API calls 84925->84928 84945 f7b437 84926->84945 84930 f84956 GlobalReAlloc 84928->84930 84931 f84962 84930->84931 84932 f84989 GlobalLock 84931->84932 84933 f8497b LeaveCriticalSection 84931->84933 84934 f8496d GlobalHandle GlobalLock 84931->84934 84932->84922 84949 f720ef RaiseException __CxxThrowException@8 84933->84949 84934->84933 84937 f847ab LeaveCriticalSection 84936->84937 84938 f84784 84936->84938 84939 f847b4 84937->84939 84938->84937 84940 f84789 TlsGetValue 84938->84940 84939->84913 84939->84914 84940->84937 84941 f84795 84940->84941 84941->84937 84942 f8479a LeaveCriticalSection 84941->84942 84942->84939 84943->84914 84946 f7b44c ctype 84945->84946 84947 f7b459 GlobalAlloc 84946->84947 84948 f61000 ctype 79 API calls 84946->84948 84947->84931 84948->84947 84950->84893 84952 f75457 __EH_prolog3 84951->84952 84976 f72aba 84952->84976 84954 f7545c ~_Task_impl 84955 f754a3 ~_Task_impl 84954->84955 84981 f6dbd1 84954->84981 84955->84846 84960 f891ed __EH_prolog3_catch 84959->84960 84970 f891f6 ~_Task_impl 84960->84970 85014 f88c89 LocalAlloc RaiseException moneypunct ~_Task_impl 84960->85014 84962 f89209 84962->84970 85015 f88c89 LocalAlloc RaiseException moneypunct ~_Task_impl 84962->85015 84964 f89216 ~_Task_impl 84964->84970 85016 fb4324 68 API calls ctype 84964->85016 84966 f89245 84967 f89250 84966->84967 85017 f720ef RaiseException __CxxThrowException@8 84966->85017 85018 f88cfc 68 API calls 2 library calls 84967->85018 84970->84848 84972 f754e3 84971->84972 84973 f7988a 84971->84973 84972->84851 84973->84972 84974 f79890 GetParent 84973->84974 85019 f88c89 LocalAlloc RaiseException moneypunct ~_Task_impl 84974->85019 84977 f72a87 ctype 109 API calls 84976->84977 84978 f72abf 84977->84978 84986 f6fa97 84978->84986 84984 f6dbd9 84981->84984 84983 f6dbfb 84983->84955 84985 f89159 68 API calls 3 library calls 84983->84985 84984->84983 84989 1062cb9 84984->84989 84985->84955 84987 f84cae ctype 103 API calls 84986->84987 84988 f6faa1 84987->84988 84988->84954 84990 1062d36 84989->84990 84998 1062cc7 84989->84998 85012 106e79b DecodePointer 84990->85012 84992 1062d3c 85013 10634c9 66 API calls __getptd_noexit 84992->85013 84995 1062cf5 RtlAllocateHeap 84995->84998 85005 1062d2e 84995->85005 84997 1062cd2 84997->84998 85006 106aaf3 66 API calls 2 library calls 84997->85006 85007 106a944 66 API calls 7 library calls 84997->85007 85008 1064c11 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84997->85008 84998->84995 84998->84997 84999 1062d22 84998->84999 85003 1062d20 84998->85003 85009 106e79b DecodePointer 84998->85009 85010 10634c9 66 API calls __getptd_noexit 84999->85010 85011 10634c9 66 API calls __getptd_noexit 85003->85011 85005->84984 85006->84997 85007->84997 85009->84998 85010->85003 85011->85005 85012->84992 85013->85005 85014->84962 85015->84964 85016->84966 85018->84970 85019->84972 85021 106257c 85020->85021 85022 1062588 RaiseException 85020->85022 85021->85022 85022->84858 85024 f8474a 85023->85024 85025 f8474f 85023->85025 85027 f720ef RaiseException __CxxThrowException@8 85024->85027 85025->84860 85029 1060bc6 85028->85029 85030 1060bc8 IsDebuggerPresent 85028->85030 85029->84874 85036 1073bb7 85030->85036 85033 1068dd9 SetUnhandledExceptionFilter UnhandledExceptionFilter 85034 1068df6 __call_reportfault 85033->85034 85035 1068dfe GetCurrentProcess TerminateProcess 85033->85035 85034->85035 85035->84874 85036->85033 85037 f8af3b SetErrorMode SetErrorMode 85038 f72a87 ctype 109 API calls 85037->85038 85039 f8af58 85038->85039 85050 f7221f GetModuleFileNameW 85039->85050 85042 f72a87 ctype 109 API calls 85044 f8af6d 85042->85044 85043 f8af8a 85046 f72a87 ctype 109 API calls 85043->85046 85044->85043 85060 f8ad6e 85044->85060 85047 f8af8f 85046->85047 85048 f8af9b 85047->85048 85083 f7be4a 85047->85083 85051 f72260 85050->85051 85059 f722fe 85050->85059 85052 f72267 SetLastError 85051->85052 85053 f72274 CreateActCtxWWorker 85051->85053 85052->85059 85055 f722d7 85053->85055 85056 f722be CreateActCtxWWorker 85053->85056 85054 1060bbe __crtLCMapStringA_stat 5 API calls 85057 f72311 85054->85057 85058 f722e0 CreateActCtxWWorker 85055->85058 85055->85059 85056->85055 85057->85042 85058->85059 85059->85054 85061 f72a87 ctype 109 API calls 85060->85061 85062 f8ad8d GetModuleFileNameA 85061->85062 85063 f8adb5 85062->85063 85064 f8adbe PathFindExtensionA 85063->85064 85089 f7e0ed RaiseException __CxxThrowException@8 85063->85089 85066 f8adda 85064->85066 85067 f8add5 85064->85067 85091 f8ad28 80 API calls 3 library calls 85066->85091 85090 f7e0ed RaiseException __CxxThrowException@8 85067->85090 85070 f8adf7 85071 f8ae00 85070->85071 85092 f7e0ed RaiseException __CxxThrowException@8 85070->85092 85081 f8ae12 ctype 85071->85081 85093 106511a 85071->85093 85074 f7b20c 114 API calls 85074->85081 85076 f8af2c 85078 1060bbe __crtLCMapStringA_stat 5 API calls 85076->85078 85080 f8af39 85078->85080 85080->85043 85081->85074 85081->85076 85082 106511a 66 API calls __strdup 85081->85082 85102 f720ef RaiseException __CxxThrowException@8 85081->85102 85103 1064b78 66 API calls 2 library calls 85081->85103 85104 10650ad 66 API calls 2 library calls 85081->85104 85082->85081 85084 f72a87 ctype 109 API calls 85083->85084 85085 f7be4f 85084->85085 85086 f7be77 85085->85086 85107 f724b8 85085->85107 85086->85048 85091->85070 85094 106512b _strlen 85093->85094 85097 1065127 85093->85097 85095 1062cb9 _malloc 66 API calls 85094->85095 85096 106513e 85095->85096 85096->85097 85105 1064b78 66 API calls 2 library calls 85096->85105 85097->85081 85099 1065150 85099->85097 85100 106515b 85099->85100 85106 1068f4a 10 API calls __call_reportfault 85100->85106 85103->85081 85104->85081 85105->85099 85106->85097 85108 f84cae ctype 103 API calls 85107->85108 85109 f724c7 GetCurrentThreadId SetWindowsHookExA 85108->85109 85109->85086 85110 f76233 85111 f76246 85110->85111 85117 f76241 85110->85117 85118 f754eb 85111->85118 85114 f7626b DefWindowProcA 85114->85117 85115 f76259 85121 f7612e 85115->85121 85119 f7544b ~_Task_impl 109 API calls 85118->85119 85120 f754f7 85119->85120 85120->85114 85120->85115 85122 f7613a __EH_prolog3_catch_GS 85121->85122 85123 f84cae ctype 103 API calls 85122->85123 85124 f7614f 85123->85124 85125 f72127 moneypunct 2 API calls 85124->85125 85126 f76166 85124->85126 85125->85126 85127 f761c9 85126->85127 85145 f744d3 GetWindowRect GetWindowLongA 85126->85145 85135 f73356 85127->85135 85130 f761f2 85147 1062efd 5 API calls __crtLCMapStringA_stat 85130->85147 85148 f77a36 85135->85148 85196 f77e16 85135->85196 85203 f77e0b 85135->85203 85210 f77da8 85135->85210 85216 f77e35 85135->85216 85224 f77e3f 85135->85224 85136 f7337a 85137 f73391 85136->85137 85232 f731f6 85136->85232 85137->85130 85146 f7608d 132 API calls 2 library calls 85137->85146 85145->85127 85146->85130 85149 f77a45 __EH_prolog3 85148->85149 85150 f77aca 85149->85150 85151 f77aba 85149->85151 85152 f77a61 85149->85152 85156 f77acf 85150->85156 85163 f77ae3 85150->85163 85154 f754bf ctype 110 API calls 85151->85154 85153 f77aad 85152->85153 85184 f77a77 85152->85184 85273 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85153->85273 85157 f77ac0 85154->85157 85269 f77459 118 API calls ctype 85156->85269 85268 f773e1 117 API calls 85157->85268 85159 f77c55 ~_Task_impl 85159->85136 85161 f77adf 85161->85163 85161->85184 85163->85184 85237 f743b9 85163->85237 85164 f77ffc 85164->85136 85167 f77c3a 85272 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85167->85272 85170 f77b81 85170->85153 85170->85167 85172 f77cb7 85170->85172 85173 f77cc5 ctype 85170->85173 85174 f77c77 85170->85174 85175 f77d72 85170->85175 85176 f77c6f 85170->85176 85177 f77c9b 85170->85177 85181 f77fc8 85170->85181 85170->85184 85187 f77d3b ctype 85170->85187 85271 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85170->85271 85180 f754bf ctype 110 API calls 85172->85180 85275 f74409 109 API calls 85173->85275 85243 f61240 85174->85243 85265 f65760 85174->85265 85179 f754bf ctype 110 API calls 85175->85179 85274 f7e74a 109 API calls ctype 85176->85274 85178 f754bf ctype 110 API calls 85177->85178 85178->85184 85179->85184 85180->85184 85283 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85181->85283 85284 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85184->85284 85186 f77ce2 85188 f754eb ctype 109 API calls 85186->85188 85278 f7e7df 85187->85278 85189 f77cf4 85188->85189 85191 f77d0a 85189->85191 85276 f88c89 LocalAlloc RaiseException moneypunct ~_Task_impl 85189->85276 85277 f76280 110 API calls 4 library calls 85191->85277 85384 f81398 85196->85384 85198 f77dab 85199 f77daf 85198->85199 85370 f61400 85198->85370 85200 f743ed LocalAlloc LeaveCriticalSection RaiseException 85199->85200 85201 f77ffc 85200->85201 85201->85136 85204 f77dab 85203->85204 85435 f7e74a 109 API calls ctype 85203->85435 85209 f61400 206 API calls 85204->85209 85206 f77daf 85436 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85206->85436 85208 f77ffc 85208->85136 85209->85206 85211 f77dab 85210->85211 85215 f61400 206 API calls 85211->85215 85212 f77daf 85437 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85212->85437 85214 f77ffc 85214->85136 85215->85212 85217 f77e38 85216->85217 85218 f754bf ctype 110 API calls 85217->85218 85219 f77dab 85218->85219 85220 f77daf 85219->85220 85223 f61400 206 API calls 85219->85223 85438 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85220->85438 85222 f77ffc 85222->85136 85223->85220 85225 f77e38 85224->85225 85226 f77daf 85224->85226 85227 f754bf ctype 110 API calls 85225->85227 85439 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85226->85439 85229 f77dab 85227->85229 85229->85226 85231 f61400 206 API calls 85229->85231 85230 f77ffc 85230->85136 85231->85226 85233 f73227 CallWindowProcA 85232->85233 85234 f73205 85232->85234 85235 f7323a 85233->85235 85234->85233 85236 f73213 DefWindowProcA 85234->85236 85235->85137 85236->85235 85238 f743cb 85237->85238 85239 f743e3 85238->85239 85240 f72127 moneypunct 2 API calls 85238->85240 85241 f890b9 ctype 7 API calls 85239->85241 85240->85238 85242 f743e9 85241->85242 85242->85170 85270 f743ed LocalAlloc LeaveCriticalSection RaiseException ctype 85242->85270 85285 f6ffb9 85243->85285 85245 f61254 85245->85184 85246 f6124f 85246->85245 85247 f65760 116 API calls 85246->85247 85248 f61279 RegisterClipboardFormatA 85247->85248 85249 f61296 GetLastError 85248->85249 85250 f6129e RegisterClipboardFormatA 85248->85250 85249->85250 85251 f612b0 GetLastError 85250->85251 85252 f612b9 RegisterClipboardFormatA 85250->85252 85251->85252 85253 f612d0 85252->85253 85254 f612ca GetLastError 85252->85254 85255 f61371 85253->85255 85256 f72a87 ctype 109 API calls 85253->85256 85254->85253 85255->85184 85257 f612e6 85256->85257 85291 f80758 85257->85291 85259 f6134f SetTimer 85259->85184 85260 f61317 85263 f80758 16 API calls 85260->85263 85261 f6132e ?EnableHotKey@@YGXH ?SetHotKey@@YGHHHHH 85261->85259 85263->85261 85264 f80758 16 API calls 85264->85260 85348 f65690 85265->85348 85268->85150 85269->85161 85270->85170 85271->85170 85272->85153 85273->85159 85275->85186 85276->85191 85277->85187 85279 f7e7f7 85278->85279 85280 f7e7eb 85278->85280 85279->85184 85365 f7e796 85280->85365 85282 f7e7f0 DeleteDC 85282->85279 85283->85184 85284->85164 85286 f6ffc5 85285->85286 85287 f6ffca 85285->85287 85288 f72127 moneypunct 2 API calls 85286->85288 85298 f6e77f 85287->85298 85288->85287 85292 f807ae GetPrivateProfileIntA 85291->85292 85293 f80766 85291->85293 85295 f612fe 85292->85295 85308 f806fe 85293->85308 85295->85259 85295->85264 85297 f8077b RegQueryValueExA RegCloseKey 85297->85295 85303 f75419 85298->85303 85301 f6e791 85301->85246 85302 f6e7aa PostMessageA 85302->85301 85304 f84cae ctype 103 API calls 85303->85304 85305 f7542d 85304->85305 85306 f6e78c 85305->85306 85307 f72127 moneypunct 2 API calls 85305->85307 85306->85301 85306->85302 85307->85306 85317 f80643 85308->85317 85311 f8071a 85311->85295 85311->85297 85312 f80738 85334 f805c1 85312->85334 85313 f80742 RegCreateKeyExA 85315 f80748 RegCloseKey 85313->85315 85315->85311 85318 f8067e RegOpenKeyExA 85317->85318 85319 f80677 85317->85319 85321 f8067c 85318->85321 85341 f80568 85319->85341 85322 f806d2 85321->85322 85323 f806a9 RegCreateKeyExA 85321->85323 85324 f806a2 85321->85324 85325 f806ea 85322->85325 85326 f806e5 RegCloseKey 85322->85326 85328 f806a7 85323->85328 85327 f805c1 3 API calls 85324->85327 85329 f806ef RegCloseKey 85325->85329 85330 f806f4 85325->85330 85326->85325 85327->85328 85328->85322 85331 f806cd 85328->85331 85332 f806d4 RegCreateKeyExA 85328->85332 85329->85330 85330->85311 85330->85312 85330->85313 85333 f805c1 3 API calls 85331->85333 85332->85322 85333->85322 85335 f805ce GetModuleHandleA 85334->85335 85336 f80610 85334->85336 85337 f8061e 85335->85337 85339 f805dd GetProcAddress 85335->85339 85336->85337 85338 f80616 RegCreateKeyExA 85336->85338 85337->85315 85338->85337 85339->85337 85340 f805ed 85339->85340 85340->85337 85342 f805ab 85341->85342 85343 f80575 GetModuleHandleA 85341->85343 85344 f805b9 85342->85344 85346 f805b1 RegOpenKeyExA 85342->85346 85343->85344 85345 f80584 GetProcAddress 85343->85345 85344->85321 85345->85344 85347 f80594 85345->85347 85346->85344 85347->85344 85349 f656c7 85348->85349 85350 f656a0 85348->85350 85359 f65460 85349->85359 85364 f7b20c 114 API calls 2 library calls 85350->85364 85353 f656af 85355 f72a87 ctype 109 API calls 85353->85355 85354 f656d1 85354->85184 85356 f656b4 85355->85356 85357 f72a87 ctype 109 API calls 85356->85357 85358 f656b9 LoadIconW 85357->85358 85358->85349 85362 f65475 _strncpy 85359->85362 85360 f65491 85360->85354 85361 f654d4 Shell_NotifyIconA 85363 f654e4 85361->85363 85362->85360 85362->85361 85363->85354 85364->85353 85366 f7e7a3 85365->85366 85367 f7e7aa ctype 85365->85367 85369 f7e6d6 109 API calls 3 library calls 85366->85369 85367->85282 85369->85367 85371 f72a87 ctype 109 API calls 85370->85371 85373 f6140c 85371->85373 85372 f61488 GetTickCount 85387 f626b0 ?GetLastMouseTime@ ?GetLastKeystrokeTime@ 85372->85387 85373->85372 85375 f61421 85373->85375 85381 f61440 85373->85381 85377 f61434 85375->85377 85419 f65740 116 API calls 85375->85419 85376 f614a0 85378 f75419 ctype 103 API calls 85376->85378 85377->85372 85382 f61475 SendMessageA 85377->85382 85380 f614aa 85378->85380 85380->85199 85381->85377 85383 f65760 116 API calls 85381->85383 85382->85372 85383->85377 85434 f81324 109 API calls 3 library calls 85384->85434 85386 f813a4 85388 f626cd 85387->85388 85389 f626ea 85388->85389 85392 f626f8 85388->85392 85424 f62410 8 API calls 85389->85424 85391 f626f1 85391->85376 85393 f62754 85392->85393 85396 f6273b 85392->85396 85397 f6272b MessageBeep 85392->85397 85394 f62763 85393->85394 85395 f6279e 85393->85395 85426 f62070 112 API calls ctype 85394->85426 85401 f627cc 85395->85401 85402 f6276c 85395->85402 85425 f62410 8 API calls 85396->85425 85397->85393 85400 f62768 85400->85395 85400->85402 85427 f62050 111 API calls ctype 85400->85427 85403 f6286d 85401->85403 85420 f61f80 85401->85420 85402->85395 85428 f61fe0 163 API calls ctype 85402->85428 85403->85376 85406 f627bd 85406->85401 85407 f627c1 MessageBeep 85406->85407 85407->85401 85411 f627ef 85412 f62824 85411->85412 85430 f62410 8 API calls 85411->85430 85414 f62847 85412->85414 85431 f62410 8 API calls 85412->85431 85432 f62390 111 API calls 85414->85432 85416 f62850 85416->85403 85433 f624c0 175 API calls 85416->85433 85419->85377 85421 f61f9d 85420->85421 85422 1060bbe __crtLCMapStringA_stat 5 API calls 85421->85422 85423 f61fcf 85422->85423 85429 f625d0 193 API calls 85423->85429 85424->85391 85425->85393 85426->85400 85427->85402 85428->85406 85429->85411 85430->85412 85431->85414 85432->85416 85433->85403 85434->85386 85436->85208 85437->85214 85438->85222 85439->85230 85440 f774d1 85469 1062ea1 85440->85469 85442 f774dd GetPropA 85443 f775c6 85442->85443 85444 f77514 85442->85444 85447 f754bf ctype 110 API calls 85443->85447 85445 f775a4 85444->85445 85446 f7751d 85444->85446 85448 f754bf ctype 110 API calls 85445->85448 85449 f77522 85446->85449 85450 f7757d SetWindowLongA RemovePropA GlobalFindAtomA GlobalDeleteAtom 85446->85450 85451 f775cc 85447->85451 85452 f775aa 85448->85452 85453 f775e4 CallWindowProcA 85449->85453 85454 f7752d 85449->85454 85450->85453 85455 f754bf ctype 110 API calls 85451->85455 85473 f77459 118 API calls ctype 85452->85473 85459 f77572 85453->85459 85457 f754bf ctype 110 API calls 85454->85457 85458 f775d4 85455->85458 85461 f7753f 85457->85461 85474 f773e1 117 API calls 85458->85474 85472 1062efd 5 API calls __crtLCMapStringA_stat 85459->85472 85460 f775ba 85464 f775de 85460->85464 85470 f744d3 GetWindowRect GetWindowLongA 85461->85470 85464->85453 85464->85459 85467 f7754f CallWindowProcA 85471 f7608d 132 API calls 2 library calls 85467->85471 85469->85442 85470->85467 85471->85459 85473->85460 85474->85464 85475 f7f31e 85476 f7f32c 85475->85476 85479 f7f259 85476->85479 85480 f7f316 85479->85480 85481 f7f28f 85479->85481 85481->85480 85482 f7f290 RegOpenKeyExA 85481->85482 85483 f7f2ff RegCloseKey 85481->85483 85484 f7f2ad RegQueryValueExA 85481->85484 85482->85481 85483->85481 85484->85481 85485 f77638 85486 f77647 __EH_prolog3_GS 85485->85486 85487 f84cae ctype 103 API calls 85486->85487 85488 f77662 85487->85488 85489 f77678 85488->85489 85490 f72127 moneypunct 2 API calls 85488->85490 85491 f77691 85489->85491 85492 f7767e CallNextHookEx 85489->85492 85490->85489 85493 f72a87 ctype 109 API calls 85491->85493 85501 f77875 85492->85501 85498 f7769b 85493->85498 85494 1062eee ctype 5 API calls 85495 f7787c 85494->85495 85496 f776c7 GetClassLongA 85499 f77845 CallNextHookEx 85496->85499 85500 f776db 85496->85500 85497 f77708 85497->85499 85503 f77716 85497->85503 85513 f77770 _memset 85497->85513 85498->85496 85498->85497 85498->85499 85499->85501 85502 f77868 UnhookWindowsHookEx 85499->85502 85504 f776e5 GlobalGetAtomNameA 85500->85504 85505 f776fd 85500->85505 85501->85494 85502->85501 85528 f72ad1 110 API calls ctype 85503->85528 85504->85505 85527 f74398 CompareStringA 85505->85527 85506 f777b4 GetClassLongA 85510 f777f9 GetWindowLongA 85506->85510 85511 f7776b 85506->85511 85509 f77721 85529 f7550c 110 API calls 2 library calls 85509->85529 85510->85499 85512 f77809 GetPropA 85510->85512 85511->85499 85512->85499 85515 f7781c SetPropA GetPropA 85512->85515 85513->85506 85531 f740ca 114 API calls 2 library calls 85513->85531 85515->85499 85518 f77830 GlobalAddAtomA SetWindowLongA 85515->85518 85517 f7772d SetWindowLongA 85524 f77753 85517->85524 85518->85499 85519 f777a6 85519->85506 85520 f777cb GetClassNameA 85519->85520 85520->85510 85521 f777e2 85520->85521 85532 10614dd 85521->85532 85530 f72209 DeactivateActCtx 85524->85530 85527->85497 85528->85509 85529->85517 85530->85511 85531->85519 85535 10613de 85532->85535 85534 f777f3 85534->85499 85534->85510 85547 1060e98 85535->85547 85538 1061420 85541 1061409 __stricoll_l 85538->85541 85557 10634c9 66 API calls __getptd_noexit 85538->85557 85539 10613f9 85555 10634c9 66 API calls __getptd_noexit 85539->85555 85541->85534 85542 10613fe 85556 1068f9c 11 API calls __mbsupr_s_l 85542->85556 85545 106142d 85558 1068f9c 11 API calls __mbsupr_s_l 85545->85558 85548 1060eab 85547->85548 85551 1060ef8 85547->85551 85559 10688f2 66 API calls 2 library calls 85548->85559 85550 1060eb0 85554 1060ed8 85550->85554 85560 106a31c 74 API calls 6 library calls 85550->85560 85551->85538 85551->85539 85554->85551 85561 1069b9b 68 API calls 6 library calls 85554->85561 85555->85542 85556->85541 85557->85545 85558->85541 85559->85550 85560->85554 85561->85551 85562 10697f6 85563 1069802 __mtinitlocknum 85562->85563 85564 1069836 __mtinitlocknum 85563->85564 85570 106ee41 85563->85570 85566 1069813 85567 1069824 85566->85567 85577 1069115 85566->85577 85608 106983c LeaveCriticalSection _doexit 85567->85608 85571 106ee56 85570->85571 85572 106ee69 EnterCriticalSection 85570->85572 85609 106ed7f 66 API calls 7 library calls 85571->85609 85572->85566 85574 106ee5c 85574->85572 85610 1064eb3 66 API calls 3 library calls 85574->85610 85578 1069121 __mtinitlocknum 85577->85578 85579 106ee41 __lock 66 API calls 85578->85579 85580 106913c __tzset_nolock 85579->85580 85611 10690d0 85580->85611 85582 1069151 85604 106920e 85582->85604 85618 1069076 66 API calls 2 library calls 85582->85618 85585 1069223 __tzset_nolock 85587 1069239 GetTimeZoneInformation 85585->85587 85588 106259f _free 66 API calls 85585->85588 85591 10692a0 WideCharToMultiByte 85585->85591 85594 10692d8 WideCharToMultiByte 85585->85594 85585->85604 85605 1065b4a 79 API calls __tzset_nolock 85585->85605 85606 1062d4d 66 API calls __mbsnbcpy_s_l 85585->85606 85607 1069409 __tzset_nolock __mtinitlocknum 85585->85607 85631 1069398 LeaveCriticalSection _doexit 85585->85631 85586 1069163 85586->85604 85619 10690a3 66 API calls 2 library calls 85586->85619 85587->85585 85588->85585 85590 1069175 85590->85604 85620 1073c46 74 API calls 2 library calls 85590->85620 85591->85585 85593 1069183 85621 1073bbf 99 API calls 3 library calls 85593->85621 85594->85585 85597 10691dc _strlen 85628 106a6c5 66 API calls _malloc 85597->85628 85598 10691a5 __stricoll_l 85598->85585 85598->85597 85600 10691d6 85598->85600 85622 106259f 85600->85622 85602 10691ea _strlen 85602->85585 85629 1064b78 66 API calls 2 library calls 85602->85629 85604->85585 85630 1068f4a 10 API calls __call_reportfault 85604->85630 85605->85585 85606->85585 85607->85567 85608->85564 85609->85574 85612 10690f1 85611->85612 85613 10690dc 85611->85613 85612->85582 85632 10634c9 66 API calls __getptd_noexit 85613->85632 85615 10690e1 85633 1068f9c 11 API calls __mbsupr_s_l 85615->85633 85617 10690ec 85617->85582 85618->85586 85619->85590 85620->85593 85621->85598 85623 10625d3 __dosmaperr 85622->85623 85624 10625aa HeapFree 85622->85624 85623->85597 85624->85623 85625 10625bf 85624->85625 85634 10634c9 66 API calls __getptd_noexit 85625->85634 85627 10625c5 GetLastError 85627->85623 85628->85602 85629->85604 85630->85585 85631->85585 85632->85615 85633->85617 85634->85627 85635 f75081 85636 f7509f 85635->85636 85637 f750a4 GetParent 85635->85637 85666 f795ec GetWindowLongA 85636->85666 85655 f7b84e 103 API calls ctype 85637->85655 85641 f750d1 PeekMessageA 85653 f750c6 85641->85653 85643 f751ac 85671 f7f435 110 API calls ctype 85643->85671 85645 f75120 SendMessageA 85645->85653 85647 f750f0 UpdateWindow 85647->85653 85648 f75108 SendMessageA 85648->85653 85649 f751b2 85650 f79743 ShowWindow 85651 f7516c UpdateWindow 85650->85651 85651->85653 85653->85641 85653->85643 85653->85645 85653->85648 85653->85649 85653->85650 85654 f75199 PeekMessageA 85653->85654 85656 f7bc99 85653->85656 85667 f79743 85653->85667 85670 f7bb2c 109 API calls ctype 85653->85670 85654->85653 85655->85653 85657 f72aba ctype 109 API calls 85656->85657 85658 f7bc53 85657->85658 85659 f724b8 ctype 103 API calls 85658->85659 85660 f7bc5c GetMessageA 85659->85660 85661 f7bc93 85660->85661 85662 f7bc71 85660->85662 85661->85653 85662->85661 85672 f7bb0b 85662->85672 85664 f7bc80 85664->85661 85665 f7bc85 TranslateMessage DispatchMessageA 85664->85665 85665->85661 85666->85637 85668 f7975e 85667->85668 85669 f7974e ShowWindow 85667->85669 85669->85647 85670->85653 85673 f72aba ctype 109 API calls 85672->85673 85674 f7ba98 85673->85674 85675 f7bb1c 85674->85675 85676 f72aba ctype 109 API calls 85674->85676 85675->85664 85677 f7baa3 85676->85677 85685 f7babe 85677->85685 85686 f61f30 109 API calls ctype 85677->85686 85679 f7bac9 85687 f75dab 110 API calls ctype 85679->85687 85681 f7bad9 85682 f754bf ctype 110 API calls 85681->85682 85681->85685 85683 f7baed 85682->85683 85688 f76ff4 114 API calls ctype 85683->85688 85685->85664 85686->85679 85687->85681 85688->85685 85689 f64a40 85711 f7fc66 85689->85711 85691 f64a72 85723 f65ad0 85691->85723 85693 f64a8a 85726 f622f0 ?InstallHooks@ 85693->85726 85695 f64a99 85727 f64980 85695->85727 85699 f64abe ctype 85700 f61000 ctype 79 API calls 85699->85700 85701 f64afb ctype 85699->85701 85700->85701 85702 f61000 ctype 79 API calls 85701->85702 85703 f64b2b ctype 85701->85703 85702->85703 85704 f64b5b GetTickCount 85703->85704 85705 f61000 ctype 79 API calls 85703->85705 85744 f62310 GetTickCount 85704->85744 85705->85704 85710 f64b9d 85712 f7fc72 __EH_prolog3 85711->85712 85748 f7bbde 85712->85748 85714 f7fc7c 85715 106511a __strdup 66 API calls 85714->85715 85716 f7fc94 85714->85716 85715->85716 85717 f72a87 ctype 109 API calls 85716->85717 85718 f7fca2 85717->85718 85719 f72127 moneypunct 2 API calls 85718->85719 85720 f6fa97 ctype 103 API calls 85718->85720 85721 f7fcb9 GetCurrentThread GetCurrentThreadId 85718->85721 85719->85718 85720->85718 85722 f7fd5d ~_Task_impl 85721->85722 85722->85691 85757 1061b8b 85723->85757 85725 f65aed LoadLibraryA 85725->85693 85726->85695 85728 f649af ctype 85727->85728 85729 f649c4 85728->85729 85730 f61000 ctype 79 API calls 85728->85730 85731 f649e8 85729->85731 85734 f64a00 85729->85734 85730->85729 85769 f7b266 85731->85769 85734->85734 85759 f62c00 85734->85759 85735 f649fe 85738 f67040 85735->85738 85817 f63830 85738->85817 85740 f6707e 85822 f66f60 85740->85822 85743 f670bb 85743->85699 85745 f61f80 5 API calls 85744->85745 85746 f62335 85745->85746 85747 f62370 ?SetKeyCount@@YGHH ?SetMouseCount@@YGHH 85746->85747 85747->85710 85749 f7bbea __EH_prolog3 85748->85749 85750 f790fa 109 API calls 85749->85750 85751 f7bbf4 85750->85751 85754 f7b89e 85751->85754 85753 f7bc0c ~_Task_impl 85753->85714 85755 f724b8 ctype 103 API calls 85754->85755 85756 f7b8b7 GetCursorPos 85755->85756 85756->85753 85758 1061b97 __mtinitlocknum 85757->85758 85758->85725 85760 f62c0e 85759->85760 85764 f62c19 85759->85764 85788 f62b70 79 API calls ctype 85760->85788 85762 f62c13 85762->85735 85763 f61000 79 API calls ctype 85763->85764 85764->85763 85768 f62c8f 85764->85768 85783 f61b20 85764->85783 85789 1060e45 66 API calls 3 library calls 85764->85789 85790 1060bcd 85764->85790 85768->85735 85770 f72a87 ctype 109 API calls 85769->85770 85771 f649f1 85770->85771 85771->85735 85772 f61bf0 FindResourceW 85771->85772 85773 f61c26 85772->85773 85774 f61c15 85772->85774 85773->85735 85812 f61020 LoadResource 85774->85812 85776 f61c1d 85776->85773 85777 f61c2f WideCharToMultiByte 85776->85777 85778 f61c52 85777->85778 85779 f61000 ctype 79 API calls 85778->85779 85780 f61c77 WideCharToMultiByte 85778->85780 85782 f61b20 ctype 66 API calls 85778->85782 85779->85778 85780->85778 85781 f61c98 85780->85781 85781->85735 85782->85780 85784 f61b30 85783->85784 85787 f61b43 ctype 85784->85787 85799 f618a0 85784->85799 85787->85764 85788->85762 85789->85764 85793 1060bda _memmove 85790->85793 85795 1060bde _memset 85790->85795 85791 1060be4 85809 10634c9 66 API calls __getptd_noexit 85791->85809 85793->85764 85794 1060be9 85810 1068f9c 11 API calls __mbsupr_s_l 85794->85810 85795->85791 85795->85793 85796 1060c29 85795->85796 85796->85793 85811 10634c9 66 API calls __getptd_noexit 85796->85811 85800 f618bb 85799->85800 85805 f7b358 85800->85805 85801 f618c9 85802 1060bcd _memcpy_s 66 API calls 85801->85802 85803 f618f0 85802->85803 85803->85764 85806 f7b36c 85805->85806 85807 f7b368 85805->85807 85808 1062cb9 _malloc 66 API calls 85806->85808 85807->85801 85808->85807 85809->85794 85810->85793 85811->85794 85813 f61037 85812->85813 85814 f6103b LockResource 85812->85814 85813->85776 85815 f61049 SizeofResource 85814->85815 85816 f6105b 85814->85816 85815->85816 85816->85776 85819 f63841 85817->85819 85818 f6384e 85818->85740 85819->85818 85820 1060bcd _memcpy_s 66 API calls 85819->85820 85821 f63891 85820->85821 85821->85740 85823 f66f9f ctype 85822->85823 85824 f61000 ctype 79 API calls 85823->85824 85825 f66fcd 85823->85825 85824->85825 85828 f65d90 85825->85828 85832 f65da3 85828->85832 85829 f61000 ctype 79 API calls 85829->85832 85830 f61b20 ctype 66 API calls 85830->85832 85831 1060bcd 66 API calls _memcpy_s 85831->85832 85832->85829 85832->85830 85832->85831 85833 f65dfa CreateMutexA WaitForSingleObject 85832->85833 85833->85743 85834 f64f60 85932 f8051e 85834->85932 85837 f64980 115 API calls 85838 f64fa3 85837->85838 85941 f63e10 85838->85941 85841 f65062 85949 f63d30 85841->85949 85844 f64fc7 85846 f64fe2 85844->85846 85847 f64fd8 85844->85847 85846->85841 86179 10613c7 76 API calls 85846->86179 86178 f63360 157 API calls __crtLCMapStringA_stat 85847->86178 85849 f65080 85958 f634e0 GetModuleHandleA GetModuleFileNameA 85849->85958 85851 f64ff2 85851->85841 85855 f65003 85851->85855 85853 f64fdf 85853->85846 85854 f6508a 85856 f6508e 85854->85856 85857 f650cd 85854->85857 86180 f64d10 147 API calls 2 library calls 85855->86180 86182 f804bc 132 API calls 3 library calls 85856->86182 85968 f62ef0 85857->85968 85861 f6502f 85862 f650d4 ctype 85862->85861 85986 f7e75e 85862->85986 85863 f6500a 85863->85861 86181 f66ee0 FindWindowA 85863->86181 85865 f65028 PostMessageA 85865->85861 85868 f65117 86183 f804bc 132 API calls 3 library calls 85868->86183 85869 f650fc GetDeviceCaps 85992 f7e7c9 85869->85992 85872 f65112 85872->85868 85875 f6514e 85872->85875 85873 f65124 85874 f7e7df ctype 110 API calls 85873->85874 85874->85861 85876 f72a87 ctype 109 API calls 85875->85876 85877 f65183 85876->85877 85878 f72a87 ctype 109 API calls 85877->85878 85879 f6518e LoadIconW 85878->85879 85880 f72a87 ctype 109 API calls 85879->85880 85881 f651a2 LoadCursorA 85880->85881 85997 f786a0 85881->85997 85883 f651cf 85884 f65290 85883->85884 85885 f6dbd1 ~_Task_impl 66 API calls 85883->85885 85886 f7e7df ctype 110 API calls 85884->85886 85887 f651eb 85885->85887 85888 f652a3 85886->85888 85889 f65200 85887->85889 86184 f61120 115 API calls 85887->86184 86015 f706ab 85889->86015 85891 f6521f 85891->85884 85892 f79743 ShowWindow 85891->85892 85893 f6522b UpdateWindow 85892->85893 85894 f6dbd1 ~_Task_impl 66 API calls 85893->85894 85895 f6523f 85894->85895 85896 f6524d 85895->85896 86185 f61b80 79 API calls ctype 85895->86185 86040 f62fc0 85896->86040 85902 f652bf 85906 f652ec 85902->85906 85907 f652ca 85902->85907 85903 f65269 86186 f61b80 79 API calls ctype 85903->86186 85905 f65271 86187 f61cb0 115 API calls 85905->86187 86059 f630a0 85906->86059 86189 f61b80 79 API calls ctype 85907->86189 85910 f65282 86188 f748c6 114 API calls ctype 85910->86188 85911 f652d2 86190 f61cb0 115 API calls 85911->86190 85917 f65305 86147 f64290 85917->86147 85922 f65346 85924 f7e7df ctype 110 API calls 85922->85924 85926 f65351 85924->85926 85925 f65326 85925->85922 86192 f61f30 109 API calls ctype 85925->86192 85928 f6533a 86193 f61e90 127 API calls ctype 85928->86193 85930 f80758 16 API calls 85930->85849 85933 106259f _free 66 API calls 85932->85933 85934 f8052e 85933->85934 85935 106511a __strdup 66 API calls 85934->85935 85936 f80536 85935->85936 85937 106259f _free 66 API calls 85936->85937 85938 f80541 85937->85938 85939 106511a __strdup 66 API calls 85938->85939 85940 f64f94 GetCommandLineA 85939->85940 85940->85837 85942 f63e1d 85941->85942 85943 f61000 ctype 79 API calls 85942->85943 85944 f61b20 ctype 66 API calls 85942->85944 85946 f72127 moneypunct 2 API calls 85942->85946 85947 f63e73 85942->85947 86194 1061025 85942->86194 86197 f720ef RaiseException __CxxThrowException@8 85942->86197 85943->85942 85944->85942 85946->85942 85947->85841 86177 10613c7 76 API calls 85947->86177 86218 f80995 85949->86218 85950 f63d75 85951 10614dd 76 API calls 85950->85951 85954 f63d8a 85951->85954 85952 f63db5 86257 f80850 85952->86257 85954->85952 86273 f63c00 GetModuleHandleA FindResourceA 85954->86273 86310 1061234 85958->86310 85962 f635d2 CloseHandle 85964 1060bbe __crtLCMapStringA_stat 5 API calls 85962->85964 85963 f635eb 85965 1060bbe __crtLCMapStringA_stat 5 API calls 85963->85965 85967 f635e7 85964->85967 85966 f63601 85965->85966 85966->85854 85967->85854 85969 f62f23 85968->85969 85970 f62f27 85969->85970 85971 f62f3c 85969->85971 85970->85862 86342 f74409 109 API calls 85971->86342 85973 f62f44 86343 f66ee0 FindWindowA 85973->86343 85975 f62f52 85976 f62f85 85975->85976 86344 f7550c 110 API calls 2 library calls 85975->86344 86346 f76280 110 API calls 4 library calls 85976->86346 85979 f62f94 85979->85862 85980 f62f5f GetLastActivePopup 85981 f754bf ctype 110 API calls 85980->85981 85982 f62f6f 85981->85982 85983 f62f73 SetForegroundWindow 85982->85983 85984 f62f7d 85982->85984 85983->85984 86345 f7554a 109 API calls 2 library calls 85984->86345 85987 f650f8 85986->85987 85988 f7e76d 85986->85988 85987->85868 85987->85869 86347 f7e6d6 109 API calls 3 library calls 85988->86347 85990 f7e777 86348 f88cfc 68 API calls 2 library calls 85990->86348 85993 f7e7d2 85992->85993 85994 f7e7cf 85992->85994 85995 f7e796 ctype 109 API calls 85993->85995 85994->85872 85996 f7e7d7 DeleteDC 85995->85996 85996->85872 85998 f786ac __EH_prolog3_catch 85997->85998 86349 f6e2cf 85998->86349 86000 f786be 86003 f786d1 ~_Task_impl 86000->86003 86356 f7403f 114 API calls 2 library calls 86000->86356 86002 f786cb 86002->86003 86004 f72a87 ctype 109 API calls 86002->86004 86003->85883 86005 f786da 86004->86005 86005->86003 86006 f890b9 ctype 7 API calls 86005->86006 86007 f786e7 86006->86007 86008 f72a87 ctype 109 API calls 86007->86008 86009 f786f0 86008->86009 86357 f63fa0 79 API calls 86009->86357 86011 f786fe 86358 f718df 79 API calls 86011->86358 86013 f78707 86359 f8912b LocalAlloc LeaveCriticalSection RaiseException moneypunct 86013->86359 86016 f706b7 __EH_prolog3 ctype 86015->86016 86017 f61ad0 ctype 79 API calls 86016->86017 86018 f706d0 86017->86018 86019 f7b266 109 API calls 86018->86019 86020 f706da 86019->86020 86021 f706ff 86020->86021 86022 f61bf0 85 API calls 86020->86022 86361 f78a01 86021->86361 86024 f706e8 86022->86024 86024->86021 86427 f7b271 80 API calls 2 library calls 86024->86427 86029 f63830 ctype 66 API calls 86030 f70723 86029->86030 86416 f707f1 86030->86416 86032 f70787 86428 f6e3f1 110 API calls ctype 86032->86428 86033 f7077c GetMenu 86033->86032 86035 f70798 86036 f7079f 86035->86036 86038 f70754 ctype ~_Task_impl 86035->86038 86429 f76447 256 API calls ctype 86036->86429 86038->85891 86041 f63089 86040->86041 86042 f62fd8 RegOpenKeyExA 86040->86042 86052 f646a0 GetModuleHandleA GetModuleFileNameA 86041->86052 86043 f63065 86042->86043 86044 f63003 RegCreateKeyExA 86042->86044 86046 f63075 86043->86046 86047 f63072 RegCloseKey 86043->86047 86044->86043 86045 f63029 RegCreateKeyExA 86044->86045 86045->86043 86048 f63049 RegCreateKeyExA 86045->86048 86049 f6307f 86046->86049 86050 f6307c RegCloseKey 86046->86050 86047->86046 86048->86043 86049->86041 86051 f63086 RegCloseKey 86049->86051 86050->86049 86051->86041 86053 1061234 __wsplitpath 76 API calls 86052->86053 86054 f646f0 86053->86054 86054->86054 86055 f62c00 ctype 79 API calls 86054->86055 86056 f64798 86055->86056 86057 1060bbe __crtLCMapStringA_stat 5 API calls 86056->86057 86058 f647a9 86057->86058 86058->85902 86058->85903 86086 f80758 16 API calls 86059->86086 86060 f630b6 86091 f807c5 87 API calls 86060->86091 86061 f630d3 86089 f80758 16 API calls 86061->86089 86062 f630e8 86095 f80758 16 API calls 86062->86095 86063 f63103 86093 f80758 16 API calls 86063->86093 86064 f6311e 86098 f80758 16 API calls 86064->86098 86065 f63139 86097 f80758 16 API calls 86065->86097 86066 f63154 86101 f80758 16 API calls 86066->86101 86067 f6316f 86100 f807c5 87 API calls 86067->86100 86068 f63193 86103 f807c5 87 API calls 86068->86103 86069 f631b1 86102 f807c5 87 API calls 86069->86102 86070 f631cf 86105 f807c5 87 API calls 86070->86105 86071 f631ed 86104 f807c5 87 API calls 86071->86104 86072 f6320b 86107 f807c5 87 API calls 86072->86107 86073 f63229 86106 f80758 16 API calls 86073->86106 86074 f6323e 86088 f807c5 87 API calls 86074->86088 86075 f6325b 86087 f80758 16 API calls 86075->86087 86076 f63270 86092 f807c5 87 API calls 86076->86092 86077 f6328d 86090 f80758 16 API calls 86077->86090 86078 f632a2 86096 f807c5 87 API calls 86078->86096 86079 f632bf 86094 f80758 16 API calls 86079->86094 86080 f632d4 86099 f807c5 87 API calls 86080->86099 86081 f632f1 86491 f7b845 86081->86491 86086->86060 86087->86076 86088->86075 86089->86062 86090->86078 86091->86061 86092->86077 86093->86064 86094->86080 86095->86063 86096->86079 86097->86066 86098->86065 86099->86081 86100->86068 86101->86067 86102->86070 86103->86069 86104->86072 86105->86071 86106->86074 86107->86073 86108 f64010 86145 f80758 16 API calls 86108->86145 86109 f6404d 86131 f807c5 87 API calls 86109->86131 86110 f6406a 86133 f80995 135 API calls 86110->86133 86111 f64089 86498 f63f30 86111->86498 86113 f6409c 86137 f80850 19 API calls 86113->86137 86114 f640dd 86138 f80995 135 API calls 86114->86138 86115 f640fc 86116 f63f30 ctype 79 API calls 86115->86116 86117 f6410f 86116->86117 86139 f80850 19 API calls 86117->86139 86118 f6414b 86140 f80758 16 API calls 86118->86140 86119 f64160 86141 f807c5 87 API calls 86119->86141 86120 f6417d 86142 f80758 16 API calls 86120->86142 86121 f64192 86143 f807c5 87 API calls 86121->86143 86122 f641af 86144 f80758 16 API calls 86122->86144 86123 f641c4 86146 f807c5 87 API calls 86123->86146 86124 f641e1 86132 f80758 16 API calls 86124->86132 86125 f641f6 86134 f807c5 87 API calls 86125->86134 86126 f64213 86135 f80758 16 API calls 86126->86135 86127 f64228 86136 f807c5 87 API calls 86127->86136 86128 f64245 86129 f7b845 ctype 109 API calls 86128->86129 86130 f6424a 86129->86130 86130->85917 86131->86110 86132->86125 86133->86111 86134->86126 86135->86127 86136->86128 86137->86114 86138->86115 86139->86118 86140->86119 86141->86120 86142->86121 86143->86122 86144->86123 86145->86109 86146->86124 86160 f80995 135 API calls 86147->86160 86148 f642d8 86149 f63f30 ctype 79 API calls 86148->86149 86150 f642eb 86149->86150 86151 10614dd 76 API calls 86150->86151 86152 f64322 86151->86152 86153 f64364 86152->86153 86154 f63c00 111 API calls 86152->86154 86159 f80758 16 API calls 86153->86159 86155 f64335 86154->86155 86161 f80995 135 API calls 86155->86161 86156 f6439f 86162 f63630 86156->86162 86157 f64351 86158 f63f30 ctype 79 API calls 86157->86158 86158->86153 86159->86156 86160->86148 86161->86157 86172 f80758 16 API calls 86162->86172 86163 f63646 86171 f80758 16 API calls 86163->86171 86164 f63661 86174 f807c5 87 API calls 86164->86174 86165 f63685 86173 f807c5 87 API calls 86165->86173 86166 f636a3 86176 f80758 16 API calls 86166->86176 86167 f636b8 86175 f807c5 87 API calls 86167->86175 86168 f636d9 86506 f63330 PostMessageA 86168->86506 86170 f636f6 86170->85922 86191 10613c7 76 API calls 86170->86191 86171->86164 86172->86163 86173->86166 86174->86165 86175->86168 86176->86167 86177->85844 86178->85853 86179->85851 86180->85863 86181->85865 86182->85861 86183->85873 86184->85889 86185->85896 86186->85905 86187->85910 86188->85884 86189->85911 86190->85910 86191->85925 86192->85928 86193->85922 86198 1060f1f 86194->86198 86202 1060f30 _strnlen 86198->86202 86199 1060f47 86213 10634c9 66 API calls __getptd_noexit 86199->86213 86201 1060f4c 86214 1068f9c 11 API calls __mbsupr_s_l 86201->86214 86202->86199 86204 1060f72 86202->86204 86212 1060f3a 86202->86212 86205 1060e98 _LocaleUpdate::_LocaleUpdate 76 API calls 86204->86205 86207 1060f7e 86205->86207 86208 1061001 86207->86208 86207->86212 86215 106a57c 82 API calls 2 library calls 86207->86215 86216 10634c9 66 API calls __getptd_noexit 86208->86216 86210 1061006 86217 10634c9 66 API calls __getptd_noexit 86210->86217 86212->85942 86213->86201 86214->86212 86215->86207 86216->86210 86217->86212 86219 f809a1 __EH_prolog3 86218->86219 86220 f80a3e 86219->86220 86221 f809b7 86219->86221 86226 f6dbd1 ~_Task_impl 66 API calls 86220->86226 86229 f809c6 ctype ~_Task_impl 86220->86229 86222 f806fe 13 API calls 86221->86222 86223 f809bf 86222->86223 86224 f809cd RegQueryValueExA 86223->86224 86223->86229 86225 f80a01 86224->86225 86230 f80a20 ctype 86224->86230 86227 f6dbd1 ~_Task_impl 66 API calls 86225->86227 86232 f80a7b 86226->86232 86228 f80a07 RegQueryValueExA 86227->86228 86228->86230 86229->85950 86296 f80626 RegCloseKey 86230->86296 86231 f61000 ctype 79 API calls 86234 f80ae0 __resetstkoflw 86231->86234 86232->86229 86232->86231 86235 f80b3e 86234->86235 86236 f80c2f GetPrivateProfileStringA 86234->86236 86237 f806fe 13 API calls 86235->86237 86239 f80b4f 86236->86239 86240 f80b45 86237->86240 86241 f64980 115 API calls 86239->86241 86240->86239 86242 f80b5a ctype 86240->86242 86256 f80c08 ctype 86241->86256 86245 f61ad0 ctype 79 API calls 86242->86245 86243 1060bbe __crtLCMapStringA_stat 5 API calls 86244 f80c82 86243->86244 86244->85950 86246 f80b6b RegQueryValueExA 86245->86246 86247 f80ba3 86246->86247 86248 f80be5 RegCloseKey 86246->86248 86285 f61bb0 86247->86285 86250 f80bf9 86248->86250 86251 f80c17 86248->86251 86253 f63830 ctype 66 API calls 86250->86253 86254 f64980 115 API calls 86251->86254 86253->86256 86254->86256 86256->86243 86258 f8085f 86257->86258 86259 f808d0 WritePrivateProfileStringA 86257->86259 86260 f80880 86258->86260 86261 f80865 86258->86261 86268 f63dd0 86259->86268 86263 f806fe 13 API calls 86260->86263 86262 f80643 11 API calls 86261->86262 86264 f8086a 86262->86264 86265 f80888 86263->86265 86264->86268 86269 f80874 RegDeleteKeyA 86264->86269 86266 f8089f 86265->86266 86267 f8088f 86265->86267 86266->86268 86271 f808a3 lstrlenA RegSetValueExA 86266->86271 86267->86268 86270 f80893 RegDeleteValueA 86267->86270 86268->85930 86272 f808be RegCloseKey 86269->86272 86270->86272 86271->86272 86272->86268 86274 f63c34 SizeofResource LoadResource LockResource 86273->86274 86275 f63cdb 86273->86275 86277 f63c5c _strnlen _memmove 86274->86277 86308 f62b70 79 API calls ctype 86275->86308 86278 f63cc1 86277->86278 86279 f61000 ctype 79 API calls 86277->86279 86280 f61b20 ctype 66 API calls 86277->86280 86283 f80850 19 API calls 86278->86283 86279->86277 86280->86277 86281 f63d0b 86297 f807c5 86281->86297 86283->86281 86286 f61bc7 86285->86286 86287 f61bbd 86285->86287 86289 f61be2 RegQueryValueExA 86286->86289 86290 f61b20 ctype 66 API calls 86286->86290 86288 f61000 ctype 79 API calls 86287->86288 86288->86286 86291 f63700 86289->86291 86290->86289 86292 f6370e _strnlen 86291->86292 86293 f6372c 86292->86293 86294 f61000 ctype 79 API calls 86292->86294 86293->86248 86295 f63744 86294->86295 86296->86229 86298 f807e8 86297->86298 86299 f8081a 86297->86299 86300 f806fe 13 API calls 86298->86300 86309 10631bc 71 API calls _vswprintf_s 86299->86309 86302 f807f0 86300->86302 86304 f8083f 86302->86304 86305 f807f6 RegSetValueExA RegCloseKey 86302->86305 86303 f8082d WritePrivateProfileStringA 86303->86304 86306 1060bbe __crtLCMapStringA_stat 5 API calls 86304->86306 86305->86304 86307 f63d28 86306->86307 86307->85952 86308->86278 86309->86303 86313 106103c 86310->86313 86314 10610d3 86313->86314 86317 1061053 86313->86317 86340 10634c9 66 API calls __getptd_noexit 86314->86340 86316 1061213 86319 f6352c CreateFileA GetLastError 86316->86319 86341 1068f9c 11 API calls __mbsupr_s_l 86316->86341 86317->86314 86322 10610c3 86317->86322 86334 10631fb 76 API calls __mbsnbcpy_s_l 86317->86334 86319->85962 86319->85963 86331 106111b 86322->86331 86333 1061141 86322->86333 86335 10660e0 76 API calls x_ismbbtype_l 86322->86335 86323 106119f 86323->86314 86323->86319 86324 10611ac 86323->86324 86339 10631fb 76 API calls __mbsnbcpy_s_l 86324->86339 86325 1061160 86325->86314 86326 106117d 86325->86326 86337 10631fb 76 API calls __mbsnbcpy_s_l 86325->86337 86326->86314 86326->86319 86329 106118e 86326->86329 86338 10631fb 76 API calls __mbsnbcpy_s_l 86329->86338 86331->86314 86331->86333 86336 10631fb 76 API calls __mbsnbcpy_s_l 86331->86336 86333->86323 86333->86325 86334->86322 86335->86322 86336->86333 86337->86326 86338->86319 86339->86319 86340->86316 86341->86319 86342->85973 86343->85975 86344->85980 86345->85976 86346->85979 86347->85990 86348->85987 86350 f6e2db __mtinitlocknum 86349->86350 86351 f72a87 ctype 109 API calls 86350->86351 86352 f6e2e9 ActivateActCtx 86351->86352 86353 f6e300 GetClassInfoA 86352->86353 86355 f6e2fc __mtinitlocknum 86352->86355 86360 f6e32a GetLastError DeactivateActCtx SetLastError 86353->86360 86355->86000 86356->86002 86357->86011 86358->86013 86359->86003 86360->86355 86362 f72a87 ctype 109 API calls 86361->86362 86363 f78a0e _memset 86362->86363 86364 f72a87 ctype 109 API calls 86363->86364 86404 f70706 86363->86404 86365 f78a46 86364->86365 86366 f78a77 86365->86366 86368 f786a0 119 API calls 86365->86368 86367 f78a99 86366->86367 86369 f786a0 119 API calls 86366->86369 86370 f78ac0 86367->86370 86371 f786a0 119 API calls 86367->86371 86368->86366 86369->86367 86372 f78ae6 86370->86372 86430 f789bd 121 API calls ctype 86370->86430 86371->86370 86374 f78b13 86372->86374 86431 f789bd 121 API calls ctype 86372->86431 86376 f78b34 86374->86376 86432 f75fd5 110 API calls ctype 86374->86432 86378 f78b55 86376->86378 86433 f75fd5 110 API calls ctype 86376->86433 86380 f78b72 86378->86380 86434 f75fd5 110 API calls ctype 86378->86434 86381 f78b8b 86380->86381 86435 f75fd5 110 API calls ctype 86380->86435 86384 f78ba8 86381->86384 86436 f75fd5 110 API calls ctype 86381->86436 86386 f78bc5 86384->86386 86437 f75fd5 110 API calls ctype 86384->86437 86388 f78be2 86386->86388 86438 f75fd5 110 API calls ctype 86386->86438 86389 f78bff 86388->86389 86439 f75fd5 110 API calls ctype 86388->86439 86392 f78c1c 86389->86392 86440 f75fd5 110 API calls ctype 86389->86440 86394 f78c35 86392->86394 86441 f75fd5 110 API calls ctype 86392->86441 86396 f78c4e 86394->86396 86442 f75fd5 110 API calls ctype 86394->86442 86397 f78c6b 86396->86397 86443 f75fd5 110 API calls ctype 86396->86443 86400 f78c88 86397->86400 86444 f75fd5 110 API calls ctype 86397->86444 86402 f78ca1 86400->86402 86445 f75fd5 110 API calls ctype 86400->86445 86402->86404 86446 f75fd5 110 API calls ctype 86402->86446 86406 f6e7d2 86404->86406 86407 f72a87 ctype 109 API calls 86406->86407 86408 f6e7e3 LoadIconW 86407->86408 86409 f6e84f 86408->86409 86410 f6e7f8 _memset 86408->86410 86409->86029 86410->86409 86411 f72a87 ctype 109 API calls 86410->86411 86412 f6e824 86411->86412 86413 f6e2cf 114 API calls 86412->86413 86414 f6e834 86413->86414 86414->86409 86447 f7872e 124 API calls 3 library calls 86414->86447 86417 f70805 86416->86417 86418 f7082c 86416->86418 86419 f72a87 ctype 109 API calls 86417->86419 86448 f62cf0 86418->86448 86421 f7080a LoadMenuA 86419->86421 86421->86418 86424 f70750 86421->86424 86422 f7083a 86455 f778d9 86422->86455 86424->86032 86424->86033 86424->86038 86425 f70889 DestroyMenu 86425->86424 86427->86021 86428->86035 86429->86038 86430->86372 86431->86374 86432->86376 86433->86378 86434->86380 86435->86381 86436->86384 86437->86386 86438->86388 86439->86389 86440->86392 86441->86394 86442->86396 86443->86397 86444->86400 86445->86402 86446->86404 86447->86409 86449 f62cfb 86448->86449 86450 f62d09 86448->86450 86451 f62c00 ctype 79 API calls 86449->86451 86453 f62c00 ctype 79 API calls 86450->86453 86452 f62d04 86451->86452 86452->86422 86454 f62d21 86453->86454 86454->86422 86456 f778fd 86455->86456 86458 f778ec 86455->86458 86457 f72a87 ctype 109 API calls 86456->86457 86460 f7793b 86457->86460 86458->86456 86459 f72127 moneypunct 2 API calls 86458->86459 86459->86456 86466 f7087f 86460->86466 86467 f7787f 86460->86467 86464 f77993 86483 f7557a 110 API calls 2 library calls 86464->86483 86466->86424 86466->86425 86468 f84cae ctype 103 API calls 86467->86468 86469 f77895 86468->86469 86470 f778a0 86469->86470 86472 f72127 moneypunct 2 API calls 86469->86472 86471 f778d0 86470->86471 86473 f778ae GetCurrentThreadId SetWindowsHookExA 86470->86473 86476 f74156 86471->86476 86472->86470 86473->86471 86474 f778cb 86473->86474 86484 f720ef RaiseException __CxxThrowException@8 86474->86484 86477 f74162 __mtinitlocknum 86476->86477 86478 f72a87 ctype 109 API calls 86477->86478 86479 f74170 ActivateActCtx 86478->86479 86480 f74187 CreateWindowExA 86479->86480 86482 f74183 __mtinitlocknum 86479->86482 86485 f741cc 86480->86485 86482->86464 86483->86466 86486 f741e4 86485->86486 86487 f741da GetLastError 86485->86487 86488 f741e6 DeactivateActCtx 86486->86488 86487->86488 86489 f741f5 SetLastError 86488->86489 86490 f741fc 86488->86490 86489->86490 86490->86482 86492 f72aba ctype 109 API calls 86491->86492 86493 f632f6 86492->86493 86494 f61380 86493->86494 86495 f613a4 86494->86495 86496 f613a9 86494->86496 86497 f72a87 ctype 109 API calls 86495->86497 86496->86108 86497->86496 86499 f63f48 86498->86499 86504 f63f97 86498->86504 86500 f63f8b 86499->86500 86501 f63f58 86499->86501 86502 f62c00 ctype 79 API calls 86500->86502 86503 f63830 ctype 66 API calls 86501->86503 86502->86504 86505 f63f5e 86503->86505 86504->86113 86505->86113 86506->86170 86594 73f712a0 86599 73f71210 GetTickCount 86594->86599 86596 73f712a5 86597 73f712b7 SetWindowsHookExA SetWindowsHookExA 86596->86597 86598 73f712ec 86596->86598 86597->86598 86599->86596 86600 f84e81 8 API calls 86601 f7b92d 86602 f724b8 ctype 103 API calls 86601->86602 86605 f7b93f 86602->86605 86603 f7b959 PeekMessageA 86603->86605 86604 f7b9b9 86605->86603 86605->86604 86606 f7b9a8 PeekMessageA 86605->86606 86606->86605 86607 6bcf1272 86608 6bcf127d 86607->86608 86609 6bcf1282 86607->86609 86621 6bcf2599 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 86608->86621 86613 6bcf117c 86609->86613 86612 6bcf1290 86614 6bcf1188 __CRT_INIT@12 86613->86614 86616 6bcf1225 __CRT_INIT@12 86614->86616 86618 6bcf11d5 ___DllMainCRTStartup 86614->86618 86622 6bcf1018 86614->86622 86616->86612 86617 6bcf1018 __CRT_INIT@12 149 API calls 86617->86616 86618->86616 86619 6bcf1018 __CRT_INIT@12 149 API calls 86618->86619 86620 6bcf1205 86618->86620 86619->86620 86620->86616 86620->86617 86621->86609 86623 6bcf1024 __CRT_INIT@12 86622->86623 86624 6bcf102c 86623->86624 86625 6bcf10a6 86623->86625 86674 6bcf2202 HeapCreate 86624->86674 86627 6bcf10ac 86625->86627 86628 6bcf1107 86625->86628 86634 6bcf10ca 86627->86634 86641 6bcf1035 __CRT_INIT@12 86627->86641 86684 6bcf1b29 66 API calls _doexit 86627->86684 86629 6bcf110c 86628->86629 86630 6bcf1165 86628->86630 86689 6bcf12a7 TlsGetValue DecodePointer TlsSetValue 86629->86689 86630->86641 86693 6bcf158e 79 API calls __freefls@4 86630->86693 86631 6bcf1031 86632 6bcf103c 86631->86632 86631->86641 86675 6bcf15fc 86 API calls 5 library calls 86632->86675 86639 6bcf10de 86634->86639 86685 6bcf1d9b 67 API calls _free 86634->86685 86636 6bcf1111 86690 6bcf17f6 66 API calls __calloc_crt 86636->86690 86688 6bcf10f1 70 API calls __mtterm 86639->86688 86641->86618 86643 6bcf1041 __RTC_Initialize 86646 6bcf1045 86643->86646 86653 6bcf1051 GetCommandLineA 86643->86653 86645 6bcf111d 86645->86641 86648 6bcf1129 DecodePointer 86645->86648 86676 6bcf2220 HeapDestroy 86646->86676 86647 6bcf10d4 86686 6bcf12db 70 API calls _free 86647->86686 86654 6bcf113e 86648->86654 86651 6bcf104a 86651->86641 86652 6bcf10d9 86687 6bcf2220 HeapDestroy 86652->86687 86677 6bcf211f 71 API calls 2 library calls 86653->86677 86658 6bcf1159 86654->86658 86659 6bcf1142 86654->86659 86657 6bcf1061 86678 6bcf1b56 73 API calls __calloc_crt 86657->86678 86692 6bcf1777 66 API calls _free 86658->86692 86691 6bcf1318 66 API calls 4 library calls 86659->86691 86663 6bcf106b 86665 6bcf106f 86663->86665 86680 6bcf2064 95 API calls 3 library calls 86663->86680 86664 6bcf1149 GetCurrentThreadId 86664->86641 86679 6bcf12db 70 API calls _free 86665->86679 86668 6bcf107b 86669 6bcf108f 86668->86669 86681 6bcf1dee 94 API calls 6 library calls 86668->86681 86669->86651 86683 6bcf1d9b 67 API calls _free 86669->86683 86672 6bcf1084 86672->86669 86682 6bcf193c 77 API calls 4 library calls 86672->86682 86674->86631 86675->86643 86676->86651 86677->86657 86678->86663 86679->86646 86680->86668 86681->86672 86682->86669 86683->86665 86684->86634 86685->86647 86686->86652 86687->86639 86688->86641 86689->86636 86690->86645 86691->86664 86692->86651 86693->86641

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 f865ff-f86656 call 1062e6b call f7e887 GetDeviceCaps 5 f86658-f86667 0->5 6 f86671 0->6 7 f86673 5->7 8 f86669-f8666f 5->8 6->7 9 f86675-f86683 7->9 8->9 10 f86692-f866a0 9->10 11 f86685-f86688 9->11 13 f866af-f866bd 10->13 14 f866a2-f866a5 10->14 11->10 12 f8668a-f86690 call f7ea60 DeleteObject 11->12 12->10 17 f866cc-f866d4 13->17 18 f866bf-f866c2 13->18 14->13 16 f866a7-f866ad call f7ea60 DeleteObject 14->16 16->13 19 f866e3-f866f1 17->19 20 f866d6-f866d9 17->20 18->17 23 f866c4-f866ca call f7ea60 DeleteObject 18->23 25 f86700-f86708 19->25 26 f866f3-f866f6 19->26 20->19 24 f866db-f866e1 call f7ea60 DeleteObject 20->24 23->17 24->19 31 f8670a-f8670d 25->31 32 f86717-f8671f 25->32 26->25 30 f866f8-f866fe call f7ea60 DeleteObject 26->30 30->25 31->32 38 f8670f-f86715 call f7ea60 DeleteObject 31->38 34 f8672e-f86736 32->34 35 f86721-f86724 32->35 40 f86738-f8673b 34->40 41 f86745-f86753 34->41 35->34 39 f86726-f8672c call f7ea60 DeleteObject 35->39 38->32 39->34 40->41 45 f8673d-f86743 call f7ea60 DeleteObject 40->45 46 f86762-f8676a 41->46 47 f86755-f86758 41->47 45->41 52 f86779-f867c7 call f8548c call 1060c50 GetTextCharsetInfo 46->52 53 f8676c-f8676f 46->53 47->46 51 f8675a-f86760 call f7ea60 DeleteObject 47->51 51->46 64 f867c9-f867cc 52->64 65 f867ce 52->65 53->52 54 f86771-f86777 call f7ea60 DeleteObject 53->54 54->52 66 f867cf-f867d5 64->66 65->66 67 f867d9-f867f1 lstrcpyA 66->67 68 f867d7 66->68 69 f86859-f868aa CreateFontIndirectA call f7ea32 call 1064bd7 call 1062990 67->69 70 f867f3-f867fa 67->70 68->67 83 f868ac 69->83 84 f868af-f869a6 CreateFontIndirectA call f7ea32 call f8548c CreateFontIndirectA call f7ea32 CreateFontIndirectA call f7ea32 CreateFontIndirectA call f7ea32 GetSystemMetrics lstrcpyA CreateFontIndirectA call f7ea32 GetStockObject 69->84 70->69 72 f867fc-f86818 EnumFontFamiliesA 70->72 74 f8681a-f8682a lstrcpyA 72->74 75 f8682c-f86846 EnumFontFamiliesA 72->75 74->69 76 f86848-f8684e 75->76 77 f86850 75->77 79 f86856-f86857 lstrcpyA 76->79 77->79 79->69 83->84 97 f869ac-f869bc GetObjectA 84->97 98 f86a2e-f86a89 GetStockObject call f7ea1e GetObjectA CreateFontIndirectA call f7ea32 CreateFontIndirectA call f7ea32 call f85550 84->98 97->98 99 f869be-f86a29 lstrcpyA CreateFontIndirectA call f7ea32 CreateFontIndirectA call f7ea32 97->99 111 f86ab7-f86ab9 98->111 99->98 112 f86a8b-f86a8f 111->112 113 f86abb-f86acf call f66a40 111->113 115 f86ae9-f86c7d call f72127 call 1062e6b GetVersionExA GetSystemMetrics 112->115 116 f86a91-f86a9f 112->116 117 f86ad4-f86ae8 call f7e8db call 1062eee 113->117 130 f86c8f 115->130 131 f86c7f-f86c86 115->131 116->115 119 f86aa1-f86aab call f754eb 116->119 119->111 128 f86aad-f86aaf 119->128 128->111 133 f86c95-f86c97 130->133 134 f86c91-f86c93 130->134 132 f86c88 131->132 131->133 132->130 135 f86c98-f86cd7 call f860cd call f74312 133->135 134->135 140 f86d48-f86d66 135->140 141 f86cd9-f86d46 GetProcAddress * 6 135->141 142 f86d6c-f86d7f call f74312 140->142 141->142 145 f86d81-f86db5 GetProcAddress * 3 142->145 146 f86db7-f86dc3 142->146 147 f86dc9-f86e06 call f865ff 145->147 146->147 149 f86e0b-f86e8c call f8513b call 1062eee 147->149
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00F86609
      • Part of subcall function 00F7E887: __EH_prolog3.LIBCMT ref: 00F7E88E
      • Part of subcall function 00F7E887: GetWindowDC.USER32(00000000,00000004,00F86129,00000000,?,?,0109A46C), ref: 00F7E8BA
    • GetDeviceCaps.GDI32(?,00000058), ref: 00F8662F
    • DeleteObject.GDI32(00000000), ref: 00F86690
    • DeleteObject.GDI32(00000000), ref: 00F866AD
    • DeleteObject.GDI32(00000000), ref: 00F866CA
    • DeleteObject.GDI32(00000000), ref: 00F866E1
    • DeleteObject.GDI32(00000000), ref: 00F866FE
    • DeleteObject.GDI32(00000000), ref: 00F86715
    • DeleteObject.GDI32(00000000), ref: 00F8672C
    • DeleteObject.GDI32(00000000), ref: 00F86743
    • DeleteObject.GDI32(00000000), ref: 00F86760
    • DeleteObject.GDI32(00000000), ref: 00F86777
    • _memset.LIBCMT ref: 00F8678E
    • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 00F8679E
    • lstrcpyA.KERNEL32(?,?), ref: 00F867ED
    • EnumFontFamiliesA.GDI32(?,00000000,Function_000265B6), ref: 00F86814
    • lstrcpyA.KERNEL32(?), ref: 00F86824
    • EnumFontFamiliesA.GDI32(?,00000000,Function_000265B6), ref: 00F8683F
    • lstrcpyA.KERNEL32(?), ref: 00F86857
    • CreateFontIndirectA.GDI32(?), ref: 00F86863
    • CreateFontIndirectA.GDI32(?), ref: 00F868B3
    • CreateFontIndirectA.GDI32(?), ref: 00F868EE
    • CreateFontIndirectA.GDI32(?), ref: 00F86916
    • CreateFontIndirectA.GDI32(?), ref: 00F86933
    • GetSystemMetrics.USER32(00000048), ref: 00F8694E
    • lstrcpyA.KERNEL32(?), ref: 00F86962
    • CreateFontIndirectA.GDI32(?), ref: 00F86968
    • GetStockObject.GDI32(00000011), ref: 00F86996
    • GetObjectA.GDI32(?,0000003C,?), ref: 00F869B8
    • lstrcpyA.KERNEL32(?), ref: 00F869F1
    • CreateFontIndirectA.GDI32(?), ref: 00F869FB
    • CreateFontIndirectA.GDI32(?), ref: 00F86A1A
    • GetStockObject.GDI32(00000011), ref: 00F86A30
    • GetObjectA.GDI32(?,0000003C,?), ref: 00F86A41
    • CreateFontIndirectA.GDI32(?), ref: 00F86A4B
    • CreateFontIndirectA.GDI32(?), ref: 00F86A6E
    • __EH_prolog3_GS.LIBCMT ref: 00F86AF9
    • GetVersionExA.KERNEL32(?,0000009C,00000000), ref: 00F86C4F
    • GetSystemMetrics.USER32(00001000), ref: 00F86C5A
    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 00F86CDF
    • GetProcAddress.KERNEL32(?,DrawThemeTextEx), ref: 00F86CF2
    • GetProcAddress.KERNEL32(?,BufferedPaintInit), ref: 00F86D05
    • GetProcAddress.KERNEL32(?,BufferedPaintUnInit), ref: 00F86D18
    • GetProcAddress.KERNEL32(?,BeginBufferedPaint), ref: 00F86D2B
    • GetProcAddress.KERNEL32(?,EndBufferedPaint), ref: 00F86D3E
    • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 00F86D87
    • GetProcAddress.KERNEL32(?,DwmDefWindowProc), ref: 00F86D9A
    • GetProcAddress.KERNEL32(?,DwmIsCompositionEnabled), ref: 00F86DAD
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$Font$CreateDeleteIndirect$AddressProc$lstrcpy$EnumFamiliesH_prolog3_MetricsStockSystem$CapsCharsetDeviceH_prolog3InfoTextVersionWindow_memset
    • String ID: BeginBufferedPaint$BufferedPaintInit$BufferedPaintUnInit$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
    • API String ID: 3153784359-1174303547
    • Opcode ID: 1f49fb0c4a951cb318cef69df2432c55b73f16cdd23a51d7f52a9e2268b526b4
    • Instruction ID: a5b934af091ae0625fceda15859a127a3b2eed2eb4adba61e14f1a17164740a9
    • Opcode Fuzzy Hash: 1f49fb0c4a951cb318cef69df2432c55b73f16cdd23a51d7f52a9e2268b526b4
    • Instruction Fuzzy Hash: EA3236B0D017199BCB21AF65C844BDEFBF8BF18700F1088AEE5AAA6251DB746640DF51
    APIs
      • Part of subcall function 73F71210: GetTickCount.KERNEL32 ref: 73F71210
    • SetWindowsHookExA.USER32(00000002,?KeyboardProc@@YGJHIJ@Z,?,00000000), ref: 73F712CD
    • SetWindowsHookExA.USER32(00000007,?MouseProc@@YGJHIJ@Z,?,00000000), ref: 73F712E4
    Memory Dump Source
    • Source File: 0000000B.00000002.3343131863.0000000073F71000.00000020.00000001.01000000.00000009.sdmp, Offset: 73F70000, based on PE: true
    • Associated: 0000000B.00000002.3343115432.0000000073F70000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 0000000B.00000002.3343154705.0000000073F76000.00000002.00000001.01000000.00000009.sdmpDownload File
    • Associated: 0000000B.00000002.3343170802.0000000073F79000.00000004.00000001.01000000.00000009.sdmpDownload File
    • Associated: 0000000B.00000002.3343186259.0000000073F7C000.00000002.00000001.01000000.00000009.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_73f70000_StchCtrl.jbxd
    Similarity
    • API ID: HookWindows$CountTick
    • String ID:
    • API String ID: 3839273497-0
    • Opcode ID: 1534090b4dd0b796817850b5a0171cf31061137a2fa911c021de5ec1757de4c2
    • Instruction ID: eb41b65e0a93dda63d57fbd8d3b4462dd6bb8535b6304c0b8d32876631f971b3
    • Opcode Fuzzy Hash: 1534090b4dd0b796817850b5a0171cf31061137a2fa911c021de5ec1757de4c2
    • Instruction Fuzzy Hash: 45E01232958614EEE620AAA5DC15B6436A8B3163D0FA0410BE21B971E4D7B06C48CB58

    Control-flow Graph

    APIs
    • __EH_prolog3.LIBCMT ref: 00F860D4
    • GetSysColor.USER32(00000016), ref: 00F860E3
    • GetSysColor.USER32(0000000F), ref: 00F860F0
    • GetSysColor.USER32(00000015), ref: 00F86103
    • GetSysColor.USER32(0000000F), ref: 00F8610B
    • GetDeviceCaps.GDI32(?,0000000C), ref: 00F86131
    • GetSysColor.USER32(0000000F), ref: 00F8613F
    • GetSysColor.USER32(00000010), ref: 00F86149
    • GetSysColor.USER32(00000015), ref: 00F86153
    • GetSysColor.USER32(00000016), ref: 00F8615D
    • GetSysColor.USER32(00000014), ref: 00F86167
    • GetSysColor.USER32(00000012), ref: 00F86171
    • GetSysColor.USER32(00000011), ref: 00F8617B
    • GetSysColor.USER32(00000006), ref: 00F86182
    • GetSysColor.USER32(0000000D), ref: 00F86189
    • GetSysColor.USER32(0000000E), ref: 00F86190
    • GetSysColor.USER32(00000005), ref: 00F86197
    • GetSysColor.USER32(00000008), ref: 00F861A1
    • GetSysColor.USER32(00000009), ref: 00F861A8
    • GetSysColor.USER32(00000007), ref: 00F861AF
    • GetSysColor.USER32(00000002), ref: 00F861B6
    • GetSysColor.USER32(00000003), ref: 00F861BD
    • GetSysColor.USER32(0000001B), ref: 00F861C4
    • GetSysColor.USER32(0000001C), ref: 00F861CE
    • GetSysColor.USER32(0000000A), ref: 00F861D8
    • GetSysColor.USER32(0000000B), ref: 00F861E2
    • GetSysColor.USER32(00000013), ref: 00F861EC
    • GetSysColor.USER32(0000001A), ref: 00F86206
    • GetSysColorBrush.USER32(00000010), ref: 00F86221
    • GetSysColorBrush.USER32(00000014), ref: 00F86238
    • GetSysColorBrush.USER32(00000005), ref: 00F8624A
    • CreateSolidBrush.GDI32(?), ref: 00F8626E
    • CreateSolidBrush.GDI32(?), ref: 00F8628A
    • CreateSolidBrush.GDI32(?), ref: 00F862A6
    • CreateSolidBrush.GDI32(?), ref: 00F862C2
    • CreateSolidBrush.GDI32(?), ref: 00F862DE
    • CreateSolidBrush.GDI32(?), ref: 00F862FA
    • CreateSolidBrush.GDI32(?), ref: 00F86316
    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00F8633F
    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00F86362
    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00F86385
    • CreateSolidBrush.GDI32(?), ref: 00F86409
    • CreatePatternBrush.GDI32(00000000), ref: 00F8644A
      • Part of subcall function 00F7EA8C: DeleteObject.GDI32(00000000), ref: 00F7EA9B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
    • String ID:
    • API String ID: 3754413814-0
    • Opcode ID: d1bfac3c89c871289236614cddb2ebc8b341239aa9b3b80ca5215d0040418b94
    • Instruction ID: 5435e741f8cb582b69a3b3e0633422f78bfec0f00826394dae8308ea282ec110
    • Opcode Fuzzy Hash: d1bfac3c89c871289236614cddb2ebc8b341239aa9b3b80ca5215d0040418b94
    • Instruction Fuzzy Hash: 6EB17A70900B449ADB31FF75CC46BABBBE0BF44700F00896EE19B86591EE79A544EF21

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 238 ff2627-ff263d call 1062e02 241 ff2738-ff273d call 1062eda 238->241 242 ff2643-ff2656 238->242 244 ff2658-ff266a 242->244 245 ff26c5 242->245 248 ff266c-ff2673 244->248 249 ff2679-ff26c3 244->249 246 ff26c7-ff26cf 245->246 250 ff26e4-ff26f1 call fedca4 246->250 251 ff26d1-ff26d4 246->251 248->249 249->246 259 ff26f3-ff26fd call feeda9 250->259 260 ff2702-ff2721 call f84212 * 2 250->260 252 ff273e-ff2744 251->252 253 ff26d6-ff26dd 251->253 252->241 256 ff2746-ff275a call f84212 252->256 255 ff26df call ff211a 253->255 255->250 256->250 264 ff275c-ff2762 256->264 259->260 273 ff272d-ff2732 260->273 274 ff2723-ff2728 call fee985 260->274 266 ff276a-ff2773 264->266 268 ff29f9-ff2ace call f72127 call 1062e02 call f7e129 call f7b352 call f61ad0 call f97026 call fedf62 call f97059 266->268 269 ff2779-ff2789 266->269 327 ff2b04-ff2b06 268->327 328 ff2ad0 268->328 269->268 272 ff278f-ff27b9 call ff08f9 269->272 280 ff27bb-ff27c8 call f7ea60 272->280 281 ff27ca-ff27d2 272->281 273->241 274->273 280->281 290 ff27fc-ff2817 GetObjectA 280->290 284 ff27e9-ff27f9 LoadImageW 281->284 285 ff27d4-ff27da 281->285 284->290 285->284 289 ff27dc-ff27e2 285->289 289->284 292 ff27e4 289->292 293 ff2829-ff282e 290->293 294 ff2819-ff2824 call fede86 290->294 292->284 297 ff2835-ff283b 293->297 298 ff2830-ff2833 293->298 302 ff29c4-ff29ee call ff2b93 DeleteObject call f66a40 294->302 301 ff2841-ff2844 297->301 297->302 298->297 298->301 301->302 303 ff284a-ff287a call f7e129 call f7e75e GetObjectA 301->303 316 ff2764-ff2767 302->316 317 ff29f4 302->317 322 ff29b8-ff29bf call f7e7df 303->322 323 ff2880-ff288d SelectObject 303->323 316->266 317->250 322->302 323->322 326 ff2893-ff28b5 CreateCompatibleBitmap 323->326 329 ff28b7-ff28bf SelectObject 326->329 330 ff28c4-ff28ef call f7e129 call f7e75e SelectObject 326->330 331 ff2b07-ff2b92 call ff2627 call 1062eda 327->331 334 ff2ad7-ff2aee 328->334 329->322 347 ff2907-ff2928 BitBlt 330->347 348 ff28f1-ff2902 SelectObject DeleteObject 330->348 339 ff2af4 call f7e0d1 334->339 340 ff2af0-ff2af2 334->340 343 ff2af9-ff2b02 339->343 340->339 340->343 343->331 350 ff298d-ff29a9 SelectObject * 2 DeleteObject 347->350 351 ff292a-ff2930 347->351 349 ff29ac-ff29b3 call f7e7df 348->349 349->322 350->349 353 ff2982-ff298b 351->353 354 ff2932-ff2949 GetPixel 351->354 353->350 353->351 355 ff295b-ff295d call fedcdd 354->355 356 ff294b-ff2951 354->356 360 ff2962-ff2965 355->360 356->355 357 ff2953-ff2959 call fedd5f 356->357 357->360 362 ff2977-ff2980 360->362 363 ff2967-ff2971 SetPixel 360->363 362->353 362->354 363->362
    APIs
    • __EH_prolog3.LIBCMT ref: 00FF2631
    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002000), ref: 00FF27F3
    • GetObjectA.GDI32(00000082,00000018,?), ref: 00FF2805
    • CreateCompatibleDC.GDI32(00000000), ref: 00FF2857
    • GetObjectA.GDI32(00000082,00000018,?), ref: 00FF2872
    • SelectObject.GDI32(?,00000082), ref: 00FF2886
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00FF28AA
    • SelectObject.GDI32(?,00000000), ref: 00FF28BD
    • CreateCompatibleDC.GDI32(?), ref: 00FF28D3
    • SelectObject.GDI32(?,?), ref: 00FF28E8
    • SelectObject.GDI32(?,00000000), ref: 00FF28F7
    • DeleteObject.GDI32(?), ref: 00FF28FC
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00FF291C
    • GetPixel.GDI32(?,?,?), ref: 00FF293B
    • SetPixel.GDI32(?,?,?,00000000), ref: 00FF2971
    • SelectObject.GDI32(?,?), ref: 00FF2993
    • SelectObject.GDI32(?,00000000), ref: 00FF299B
    • DeleteObject.GDI32(00000082), ref: 00FF29A0
    • DeleteObject.GDI32(00000082), ref: 00FF29D2
    • __EH_prolog3.LIBCMT ref: 00FF2A06
    • CreateCompatibleDC.GDI32(00000000), ref: 00FF2AD1
    • CreateCompatibleDC.GDI32(00000000), ref: 00FF2ADD
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$Select$CompatibleCreate$Delete$H_prolog3Pixel$BitmapImageLoad
    • String ID: $@Ls Fs
    • API String ID: 1197801157-1242102843
    • Opcode ID: 6522f86eac2e5615d894c97b8d24de98809618bea3e1fb92b473154a02926717
    • Instruction ID: 59a6caafe286fe1eaee5a0ed794d3c05f286d8821c88a46d837e131bf620c168
    • Opcode Fuzzy Hash: 6522f86eac2e5615d894c97b8d24de98809618bea3e1fb92b473154a02926717
    • Instruction Fuzzy Hash: F8027B71D00219DFCF65DFA8C880AADBBB5FF08710F10816AF945AB26AC7754941EFA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 364 f77638-f77671 call 1062e6b call f84cae 369 f77673 call f72127 364->369 370 f77678-f7767c 364->370 369->370 372 f77691-f776a7 call f72a87 370->372 373 f7767e-f7768c CallNextHookEx 370->373 379 f776be-f776c5 372->379 380 f776a9-f776b0 372->380 374 f77877-f7787c call 1062eee 373->374 381 f776c7-f776d5 GetClassLongA 379->381 382 f77712-f77714 379->382 383 f776b6-f776b8 380->383 384 f77845-f77866 CallNextHookEx 380->384 381->384 385 f776db-f776e3 381->385 388 f77716-f77751 call f72ad1 call f7550c SetWindowLongA 382->388 389 f77770-f77778 382->389 383->379 383->384 386 f77875 384->386 387 f77868-f77871 UnhookWindowsHookEx 384->387 390 f776e5-f776fa GlobalGetAtomNameA 385->390 391 f776fd-f7770c call f74398 385->391 386->374 387->386 414 f77755-f7776b call f72209 388->414 415 f77753 388->415 392 f777b4-f777c7 GetClassLongA 389->392 393 f7777a-f777b2 call 1060c50 call f740ca 389->393 390->391 391->382 391->384 398 f777f9-f77807 GetWindowLongA 392->398 399 f777c9 392->399 393->392 409 f777cb-f777e0 GetClassNameA 393->409 398->384 400 f77809-f7781a GetPropA 398->400 399->384 400->384 404 f7781c-f7782e SetPropA GetPropA 400->404 404->384 407 f77830-f7783f GlobalAddAtomA SetWindowLongA 404->407 407->384 409->398 411 f777e2-f777f7 call 10614dd 409->411 411->384 411->398 414->384 415->414
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00F77642
      • Part of subcall function 00F84CAE: __EH_prolog3.LIBCMT ref: 00F84CB5
    • CallNextHookEx.USER32(?,?,?,?), ref: 00F77686
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    • GetClassLongA.USER32(?,000000E6), ref: 00F776CA
    • GlobalGetAtomNameA.KERNEL32 ref: 00F776F4
    • SetWindowLongA.USER32(?,000000FC,Function_00016233), ref: 00F77749
    • _memset.LIBCMT ref: 00F77787
      • Part of subcall function 00F740CA: ActivateActCtx.KERNEL32(?,?,010BAE40,00000010), ref: 00F740EA
    • GetClassLongA.USER32(?,000000E0), ref: 00F777B7
    • GetClassNameA.USER32(?,?,00000100), ref: 00F777D8
    • GetWindowLongA.USER32(?,000000FC), ref: 00F777FC
    • GetPropA.USER32(?,AfxOldWndProc423), ref: 00F77816
    • SetPropA.USER32(?,AfxOldWndProc423,?), ref: 00F77821
    • GetPropA.USER32(?,AfxOldWndProc423), ref: 00F77829
    • GlobalAddAtomA.KERNEL32(AfxOldWndProc423), ref: 00F77831
    • SetWindowLongA.USER32(?,000000FC,Function_000174D1), ref: 00F7783F
    • CallNextHookEx.USER32(?,00000003,?,?), ref: 00F77857
    • UnhookWindowsHookEx.USER32(?), ref: 00F7786B
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Long$ClassHookPropWindow$AtomCallGlobalH_prolog3NameNext$ActivateException@8H_prolog3_ThrowUnhookWindows_memset
    • String ID: #32768$AfxOldWndProc423$ime
    • API String ID: 2595272471-4034971020
    • Opcode ID: 99e314e8958444186bbf5fb64815fdfe691968ac4b7da815a86f22738d13569d
    • Instruction ID: 4ea5566bdfcffd125dab0c29c3d0c0980d927061a7e700c065e6c53598164f58
    • Opcode Fuzzy Hash: 99e314e8958444186bbf5fb64815fdfe691968ac4b7da815a86f22738d13569d
    • Instruction Fuzzy Hash: D951F831918316DBDB25AF25CC48BEE7B78BF08360F204156F98DA6185DB38DD41DBA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 419 f64f60-f64fb6 call f8051e GetCommandLineA call f64980 call f63e10 426 f65062 419->426 427 f64fbc-f64fcf call 10613c7 419->427 428 f65065-f6508c call f63d30 call f80758 call f634e0 426->428 433 f64fe2-f64fe5 427->433 434 f64fd1-f64fd6 427->434 446 f6508e-f650ad call f804bc 428->446 447 f650cd-f650d6 call f62ef0 428->447 433->426 435 f64fe7-f64ff7 call 10613c7 433->435 434->433 436 f64fd8-f64fdf call f63360 434->436 435->426 443 f64ff9-f65001 435->443 436->433 443->428 445 f65003-f65017 call f64d10 call f66ed0 443->445 454 f6502f-f65040 445->454 463 f65019-f65029 call f66ee0 PostMessageA 445->463 457 f6504e-f65061 446->457 458 f650af-f650cc 446->458 447->454 455 f650dc-f650fa call f7e129 call f7e75e 447->455 461 f65042 454->461 471 f65117-f65149 call f804bc call f7e7df 455->471 472 f650fc-f65115 GetDeviceCaps call f7e7c9 455->472 461->457 464 f65044-f65049 461->464 463->454 464->457 471->461 472->471 478 f6514e-f651d1 call f72a87 * 2 LoadIconW call f72a87 LoadCursorA call f786a0 472->478 488 f651d7-f651f7 call f6dbd1 478->488 489 f65298-f652be call f7e7df call f61b00 478->489 494 f65204 488->494 495 f651f9-f65202 call f61120 488->495 498 f65206-f65221 call f706ab 494->498 495->498 498->489 502 f65223-f65244 call f79743 UpdateWindow call f6dbd1 498->502 507 f65246-f6524d call f61b80 502->507 508 f6524f 502->508 510 f65251-f65267 call f62fc0 call f646a0 507->510 508->510 516 f652bf-f652c8 call f62fb0 510->516 517 f65269-f65288 call f61b80 call f61cb0 510->517 522 f652ec-f6530e call f613e0 call f630a0 call f64010 call f64290 call f63630 516->522 523 f652ca-f652ea call f61b80 call f61cb0 516->523 529 f65289-f65293 call f748c6 call f61b00 517->529 543 f65313-f65319 522->543 523->529 529->489 544 f65346-f6536f call f7e7df call f61b00 543->544 545 f6531b-f6532b call 10613c7 543->545 545->544 550 f6532d-f65333 545->550 550->544 553 f65335-f65341 call f61f30 call f61e90 550->553 553->544
    APIs
      • Part of subcall function 00F8051E: _free.LIBCMT ref: 00F80529
      • Part of subcall function 00F8051E: __strdup.LIBCMT ref: 00F80531
      • Part of subcall function 00F8051E: _free.LIBCMT ref: 00F8053C
      • Part of subcall function 00F8051E: __strdup.LIBCMT ref: 00F80544
    • GetCommandLineA.KERNEL32(Shelter Publications,16B3F121), ref: 00F64F94
    • PostMessageA.USER32(00000000,00000012,00000000,00000000), ref: 00F65029
    • CreateCompatibleDC.GDI32(00000000), ref: 00F650E9
    • GetDeviceCaps.GDI32(?,0000000C), ref: 00F65102
    • LoadIconW.USER32(?,00000002), ref: 00F65194
    • LoadCursorA.USER32(?,00007F00), ref: 00F651AB
      • Part of subcall function 00F63360: GetModuleHandleA.KERNEL32(00000000,?,00000104,16B3F121), ref: 00F6339C
      • Part of subcall function 00F63360: GetModuleFileNameA.KERNEL32(00000000), ref: 00F633A3
      • Part of subcall function 00F63360: RegCreateKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00F633CA
      • Part of subcall function 00F63360: RegSetValueExA.ADVAPI32(?,StretchWare StchCtrl,00000000,00000001,?,?), ref: 00F63403
      • Part of subcall function 00F63360: GetLastError.KERNEL32 ref: 00F6340D
      • Part of subcall function 00F63360: RegCloseKey.ADVAPI32(?), ref: 00F6341C
      • Part of subcall function 00F63360: FormatMessageA.KERNEL32(00001000,00000000,00000000,00000000,?,00000104,00000000), ref: 00F63448
      • Part of subcall function 00F79743: ShowWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00F7C535), ref: 00F79754
    • UpdateWindow.USER32(?), ref: 00F6522F
      • Part of subcall function 00F6DBD1: _malloc.LIBCMT ref: 00F6DBEF
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CreateLoadMessageModuleWindow__strdup_free$CapsCloseCommandCompatibleCursorDeviceErrorFileFormatHandleIconLastLineNamePostShowUpdateValue_malloc
    • String ID: -INSTALL$-REMOVE$@Ls Fs$LastStretchTopic$Shelter Publications$StretchWare
    • API String ID: 630048173-134122987
    • Opcode ID: ceeac63e01d8015374d20e2384886fb8d2bff283b960ca02f883ff3869010260
    • Instruction ID: 6a0ef95314e3db5fc0218b1ad0140f699b89760a8ce8039e9850b8615ffb95f4
    • Opcode Fuzzy Hash: ceeac63e01d8015374d20e2384886fb8d2bff283b960ca02f883ff3869010260
    • Instruction Fuzzy Hash: 2EC1D271A006059FCB14EFB8CC92AAEB7B5BF44720F14462EE016E72C1EF399901DB91

    Control-flow Graph

    APIs
    • RegisterClipboardFormatA.USER32(01087DA8), ref: 00F6128B
    • GetLastError.KERNEL32(?,00000400,?,?,?), ref: 00F61296
    • RegisterClipboardFormatA.USER32(01087D94), ref: 00F612A5
    • GetLastError.KERNEL32(?,00000400,?,?,?), ref: 00F612B0
    • RegisterClipboardFormatA.USER32(01087D7C), ref: 00F612BF
    • GetLastError.KERNEL32(?,00000400,?,?,?), ref: 00F612CA
    • ?EnableHotKey@@YGXH@Z.STRETCHHOOK(00000001,?,00000400,?,?,?), ref: 00F61332
    • ?SetHotKey@@YGHHHHH@Z.STRETCHHOOK(00000000,00000000,00000000,00000000,?,00000400,?,?,?), ref: 00F61349
    • SetTimer.USER32(?,000004D2,00000064,00000000), ref: 00F6135C
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClipboardErrorFormatLastRegister$Key@@$EnableTimer
    • String ID: HotKey Enable$HotKey Keycode$HotKey Modifiers$Preferences
    • API String ID: 3990847425-1568940631
    • Opcode ID: 8e99ea68c8c15750f94410fb56df5b5b9cb541f4cd30a5872da2bf97dbf87624
    • Instruction ID: fa9a38cf3fb2aa542326f7435ebdf63548f11510bd98f2c71c3df17c685b11d9
    • Opcode Fuzzy Hash: 8e99ea68c8c15750f94410fb56df5b5b9cb541f4cd30a5872da2bf97dbf87624
    • Instruction Fuzzy Hash: B3310871710600ABD720EFB9DC51F5A77E8FB58764F20812AF694D7284DB76D800DB94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 587 f8ad6e-f8adb3 call f72a87 GetModuleFileNameA 590 f8adb9 call f7e0ed 587->590 591 f8adb5-f8adb7 587->591 592 f8adbe-f8add3 PathFindExtensionA 590->592 591->590 591->592 594 f8adda-f8adf9 call f8ad28 592->594 595 f8add5 call f7e0ed 592->595 599 f8adfb call f7e0ed 594->599 600 f8ae00-f8ae04 594->600 595->594 599->600 601 f8ae1f-f8ae23 600->601 602 f8ae06-f8ae18 call 106511a 600->602 605 f8ae58-f8ae5c 601->605 606 f8ae25-f8ae3d call f7b20c 601->606 602->601 612 f8ae1a call f720ef 602->612 607 f8ae5e-f8ae76 call f7b20c 605->607 608 f8ae97-f8aea1 605->608 622 f8ae48 606->622 623 f8ae3f-f8ae46 606->623 624 f8ae78-f8ae88 call 106511a 607->624 625 f8ae8a 607->625 613 f8aea3-f8aeb0 608->613 614 f8aef4-f8aef8 608->614 612->601 620 f8aeb9 613->620 621 f8aeb2-f8aeb7 613->621 618 f8aefa-f8af26 call 10650ad call f62de0 call 106511a 614->618 619 f8af2c-f8af3a call 1060bbe 614->619 618->612 618->619 627 f8aebe-f8aee5 call 1064b78 call f62de0 call 106511a 620->627 621->627 628 f8ae4b-f8ae56 call 106511a 622->628 623->628 631 f8ae91-f8ae95 624->631 625->631 627->612 647 f8aeeb-f8aef1 627->647 628->605 628->612 631->608 631->612 647->614
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: __strdup$ExtensionFileFindModuleNamePath_strcat_s_strcpy_s
    • String ID: .CHM$.HLP$.INI
    • API String ID: 3308358609-4017452060
    • Opcode ID: 40215842c3c6ff34514654adb7c6845e7a3648cc5118408f16b1372675a61afa
    • Instruction ID: 9dab677ba47fa490db7278e96674beafeb0ff0e8ba8edae07bd8fd447f4c1f8c
    • Opcode Fuzzy Hash: 40215842c3c6ff34514654adb7c6845e7a3648cc5118408f16b1372675a61afa
    • Instruction Fuzzy Hash: 2C516AB19007199AEB31FB65CC44BDAB7ECEB04314F0048ABE585D7141EBB4E984DB62

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 648 f63c00-f63c2e GetModuleHandleA FindResourceA 649 f63c34-f63c5a SizeofResource LoadResource LockResource 648->649 650 f63cdb-f63ce8 call f62b70 648->650 652 f63c66-f63c77 649->652 653 f63c5c-f63c61 call f61000 649->653 658 f63cf2-f63d2e call f80850 call f807c5 650->658 654 f63c81-f63c86 652->654 655 f63c79-f63c7c call f61b20 652->655 653->652 654->653 660 f63c88-f63ca1 call 1061500 654->660 655->654 664 f63cb6-f63cb8 660->664 665 f63ca3-f63caa 660->665 664->653 668 f63cba-f63cbf 664->668 667 f63cac-f63cb3 call 1061280 665->667 665->668 667->664 668->653 670 f63cc1-f63cd9 668->670 670->658
    APIs
    • GetModuleHandleA.KERNEL32(StretchRes,?,?,00000000,?,?,00F64335), ref: 00F63C11
    • FindResourceA.KERNEL32(00000000,000000C8,Stsq), ref: 00F63C24
    • SizeofResource.KERNEL32(00000000,00000000,?,00F64335), ref: 00F63C36
    • LoadResource.KERNEL32(00000000,00000000,?,00F64335), ref: 00F63C40
    • LockResource.KERNEL32(00000000,?,00F64335), ref: 00F63C47
    • _memmove.LIBCMT ref: 00F63C94
    • _strnlen.LIBCMT ref: 00F63CAE
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Resource$FindHandleLoadLockModuleSizeof_memmove_strnlen
    • String ID: Preferences$Sequence$Sequence Index$StretchRes$Stsq
    • API String ID: 924897836-2695636484
    • Opcode ID: e54fa638843107551d7c3c474af4ae10ff857ff7c58cd04b63dd9e5c60992c05
    • Instruction ID: 9889dd127759c55ca4a1f12ec473f0b68cedf34a271cfe1dda812552d3560c7e
    • Opcode Fuzzy Hash: e54fa638843107551d7c3c474af4ae10ff857ff7c58cd04b63dd9e5c60992c05
    • Instruction Fuzzy Hash: C3311031B016019FD310EB68CC88E2EBBE9FF88360F248169F5959B341DB74AD119BD0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 674 f62fc0-f62fd2 675 f63093-f63098 674->675 676 f62fd8-f63001 RegOpenKeyExA 674->676 677 f63065-f63070 676->677 678 f63003-f63027 RegCreateKeyExA 676->678 680 f63075-f6307a 677->680 681 f63072-f63073 RegCloseKey 677->681 678->677 679 f63029-f63047 RegCreateKeyExA 678->679 679->677 682 f63049-f63063 RegCreateKeyExA 679->682 683 f6307f-f63084 680->683 684 f6307c-f6307d RegCloseKey 680->684 681->680 682->677 685 f63086-f63087 RegCloseKey 683->685 686 f63089-f63092 683->686 684->683 685->686 686->675
    APIs
    • RegOpenKeyExA.KERNELBASE(80000002,Software,00000000,0002001F,?), ref: 00F62FF9
    • RegCreateKeyExA.ADVAPI32(?,Shelter Publications,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00F63023
    • RegCreateKeyExA.ADVAPI32(?,Stretch,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00F63043
    • RegCreateKeyExA.ADVAPI32(?,StretchWare,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00F63063
    • RegCloseKey.ADVAPI32(?), ref: 00F63073
    • RegCloseKey.ADVAPI32(?), ref: 00F6307D
    • RegCloseKey.ADVAPI32(?), ref: 00F63087
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CloseCreate$Open
    • String ID: Shelter Publications$Software$Stretch$StretchWare
    • API String ID: 1740278721-25447048
    • Opcode ID: dae87b6c479a26aeae6957873a7f82a76f509e002b47e20c62d5c984812cbca3
    • Instruction ID: 01ffe817f352833d53970a720cd58102a54de3bdde7c7a1bae42694b77943d59
    • Opcode Fuzzy Hash: dae87b6c479a26aeae6957873a7f82a76f509e002b47e20c62d5c984812cbca3
    • Instruction Fuzzy Hash: 55216076E00219BADB20DB9ACC88DAFBBBCEBC5B04B10405EF544E710AD6705A04DB70

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 687 f848c7-f848e8 EnterCriticalSection 688 f848ea-f848f1 687->688 689 f848f7-f848fc 687->689 688->689 690 f849b5-f849b8 688->690 691 f84919-f84921 689->691 692 f848fe-f84901 689->692 694 f849ba-f849bd 690->694 695 f849c0-f849de LeaveCriticalSection 690->695 696 f84938-f8495c GlobalHandle GlobalUnlock call f7b437 GlobalReAlloc 691->696 697 f84923-f84936 call f7b437 GlobalAlloc 691->697 693 f84904-f84907 692->693 698 f84909-f8490f 693->698 699 f84911-f84913 693->699 694->695 704 f84962-f84964 696->704 697->704 698->693 698->699 699->690 699->691 705 f84989-f849b2 GlobalLock call 1060c50 704->705 706 f84966-f8496b 704->706 705->690 708 f8497b-f84984 LeaveCriticalSection call f720ef 706->708 709 f8496d-f84975 GlobalHandle GlobalLock 706->709 708->705 709->708
    APIs
    • EnterCriticalSection.KERNEL32(010D3144,?,?,?,010D3128,010D3128,?,00F84D02,00000004,00F72A96,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F848DA
    • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,010D3128,010D3128,?,00F84D02,00000004,00F72A96,00F72143,00F72ABF,00F7B84A,00F632F6), ref: 00F84930
    • GlobalHandle.KERNEL32(008A2688), ref: 00F84939
    • GlobalUnlock.KERNEL32(00000000,?,?,?,010D3128,010D3128,?,00F84D02,00000004,00F72A96,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F84943
    • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 00F8495C
    • GlobalHandle.KERNEL32(008A2688), ref: 00F8496E
    • GlobalLock.KERNEL32(00000000,?,?,?,010D3128,010D3128,?,00F84D02,00000004,00F72A96,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F84975
    • LeaveCriticalSection.KERNEL32(?,?,?,?,010D3128,010D3128,?,00F84D02,00000004,00F72A96,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F8497E
    • GlobalLock.KERNEL32(00000000,?,?,?,010D3128,010D3128,?,00F84D02,00000004,00F72A96,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F8498A
    • _memset.LIBCMT ref: 00F849A4
    • LeaveCriticalSection.KERNEL32(?), ref: 00F849D2
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
    • String ID:
    • API String ID: 496899490-0
    • Opcode ID: d7fb938f7bd4600192eabd3320284542e9249b867cb546482a433e0c169a037c
    • Instruction ID: d920d49056a20fad900cce10807a0d042ac51596a25c997226f73497b1e79ecc
    • Opcode Fuzzy Hash: d7fb938f7bd4600192eabd3320284542e9249b867cb546482a433e0c169a037c
    • Instruction Fuzzy Hash: 7931CD72A04705AFD731AF68DC89A9FBBF8EF44310B118929E5C6D3644DB39F8408B60

    Control-flow Graph

    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00F774D8
    • GetPropA.USER32(?,AfxOldWndProc423), ref: 00F774F0
    • CallWindowProcA.USER32(?,?,00000110,?,?), ref: 00F7755C
      • Part of subcall function 00F7608D: GetWindowRect.USER32(?,?), ref: 00F760D0
      • Part of subcall function 00F7608D: GetWindow.USER32(?,00000004), ref: 00F760ED
    • SetWindowLongA.USER32(?,000000FC,?), ref: 00F77583
    • RemovePropA.USER32(?,AfxOldWndProc423), ref: 00F7758B
    • GlobalFindAtomA.KERNEL32(AfxOldWndProc423), ref: 00F77592
    • GlobalDeleteAtom.KERNEL32(?), ref: 00F7759C
      • Part of subcall function 00F744D3: GetWindowRect.USER32(?,?), ref: 00F744E2
    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00F775EF
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prolog3_catch_LongRemove
    • String ID: AfxOldWndProc423
    • API String ID: 3351853316-1060338832
    • Opcode ID: ffaacdb6334dab1d3e50db55f77db1caf13054dcfdafefba969c206dd97ec504
    • Instruction ID: f5cb4692d8876ae97b6cce905113607d920a06a81f68ee1cbc5d8a3e5d667f31
    • Opcode Fuzzy Hash: ffaacdb6334dab1d3e50db55f77db1caf13054dcfdafefba969c206dd97ec504
    • Instruction Fuzzy Hash: 0B316F71C14219ABCB15AFB8DC48DEEBEB8FF08310F14811AF95AB2255C7398910EB65

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 843 f634e0-f6352f GetModuleHandleA GetModuleFileNameA call 1061234 846 f63531-f63542 843->846 846->846 847 f63544-f6354c 846->847 848 f63550-f63555 847->848 848->848 849 f63557-f63561 848->849 850 f63562-f63568 849->850 850->850 851 f6356a-f63580 850->851 852 f63581-f63587 851->852 852->852 853 f63589-f635d0 CreateFileA GetLastError 852->853 854 f635d2-f635ea CloseHandle call 1060bbe 853->854 855 f635eb-f63604 call 1060bbe 853->855
    APIs
    • GetModuleHandleA.KERNEL32(00000000,?,00000100), ref: 00F63501
    • GetModuleFileNameA.KERNEL32(00000000), ref: 00F63508
    • __wsplitpath.LIBCMT ref: 00F63527
      • Part of subcall function 01061234: __splitpath_helper.LIBCMT ref: 01061276
    • CreateFileA.KERNELBASE(?,00000000,00000000,00000000,00000003,00000000,00000000), ref: 00F635B6
    • GetLastError.KERNEL32 ref: 00F635BE
    • CloseHandle.KERNEL32(00000000), ref: 00F635D3
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: FileHandleModule$CloseCreateErrorLastName__splitpath_helper__wsplitpath
    • String ID: stretch.exe
    • API String ID: 3286411828-1584523231
    • Opcode ID: fee31cc7af37bf0ba2bccb0876e0a9fd3022aa1b04f7a7b468b39d23e99d9783
    • Instruction ID: f8bc2839d6ef060658822b2ff348e4bfc30372a0cd9384c3aa9a8e2643707a40
    • Opcode Fuzzy Hash: fee31cc7af37bf0ba2bccb0876e0a9fd3022aa1b04f7a7b468b39d23e99d9783
    • Instruction Fuzzy Hash: E3314975A002095BC724DB689C54BEE77E4EB98310F1481E9EAD6D7284EF719E44CB90

    Control-flow Graph

    APIs
    • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00F84E90
    • GetSystemMetrics.USER32(0000000C), ref: 00F84E97
    • GetSystemMetrics.USER32(00000002), ref: 00F84E9E
    • GetSystemMetrics.USER32(00000003), ref: 00F84EA8
    • GetDC.USER32(00000000), ref: 00F84EB2
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F84EC3
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F84ECB
    • ReleaseDC.USER32(00000000,00000000), ref: 00F84ED3
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
    • String ID:
    • API String ID: 1031845853-0
    • Opcode ID: cb4685dcdf6d0fa350b696926250ff2c20b7a5ed675966978609763a931d87ff
    • Instruction ID: 6e6fb4cc832ce3bd0c3eb53f78b1500e8dc4ca4323e0afe228c2b9d1c9f2b769
    • Opcode Fuzzy Hash: cb4685dcdf6d0fa350b696926250ff2c20b7a5ed675966978609763a931d87ff
    • Instruction Fuzzy Hash: 20F062B1E44714AAE7205B719C49B1B7F64FB40761F104426E6858B184CBBA9801CFD0
    APIs
    • __EH_prolog3.LIBCMT ref: 00F8099C
    • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,00000000,?,00000010), ref: 00F809F3
    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F80A1A
      • Part of subcall function 00F6DBD1: _malloc.LIBCMT ref: 00F6DBEF
    • RegQueryValueExA.KERNELBASE(?,?,00000000,?,00000000,?,00000000,16B3F121,?,00000000,?,00000000,0107AC7A,000000FF,?,80070057), ref: 00F80B97
    • RegQueryValueExA.KERNELBASE(?,?,00000000,?,00000000,?,?,?,80070057), ref: 00F80BD0
    • RegCloseKey.KERNELBASE(?,?,80070057), ref: 00F80BEB
    • GetPrivateProfileStringA.KERNEL32(?,?,?,?,00001000,?), ref: 00F80C54
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: QueryValue$CloseH_prolog3PrivateProfileString_malloc
    • String ID:
    • API String ID: 900355960-0
    • Opcode ID: 49c82b906e63423240f9cfea7f9fcc8fbfee3505a0803685d52e2315e9b21b19
    • Instruction ID: e6a1cc12966a4cfc9d598733450796d987bcfb7749a83c9262c0d325c5501317
    • Opcode Fuzzy Hash: 49c82b906e63423240f9cfea7f9fcc8fbfee3505a0803685d52e2315e9b21b19
    • Instruction Fuzzy Hash: 72919171D00269AFCB25EF24CC449EEBBB8FF08310F50459AF45997251DB789A84EFA0
    APIs
    • RegOpenKeyExA.KERNELBASE(80000001,software,00000000,0002001F,?), ref: 00F8067E
    • RegCreateKeyExA.KERNELBASE(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00F806A9
    • RegCreateKeyExA.KERNELBASE(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00F806D4
    • RegCloseKey.KERNELBASE(?), ref: 00F806E8
    • RegCloseKey.ADVAPI32(?), ref: 00F806F2
      • Part of subcall function 00F80568: GetModuleHandleA.KERNEL32(Advapi32.dll), ref: 00F8057A
      • Part of subcall function 00F80568: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedA), ref: 00F8058A
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CloseCreate$AddressHandleModuleOpenProc
    • String ID: software
    • API String ID: 550756860-2010147023
    • Opcode ID: 4acf2e6f23e106dc9ffae0dc8eb94eaa9f8ed5d3a9470b87f2b80f5d58a075ad
    • Instruction ID: e7674a1618b4ce4bea334091f7197f7d3598d7b187faf3166256a01437e03f14
    • Opcode Fuzzy Hash: 4acf2e6f23e106dc9ffae0dc8eb94eaa9f8ed5d3a9470b87f2b80f5d58a075ad
    • Instruction Fuzzy Hash: 41214C32D04008FB8B61AA85CC88CEFBFBEEFC5710B64006AF545A6015EA315E58EF60
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00F72252
    • SetLastError.KERNEL32(0000006F), ref: 00F72269
    • CreateActCtxWWorker.KERNEL32(?), ref: 00F722B1
    • CreateActCtxWWorker.KERNEL32(00000020), ref: 00F722CF
    • CreateActCtxWWorker.KERNEL32(00000020), ref: 00F722F1
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CreateWorker$ErrorFileLastModuleName
    • String ID:
    • API String ID: 3218422885-3916222277
    • Opcode ID: 8df1be45d90b052085b69edece9c3bba42493425d0bb7231c50aac561fbc3e5f
    • Instruction ID: 7944791d526b5a6be6f1fac40852260af6d673dc789dd7397ca77e814b381959
    • Opcode Fuzzy Hash: 8df1be45d90b052085b69edece9c3bba42493425d0bb7231c50aac561fbc3e5f
    • Instruction Fuzzy Hash: 7D214C708002189EDB60DF75D8487EEB7F8BF58324F10869AD0A9D2190DB785A85DF61
    APIs
    • __EH_prolog3.LIBCMT ref: 0100641A
      • Part of subcall function 00F890B9: EnterCriticalSection.KERNEL32(010D35D8,?,?,?,?,00F847F0,00000010,00000008,00F72AB5,00F72A4C,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F890F3
      • Part of subcall function 00F890B9: InitializeCriticalSection.KERNEL32(?,?,?,?,?,00F847F0,00000010,00000008,00F72AB5,00F72A4C,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F89105
      • Part of subcall function 00F890B9: LeaveCriticalSection.KERNEL32(010D35D8,?,?,?,?,00F847F0,00000010,00000008,00F72AB5,00F72A4C,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F89112
      • Part of subcall function 00F890B9: EnterCriticalSection.KERNEL32(?,?,?,?,?,00F847F0,00000010,00000008,00F72AB5,00F72A4C,00F72143,00F72ABF,00F7B84A,00F632F6,?,00F6163B), ref: 00F89122
    • GetProfileIntA.KERNEL32(windows,DragMinDist,00000002), ref: 01006472
    • GetProfileIntA.KERNEL32(windows,DragDelay,000000C8), ref: 01006484
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
    • String ID: DragDelay$DragMinDist$windows
    • API String ID: 3965097884-2101198082
    • Opcode ID: 728f0f5a312bdb9b3f48ce406a68e035c40b7734784bc7cdc5b79375c6b74777
    • Instruction ID: b6ded618bbec66fad331eafe0ccaf873d1dd082df0450eb356f5bb716f7e6913
    • Opcode Fuzzy Hash: 728f0f5a312bdb9b3f48ce406a68e035c40b7734784bc7cdc5b79375c6b74777
    • Instruction Fuzzy Hash: A6017CB0985B408BE721AF2A8D9160AFBE9BFA4700F90490EE5C59B655DBF961018B05
    APIs
    • RegDeleteKeyA.ADVAPI32(00000000,?), ref: 00F80878
    • RegDeleteValueA.ADVAPI32(00000000,?), ref: 00F80897
    • RegCloseKey.ADVAPI32(00000000), ref: 00F808C1
      • Part of subcall function 00F80643: RegCloseKey.KERNELBASE(?), ref: 00F806E8
      • Part of subcall function 00F80643: RegCloseKey.ADVAPI32(?), ref: 00F806F2
    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00F808DC
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Close$Delete$PrivateProfileStringValueWrite
    • String ID:
    • API String ID: 1330817964-0
    • Opcode ID: dd118bcdb4013ee70eac75e206468d331ded3da1941cf92aa7687ddc8643270b
    • Instruction ID: 52e4a7f0f2cdb8ec737fc2674b4760c4a514163e3719aef1b08d2a498be30003
    • Opcode Fuzzy Hash: dd118bcdb4013ee70eac75e206468d331ded3da1941cf92aa7687ddc8643270b
    • Instruction Fuzzy Hash: C8115E37804155FFCF613FA0CC889EE3B69EF05361B608438FA5555014CB368D96BB90
    APIs
    • __EH_prolog3.LIBCMT ref: 00FF2A06
    • CreateCompatibleDC.GDI32(00000000), ref: 00FF2AD1
    • CreateCompatibleDC.GDI32(00000000), ref: 00FF2ADD
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CompatibleCreate$H_prolog3
    • String ID: @Ls Fs
    • API String ID: 2193723985-1589975592
    • Opcode ID: 44fb8ca718762b625ef103dca4317f6cd78ed1301b2d328e294594af17736e0f
    • Instruction ID: f4f3e318b3d8863230470b40c4dd67969fac1d4dfb9bb0f680bb064c3c26a301
    • Opcode Fuzzy Hash: 44fb8ca718762b625ef103dca4317f6cd78ed1301b2d328e294594af17736e0f
    • Instruction Fuzzy Hash: 0D51BFB0911365CFCB58DF69C8812997BB8BF09B00F1481ABED49DF25ADBB88540DF91
    APIs
    • ?GetLastMouseTime@@YGJXZ.STRETCHHOOK(?,?,?,00F6173C), ref: 00F626B5
    • ?GetLastKeystrokeTime@@YGJXZ.STRETCHHOOK(?,?,?,00F6173C), ref: 00F626BD
    • MessageBeep.USER32(00000030), ref: 00F62737
    • MessageBeep.USER32(00000030), ref: 00F627C3
      • Part of subcall function 00F62050: FindWindowA.USER32(StretchWareAppClass,00000000), ref: 00F62057
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: BeepLastMessageTime@@$FindKeystrokeMouseWindow
    • String ID:
    • API String ID: 260692530-0
    • Opcode ID: fbc73143d27c44e0ca08a85697af7eb0f6f3a0e435cd05f5f2f81362ff759c44
    • Instruction ID: c349b9f2c013bcb7f29f86bd0dbf8091822506bfad93f5785be4f015a1fe6a0b
    • Opcode Fuzzy Hash: fbc73143d27c44e0ca08a85697af7eb0f6f3a0e435cd05f5f2f81362ff759c44
    • Instruction Fuzzy Hash: 3D410831D05F054BE7F09F28EC467697254EB5033AF180125FC9AA61DEEF2E8480E761
    APIs
    • CreateMutexA.KERNELBASE(00000000,00000000,16B3F121,010883F0,00000000,16B3F121), ref: 00F670A5
    • WaitForSingleObject.KERNEL32(00000000,00000001), ref: 00F670B1
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CreateMutexObjectSingleWait
    • String ID: SingleApplicationMutex
    • API String ID: 3113225513-1050641058
    • Opcode ID: fd1dd565e52030c1eea6d4bb673df630b222e5f5a379c4bca11af29374d637cb
    • Instruction ID: bb260e3bc9a12da82fd173857bf79b5d4ff1537afa392a6edb8da226c70ca594
    • Opcode Fuzzy Hash: fd1dd565e52030c1eea6d4bb673df630b222e5f5a379c4bca11af29374d637cb
    • Instruction Fuzzy Hash: 86218EB1A08705AFE720DF58CC46B5ABBE8EB44724F10861EF569CB291D7B5A940CB90
    APIs
    • FindResourceW.KERNEL32(00F64C06,0108877A,00000006,0108877A,?,?,?,00F649FE,00000000,?,?,?,00F64C06), ref: 00F61C0B
      • Part of subcall function 00F61020: LoadResource.KERNEL32(00F7B459,?,?,00000000,?,00F7B459,?,00F7B459,00000000), ref: 00F6102D
    • WideCharToMultiByte.KERNELBASE(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,?,00F64C06), ref: 00F61C46
    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,?,00000000,00000000,00000000,?,00F64C06), ref: 00F61C8B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ByteCharMultiResourceWide$FindLoad
    • String ID:
    • API String ID: 861045882-0
    • Opcode ID: 3daae7fb0bd9e4a9bb0d74de06240543cb2652516e2a4fa39fd99984edf61450
    • Instruction ID: a0a58b13efcfe7028a716c53230b60a09b640026929a218321ae2dd3b6e0f813
    • Opcode Fuzzy Hash: 3daae7fb0bd9e4a9bb0d74de06240543cb2652516e2a4fa39fd99984edf61450
    • Instruction Fuzzy Hash: 4821A132741220BFE7209A18DC99FBBB798FB45760F14401AF944EF3C4D6B5AC4197A0
    APIs
    • RegOpenKeyExA.KERNELBASE(80000001,010CBEF4,00000000,00000001,?), ref: 00F7F29E
    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,00000004), ref: 00F7F2BE
    • RegCloseKey.ADVAPI32(?), ref: 00F7F302
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID:
    • API String ID: 3677997916-0
    • Opcode ID: e6ed33b3580134a541ea27b17cb0cf2651bd554f0b393d7fade57fd00dd32de2
    • Instruction ID: 5e7fc57f3a3141c79122ea8e7b1b1840de116edfef9e47923ea709950a5a4e15
    • Opcode Fuzzy Hash: e6ed33b3580134a541ea27b17cb0cf2651bd554f0b393d7fade57fd00dd32de2
    • Instruction Fuzzy Hash: 3C214C75D00208EFDB15CF95D889AAEBBB8EF80710F3080AFE44AA6145D7715E48DF12
    APIs
    • RegSetValueExA.KERNELBASE(00000000,?,00000000,00000004,?,00000004), ref: 00F80802
    • RegCloseKey.ADVAPI32(00000000), ref: 00F8080B
    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00F80839
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClosePrivateProfileStringValueWrite
    • String ID:
    • API String ID: 219906979-0
    • Opcode ID: 96b58400b602e7f997fbbe0de53408ca5417679ba09ba140323bdc093923f5ae
    • Instruction ID: 35d9509ccc042aaecee44d387baf53c39068720ba36e590ab4ccdb9c432f3dca
    • Opcode Fuzzy Hash: 96b58400b602e7f997fbbe0de53408ca5417679ba09ba140323bdc093923f5ae
    • Instruction Fuzzy Hash: 1C010432900209BBD720AF648C41FBF73ACEF48714F140429F541A7184DF75ED0497A0
    APIs
    • RegQueryValueExA.KERNELBASE(00000000,?,00000000,?,?,?), ref: 00F80795
    • RegCloseKey.ADVAPI32(00000000), ref: 00F8079E
    • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00F807BA
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClosePrivateProfileQueryValue
    • String ID:
    • API String ID: 1423431592-0
    • Opcode ID: d0de047d31f71d72fc8fccec1cf38bab93a52c835870f1551046f75470628bdf
    • Instruction ID: 5b4480a0988eb84f1a892cd643bdfd33dc95d8b91cc15c706cf743180bb6de64
    • Opcode Fuzzy Hash: d0de047d31f71d72fc8fccec1cf38bab93a52c835870f1551046f75470628bdf
    • Instruction Fuzzy Hash: 3D014B76500118FFDB22AF90CC84FDE7B6DEB04764F604015FA059A054EB75EA59AF90
    APIs
    • GetMessageA.USER32(00000030,00000000,00000000,00000000), ref: 00F7BC67
    • TranslateMessage.USER32(00000030), ref: 00F7BC86
    • DispatchMessageA.USER32(00000030), ref: 00F7BC8D
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Message$DispatchTranslate
    • String ID:
    • API String ID: 1706434739-0
    • Opcode ID: 48810279a89abcb7e50814986efa76fdf30ffc167ec0c5122c078d694755fccb
    • Instruction ID: c5e2cf0a54a27ad14b861888de57bc500aa21f15910e337a10e6b012cfb49e32
    • Opcode Fuzzy Hash: 48810279a89abcb7e50814986efa76fdf30ffc167ec0c5122c078d694755fccb
    • Instruction Fuzzy Hash: 22F05E32614502AFA3266A30AD48F7F37ACEFC2721315C06EF44AD6405DF29DC02EB62
    APIs
    • LoadLibraryA.KERNELBASE(StretchRes.dll,?,00000004,00000064,Function_00001B80,Function_00001B00,?,00F64A8A,00000000,16B3F121), ref: 00F65AF2
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: StretchRes.dll
    • API String ID: 1029625771-1347602766
    • Opcode ID: c09a6119ad901402a54edc9a049a6cc95b6e4c1dc66c9edc4b8d2bfe866e7982
    • Instruction ID: 1664c2f18a3bc4a6fa04af510536bcd024cc7bb847293956de2879fb6298b3cf
    • Opcode Fuzzy Hash: c09a6119ad901402a54edc9a049a6cc95b6e4c1dc66c9edc4b8d2bfe866e7982
    • Instruction Fuzzy Hash: CEE012B1A457109FC3A0EF799C05FC67AE8EB84B61F40492AB2DDD7140E7B5A440CB65
    APIs
    • __EH_prolog3.LIBCMT ref: 00F706B2
      • Part of subcall function 00F61BF0: FindResourceW.KERNEL32(00F64C06,0108877A,00000006,0108877A,?,?,?,00F649FE,00000000,?,?,?,00F64C06), ref: 00F61C0B
    • GetMenu.USER32(?), ref: 00F7077F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: FindH_prolog3MenuResource
    • String ID:
    • API String ID: 1047964904-0
    • Opcode ID: 9e02c6c090bea708207ad48ba9b7e01309b46867da2023d6ac374ccd4b6e32dd
    • Instruction ID: d22dc9f6a0e5e238b10c0746b3b30effb930bdd718d102278ccdec8d6315b4ef
    • Opcode Fuzzy Hash: 9e02c6c090bea708207ad48ba9b7e01309b46867da2023d6ac374ccd4b6e32dd
    • Instruction Fuzzy Hash: FB31E031A00209EBDB25AF30CC41FAF7AA8FF44750F00841AF95AA7291DB75A901EB51
    APIs
    • LoadMenuA.USER32(?,?), ref: 00F70811
    • DestroyMenu.USER32(?,?,?,?,?,?,?,?,?), ref: 00F7088C
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Menu$DestroyLoad
    • String ID:
    • API String ID: 588275208-0
    • Opcode ID: 6f2a6e242a171da46c754ec87035ae28b2791d87ac33baddb6a92804e421c385
    • Instruction ID: f4f1fab4b8562ba59d7fed097adf642b75fc5780fd29d2af0eb58e01ab177945
    • Opcode Fuzzy Hash: 6f2a6e242a171da46c754ec87035ae28b2791d87ac33baddb6a92804e421c385
    • Instruction Fuzzy Hash: 64212C75500109EFCF11DF64C848CAE7BB5FF88360B148066F85997211DA35DD21EF91
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: _memmove_s
    • String ID:
    • API String ID: 800865076-0
    • Opcode ID: 0d2e4c0e4e7b1fa12090d1e028ec0bce9e235b54f3cfb2b6176c53ad4bd2838d
    • Instruction ID: 647c1675ecfda590ffb9cb58308d90bb491bc72fa2b2b77badcb014a13fbf7aa
    • Opcode Fuzzy Hash: 0d2e4c0e4e7b1fa12090d1e028ec0bce9e235b54f3cfb2b6176c53ad4bd2838d
    • Instruction Fuzzy Hash: 3711C132601915AFDB04EF58DD98E6EF7A9EF94370B00815AF8049F328DA35AC40ABD0
    APIs
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00F7B95E
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00F7B9AD
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessagePeek
    • String ID:
    • API String ID: 2222842502-0
    • Opcode ID: ce55cf0f1a502ab7815876540d66926290fa54673e9136a0ce7103821575b558
    • Instruction ID: 0d95a02dd1478b54694bc6101488feb9bdbae49d5103ff2b492fdd368cc1f940
    • Opcode Fuzzy Hash: ce55cf0f1a502ab7815876540d66926290fa54673e9136a0ce7103821575b558
    • Instruction Fuzzy Hash: DC114230E00214EBDB219F66CC48F5FBFBCEFD5755B10809AE65593201D7358900DB61
    APIs
    • _strncpy.LIBCMT ref: 00F654B2
    • Shell_NotifyIconA.SHELL32(00000002,00000150,00000130,?,?,00F656D1,00000000,00000000,00000000,?,?,00F65775,0000008E), ref: 00F654D9
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: IconNotifyShell__strncpy
    • String ID:
    • API String ID: 286316210-0
    • Opcode ID: 280af667a9840d04c5ce075f8b99ca1d6ae91b3f9da87fb307941edca64256fd
    • Instruction ID: 49bb680a3d3470968837bed149b9e0d2540b7c993386b2034f73986e49bb8b8a
    • Opcode Fuzzy Hash: 280af667a9840d04c5ce075f8b99ca1d6ae91b3f9da87fb307941edca64256fd
    • Instruction Fuzzy Hash: 2311C272901B008FE774CA19D1447A7B7E8BB50B22F04556ED4C796980DBB4F8C9DF10
    APIs
    • SendMessageA.USER32(?,00000111,00000002,00000000), ref: 00F61482
    • GetTickCount.KERNEL32 ref: 00F61488
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CountMessageSendTick
    • String ID:
    • API String ID: 3168085573-0
    • Opcode ID: 293eb0ba2e51261c39d624172ba6d58168e79c3e92dd1a679a0bfe4aad14bb0d
    • Instruction ID: 4676ad6a7523a38ceb94ce59df4cac091cea94bf48952333ebf7d8b5da9a07a5
    • Opcode Fuzzy Hash: 293eb0ba2e51261c39d624172ba6d58168e79c3e92dd1a679a0bfe4aad14bb0d
    • Instruction Fuzzy Hash: 0801D6712006048BD728EB24EC86BEA77D4BF01B54F488469EA8A5B196CE799850E7A1
    APIs
      • Part of subcall function 00F80643: RegCloseKey.KERNELBASE(?), ref: 00F806E8
      • Part of subcall function 00F80643: RegCloseKey.ADVAPI32(?), ref: 00F806F2
    • RegCloseKey.ADVAPI32(00000000), ref: 00F80749
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Close
    • String ID:
    • API String ID: 3535843008-0
    • Opcode ID: e36992c144660fa793eea3dacf1a6dc2229fe7c1e63a8b121d0aabbc9f2b6587
    • Instruction ID: 7af6a0a3043ef159b2712f5f1eb82456ce4d0dbac9b92781cf97475c2e7859f0
    • Opcode Fuzzy Hash: e36992c144660fa793eea3dacf1a6dc2229fe7c1e63a8b121d0aabbc9f2b6587
    • Instruction Fuzzy Hash: A0F09037901028FB8B62AB51CC49CEF7FACEF8A7B0B504015F50986001DA74AA06EFB0
    APIs
    • SetErrorMode.KERNELBASE(00000000), ref: 00F8AF49
    • SetErrorMode.KERNELBASE(00000000), ref: 00F8AF51
      • Part of subcall function 00F7221F: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00F72252
      • Part of subcall function 00F7221F: SetLastError.KERNEL32(0000006F), ref: 00F72269
      • Part of subcall function 00F8AD6E: GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 00F8ADAB
      • Part of subcall function 00F8AD6E: PathFindExtensionA.KERNELBASE(?), ref: 00F8ADC5
      • Part of subcall function 00F8AD6E: __strdup.LIBCMT ref: 00F8AE0D
      • Part of subcall function 00F8AD6E: __strdup.LIBCMT ref: 00F8AE4B
      • Part of subcall function 00F8AD6E: __strdup.LIBCMT ref: 00F8AE7F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Error__strdup$FileModeModuleName$ExtensionFindLastPath
    • String ID:
    • API String ID: 3517913719-0
    • Opcode ID: 5b73d451014da4bd1c4270efdd26213546b007615d3aa83abed50c96b59c943b
    • Instruction ID: d9e2650feedd86cd869d24a2db39eb4d294fdf289f4f23a9d75238db2db79c7f
    • Opcode Fuzzy Hash: 5b73d451014da4bd1c4270efdd26213546b007615d3aa83abed50c96b59c943b
    • Instruction Fuzzy Hash: 62F049B5A102555FEBA1BF649805E9D3B98EF44320B06805BF6488B252DA38D840DBA3
    APIs
    • ActivateActCtx.KERNEL32(?,?,010BAE60,00000010), ref: 00F74176
    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F741AE
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ActivateCreateWindow
    • String ID:
    • API String ID: 2169890993-0
    • Opcode ID: d5fec1f02560671dda5edac94879e847f42dfd23b04e24aed2aeca34331d60b8
    • Instruction ID: a28aa27b9489c99b5f66fb9b6e540e92ae0291d67e09c67b7404f72fd11f17e1
    • Opcode Fuzzy Hash: d5fec1f02560671dda5edac94879e847f42dfd23b04e24aed2aeca34331d60b8
    • Instruction Fuzzy Hash: 0401C07280021AEBCF12AFA4CD049DD7B76BF1C710F508615FAA8A2120C77A99A1EF40
    APIs
      • Part of subcall function 00F84CAE: __EH_prolog3.LIBCMT ref: 00F84CB5
    • GetCurrentThreadId.KERNEL32 ref: 00F778AE
    • SetWindowsHookExA.USER32(00000005,00F77638,00000000,00000000), ref: 00F778BE
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3$CurrentException@8HookThreadThrowWindows
    • String ID:
    • API String ID: 1415497866-0
    • Opcode ID: a77fbb4c172d89826243bdd14df3faed40e7126a8ba4a69462f53174dfd18394
    • Instruction ID: e0926d2af53c57cf404c571be19b363605a712429143ea67f9c3e4d55bcb0949
    • Opcode Fuzzy Hash: a77fbb4c172d89826243bdd14df3faed40e7126a8ba4a69462f53174dfd18394
    • Instruction Fuzzy Hash: 0FF0E231A5970097C2303A95DC09B1B7698EB84B71F60813BF64D46544EA74E844D7B3
    APIs
    • DefWindowProcA.USER32(?,?,?,?), ref: 00F7321F
    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00F73234
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ProcWindow$Call
    • String ID:
    • API String ID: 2316559721-0
    • Opcode ID: 319ab6edad9b6e1c3db72592c4499e78cb8b4f7ee733dea364e8e799969cccea
    • Instruction ID: 47eb341d321d42faad51555c951b34991921e6a6f25a8c26e6853c6375dd84ac
    • Opcode Fuzzy Hash: 319ab6edad9b6e1c3db72592c4499e78cb8b4f7ee733dea364e8e799969cccea
    • Instruction Fuzzy Hash: A4F01C36104209FFCF215F99DC04DAA7BBAFF1C361B148469F99986525D732D920FB50
    APIs
    • ActivateActCtx.KERNEL32(?,00000000,010BAEC0,00000010,00FA33A9,UxTheme.dll,751E6BA0,?,00FA346A,00000004,00F8E32D,00000000,00000004,00FEE906), ref: 00F74332
    • LoadLibraryW.KERNELBASE(00000020,?,00FA346A,00000004,00F8E32D,00000000,00000004,00FEE906,?,?,0109A46C), ref: 00F74349
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ActivateLibraryLoad
    • String ID:
    • API String ID: 389599620-0
    • Opcode ID: 42258dc8e89f9693a14e04f11427bb629ef6beb023a34d4255f828fe652ce7f5
    • Instruction ID: dab9901d6d12f2ad4508d96537181c2aa555813a1d68636703bfd3b3257b32cd
    • Opcode Fuzzy Hash: 42258dc8e89f9693a14e04f11427bb629ef6beb023a34d4255f828fe652ce7f5
    • Instruction Fuzzy Hash: 84F03071D0021AEBCF61AFA4CC049DDBAB5BF08B50F508526E499E7154C7789611EF91
    APIs
    • __lock.LIBCMT ref: 0106980E
      • Part of subcall function 0106EE41: __mtinitlocknum.LIBCMT ref: 0106EE57
      • Part of subcall function 0106EE41: __amsg_exit.LIBCMT ref: 0106EE63
      • Part of subcall function 0106EE41: EnterCriticalSection.KERNEL32(00F7B459,00F7B459,?,0106880F,0000000D), ref: 0106EE6B
    • __tzset_nolock.LIBCMT ref: 0106981F
      • Part of subcall function 01069115: __lock.LIBCMT ref: 01069137
      • Part of subcall function 01069115: ____lc_codepage_func.LIBCMT ref: 0106917E
      • Part of subcall function 01069115: __getenv_helper_nolock.LIBCMT ref: 010691A0
      • Part of subcall function 01069115: _free.LIBCMT ref: 010691D7
      • Part of subcall function 01069115: _strlen.LIBCMT ref: 010691DE
      • Part of subcall function 01069115: __malloc_crt.LIBCMT ref: 010691E5
      • Part of subcall function 01069115: _strlen.LIBCMT ref: 010691FB
      • Part of subcall function 01069115: _strcpy_s.LIBCMT ref: 01069209
      • Part of subcall function 01069115: __invoke_watson.LIBCMT ref: 0106921E
      • Part of subcall function 01069115: _free.LIBCMT ref: 0106922D
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: __lock_free_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__invoke_watson__malloc_crt__mtinitlocknum__tzset_nolock_strcpy_s
    • String ID:
    • API String ID: 1828324828-0
    • Opcode ID: 2bc924988ca43160e3cafd5ca19bd079ee3a8f3db2fefb45520ebe92a117159c
    • Instruction ID: 4df853c8588d4e7225cd643d593906c551fae387688ab9df4c3cc03ce922e6c5
    • Opcode Fuzzy Hash: 2bc924988ca43160e3cafd5ca19bd079ee3a8f3db2fefb45520ebe92a117159c
    • Instruction Fuzzy Hash: A4E05B30893B11DECB73BBE4954118C72B86B28F25F9001AED9C4156C5CA760552CB91
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00F7BE5D
    • SetWindowsHookExA.USER32(000000FF,Function_0001BCAF,00000000,00000000), ref: 00F7BE6D
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CurrentHookThreadWindows
    • String ID:
    • API String ID: 1904029216-0
    • Opcode ID: 12fa6dab1c5bf2e16e7b00f590d6ce8f0862c15bca87181d6308816ab0c91661
    • Instruction ID: 53bbb1dc33ac45745f3b8af6569514b602e149627400be60357f962c7cacdebc
    • Opcode Fuzzy Hash: 12fa6dab1c5bf2e16e7b00f590d6ce8f0862c15bca87181d6308816ab0c91661
    • Instruction Fuzzy Hash: CCD0A7718082106EE7716BB0BC09B5D3A445B06330F158357F4A4922C9C73C844057A3
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3
    • String ID:
    • API String ID: 431132790-0
    • Opcode ID: 7b8ce52b8d5c62f4f397672c2573b9579601de3206c17659cd6b8ae3d9848238
    • Instruction ID: 8ebdc39c2134fe50aa315eb78f37741d4933e90cc64fc118297114d491954869
    • Opcode Fuzzy Hash: 7b8ce52b8d5c62f4f397672c2573b9579601de3206c17659cd6b8ae3d9848238
    • Instruction Fuzzy Hash: 38B15D70A14306DFDF15EF64CD80BAE7BB4AF08314F14846AE81997291DB75DA40EB62
    APIs
      • Part of subcall function 00F7FC66: __EH_prolog3.LIBCMT ref: 00F7FC6D
      • Part of subcall function 00F7FC66: __strdup.LIBCMT ref: 00F7FC8F
      • Part of subcall function 00F7FC66: GetCurrentThread.KERNEL32 ref: 00F7FCBC
      • Part of subcall function 00F7FC66: GetCurrentThreadId.KERNEL32 ref: 00F7FCC5
      • Part of subcall function 00F65AD0: LoadLibraryA.KERNELBASE(StretchRes.dll,?,00000004,00000064,Function_00001B80,Function_00001B00,?,00F64A8A,00000000,16B3F121), ref: 00F65AF2
      • Part of subcall function 00F622F0: ?InstallHooks@@YAXXZ.STRETCHHOOK ref: 00F622F3
      • Part of subcall function 00F67040: CreateMutexA.KERNELBASE(00000000,00000000,16B3F121,010883F0,00000000,16B3F121), ref: 00F670A5
      • Part of subcall function 00F67040: WaitForSingleObject.KERNEL32(00000000,00000001), ref: 00F670B1
    • GetTickCount.KERNEL32 ref: 00F64B7B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CurrentThread$CountCreateH_prolog3Hooks@@InstallLibraryLoadMutexObjectSingleTickWait__strdup
    • String ID:
    • API String ID: 222554213-0
    • Opcode ID: c461b9bf6d7d18ac017d01a184f730672b8b03418e64b4120ca39f35228219e6
    • Instruction ID: 244f57027edf9377c942c7c5bac959d044dba4add9682460bcdc63995f74478c
    • Opcode Fuzzy Hash: c461b9bf6d7d18ac017d01a184f730672b8b03418e64b4120ca39f35228219e6
    • Instruction Fuzzy Hash: 5541AF30604646DFDB48EBB8C851BAEB7E4FF05320F14866DE45AD7281DF78A900AB91
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00F76135
      • Part of subcall function 00F84CAE: __EH_prolog3.LIBCMT ref: 00F84CB5
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8H_prolog3_catch_Throw
    • String ID:
    • API String ID: 2285297229-0
    • Opcode ID: e04aede0a5d025def13ae5e69852a12b44efae601a3fcd13be8a2c8ef75cb788
    • Instruction ID: 7417c5dcfe84e0142992bf9b46882323f2d8597b0517fa7b84762b417779c7a0
    • Opcode Fuzzy Hash: e04aede0a5d025def13ae5e69852a12b44efae601a3fcd13be8a2c8ef75cb788
    • Instruction Fuzzy Hash: 9C311C75E00609DFCF04DFA4C8819DEBBF6BF88310F14846AE909AB255D774A941DFA1
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: _memcpy_s
    • String ID:
    • API String ID: 2001391462-0
    • Opcode ID: 3b864859ec39ba8dd36761953ac527a0829503925e1f7a687fb352feb50cfc70
    • Instruction ID: 7ff73d7b5a7b293c76f01acaeb6824d24d6a7d52a34818bc63e5d5771df032e6
    • Opcode Fuzzy Hash: 3b864859ec39ba8dd36761953ac527a0829503925e1f7a687fb352feb50cfc70
    • Instruction Fuzzy Hash: 3F115E76600A05AFD708DF6CC880CAAB3B9FF89320714865DE5598B350EB31ED01CBD0
    APIs
    • __EH_prolog3.LIBCMT ref: 00F84CB5
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3$Exception@8Throw
    • String ID:
    • API String ID: 2489616738-0
    • Opcode ID: 2c3f29bff74a39575716152ec5a2befbf5db5f91a195caaf25e6e10f0cfbbacc
    • Instruction ID: cdec1299d57571993808c9577d709cd318119639cdcc7ea0370c5e268fc69702
    • Opcode Fuzzy Hash: 2c3f29bff74a39575716152ec5a2befbf5db5f91a195caaf25e6e10f0cfbbacc
    • Instruction Fuzzy Hash: 26015E79A012039BDB24BF74C9026AE76F5BB55321B104529E8C18B280DF389940E715
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 768bdc8ae88739f0aa34baaf4b0e2b7597c5aca113e3fa1ae2b2d972ba85c5a6
    • Instruction ID: 29f361166d19a968443af3398071214c581878b5675ea7a431d6b8e3b02e7f94
    • Opcode Fuzzy Hash: 768bdc8ae88739f0aa34baaf4b0e2b7597c5aca113e3fa1ae2b2d972ba85c5a6
    • Instruction Fuzzy Hash: 3FF0F832404919BB8F52AFA09D04DAB3B6ABF09362B04C412FA5991412C776C920FBA6
    APIs
    • PostMessageA.USER32(?,00000362,0000E001,00000000), ref: 00F6E7B9
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessagePost
    • String ID:
    • API String ID: 410705778-0
    • Opcode ID: 1c615e2ea257ec40a1925cb7f1e293dedf996c2a9021ebf98590bed981ebd3f8
    • Instruction ID: d9625ff8bf3dd14e0e4663f1ecafb8c2f3010335d659a8a04ae7222b47b525e1
    • Opcode Fuzzy Hash: 1c615e2ea257ec40a1925cb7f1e293dedf996c2a9021ebf98590bed981ebd3f8
    • Instruction Fuzzy Hash: 2BF0EC31350600ABDB305F74CC44F997BA5BF04B30F214726F9B9D61D1CBB2D850AA41
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: IconLoad
    • String ID:
    • API String ID: 2457776203-0
    • Opcode ID: a33ebab106d07fa64e21fc74179dafada7063db82b92c8b1757f6eae36d07249
    • Instruction ID: eab95780eb6623d4814b5efc223dd6ee9d1e651d2ceae24eaf62e2bf6dde5e95
    • Opcode Fuzzy Hash: a33ebab106d07fa64e21fc74179dafada7063db82b92c8b1757f6eae36d07249
    • Instruction Fuzzy Hash: B5E09AB22105146AE251B2A9DC02FBEB39CEF45B20F448027BA08DB141CA68A850A3B6
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: _malloc
    • String ID:
    • API String ID: 1579825452-0
    • Opcode ID: a5c72593a8d61a17476d515242c04f2ddc45060e9de58d9061ebb4c143770b53
    • Instruction ID: 035bdd7c52ec84e1815795881ab2dfc8b1ddf85c7bb477fdb570694cb83cb851
    • Opcode Fuzzy Hash: a5c72593a8d61a17476d515242c04f2ddc45060e9de58d9061ebb4c143770b53
    • Instruction Fuzzy Hash: F7E09233500616AFD7408F4AD404B86FBDDEFA2375F16C427D908CB261C772E8448BA0
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CountTick
    • String ID:
    • API String ID: 536389180-0
    • Opcode ID: c894017b54327d5a5ecd4346fe9293647654bab74307ba906bdf9adaeb25ac3c
    • Instruction ID: 8a38c53b2c9e8671f9b8db13317cd583a34f2f13074a93458b662c13cd8fd5f1
    • Opcode Fuzzy Hash: c894017b54327d5a5ecd4346fe9293647654bab74307ba906bdf9adaeb25ac3c
    • Instruction Fuzzy Hash: 21E0E5705013088BC77CDB18A5822187BADF780204F509559EC4A4666CDE3B5910DB81
    APIs
      • Part of subcall function 00F88839: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00F8886C
      • Part of subcall function 00F88839: _memset.LIBCMT ref: 00F88885
    • SystemParametersInfoA.USER32(00000029,-00000158,?,00000000), ref: 00F854B0
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AddressInfoParametersProcSystem_memset
    • String ID:
    • API String ID: 831922234-0
    • Opcode ID: 52b2b2c7fddbad4430fa06e1a91741ca931b65528a7cd64efe3d699ac24d86a6
    • Instruction ID: 6b781b63fd458ea7582c216c8cc7c72a644c9a5fb57470fe73751194a49c13b8
    • Opcode Fuzzy Hash: 52b2b2c7fddbad4430fa06e1a91741ca931b65528a7cd64efe3d699ac24d86a6
    • Instruction Fuzzy Hash: 3FD0A7B3590644AFE3001B71EC0AFBA3609D7A0721F940621B514CA1C0DBBADC418310
    APIs
    • ShowWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00F7C535), ref: 00F79754
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ShowWindow
    • String ID:
    • API String ID: 1268545403-0
    • Opcode ID: b6ec8842220680ef380c7e2b816741d54d43075cb993dd56181c4ebec5a26059
    • Instruction ID: 28206a3aba1bb474b2888ba9cf6fbe9dd2f24249cfd49b05ee4666003d56be8c
    • Opcode Fuzzy Hash: b6ec8842220680ef380c7e2b816741d54d43075cb993dd56181c4ebec5a26059
    • Instruction Fuzzy Hash: 6CD05E72104208DFC7509F00D408B603BA5FF44329F6080A9E5480A521C7339823DF40
    APIs
    • PostMessageA.USER32(0000FFFF,0000C1D2,?,?), ref: 00F63347
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessagePost
    • String ID:
    • API String ID: 410705778-0
    • Opcode ID: ddcbcc9f3d08f54bd970a76c4fafbec3ccbcfb04c4a5179ad3231687c631b1bb
    • Instruction ID: afb95cdb30b09bf76cbf4f9afd2a6eb0c8e6e04580c855d7a66cdeabcbd7b610
    • Opcode Fuzzy Hash: ddcbcc9f3d08f54bd970a76c4fafbec3ccbcfb04c4a5179ad3231687c631b1bb
    • Instruction Fuzzy Hash: D7C01271154208AFA354DE54D845C76736CFB88710B108115BD9547248C671BC40C760
    APIs
    • DeleteObject.GDI32(00000000), ref: 00F7EA9B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: DeleteObject
    • String ID:
    • API String ID: 1531683806-0
    • Opcode ID: cfa84aed529175dae675b6acd96421e7ba1304aece4b2c2994afd84a9b1543d0
    • Instruction ID: bd81ea281e17e15e19f48860101223a11b6e37a1c2450ae62be729868467c89d
    • Opcode Fuzzy Hash: cfa84aed529175dae675b6acd96421e7ba1304aece4b2c2994afd84a9b1543d0
    • Instruction Fuzzy Hash: EBB092B4A15106AAEE20A6308A0931A3B556B4531AF10C8E6F049D9049EA3E8042AA12
    APIs
    • MessageBeep.USER32 ref: 00FC005C
    • SendMessageA.USER32(?,000000B0,?,?), ref: 00FC00A1
    • SendMessageA.USER32(?,000000B0,?,?), ref: 00FC014E
    • SendMessageA.USER32(?,000000B0,?,?), ref: 00FC02E8
    • GetKeyState.USER32(00000010), ref: 00FC031D
    • SendMessageA.USER32(?,000000B0,?,?), ref: 00FC0333
    • GetKeyState.USER32(00000011), ref: 00FC035F
    • SendMessageA.USER32(?,000000B0,?,?), ref: 00FC0375
    • SendMessageA.USER32(?,000000B0,?,?), ref: 00FC03BD
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Message$Send$State$Beep
    • String ID:
    • API String ID: 4138746095-0
    • Opcode ID: 489cae8d6dc3e2de7256d2611a79978d4dc6e84f62b866203d79b64ab81a8653
    • Instruction ID: 809199079a7a886996080c3fec5bf499792801f548c66f281e94b899ab38c64b
    • Opcode Fuzzy Hash: 489cae8d6dc3e2de7256d2611a79978d4dc6e84f62b866203d79b64ab81a8653
    • Instruction Fuzzy Hash: 39D13B7250060AFBDF15DF54CD86FEE37A9FB04720F10851AF966C6180DB30EA52AB61
    APIs
    • IsWindow.USER32(?), ref: 00FCE56F
    • GetFocus.USER32 ref: 00FCE57D
    • IsChild.USER32(?,?), ref: 00FCE5B1
    • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 00FCE5E5
    • IsChild.USER32(?,?), ref: 00FCE601
    • SendMessageA.USER32(?,00000100,?,00000000), ref: 00FCE630
    • IsIconic.USER32(?), ref: 00FCE671
    • GetAsyncKeyState.USER32(00000011), ref: 00FCE6F7
    • GetAsyncKeyState.USER32(00000012), ref: 00FCE709
    • GetAsyncKeyState.USER32(00000010), ref: 00FCE716
    • IsWindowVisible.USER32(?), ref: 00FCE777
      • Part of subcall function 00FDB249: RedrawWindow.USER32(?,00000000,00000000,00000105,00000000), ref: 00FDB276
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AsyncStateWindow$ChildMessageSend$FocusIconicRedrawVisible
    • String ID:
    • API String ID: 763474574-0
    • Opcode ID: 17ab1a6231cecf32ee3bc8fc32a340352c1d59eb945be2c57f1aa90513ed8e43
    • Instruction ID: d3954726a2476a5edf26c1cda3b7493184f28b8bd2b72d10e2b767e893a74ce1
    • Opcode Fuzzy Hash: 17ab1a6231cecf32ee3bc8fc32a340352c1d59eb945be2c57f1aa90513ed8e43
    • Instruction Fuzzy Hash: 7171D236A10206DFDB20AFA4CA86FA97BA5BF14314F18047DF996DB250EB359C40FB10
    APIs
    • GetPropA.USER32(?), ref: 00F7A036
    • GlobalLock.KERNEL32(00000000,?,?,?), ref: 00F7A03F
    • SendMessageA.USER32(?,00000476,00000000,00000000), ref: 00F7A060
    • GlobalUnlock.KERNEL32(00000000,?,?,?), ref: 00F7A067
    • RemovePropA.USER32(?), ref: 00F7A076
    • GlobalFree.KERNEL32(00000000), ref: 00F7A081
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Global$Prop$FreeLockMessageRemoveSendUnlock
    • String ID:
    • API String ID: 2391254433-0
    • Opcode ID: 29d3a80ed8e2fef1ff493e6f35aa36efb93ec21459ff1bb9a1be6c00133f8ac0
    • Instruction ID: bb00b37b55d626a83035c6108974bf46d08b4fdc8dcf2c7829317a5b07bf721f
    • Opcode Fuzzy Hash: 29d3a80ed8e2fef1ff493e6f35aa36efb93ec21459ff1bb9a1be6c00133f8ac0
    • Instruction Fuzzy Hash: 0B216532644600ABDB312F34DC48B2E7A69FB88751F258826F5CAD6154DB36DC40FB23
    APIs
    • GetParent.USER32(?), ref: 00FD6222
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    • IsIconic.USER32(?), ref: 00FD624B
    • GetParent.USER32(?), ref: 00FD6258
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Parent$Exception@8H_prolog3IconicThrow
    • String ID:
    • API String ID: 144390861-0
    • Opcode ID: d424fcdecc5b8eccdad9ca8eaeb0ee4ba9661356ec527fa83f032c804446f499
    • Instruction ID: eadc00f41ca4c171dedc1b1c61505d00c73e06b058927a3e8a4215cfb7ba0e87
    • Opcode Fuzzy Hash: d424fcdecc5b8eccdad9ca8eaeb0ee4ba9661356ec527fa83f032c804446f499
    • Instruction Fuzzy Hash: 3AF0A432704615778F127A728C0462A7A9AEBA0372B144127F549D2711EA39DC51A790
    APIs
    • IsIconic.USER32(?), ref: 00FD0474
    • PostMessageA.USER32(?,00000112,0000F060,00000000), ref: 00FD04C4
      • Part of subcall function 00F795EC: GetWindowLongA.USER32(?,000000F0), ref: 00F795F7
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: IconicLongMessagePostWindow
    • String ID:
    • API String ID: 1855654840-0
    • Opcode ID: 8c26c27b86ebd8220876c6968591d39df8c8edb4cb4b490224da73d78bcb6674
    • Instruction ID: ecf537cd7dfde1636c8415e400d63c9dfdcfbeeb2b728e16ef154a1e7bf9f87e
    • Opcode Fuzzy Hash: 8c26c27b86ebd8220876c6968591d39df8c8edb4cb4b490224da73d78bcb6674
    • Instruction Fuzzy Hash: 9D110473A107029BD734DA38DD45FAAB6D3FB46320F1C063BE245C23D5CA68DC00AA40
    APIs
      • Part of subcall function 00F795EC: GetWindowLongA.USER32(?,000000F0), ref: 00F795F7
    • GetKeyState.USER32(00000073), ref: 00FB2386
    • GetKeyState.USER32(00000012), ref: 00FB238F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: State$LongWindow
    • String ID:
    • API String ID: 3716621309-0
    • Opcode ID: 520595f56d7dcb1f52c9a4959056ccea073c61fda6a6e32cfd0dea8e22f149fb
    • Instruction ID: a3fa0185d2c108b7bc3088165a6559e2b3d6013d35dc518390434c18c7472409
    • Opcode Fuzzy Hash: 520595f56d7dcb1f52c9a4959056ccea073c61fda6a6e32cfd0dea8e22f149fb
    • Instruction Fuzzy Hash: ECF0963630021A6AEF213957CC41EEE7A59DF917A0F084036FD489A199DA7BDD11BA50
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FF2124
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,0108D480,00000000,01092C30,00000000,0108D534,00000000,?,?,00000584,00FF26E4,?,00000000,00000084), ref: 00FF21D3
    • __splitpath_s.LIBCMT ref: 00FF2202
    • __splitpath_s.LIBCMT ref: 00FF2221
    • __makepath_s.LIBCMT ref: 00FF2251
    • _strlen.LIBCMT ref: 00FF225D
    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,0108D534,00000000,?,?,00000584,00FF26E4,?,00000000,00000084), ref: 00FF2295
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: File__splitpath_s$CreateH_prolog3_ModuleName__makepath_s_strlen
    • String ID: $@Ls Fs
    • API String ID: 114649838-1242102843
    • Opcode ID: 5f32e8b5d39c29183f6190bb0003a79f805fadf6878d0335b954b2d5d04263b4
    • Instruction ID: 1f4da3c4977576eb5f44cf74c469d035772e7e28b5e4ec35fe51b1bf250e7bb4
    • Opcode Fuzzy Hash: 5f32e8b5d39c29183f6190bb0003a79f805fadf6878d0335b954b2d5d04263b4
    • Instruction Fuzzy Hash: B4D12A71800A2CAFDF609F64CC94AEEBB79AF08356F1041E5F649A2161DB355EC4EF10
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00F9A2C1
    • GetParent.USER32(?), ref: 00F9A31C
    • GetParent.USER32(?), ref: 00F9A338
    • UpdateWindow.USER32(?), ref: 00F9A380
    • SetCursor.USER32 ref: 00F9A3A5
    • GetAsyncKeyState.USER32(00000012), ref: 00F9A407
    • UpdateWindow.USER32(?), ref: 00F9A50D
    • InflateRect.USER32(?,00000002,00000002), ref: 00F9A56D
    • SetCapture.USER32(?), ref: 00F9A576
    • SetCursor.USER32(00000000), ref: 00F9A58E
    • IsWindow.USER32(?), ref: 00F9A62C
    • GetCursorPos.USER32(?), ref: 00F9A66B
    • ScreenToClient.USER32(?,?), ref: 00F9A678
    • PtInRect.USER32(?,?,?), ref: 00F9A694
    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 00F9A708
    • GetParent.USER32(?), ref: 00F9A723
    • GetParent.USER32(?), ref: 00F9A737
    • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000), ref: 00F9A749
    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 00F9A76B
    • GetParent.USER32(?), ref: 00F9A774
    • GetParent.USER32(?), ref: 00F9A78F
    • GetParent.USER32(?), ref: 00F9A79A
    • InvalidateRect.USER32(?,?,00000001), ref: 00F9A7D2
    • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,?,00000000), ref: 00F9A90A
      • Part of subcall function 00F97AE0: InvalidateRect.USER32(?,?,00000001,?), ref: 00F97B55
      • Part of subcall function 00F97AE0: InflateRect.USER32(?,?,?), ref: 00F97B9B
      • Part of subcall function 00F97AE0: RedrawWindow.USER32(?,?,00000000,00000401,?,?), ref: 00F97BAE
    • UpdateWindow.USER32(?), ref: 00F9A86A
    • UpdateWindow.USER32(?), ref: 00F9A8C9
    • SetCapture.USER32(?,?,00000000), ref: 00F9A8D4
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Parent$RectRedraw$Update$Cursor$CaptureInflateInvalidate$AsyncClientH_prolog3_ScreenState
    • String ID:
    • API String ID: 991125134-0
    • Opcode ID: 6306bdd1c228cf70b1598fbe52b471a6cff5e50d43092591d030db5bdbe23f11
    • Instruction ID: 54a6148e4ff9098b71821c6e7c27a3d8925f53c84bf8c6939bdeaabcbb33eae4
    • Opcode Fuzzy Hash: 6306bdd1c228cf70b1598fbe52b471a6cff5e50d43092591d030db5bdbe23f11
    • Instruction Fuzzy Hash: 54028170A00610DFDF25AF64C889A9D7BB5FF08720F244179F8499F269DB359844EF92
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FEA523
    • EnterCriticalSection.KERNEL32(010D4FDC,0000008C), ref: 00FEA539
    • GetUpdateRect.USER32(?,?,00000000), ref: 00FEA562
    • GetClientRect.USER32(?,?), ref: 00FEA587
    • GetWindowRect.USER32(?,?), ref: 00FEA59F
    • OffsetRect.USER32(?,?,?), ref: 00FEA5BB
    • OffsetRect.USER32(?,?,?), ref: 00FEA5CD
    • CreateCompatibleDC.GDI32(?), ref: 00FEA5FD
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00FEA627
    • IsRectEmpty.USER32(?), ref: 00FEA67F
    • GetWindowRect.USER32(?,?), ref: 00FEA70A
      • Part of subcall function 00F7E593: ScreenToClient.USER32(00000407,?), ref: 00F7E5A4
      • Part of subcall function 00F7E593: ScreenToClient.USER32(00000407,?), ref: 00F7E5B1
    • OffsetRect.USER32(?,?,?), ref: 00FEA72B
    • InflateRect.USER32(?,00000000,000000FF), ref: 00FEA738
    • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 00FEA7AD
    • CreateRectRgnIndirect.GDI32(?), ref: 00FEA68A
      • Part of subcall function 00F7E508: SelectClipRgn.GDI32(?,00000000), ref: 00F7E52E
      • Part of subcall function 00F7E508: SelectClipRgn.GDI32(?,?), ref: 00F7E544
      • Part of subcall function 00F7DFAD: IntersectClipRect.GDI32(?,?,?,?,?), ref: 00F7DFD6
      • Part of subcall function 00F7DFAD: IntersectClipRect.GDI32(?,?,?,?,?), ref: 00F7DFEB
      • Part of subcall function 00F8E2EF: __EH_prolog3.LIBCMT ref: 00F8E2F6
    • LeaveCriticalSection.KERNEL32(010D4FDC), ref: 00FEA861
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Clip$ClientCreateOffset$CompatibleCriticalIntersectScreenSectionSelectWindow$BitmapEmptyEnterH_prolog3H_prolog3_IndirectInflateLeaveUpdate
    • String ID: @Ls Fs
    • API String ID: 1337057690-1589975592
    • Opcode ID: e90bb35bdb1d859dff8cec9bba3c96cf379c43ccbd01e6446879587e92aad052
    • Instruction ID: adf8e5d42dda951319a6eafbf03338c280374cd7abb26c2ad2c36321002a65b5
    • Opcode Fuzzy Hash: e90bb35bdb1d859dff8cec9bba3c96cf379c43ccbd01e6446879587e92aad052
    • Instruction Fuzzy Hash: 3DC11471D00219DFCF11EFA4CC84AEEBBB9BF08300F1441AAE946AB255DB356A45DF61
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FEE6AF
    • CreateCompatibleDC.GDI32(00000000), ref: 00FEE716
    • GetObjectA.GDI32(?,00000018,000000FF), ref: 00FEE734
    • SelectObject.GDI32(?,?), ref: 00FEE772
    • CreateCompatibleDC.GDI32(?), ref: 00FEE790
    • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00FEE7E6
    • SelectObject.GDI32(?,?), ref: 00FEE7FB
    • SelectObject.GDI32(?,00000000), ref: 00FEE811
    • SelectObject.GDI32(?,?), ref: 00FEE820
    • DeleteObject.GDI32(?), ref: 00FEE827
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00FEE879
    • GetPixel.GDI32(?,?,00000000), ref: 00FEE941
    • SetPixel.GDI32(?,?,00000000,?), ref: 00FEE956
    • SelectObject.GDI32(?,?), ref: 00FEE973
    • SelectObject.GDI32(?,?), ref: 00FEE97B
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$Select$Create$CompatiblePixel$DeleteH_prolog3_Section
    • String ID: ($@Ls Fs
    • API String ID: 1942225872-2035409421
    • Opcode ID: b7ce6db114f40f47ff761f6b78678846e512a18b2864053acc6e3856b286e496
    • Instruction ID: b2e8b05b1fc01eba53a4177d82adce4955915b60145643c2a5a5a866fcd5b113
    • Opcode Fuzzy Hash: b7ce6db114f40f47ff761f6b78678846e512a18b2864053acc6e3856b286e496
    • Instruction Fuzzy Hash: FBA10275C00258DFCF21EFA5D8809ADBBB5FF18310F20412AE566A7251DB316E46EF11
    APIs
    • GetDlgItem.USER32(?,00003020), ref: 00F7A263
    • GetDlgItem.USER32(?,00003020), ref: 00F7A296
    • GetWindowRect.USER32(00000000,?), ref: 00F7A2B0
    • MapDialogRect.USER32(?,?), ref: 00F7A2D4
    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,00000020,00000016), ref: 00F7A301
    • GetDlgItem.USER32(?,?), ref: 00F7A316
    • GetWindowRect.USER32(00000000,?), ref: 00F7A328
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000015,?), ref: 00F7A347
    • GetWindowRect.USER32(?,?), ref: 00F7A35E
    • GetWindowRect.USER32(?,?), ref: 00F7A3B3
    • GetDlgItem.USER32(?,00000001), ref: 00F7A3C6
    • GetWindowRect.USER32(00000000,?), ref: 00F7A3D5
    • GetDlgItem.USER32(?,?), ref: 00F7A400
    • ShowWindow.USER32(00000000,00000000), ref: 00F7A40E
    • EnableWindow.USER32(00000000,00000000), ref: 00F7A416
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Rect$Item$DialogEnableShow
    • String ID:
    • API String ID: 763981185-3916222277
    • Opcode ID: 43596e752a03501761c3cc7bb9521d15c5f6ff5d0c0e56531105b694b0cf2bba
    • Instruction ID: 02de802383c8f7dff4b0b86b964134dba327544f3f5efcf5306dbd50f2d1c452
    • Opcode Fuzzy Hash: 43596e752a03501761c3cc7bb9521d15c5f6ff5d0c0e56531105b694b0cf2bba
    • Instruction Fuzzy Hash: 58610371D00209AFDB21DFA9CD88DAFFBF9FF88710F10451AE145A2164DB769A40DB26
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FCA594
    • GetClientRect.USER32(?,?), ref: 00FCA5B6
    • CreateCompatibleDC.GDI32(?), ref: 00FCA5F2
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00FCA63A
    • CreateDIBSection.GDI32 ref: 00FCA6B7
    • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 00FCA6EA
    • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 00FCA71D
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 00FCA781
    • _memmove.LIBCMT ref: 00FCA79A
    • GetWindowRect.USER32(?,?), ref: 00FCA7E9
    • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 00FCA902
    • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 00FCA978
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Create$Section$CompatibleRect$BitmapClientH_prolog3_Window_memmove
    • String ID: ($@Ls Fs
    • API String ID: 498668396-2035409421
    • Opcode ID: b37b49b740b1356e625de4e1360de983ddb1e03410a72e84c51b6cc359a690a0
    • Instruction ID: 191ae7c03f54dc783d848207ea55d1dbb5d5ed41d266ab1585a11876b4dd8822
    • Opcode Fuzzy Hash: b37b49b740b1356e625de4e1360de983ddb1e03410a72e84c51b6cc359a690a0
    • Instruction Fuzzy Hash: 9CD12571D0060ADFCB21DFA4C985EAEBBB9FF48304F24856EE55AA7211D731A841EF11
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FB823B
    • SendMessageA.USER32(?,0000110A,00000000,00000000), ref: 00FB826F
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 00FB8280
    • SendMessageA.USER32(?,0000110A,00000004,00000000), ref: 00FB836B
    • SendMessageA.USER32(?,00001102,00000002,00000000), ref: 00FB8381
    • SendMessageA.USER32(?,0000110A,00000004,00000000), ref: 00FB8396
    • SHGetFileInfoA.SHELL32(?,00000000,?,00000160,00000208), ref: 00FB83D2
    • SHGetFileInfoA.SHELL32(?,00000000,?,00000160,00000208), ref: 00FB83F5
    • lstrcmpA.KERNEL32(?,?), ref: 00FB840D
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$FileInfo$H_prolog3_lstrcmp
    • String ID:
    • API String ID: 597947708-0
    • Opcode ID: 4d57b645564b5441924dabca24813763f3fbdce940702cca29e60d167769c903
    • Instruction ID: aa21938d42b1a59efbb07c72c82449574d41b52a57f6110f5c306b5068e789a0
    • Opcode Fuzzy Hash: 4d57b645564b5441924dabca24813763f3fbdce940702cca29e60d167769c903
    • Instruction Fuzzy Hash: DB813B70A4022AEFDF35DF21CD49BDDBAB9BB08750F1001E6A548B61A0DBB19E91DF04
    APIs
    • PeekMessageA.USER32(?,00000000,00000201,00000201,00000001), ref: 00FD8545
    • SendMessageA.USER32(00000000,00000084,00000000,?), ref: 00FD8562
    • ReleaseCapture.USER32 ref: 00FD859D
    • GetMessageA.USER32(?,00000000,000000A1,000000A1), ref: 00FD85AC
    • PeekMessageA.USER32(?,00000000,?,?,00000001), ref: 00FD85C0
    • DispatchMessageA.USER32(?), ref: 00FD85C7
    • DispatchMessageA.USER32(?), ref: 00FD8672
    • GetCursorPos.USER32(?), ref: 00FD867C
    • PeekMessageA.USER32(?,00000000,?,?,00000001), ref: 00FD869D
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Message$Peek$Dispatch$CaptureCursorReleaseSend
    • String ID:
    • API String ID: 597789953-0
    • Opcode ID: 2ac74286de53d13c23560d091b6ebe94a59268dea9bb62f5ad31a7e3e6f34f99
    • Instruction ID: ab59d6d7a77c6791b904b8a70f5ee696f751cbda28f4f6519060f646dd6dfcac
    • Opcode Fuzzy Hash: 2ac74286de53d13c23560d091b6ebe94a59268dea9bb62f5ad31a7e3e6f34f99
    • Instruction Fuzzy Hash: DE519F71600200BBEB306B55DC88FBF77AEEB457A1F280416F582D2244DA79DD42EB66
    APIs
    • GetCapture.USER32 ref: 00FD2389
    • LoadCursorA.USER32(00000000,00007F00), ref: 00FD23F7
    • SetCursor.USER32(00000000), ref: 00FD23FE
    • SetRectEmpty.USER32(?), ref: 00FD2417
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Cursor$CaptureEmptyLoadRect
    • String ID:
    • API String ID: 2438408-0
    • Opcode ID: 8fb2d089efbbc74b4a0f5fb018ed6de50d9ca736f80be0a318271a3532b02a5f
    • Instruction ID: 2fb25a9aa19f76fa0788c6da3768700af7c4f61861833ec0a34b356656832442
    • Opcode Fuzzy Hash: 8fb2d089efbbc74b4a0f5fb018ed6de50d9ca736f80be0a318271a3532b02a5f
    • Instruction Fuzzy Hash: 2EA15E71E002199FCF15DFE8C9889AEBBB6FF58310F18406AF845EB209DB759905DB90
    APIs
    • __EH_prolog3.LIBCMT ref: 00FC66A6
    • PathRemoveFileSpecW.SHLWAPI(?), ref: 00FC6757
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000), ref: 00FC6794
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000), ref: 00FC67BD
    • _strlen.LIBCMT ref: 00FC67D8
    • CoTaskMemFree.OLE32(?), ref: 00FC67E8
    • PathRemoveFileSpecW.SHLWAPI(?), ref: 00FC68B7
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000), ref: 00FC68D2
    • CoTaskMemFree.OLE32(?), ref: 00FC68DD
    • PathRemoveFileSpecW.SHLWAPI(?), ref: 00FC691F
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000), ref: 00FC695E
    • CoTaskMemFree.OLE32(?), ref: 00FC6969
    • PathFindFileNameA.SHLWAPI(?,00000000,?), ref: 00FC6A30
    • PathFindExtensionA.SHLWAPI(?,00000000), ref: 00FC6A58
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Path$ByteCharFileMultiWide$FreeRemoveSpecTask$Find$ExtensionH_prolog3Name_strlen
    • String ID:
    • API String ID: 2911475250-0
    • Opcode ID: 46a60ef872373fe7dfc99a58b962ed9111ff56c2e5817510db8053cf2a3c7e55
    • Instruction ID: e64aedf36f1191f40427efb1a7a56bc5ec0d0270d4df86bb060b9ec2fd82ebfe
    • Opcode Fuzzy Hash: 46a60ef872373fe7dfc99a58b962ed9111ff56c2e5817510db8053cf2a3c7e55
    • Instruction Fuzzy Hash: 02E15B7090010AEFCB04DFA4C989EAEB7B9FF48314B20455DF556EB2A1CB35AD06DB20
    APIs
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00F6A1C1
    • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00F6A1D2
    • PostMessageA.USER32(0000FFFF,0000C1D0,0000000E,00000001), ref: 00F6A20E
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Message$Send$Post
    • String ID: Notification Dialog ON$Notification Flash Icon ON$Notification Flash Interval$Notification Sound$Notification Sound ON$Notification Sound Volume$Notification Use System Volume$Preferences$SoundPath
    • API String ID: 3628032766-3242384156
    • Opcode ID: b657e35eb6852e739b13ef6553a138006b58c226b2790add4dcefab4cd32e93e
    • Instruction ID: 7b374cf5b99afca0a7ef24458fa915f875bc2641dcffa000d3b41db05deb6c3e
    • Opcode Fuzzy Hash: b657e35eb6852e739b13ef6553a138006b58c226b2790add4dcefab4cd32e93e
    • Instruction Fuzzy Hash: 92413471345601AFD794EB64CC91FAAB3E5BB88740F64861EF2D9DB340CB74A9428B90
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: _memset$H_prolog3H_prolog3___splitpath_s_strlen
    • String ID: Aero$Luna$homestead$metallic$normalcolor$royale
    • API String ID: 3363187346-2881773410
    • Opcode ID: 0c2ae2c3e8c22f1e9b2fb7b81d5f2ce06eac3901e83807a7024c5083996a1e86
    • Instruction ID: 861ea1d56177029cdae23fdd9806ebd7bfc2a6e22b0a1f7211391dc6a77c730e
    • Opcode Fuzzy Hash: 0c2ae2c3e8c22f1e9b2fb7b81d5f2ce06eac3901e83807a7024c5083996a1e86
    • Instruction Fuzzy Hash: D6519F71E0052DAACB25D765CC51BEFB77CAF15321F080299B119E21C1EBB49B84EEA1
    APIs
    • __EH_prolog3.LIBCMT ref: 0100A5DA
    • GetObjectA.GDI32(00000018,00000018,0109A46C), ref: 0100A5F6
    • _memmove.LIBCMT ref: 0100A654
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3Object_memmove
    • String ID:
    • API String ID: 107514201-3916222277
    • Opcode ID: d7effb3e25a1e7a9bc8f6826e8f9624e83db47c1c60258bd240592cb4d98edc9
    • Instruction ID: ef1106ef48e60cfbe0d764becaded8591faab22ea076e9de2ab8db638b5f882c
    • Opcode Fuzzy Hash: d7effb3e25a1e7a9bc8f6826e8f9624e83db47c1c60258bd240592cb4d98edc9
    • Instruction Fuzzy Hash: 49414C71D00219EFEF16DFA8CC809EEBBB5FF48350F10816AE556A7290DB355A05DB90
    APIs
    • __EH_prolog3.LIBCMT ref: 00F902A9
      • Part of subcall function 00F8E228: GetObjectA.GDI32(?,00000054,?), ref: 00F8E247
      • Part of subcall function 00F7E7F8: __EH_prolog3.LIBCMT ref: 00F7E7FF
      • Part of subcall function 00F7E7F8: GetDC.USER32(00000000), ref: 00F7E82B
    • CreateCompatibleDC.GDI32(?), ref: 00F902F9
    • SelectObject.GDI32(?,?), ref: 00F90314
    • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000074), ref: 00F90343
    • GdipDisposeImage.GDIPLUS(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000074), ref: 00F90356
    • GdipCreateFromHDC.GDIPLUS(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00F90365
    • GdipSetInterpolationMode.GDIPLUS(?,00000007,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F90376
    • GdipDeleteGraphics.GDIPLUS(?,?,00000007,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00F903B0
    • GdipDisposeImage.GDIPLUS(?,?,?,00000007,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F903B8
    • SelectObject.GDI32(?,?), ref: 00F903C8
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Gdip$CreateObject$DisposeFromH_prolog3ImageSelect$BitmapCompatibleDeleteGraphicsInterpolationMode
    • String ID: @Ls Fs
    • API String ID: 3579439469-1589975592
    • Opcode ID: b3503288d1f7d894b0ae1697e82f69eddc2c559afaba2afa58e82d1c37443806
    • Instruction ID: 7b51d380c65e5fefcf0fd8a5802c92408d30328573c4c7b015a34357db38e24b
    • Opcode Fuzzy Hash: b3503288d1f7d894b0ae1697e82f69eddc2c559afaba2afa58e82d1c37443806
    • Instruction Fuzzy Hash: F2417772C00219EFDF14EFA4CC849EEBBB8BF18310F14816AE945A7211DB749A44EB91
    APIs
      • Part of subcall function 00FD8334: LoadCursorA.USER32(00000000,00007F8B), ref: 00FD834E
      • Part of subcall function 00FD8334: LoadCursorW.USER32(?,00007901), ref: 00FD836B
    • PeekMessageA.USER32(?,?,00000367,00000367,00000003), ref: 00FD86E4
    • PostMessageA.USER32(?,00000111,0000E145,00000000), ref: 00FD8747
    • SendMessageA.USER32(?,00000362,0000E002,00000000), ref: 00FD8769
    • GetCursorPos.USER32(?), ref: 00FD8784
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00FD87B0
    • ReleaseCapture.USER32 ref: 00FD87FD
    • SetCapture.USER32(?), ref: 00FD8802
    • ReleaseCapture.USER32 ref: 00FD880E
    • SendMessageA.USER32(?,00000362,?,00000000), ref: 00FD8822
    • SendMessageA.USER32(?,00000111,0000E147,00000000), ref: 00FD884D
    • PostMessageA.USER32(?,0000036A,00000000,00000000), ref: 00FD886B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Message$CaptureCursorSend$LoadPeekPostRelease
    • String ID:
    • API String ID: 291007519-0
    • Opcode ID: 3c06fbc87bfa26b5e3cf848ad539ca6b5bff30f6f486e39452ea4d4e4f13b8df
    • Instruction ID: cb462083b626c068674f1084864a5c42ed8218ae2626728f7e7ac9e3e37ee7ea
    • Opcode Fuzzy Hash: 3c06fbc87bfa26b5e3cf848ad539ca6b5bff30f6f486e39452ea4d4e4f13b8df
    • Instruction Fuzzy Hash: C3519471A00208EFDB21AF60CC84EAEBBBEFF44394F64446AF19696251DB759D41EF10
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00F90401
    • GetWindowRect.USER32(?,?), ref: 00F90450
    • OffsetRect.USER32(?,?,?), ref: 00F90466
      • Part of subcall function 00F7E7F8: __EH_prolog3.LIBCMT ref: 00F7E7FF
      • Part of subcall function 00F7E7F8: GetDC.USER32(00000000), ref: 00F7E82B
    • CreateCompatibleDC.GDI32(?), ref: 00F904D7
    • SelectObject.GDI32(?,?), ref: 00F904F7
    • SelectObject.GDI32(?,?), ref: 00F90539
    • CreateCompatibleDC.GDI32(?), ref: 00F90652
    • SelectObject.GDI32(?,?), ref: 00F90672
    • SelectObject.GDI32(?,00000000), ref: 00F906A2
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ObjectSelect$CompatibleCreateRect$H_prolog3H_prolog3_OffsetWindow
    • String ID: @Ls Fs
    • API String ID: 2818906880-1589975592
    • Opcode ID: ef78fef61fb7aa1ff9cd6c256d22d386db67ec96875ff6fdc89bf60fdfa8fe03
    • Instruction ID: d8300585e000966a7d64906356aa44d5bfc331d14fcc772929a5b73fda459944
    • Opcode Fuzzy Hash: ef78fef61fb7aa1ff9cd6c256d22d386db67ec96875ff6fdc89bf60fdfa8fe03
    • Instruction Fuzzy Hash: 18A11172D0021AEFDF14EFA4C984AEEBBB5BF48300F1441AAE919B7251DB345A45DF60
    APIs
    • GetModuleHandleA.KERNEL32(StretchRes), ref: 00F6A2CD
    • FindResourceA.KERNEL32(00000000,soundlist,0000000A), ref: 00F6A2DD
    • SizeofResource.KERNEL32(00000000,00000000), ref: 00F6A2F0
    • LoadResource.KERNEL32(00000000,?), ref: 00F6A2FE
    • LockResource.KERNEL32(00000000), ref: 00F6A30D
    • SendMessageA.USER32(?,00000143,00000000,?), ref: 00F6A398
    • SendMessageA.USER32(?,00000151,00000000,000000FF), ref: 00F6A3B0
    • SendMessageA.USER32(?,00000146,00000000,00000000), ref: 00F6A412
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Resource$MessageSend$FindHandleLoadLockModuleSizeof
    • String ID: StretchRes$soundlist
    • API String ID: 2030522427-4121383072
    • Opcode ID: 31458f374c59bebdd49ff398e51e2928d63c5d5f15bc8ad40f8460b908736405
    • Instruction ID: 4d5fef766acd87cad2f590cc810921497a9b44f176275e2c5a74ddcc251ab25c
    • Opcode Fuzzy Hash: 31458f374c59bebdd49ff398e51e2928d63c5d5f15bc8ad40f8460b908736405
    • Instruction Fuzzy Hash: A361D371A006069FCB14DF68CC55BAFB7B8FF45320F148258E852AB395DB35A905CB91
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FCA0B9
    • GetClientRect.USER32(?,?), ref: 00FCA0DB
    • SetRectEmpty.USER32(?), ref: 00FCA12B
    • MapWindowPoints.USER32(?,?,?), ref: 00FCA173
    • MapWindowPoints.USER32(?,?,?,00000002), ref: 00FCA1EB
    • GetWindowRect.USER32(?,?), ref: 00FCA21E
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 00FCA248
    • OffsetRect.USER32(?,?,00000000), ref: 00FCA2ED
    • InflateRect.USER32(?,00000000,00000000), ref: 00FCA324
    • IsRectEmpty.USER32(?), ref: 00FCA408
      • Part of subcall function 00F79606: GetWindowLongA.USER32(00000407,000000EC), ref: 00F79611
    • IsRectEmpty.USER32(?), ref: 00FCA534
      • Part of subcall function 0100ADB3: __EH_prolog3_GS.LIBCMT ref: 0100ADBA
      • Part of subcall function 0100ADB3: UnionRect.USER32(?,?,?), ref: 0100AE12
      • Part of subcall function 0100ADB3: EqualRect.USER32(?,?), ref: 0100AE20
      • Part of subcall function 0100ADB3: CreateCompatibleDC.GDI32(?), ref: 0100AE57
      • Part of subcall function 0100ADB3: CreateCompatibleBitmap.GDI32(?,?,?), ref: 0100AE87
      • Part of subcall function 0100ADB3: SelectObject.GDI32(?,00000000), ref: 0100AEE7
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Window$Empty$CompatibleCreateH_prolog3_Points$BitmapClientEqualInflateLongObjectOffsetSelectUnion
    • String ID:
    • API String ID: 3848083076-0
    • Opcode ID: 40a64bc5f804fbb43d4bd259c060f7b1573b5b74e97cca0712c1d651e77df55b
    • Instruction ID: a8db903fc3d67fcf20b19c4eb993b26deddeee3f6dab24c61ee77ab650fd3e0c
    • Opcode Fuzzy Hash: 40a64bc5f804fbb43d4bd259c060f7b1573b5b74e97cca0712c1d651e77df55b
    • Instruction Fuzzy Hash: 37F18831D0026ADFCF11DFA4C989AEEBBB6FF09304F140169E802AF249DB756945DB91
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$EmptyFillH_prolog3_
    • String ID:
    • API String ID: 3863378599-0
    • Opcode ID: 0e89669757e24445937889fc28922b141538c983f0180fa30191745537e03737
    • Instruction ID: 6bf9946eeccfddaa8fdf608bb59743a42fda6f2cbb0b14b371a222ded4fed637
    • Opcode Fuzzy Hash: 0e89669757e24445937889fc28922b141538c983f0180fa30191745537e03737
    • Instruction Fuzzy Hash: 56F16731D0060ACFCF15DFA4C884AEEB7B6BF08311F244169E846BB255DB75A946DF90
    APIs
    • GetCursorPos.USER32(?), ref: 00FCC08B
    • ScreenToClient.USER32(?,?), ref: 00FCC098
    • PtInRect.USER32(?,?,?), ref: 00FCC0C6
    • PtInRect.USER32(?,?,?), ref: 00FCC0EB
    • KillTimer.USER32(?,00000002), ref: 00FCC11B
    • InvalidateRect.USER32(?,?,00000001), ref: 00FCC139
    • InvalidateRect.USER32(?,?,00000001), ref: 00FCC147
    • _clock.LIBCMT ref: 00FCC15C
    • KillTimer.USER32(?,00000001), ref: 00FCC261
    • ValidateRect.USER32(?,00000000), ref: 00FCC27D
    • RedrawWindow.USER32(?,00000000,00000000,00000185,00000000), ref: 00FCC2BB
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$InvalidateKillTimer$ClientCursorRedrawScreenValidateWindow_clock
    • String ID:
    • API String ID: 3482734790-0
    • Opcode ID: c059b84b5acefde27d4282ace518449b01df0d36d64099a6678e9807b47dca5f
    • Instruction ID: f8afc1f9267c4344dbe2e6244e600f6b3d7310972c8ef85812dc832d49834c74
    • Opcode Fuzzy Hash: c059b84b5acefde27d4282ace518449b01df0d36d64099a6678e9807b47dca5f
    • Instruction Fuzzy Hash: FC716E31600A06DFCB31DF64CA85FAABBF5FF48350F14082EE49BD6155DA75A941EB80
    APIs
      • Part of subcall function 00FED6F6: GdipGetImagePixelFormat.GDIPLUS(?,010D52DC,00000000,00000000,?,00FF0456,00000000,00000000,010D52DC), ref: 00FED706
    • _free.LIBCMT ref: 00FF055F
    • _free.LIBCMT ref: 00FF05AB
    • GdipBitmapLockBits.GDIPLUS(?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,010D52DC), ref: 00FF0674
    • _free.LIBCMT ref: 00FF06A4
      • Part of subcall function 00FED718: GdipGetImagePaletteSize.GDIPLUS(?,00000000,00000000,00000000,?,00FF0510,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00FED72C
    • GdipBitmapUnlockBits.GDIPLUS(00000005,?,?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,010D52DC), ref: 00FF0720
    • _free.LIBCMT ref: 00FF079B
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Gdip_free$BitmapBitsImage$FormatLockPalettePixelSizeUnlock
    • String ID: &
    • API String ID: 4092590016-3042966939
    • Opcode ID: b33a6c91a948fdabd7a791125c850077e6a285db640795f4f5aaa686b25a364e
    • Instruction ID: 3a616a2460e699dea740184b031dd47ce0fd86940d9480ea436c22dfbae7960b
    • Opcode Fuzzy Hash: b33a6c91a948fdabd7a791125c850077e6a285db640795f4f5aaa686b25a364e
    • Instruction Fuzzy Hash: 3FA15AB2D0022D9BCB309F14CD80BA9B7B5AF44314F1480E9E749A7262CB74AEC5DF58
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FE2132
    • GetSystemMetrics.USER32(00000003), ref: 00FE2149
    • GetObjectA.GDI32(0000003C,?), ref: 00FE2172
    • _memset.LIBCMT ref: 00FE217F
    • lstrcpyA.KERNEL32 ref: 00FE21A3
      • Part of subcall function 00F7E7F8: __EH_prolog3.LIBCMT ref: 00F7E7FF
      • Part of subcall function 00F7E7F8: GetDC.USER32(00000000), ref: 00F7E82B
    • CreateFontIndirectA.GDI32(?), ref: 00FE21CF
      • Part of subcall function 00F7EB1F: SelectObject.GDI32(?,00000000), ref: 00F7EB45
      • Part of subcall function 00F7EB1F: SelectObject.GDI32(?,?), ref: 00F7EB5B
    • GetTextMetricsA.GDI32(?,?), ref: 00FE2209
    • CreateFontIndirectA.GDI32(?), ref: 00FE2266
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$CreateFontIndirectMetricsSelect$H_prolog3H_prolog3_SystemText_memsetlstrcpy
    • String ID: Arial
    • API String ID: 1699662471-493054409
    • Opcode ID: 36a2c54b721fafdbf931ff8f4f7d7b1c56876c8f2068a9fa25f57ff3ad0d757b
    • Instruction ID: e4ea0c63491a0aa6562394700959a2e2fd17f82e6ff424e03d25eb42a71636f9
    • Opcode Fuzzy Hash: 36a2c54b721fafdbf931ff8f4f7d7b1c56876c8f2068a9fa25f57ff3ad0d757b
    • Instruction Fuzzy Hash: FB419231900245DFEB64DBB4CC45BEDB7B8BF44300F5481AAE65AE3181EB386A45EF11
    APIs
    • GetCapture.USER32 ref: 00FD83AF
    • WindowFromPoint.USER32(?,?,?,00000001,?,00000000), ref: 00FD83BE
    • GetActiveWindow.USER32 ref: 00FD83E0
    • GetCurrentThreadId.KERNEL32 ref: 00FD83F8
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FD8407
    • GetDesktopWindow.USER32 ref: 00FD8413
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Thread$ActiveCaptureCurrentDesktopFromPointProcess
    • String ID:
    • API String ID: 1298419125-0
    • Opcode ID: d0ae071adab060d5e3efbab9cfdf22a8b713e1a05619bd93a14fb270269481f0
    • Instruction ID: 1e902a5b6fe0d3333dcd165a819b4e305a04026b2fd9e4370c2e0326722423c0
    • Opcode Fuzzy Hash: d0ae071adab060d5e3efbab9cfdf22a8b713e1a05619bd93a14fb270269481f0
    • Instruction Fuzzy Hash: 15317071D00216DFCF21EFA4D8488AEBBB6FB45361B284066E485A7304DF398D42EB51
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FC21BA
    • SendMessageA.USER32(?,000000B9,00000001,00000000), ref: 00FC228D
      • Part of subcall function 00F76D32: GetWindowTextLengthA.USER32(?), ref: 00F76D43
      • Part of subcall function 00F76D32: GetWindowTextA.USER32(?,00000000,00000001), ref: 00F76D5A
    • __splitpath_s.LIBCMT ref: 00FC22FA
      • Part of subcall function 00F85CBE: __mbsinc.LIBCMT ref: 00F85CE8
    • SendMessageA.USER32(?,000000B9,00000001,00000000), ref: 00FC24C9
    • GetParent.USER32(?), ref: 00FC24E2
    • GetParent.USER32(?), ref: 00FC24F1
    • RedrawWindow.USER32(?,00000000,00000000,00000481,00000000), ref: 00FC2503
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$MessageParentSendText$H_prolog3_LengthRedraw__mbsinc__splitpath_s
    • String ID: *?<>|
    • API String ID: 744279128-3491500753
    • Opcode ID: 9a307932788e5ddd5305f99a6272db42c68f398ebeaf026644dfcefd79824dd7
    • Instruction ID: 93ef2b374420c52ea4b35928ee7bde7f965e82c80e00e673f3e42abb31b70f19
    • Opcode Fuzzy Hash: 9a307932788e5ddd5305f99a6272db42c68f398ebeaf026644dfcefd79824dd7
    • Instruction Fuzzy Hash: 8C9191719001599BCB2AEB64CD96FEEB7BCEF18314F0442DCB14AA6191DB741F84EB11
    APIs
    • GetStockObject.GDI32(00000011), ref: 00F8A526
    • GetStockObject.GDI32(0000000D), ref: 00F8A52E
    • GetObjectA.GDI32(00000000,0000003C,?), ref: 00F8A53B
    • GetDC.USER32(00000000), ref: 00F8A54A
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F8A55E
    • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 00F8A56A
    • ReleaseDC.USER32(00000000,00000000), ref: 00F8A576
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$Stock$CapsDeviceRelease
    • String ID: System
    • API String ID: 46613423-3470857405
    • Opcode ID: e40c58a15bc883528f08e1bf53a1a33255e1c4f59cddd0e89d5262ab2358139c
    • Instruction ID: af06bb5d1e6a3f93b0b7be1ec9f4458d06ef8597abff0dc2941151b117d21c25
    • Opcode Fuzzy Hash: e40c58a15bc883528f08e1bf53a1a33255e1c4f59cddd0e89d5262ab2358139c
    • Instruction Fuzzy Hash: C611C171A40218EBEB20AFA0DC45FEE7BB8EB54751F140026F681AA1C4DB759D42DBB1
    APIs
    • PtInRect.USER32(?,?,00000000), ref: 010022D2
    • RedrawWindow.USER32(?,?,00000000,00000105,?,?,?,?,00000000), ref: 010022FE
    • ClientToScreen.USER32(?,?), ref: 01002333
    • WindowFromPoint.USER32(?,?,?,?,?,?,00000000), ref: 0100233F
    • ReleaseCapture.USER32 ref: 01002357
    • SetCapture.USER32(?,?,?,?,?,00000000), ref: 010023C9
    • ReleaseCapture.USER32 ref: 010023FB
    • ClientToScreen.USER32(?,?), ref: 010024E9
    • SetCursorPos.USER32(?,?,?,?,?,?,00000000), ref: 010024F5
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Capture$ClientReleaseScreenWindow$CursorFromPointRectRedraw
    • String ID:
    • API String ID: 2024412728-0
    • Opcode ID: f93dee93fa9aa31388ba8aeb3625bc59346934d2c8a946033420b0ddb66d8c61
    • Instruction ID: 5673d710565ecc96d884b6be189e40861c2c4fa109be6e42f51ba62e3679db6c
    • Opcode Fuzzy Hash: f93dee93fa9aa31388ba8aeb3625bc59346934d2c8a946033420b0ddb66d8c61
    • Instruction Fuzzy Hash: 70814D70600606DFDB22DF68C8989EEBBF5FF48301F20456AE9EA87294DB319541DF51
    APIs
    • SetRectEmpty.USER32(?), ref: 00FBA100
    • InvalidateRect.USER32(?,?,00000001), ref: 00FBA163
    • InvalidateRect.USER32(?,?,00000001), ref: 00FBA16E
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Invalidate$Empty
    • String ID:
    • API String ID: 1126320529-0
    • Opcode ID: 0bae26fc08099cc88aab10a6c53f0fe24bf035f6b190319621a2aa77f44436f8
    • Instruction ID: e90c0c753be1b06e200352ed8cc4aab1f9211b14587c021603b49174c3fa340e
    • Opcode Fuzzy Hash: 0bae26fc08099cc88aab10a6c53f0fe24bf035f6b190319621a2aa77f44436f8
    • Instruction Fuzzy Hash: C7612771A002099FCF11DF69C884AEEB7F9FF48710F2540A9E805AB255DB71AE40DF61
    APIs
    • LoadBitmapW.USER32(?,000000AB), ref: 00F6A5A0
    • LoadBitmapW.USER32(?,000000A8), ref: 00F6A5BC
    • LoadBitmapW.USER32(?,000000A9), ref: 00F6A5D8
    • LoadBitmapW.USER32(?,000000AA), ref: 00F6A5F4
    • LoadBitmapW.USER32(?,000000A7), ref: 00F6A610
    • LoadBitmapW.USER32(?,00000098), ref: 00F6A62C
    • LoadBitmapW.USER32(?,000000AD), ref: 00F6A648
    • SendMessageA.USER32(?,00000172,00000000,?), ref: 00F6A688
    • SetTimer.USER32(?,0000002B,000001F4,00000000), ref: 00F6A69B
      • Part of subcall function 00F6A480: SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 00F6A4B6
      • Part of subcall function 00F6A480: SendMessageA.USER32(?,00000158,00000000,?), ref: 00F6A4E2
      • Part of subcall function 00F6A480: SendMessageA.USER32(?,0000014E,00000001,00000000), ref: 00F6A4FC
      • Part of subcall function 00F6A480: SendMessageA.USER32(?,00000405,00000001,?), ref: 00F6A518
      • Part of subcall function 00F6A480: SendMessageA.USER32(?,00000409,00000000,00000000), ref: 00F6A52A
      • Part of subcall function 00F6A480: SendMessageA.USER32(?,00000414,00000001,00000000), ref: 00F6A53C
      • Part of subcall function 00F69B10: SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 00F69B4D
      • Part of subcall function 00F69B10: SendMessageA.USER32(?,00000143,00000000,00000010), ref: 00F69BBA
      • Part of subcall function 00F69B10: SendMessageA.USER32(?,0000014E,?,00000000), ref: 00F69C04
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$BitmapLoad$Timer
    • String ID:
    • API String ID: 3544907218-0
    • Opcode ID: ccb67fc24c9fd3e7be552b97b12c01beeeaa9db7276b9f9259ee09489549fc5e
    • Instruction ID: 2a5eb166efd196a630784d0f7f1221c2a840be33d5264604ed32b7eefe465f59
    • Opcode Fuzzy Hash: ccb67fc24c9fd3e7be552b97b12c01beeeaa9db7276b9f9259ee09489549fc5e
    • Instruction Fuzzy Hash: E9318DB53806006BE625F770CC5AEAB739CAF54710F15C45EF18A9B182DE7CA800DBA2
    APIs
      • Part of subcall function 00F8025B: GetParent.USER32(?), ref: 00F802AF
      • Part of subcall function 00F8025B: GetLastActivePopup.USER32(?), ref: 00F802C0
      • Part of subcall function 00F8025B: IsWindowEnabled.USER32(?), ref: 00F802D4
      • Part of subcall function 00F8025B: EnableWindow.USER32(?,00000000), ref: 00F802E7
    • EnableWindow.USER32(?,00000001), ref: 00F8035A
    • GetWindowThreadProcessId.USER32(?,?), ref: 00F8036E
    • GetCurrentProcessId.KERNEL32(?,00000000), ref: 00F80378
    • SendMessageA.USER32(?,00000376,00000000,00000000), ref: 00F80390
    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000), ref: 00F8040A
    • EnableWindow.USER32(00000000,00000001), ref: 00F8044F
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
    • String ID: 0
    • API String ID: 1877664794-4108050209
    • Opcode ID: 7039c3c9e238cc132b96edbc4bc703cf00e3767fcfe6bb24026a9e7d7941b4c5
    • Instruction ID: b5687a7e29ebaf1f9037a946fcb804ee371ae0a153bd2532c4f7bd7338a1eb7b
    • Opcode Fuzzy Hash: 7039c3c9e238cc132b96edbc4bc703cf00e3767fcfe6bb24026a9e7d7941b4c5
    • Instruction Fuzzy Hash: BE41D132A0021C9BDB71AF64CC86BDEB7B8EF05720F500195F695E6284DBB09E849F90
    APIs
    • __EH_prolog3.LIBCMT ref: 00FB852D
    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?,00000078), ref: 00FB8550
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    • SHGetDesktopFolder.SHELL32(?), ref: 00FB8565
    • GlobalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000040), ref: 00FB857A
    • SendMessageA.USER32 ref: 00FB8623
    • SendMessageA.USER32(?,00001102,00000002,00000000), ref: 00FB8630
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: FolderH_prolog3MessageSend$AllocDesktopException@8GlobalLocationSpecialThrow
    • String ID: g
    • API String ID: 2027722222-30677878
    • Opcode ID: d10efaa5145df7a74d8fb36f486028fb251d8d66b719ef67842c30e415c1d082
    • Instruction ID: 267bac60adecdd142bcfde00165cd151461ba002df65407fe7dbacd5c8b25094
    • Opcode Fuzzy Hash: d10efaa5145df7a74d8fb36f486028fb251d8d66b719ef67842c30e415c1d082
    • Instruction Fuzzy Hash: B7316D71A00216DFCB21DFA9CC89AEEBBF9FF88310F144569E545EB284DB759841DB10
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$ChildEmptyFocusH_prolog3H_prolog3_ParentRectRedrawVisible
    • String ID:
    • API String ID: 937326129-0
    • Opcode ID: 262d473fd5d75f975978d70cd2f0476b2e7190f39a8db0ad2a6e368e85096090
    • Instruction ID: c41555593c091b8b4940f71401e6cb4338066948344ed7ebd5fc1a5a8ff01520
    • Opcode Fuzzy Hash: 262d473fd5d75f975978d70cd2f0476b2e7190f39a8db0ad2a6e368e85096090
    • Instruction Fuzzy Hash: 8AD1A431E006169FCB11DF64C884BEDB7E6BF08710F18416AE859AB395DB34AD41EF91
    APIs
    • GetWindowRect.USER32(?,?), ref: 00F6C33A
    • PostMessageA.USER32(0000FFFF,0000C1D0,0000000D,00000000), ref: 00F6C34F
      • Part of subcall function 00F75613: _memset.LIBCMT ref: 00F756AC
      • Part of subcall function 00F75613: SendMessageA.USER32(00000000,00000405,00000000,?), ref: 00F756D5
      • Part of subcall function 00F75613: GetWindowLongA.USER32(00F6C35C,000000FC), ref: 00F756E7
      • Part of subcall function 00F75613: GetWindowLongA.USER32(00F6C35C,000000FC), ref: 00F756F8
      • Part of subcall function 00F75613: SetWindowLongA.USER32(00F6C35C,000000FC,?), ref: 00F75714
    • ?EnableHotKey@@YGXH@Z.STRETCHHOOK(00000000), ref: 00F6C3B6
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Long$Message$EnableKey@@PostRectSend_memset
    • String ID: HotKey Enable$LastPrefsX$LastPrefsY$Preferences
    • API String ID: 1062911976-3955191876
    • Opcode ID: cbb6cfa5932744f373594f8ecdad04c6f0c0834cb7c3a3004a335da394ae1c46
    • Instruction ID: b859fe1aa9779c075307339aa2ebf697e7fbb4d9d0f833018faf66d1fb93c58c
    • Opcode Fuzzy Hash: cbb6cfa5932744f373594f8ecdad04c6f0c0834cb7c3a3004a335da394ae1c46
    • Instruction Fuzzy Hash: 61119D70704205ABDB24EF99C845E7EB7F4BF98700F60815EF4C597344CAB559028BA1
    APIs
    • __EH_prolog3.LIBCMT ref: 00FA4016
    • GetSysColorBrush.USER32(00000018), ref: 00FA402F
    • FillRect.USER32(00000000,?,00000000), ref: 00FA403B
    • GetSysColor.USER32(00000017), ref: 00FA4063
    • GetSysColor.USER32(00000017), ref: 00FA408D
    • GetSysColor.USER32(00000017), ref: 00FA4092
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Color$BrushFillH_prolog3Rect
    • String ID: mmm
    • API String ID: 24942539-1545505134
    • Opcode ID: f6215824aae116fee9048bcdaeacab95512dbe4f07e10b6bfaed98654d307204
    • Instruction ID: 50e2c92ff4cdd4c9ed4fc5b6d21f4e727ad3d035eb999fb45bd49e714ea582c5
    • Opcode Fuzzy Hash: f6215824aae116fee9048bcdaeacab95512dbe4f07e10b6bfaed98654d307204
    • Instruction Fuzzy Hash: 9D1121712002499FCB10EFA4CC88EAE77A9FF88710F154518FA96CB395CB74AD40DBA1
    APIs
    • _memset.LIBCMT ref: 00F8A6C6
    • _strlen.LIBCMT ref: 00F8A6CC
    • _strcpy_s.LIBCMT ref: 00F8A6E5
    • GetDC.USER32(00000000), ref: 00F8A6FB
    • EnumFontFamiliesExA.GDI32(00000000,00F8A7C0,00F8A662,?,00000000), ref: 00F8A716
    • ReleaseDC.USER32(00000000,00000000), ref: 00F8A71E
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: EnumException@8FamiliesFontH_prolog3ReleaseThrow_memset_strcpy_s_strlen
    • String ID: MS UI Gothic
    • API String ID: 820125098-1905310704
    • Opcode ID: 52412cf714ab82f750e776bbeda255b26696e6abaf482912c1a042c71449ca0d
    • Instruction ID: 79a495863ce74248a182651a04ded9df205133b1ca79ee11e247ab0fa02ddfff
    • Opcode Fuzzy Hash: 52412cf714ab82f750e776bbeda255b26696e6abaf482912c1a042c71449ca0d
    • Instruction Fuzzy Hash: 6101C472900218EBD721EBA49C49DEF7BBCEB49750F140055F445E3244DB69AA02D7B6
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$CaptureDestroyEmptyMessageParentPointsRectReleaseSendVisible
    • String ID:
    • API String ID: 3509494761-0
    • Opcode ID: dbee9ba0966cb098b148c8d9f8b6c4dbdf200ca5f9c84b2e1810f3bf4816fa4e
    • Instruction ID: 272a4f866e7b54392f0b61ec17d7e3b50a743df1d9d5e537919a3918cd520c1e
    • Opcode Fuzzy Hash: dbee9ba0966cb098b148c8d9f8b6c4dbdf200ca5f9c84b2e1810f3bf4816fa4e
    • Instruction Fuzzy Hash: 4C519F316042059BDF119F64C899BBE37B6AF45311F0800B8FA4ADF2AADF75D844DB61
    APIs
    • __EH_prolog3.LIBCMT ref: 00FA651C
    • IsWindowVisible.USER32(?), ref: 00FA6575
    • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 00FA65AB
    • CreateRectRgn.GDI32(00000000,00000000,00000005,00000005), ref: 00FA65C6
    • CreateEllipticRgn.GDI32(00000000,00000000,0000000B,0000000B,00000000), ref: 00FA65F1
    • CreateRectRgn.GDI32(?,00000000,?,00000005), ref: 00FA6625
    • CreateEllipticRgn.GDI32(?,00000000,?,0000000B,00000000), ref: 00FA6658
      • Part of subcall function 00F83B45: CombineRgn.GDI32(?,?,?,?), ref: 00F83B6A
    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00FA668A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Create$Rect$EllipticWindow$CombineH_prolog3Visible
    • String ID:
    • API String ID: 2498130849-0
    • Opcode ID: 1bb3e2643095fa8fde907d08e1bf003e4c321416da52ac35c6fcaa3824729290
    • Instruction ID: 2394c9f8a1b3b27c027b8a354a9ae8135bebd0d75293438a4c01a73d62509b81
    • Opcode Fuzzy Hash: 1bb3e2643095fa8fde907d08e1bf003e4c321416da52ac35c6fcaa3824729290
    • Instruction Fuzzy Hash: 5E517FB194020AABDB11EBA0CD95EEFB778BF14700F10416AB156A71D1EB385A04DBA1
    APIs
    • __EH_prolog3.LIBCMT ref: 00F90104
    • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 00F9013A
    • GetParent.USER32(?), ref: 00F9015F
    • GetTopWindow.USER32(?), ref: 00F90219
    • GetWindow.USER32(?,00000002), ref: 00F90237
    • IsWindow.USER32(?), ref: 00F90257
    • GetParent.USER32(?), ref: 00F90264
    • DestroyWindow.USER32(?,?,00000020), ref: 00F90272
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Parent$DestroyH_prolog3MessageSend
    • String ID:
    • API String ID: 3234442123-0
    • Opcode ID: a2ea43cf334fc06b80ee9b3a928c79a0d5c7ca2e05142b6d10e8e3dac8c5aa08
    • Instruction ID: f93d79bf32555416ecebce32c385757eee8bf5290a66d6c4aa3129b8a1171b68
    • Opcode Fuzzy Hash: a2ea43cf334fc06b80ee9b3a928c79a0d5c7ca2e05142b6d10e8e3dac8c5aa08
    • Instruction Fuzzy Hash: F3417171A00601DFDF25AFA4CC85AAEB7B5FF48310F54442DE29AA7251DF34AD80EB50
    APIs
    • lstrlenA.KERNEL32(?,00000001,?,00000000), ref: 00FC6357
    • _memset.LIBCMT ref: 00FC6373
    • GetFocus.USER32 ref: 00FC637B
      • Part of subcall function 00F7557A: UnhookWindowsHookEx.USER32(?), ref: 00F755AA
    • IsWindowEnabled.USER32(00000005), ref: 00FC63B0
    • EnableWindow.USER32(00000005,00000000), ref: 00FC63CC
    • EnableWindow.USER32(00000000,00000001), ref: 00FC645F
    • IsWindow.USER32(?), ref: 00FC6464
    • SetFocus.USER32(?), ref: 00FC6471
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$EnableFocus$EnabledHookUnhookWindows_memsetlstrlen
    • String ID:
    • API String ID: 3424750955-0
    • Opcode ID: e23e50de584a0973edff76d8182e4a2833316842b46f8c3ffdf8e8dfcb783fe7
    • Instruction ID: 2d0700ea63f63a38771a73d36702fdf7b1c74ce79c02dffaa2ef7dd653f2bbbd
    • Opcode Fuzzy Hash: e23e50de584a0973edff76d8182e4a2833316842b46f8c3ffdf8e8dfcb783fe7
    • Instruction Fuzzy Hash: 3641BF31604601DFDB24DF74CA46F5ABBA5EF44314F24846DE58A8B256CB35E806EB81
    APIs
    • GetParent.USER32(?), ref: 00FC45A7
    • SendMessageA.USER32(?,00000111,?,?), ref: 00FC45D5
    • IsWindow.USER32(?), ref: 00FC45E4
    • RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,?,?,?,00FBE234,?,?,?), ref: 00FC45F4
    • IsWindow.USER32(?), ref: 00FC4604
    • ReleaseCapture.USER32 ref: 00FC4612
    • KillTimer.USER32(?,00000001,?,?,?,?,?,00FBE234,?,?,?), ref: 00FC462B
    • SendMessageA.USER32(?,0000041C,00000000,00000000), ref: 00FC464A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$MessageSend$CaptureKillParentRedrawReleaseTimer
    • String ID:
    • API String ID: 3014619129-0
    • Opcode ID: c1ae3badc824e640d709b6e831a64aa8a17258fc0552765d78f8f31d880b8064
    • Instruction ID: 9875d79941feb39532846ea859faf1d6808447d335610b447ab95c7fcc9e2ca6
    • Opcode Fuzzy Hash: c1ae3badc824e640d709b6e831a64aa8a17258fc0552765d78f8f31d880b8064
    • Instruction Fuzzy Hash: 16317E70910B01DBCB319B34C956FABFAE5FB85711F28492EE1DA81108E771A840EB11
    APIs
    • lstrlenA.KERNEL32(?,00000001,?,00000000), ref: 00FC6357
    • _memset.LIBCMT ref: 00FC6373
    • GetFocus.USER32 ref: 00FC637B
      • Part of subcall function 00F7557A: UnhookWindowsHookEx.USER32(?), ref: 00F755AA
    • IsWindowEnabled.USER32(00000005), ref: 00FC63B0
    • EnableWindow.USER32(00000005,00000000), ref: 00FC63CC
    • EnableWindow.USER32(00000000,00000001), ref: 00FC645F
    • IsWindow.USER32(?), ref: 00FC6464
    • SetFocus.USER32(?), ref: 00FC6471
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$EnableFocus$EnabledHookUnhookWindows_memsetlstrlen
    • String ID:
    • API String ID: 3424750955-0
    • Opcode ID: cd6fe3a44515c64299f4a1e5446c2f10ed1d2cd0b3410b4d3b0ecfd3bddf7a9e
    • Instruction ID: 9955708932a241fd92d2ef40f01e79683a3bb74d38f37994e6bd116f22c65237
    • Opcode Fuzzy Hash: cd6fe3a44515c64299f4a1e5446c2f10ed1d2cd0b3410b4d3b0ecfd3bddf7a9e
    • Instruction Fuzzy Hash: 9F319E30A04601DFDB249F74CA85F5ABBB5FF44304F24846DE58A9B256CB75E806EB80
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FE027E
    • GetParent.USER32(?), ref: 00FE0331
    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00FE0421
    • GetWindowRect.USER32(?,?), ref: 00FE0473
    • OffsetRect.USER32(?,?,?), ref: 00FE04AB
    • CreateRectRgn.GDI32(?,?,?,?), ref: 00FE04C8
    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00FE04DF
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: RectWindow$CreateH_prolog3_OffsetParent
    • String ID:
    • API String ID: 1438117353-0
    • Opcode ID: c0df1edd54a64f9fb0337ed6e61743ad2511cb7d091eb2ef6e9d92204a473b69
    • Instruction ID: a4784f40add14c36a2483e93094e2bcbbc2dec6e911fe0e5d398af5f83cca3fd
    • Opcode Fuzzy Hash: c0df1edd54a64f9fb0337ed6e61743ad2511cb7d091eb2ef6e9d92204a473b69
    • Instruction Fuzzy Hash: B5A11371D00219DFCB11DFA8C984AEDBBB2BF08310F24416AE945EB295DBB5AD81DF50
    APIs
    • __EH_prolog3.LIBCMT ref: 0100C027
    • CreateCompatibleDC.GDI32(?), ref: 0100C105
    • CreateCompatibleBitmap.GDI32(00000001,?,?), ref: 0100C139
    • SelectObject.GDI32(?,00000000), ref: 0100C196
    • DeleteObject.GDI32(?), ref: 0100C29D
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CompatibleCreateObject$BitmapDeleteH_prolog3Select
    • String ID: @Ls Fs
    • API String ID: 3587968642-1589975592
    • Opcode ID: 0f3142bc23fba68033ae3977ddcb51e360026f1eb8e2ae89cbe62ab723569e4c
    • Instruction ID: c632efe7851ee832c2ff04f85b5ea4bda20068dfa5020aa99a708729e4c746de
    • Opcode Fuzzy Hash: 0f3142bc23fba68033ae3977ddcb51e360026f1eb8e2ae89cbe62ab723569e4c
    • Instruction Fuzzy Hash: D9A13C71D0021ADFEF15CFE8CA849EDBBB5BF48300F14826AE955A7295D7349A05CF90
    APIs
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00F6A720
    • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00F6A731
    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00F6A750
    • GetModuleHandleA.KERNEL32(StretchRes,00000001,?,?), ref: 00F6A7A5
    • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 00F6A830
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$HandleModule
    • String ID: StretchRes
    • API String ID: 1411696585-621865559
    • Opcode ID: 6b1ff038cf2accf7315c817f09c73fdfb3f5ecf256fad7365fbaf3fcf4d9a901
    • Instruction ID: c191a5dc460967feea47a4f746f66db6e51b995a6cad7fc7e592e91f987e3e14
    • Opcode Fuzzy Hash: 6b1ff038cf2accf7315c817f09c73fdfb3f5ecf256fad7365fbaf3fcf4d9a901
    • Instruction Fuzzy Hash: 8C51B271600606AFD714DB78CC52FAEB3A8EF85320F14836DF125EB2D1DB75A9019B91
    APIs
    • MonitorFromPoint.USER32(?,?,00000002), ref: 00FCE311
    • GetMonitorInfoA.USER32(00000000), ref: 00FCE318
    • CopyRect.USER32(?,?), ref: 00FCE32A
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00FCE33A
    • IntersectRect.USER32(?,?,?), ref: 00FCE36D
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: InfoMonitorRect$CopyFromIntersectParametersPointSystem
    • String ID: (
    • API String ID: 2931574886-3887548279
    • Opcode ID: d1e595a99cfd4a7adc323a859d18126265de2f3b31c0e71eb2eeb7b9d1739e2f
    • Instruction ID: 7740dbb9cca5f28f59a089897ed582711bb7118b07358f4c699dbabc97bf7b2c
    • Opcode Fuzzy Hash: d1e595a99cfd4a7adc323a859d18126265de2f3b31c0e71eb2eeb7b9d1739e2f
    • Instruction Fuzzy Hash: 305104B5D0020A9FCB20CFA9C989AAEFBF9FF58310F10851EE455E7250D734AA04CB61
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FF817E
      • Part of subcall function 00F85BF1: __EH_prolog3.LIBCMT ref: 00F85BF8
      • Part of subcall function 00F85BF1: LoadCursorA.USER32(00000000,00007F00), ref: 00F85C24
      • Part of subcall function 00F85BF1: GetClassInfoA.USER32(?,00000000,?), ref: 00F85C68
    • CopyRect.USER32(?,?), ref: 00FF8232
      • Part of subcall function 00F7E5D4: ClientToScreen.USER32(?,?), ref: 00F7E5E5
      • Part of subcall function 00F7E5D4: ClientToScreen.USER32(?,?), ref: 00F7E5F2
    • IsRectEmpty.USER32(?), ref: 00FF824B
    • IsRectEmpty.USER32(?), ref: 00FF8263
    • IsRectEmpty.USER32(?), ref: 00FF8278
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Empty$ClientScreen$ClassCopyCursorH_prolog3H_prolog3_InfoLoad
    • String ID: Afx:ControlBar
    • API String ID: 2202805320-4244778371
    • Opcode ID: 0900cc7b64b11a53096a306eae15678c1f6caa16d991d7beb6c5417e61a61098
    • Instruction ID: f9f6f7f800ef09e54bb87592d827595950a5af80dc946e69a7ad9d2b7e26d892
    • Opcode Fuzzy Hash: 0900cc7b64b11a53096a306eae15678c1f6caa16d991d7beb6c5417e61a61098
    • Instruction Fuzzy Hash: A7418D329006189BCF01DFA4CC84BEE77B9BF49350F080168FD45BB255DB79A906EB60
    APIs
    • __EH_prolog3.LIBCMT ref: 00FBE29B
      • Part of subcall function 00F89998: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 00F899BB
      • Part of subcall function 00FB5EED: __EH_prolog3.LIBCMT ref: 00FB5EF4
      • Part of subcall function 00F89927: __EH_prolog3.LIBCMT ref: 00F8992E
    Strings
    • MFCMenuButton_StayPressed, xrefs: 00FBE31B
    • MFCMenuButton_Autosize, xrefs: 00FBE35F
    • MFCMenuButton_DefaultClick, xrefs: 00FBE33D
    • MFCMenuButton_RightArrow, xrefs: 00FBE2F9
    • MFCMenuButton_OSMenu, xrefs: 00FBE2D3
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3$ByteCharMultiWide
    • String ID: MFCMenuButton_Autosize$MFCMenuButton_DefaultClick$MFCMenuButton_OSMenu$MFCMenuButton_RightArrow$MFCMenuButton_StayPressed
    • API String ID: 2949695960-2044485435
    • Opcode ID: 1614fb2c6147339918d5d56a7185027de24e2eba4360e1ad2dbc763e7f87f2b4
    • Instruction ID: c2bcaa95d48a7b48b27dac0387beacfb166b76f958ecc4b6e83246f39642120a
    • Opcode Fuzzy Hash: 1614fb2c6147339918d5d56a7185027de24e2eba4360e1ad2dbc763e7f87f2b4
    • Instruction Fuzzy Hash: AB31D671D0420A9EDF00EFE5CD81AEEB7F8AF08310F44452AE565F7241DB78EA059B60
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 010064CC
      • Part of subcall function 01006413: __EH_prolog3.LIBCMT ref: 0100641A
      • Part of subcall function 01006413: GetProfileIntA.KERNEL32(windows,DragMinDist,00000002), ref: 01006472
      • Part of subcall function 01006413: GetProfileIntA.KERNEL32(windows,DragDelay,000000C8), ref: 01006484
    • CopyRect.USER32(?,?), ref: 010064FA
    • GetCursorPos.USER32(?), ref: 0100650C
    • SetRect.USER32(?,?,?,?,?), ref: 01006522
    • IsRectEmpty.USER32(?), ref: 0100653D
    • InflateRect.USER32(?,00000002,00000002), ref: 0100654F
    • DoDragDrop.OLE32(00000000,00000000,?,00000000), ref: 010065A6
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Profile$CopyCursorDragDropEmptyH_prolog3H_prolog3_Inflate
    • String ID:
    • API String ID: 1837043813-0
    • Opcode ID: deb95d73bf1f3c99186604b040eec3cd86d5f68bf7713be6eaeb2defd9f82bff
    • Instruction ID: 29e14a0b14871ec69dcce1c51668f56a2897ec7fc3fce6e83f9d0497ad20bc62
    • Opcode Fuzzy Hash: deb95d73bf1f3c99186604b040eec3cd86d5f68bf7713be6eaeb2defd9f82bff
    • Instruction Fuzzy Hash: 06217131904214DBDF12EFE4CC889EEB7BABF44701F100018E592EB288EB76A915DB50
    APIs
    • RealChildWindowFromPoint.USER32(?,?,?), ref: 00F84432
    • ClientToScreen.USER32(?,?), ref: 00F84451
    • GetWindow.USER32(?,00000005), ref: 00F844B4
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$ChildClientFromPointRealScreen
    • String ID:
    • API String ID: 2518355518-0
    • Opcode ID: e229f9d8294f8788bf2b5c6e902c53a585b0b4565819ce124ec6fea510a76339
    • Instruction ID: 59442fa8d464255f2f21e9bee206d4d82b6f0cf22ab41549a6cca3003ac320d4
    • Opcode Fuzzy Hash: e229f9d8294f8788bf2b5c6e902c53a585b0b4565819ce124ec6fea510a76339
    • Instruction Fuzzy Hash: BE214172D1151AAFDB10EFA4DC44BFE77B8FF18321F104119E951E2148D778AA05DBA1
    APIs
    • SelectObject.GDI32(?,00000000), ref: 00FEE3ED
      • Part of subcall function 00F84212: DeleteObject.GDI32(00000000), ref: 00F8422B
    • SelectObject.GDI32(?,00000000), ref: 00FEE403
    • DeleteObject.GDI32(00000000), ref: 00FEE46E
    • DeleteDC.GDI32(00000000), ref: 00FEE47D
    • LeaveCriticalSection.KERNEL32(010D52DC), ref: 00FEE496
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$Delete$Select$CriticalLeaveSection
    • String ID:
    • API String ID: 3849354926-3916222277
    • Opcode ID: e4a90330b65d499b4c5192d27624cffa0f5b24ae3e598fe800cd47f04e5ba0cc
    • Instruction ID: e0121c0d3b6fe9062d56cb95e96bed01dc65ca69a4005ad259377a01b85bf1cf
    • Opcode Fuzzy Hash: e4a90330b65d499b4c5192d27624cffa0f5b24ae3e598fe800cd47f04e5ba0cc
    • Instruction Fuzzy Hash: E021BD35900204DFCF21EF69EC808AE7BB5FF85320B1481A6FD589B16AC7759845EF90
    APIs
    • __EH_prolog3.LIBCMT ref: 00F746DA
    • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 00F74737
    • GetProcAddress.KERNEL32(UnregisterTouchWindow), ref: 00F74759
      • Part of subcall function 00F7428C: ActivateActCtx.KERNEL32(?,?,010BAEA0,00000010,00F74703,user32.dll,?,?,?,00000000,00F7560A,00000000,00000000,?,?,00F692FE), ref: 00F742AC
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AddressProc$ActivateH_prolog3
    • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
    • API String ID: 1001276555-2470269259
    • Opcode ID: d9d20c01840b2fb5f28106cdf50399ab9d49dde096551a1fb5b9bf2a5d99db56
    • Instruction ID: fb6e8deccd2999a3642aebe188b188a7417f6ec784d929792cc0129b1e99efa9
    • Opcode Fuzzy Hash: d9d20c01840b2fb5f28106cdf50399ab9d49dde096551a1fb5b9bf2a5d99db56
    • Instruction Fuzzy Hash: AD11B230A013019FDB28EB24F94571D3BE8BB15324F10896EE8CCC2198C77AA951DF51
    APIs
    • GetWindowRect.USER32(?,?), ref: 00FAE0F9
      • Part of subcall function 00F79606: GetWindowLongA.USER32(00000407,000000EC), ref: 00F79611
    • GetWindowRect.USER32(?,?), ref: 00FAE1F4
    • GetParent.USER32(?), ref: 00FAE201
    • GetParent.USER32(?), ref: 00FAE21B
    • OffsetRect.USER32(?,?,?), ref: 00FAE2E8
    • OffsetRect.USER32(?,?,?), ref: 00FAE2F4
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Window$OffsetParent$Long
    • String ID:
    • API String ID: 2171155602-0
    • Opcode ID: 285e55035d4d51fb9094ec368964515535c89a766a5f25627f743f00e6e0ea0a
    • Instruction ID: 2e6cefdd09ef6e3dec809b9762a58fb8861d18f4be9b471c927114df0f9dfed3
    • Opcode Fuzzy Hash: 285e55035d4d51fb9094ec368964515535c89a766a5f25627f743f00e6e0ea0a
    • Instruction Fuzzy Hash: 5C91CFB5D00209EFCF15DFA8C988AEEBBF5FF49300F24456AE945A7250D7346A41DB60
    APIs
    • __EH_prolog3.LIBCMT ref: 00FDE381
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
      • Part of subcall function 00F76CFA: GetParent.USER32(?), ref: 00F76D04
    • SendMessageA.USER32(?,?,00000000,00000000), ref: 00FDE4B0
      • Part of subcall function 00FA79A0: __EH_prolog3_catch.LIBCMT ref: 00FA79AA
      • Part of subcall function 00FA79A0: CloseHandle.KERNEL32(?,?,?,00000080), ref: 00FA79E3
      • Part of subcall function 00FA79A0: GetTempPathA.KERNEL32(00000104,00000000,00000104,00000000,?,?,00000080), ref: 00FA7A0A
      • Part of subcall function 00FA79A0: GetTempFileNameA.KERNEL32(?,AFX,00000000,00000000,00000104,00000000,000000FF), ref: 00FA7A41
      • Part of subcall function 00FA79A0: CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF), ref: 00FA7A63
    • SendMessageA.USER32(?,00000366,00000000,00000000), ref: 00FDE563
    • SendMessageA.USER32(?,0000C13F,?,00000000), ref: 00FDE581
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00FDE5F6
    • UpdateWindow.USER32(?), ref: 00FDE5FF
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$FileH_prolog3Temp$CloseCreateException@8H_prolog3_catchHandleInvalidateNameParentPathRectThrowUpdateWindow
    • String ID:
    • API String ID: 88766659-0
    • Opcode ID: 3a9d3b2cecc7a7aa263e88d9c0499db0517c914e2e980fcdfa285385a09f6203
    • Instruction ID: 00f47ce43bf9b59750c61eedead6521ebd9e3f6429c6c64d9e390ddcba6a5170
    • Opcode Fuzzy Hash: 3a9d3b2cecc7a7aa263e88d9c0499db0517c914e2e980fcdfa285385a09f6203
    • Instruction Fuzzy Hash: 5E7192746006009FCF25AF64CC44EAE7BB6FF88750F18452AF98A8B355DF359940EB51
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FB659B
    • GetClientRect.USER32(?,?), ref: 00FB65E1
      • Part of subcall function 00F7E7F8: __EH_prolog3.LIBCMT ref: 00F7E7FF
      • Part of subcall function 00F7E7F8: GetDC.USER32(00000000), ref: 00F7E82B
      • Part of subcall function 00F7EB1F: SelectObject.GDI32(?,00000000), ref: 00F7EB45
      • Part of subcall function 00F7EB1F: SelectObject.GDI32(?,?), ref: 00F7EB5B
    • SendMessageA.USER32(?,00000030,?,00000000), ref: 00FB6632
    • GetTextMetricsA.GDI32(?,?), ref: 00FB663F
    • GetParent.USER32(?), ref: 00FB6724
    • SendMessageA.USER32(?,00000030,?,00000000), ref: 00FB674F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageObjectSelectSend$ClientH_prolog3H_prolog3_MetricsParentRectText
    • String ID:
    • API String ID: 1207058154-0
    • Opcode ID: d5c1fb663a23f67a3c88a7956edbbe93019115415404e8e022d9c5214e1a06a6
    • Instruction ID: 6e89a67d59ce7aad126b1e2f2e894d246f91d3c159ca94b2acc1fe32e1bfa114
    • Opcode Fuzzy Hash: d5c1fb663a23f67a3c88a7956edbbe93019115415404e8e022d9c5214e1a06a6
    • Instruction Fuzzy Hash: 4871B032A001159BCF15DFA9CC95EEE77B6BF48710F258169E91AEB245CB34AC01DF50
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c7b90f69574188ed4ccd910cbac7f4a21fdb42999d951508a7f806b8138c2593
    • Instruction ID: b00815110056b00ac3e43604e5c0a7d75a301f4291050ed6fe0a4463cf0c4bc4
    • Opcode Fuzzy Hash: c7b90f69574188ed4ccd910cbac7f4a21fdb42999d951508a7f806b8138c2593
    • Instruction Fuzzy Hash: E951AD31700A00AFEF259F64CC88B6A77E5AF49750F144569F946CB2A1DF74ED42EB10
    APIs
    • __EH_prolog3.LIBCMT ref: 00FC6495
    • CoTaskMemFree.OLE32(?,000000FF), ref: 00FC653B
    • GetParent.USER32(?), ref: 00FC65B4
    • SendMessageA.USER32(?,00000464,00000104,?), ref: 00FC65C8
    • GetParent.USER32(?), ref: 00FC65FB
    • SendMessageA.USER32(?,00000465,00000104,?), ref: 00FC660F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageParentSend$FreeH_prolog3Task
    • String ID:
    • API String ID: 526180827-0
    • Opcode ID: f7d30f0a9ad631d1affafdef87dc1c5b4a2ee1b95b192761d3c31979cf53f7c2
    • Instruction ID: 3125f627118828b27291cb1791c5068c6b4289a9c8edb74cb708dcc477bd5452
    • Opcode Fuzzy Hash: f7d30f0a9ad631d1affafdef87dc1c5b4a2ee1b95b192761d3c31979cf53f7c2
    • Instruction Fuzzy Hash: 2E517CB1A0411AAFCF04EFA0CD56EAEB774FF44320F244619F565E7291DB38A941EB90
    APIs
    • GetClientRect.USER32(?,?), ref: 00FBA599
    • SendMessageA.USER32(?,00001204,00000000,00000001), ref: 00FBA5DB
    • SendMessageA.USER32(?,00001204,00000001,00000001), ref: 00FBA5FD
    • SendMessageA.USER32(?,00000201,00000000,00000000), ref: 00FBA677
    • SendMessageA.USER32(?,00000202,00000000,00000000), ref: 00FBA68F
    • PtInRect.USER32(?,?,?), ref: 00FBA6AB
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$Rect$Client
    • String ID:
    • API String ID: 4194289498-0
    • Opcode ID: e740ab85761e2bfd54a9917ab34659966bff077fbdd266a67b0a5d490547bb12
    • Instruction ID: 7cc683b1a25cb8f85b57bed58fdf3986b83b1799ad6604d8364e1af46a824d34
    • Opcode Fuzzy Hash: e740ab85761e2bfd54a9917ab34659966bff077fbdd266a67b0a5d490547bb12
    • Instruction Fuzzy Hash: 4D516CB1900219DFCF11DF65C988EDE7BBAFF48710F1840A9E8089B265CB71A941DFA1
    APIs
      • Part of subcall function 00F6A240: GetModuleHandleA.KERNEL32(StretchRes), ref: 00F6A2CD
      • Part of subcall function 00F6A240: FindResourceA.KERNEL32(00000000,soundlist,0000000A), ref: 00F6A2DD
      • Part of subcall function 00F6A240: SizeofResource.KERNEL32(00000000,00000000), ref: 00F6A2F0
      • Part of subcall function 00F6A240: LoadResource.KERNEL32(00000000,?), ref: 00F6A2FE
      • Part of subcall function 00F6A240: LockResource.KERNEL32(00000000), ref: 00F6A30D
      • Part of subcall function 00F677C0: waveOutGetDevCapsA.WINMM(000000FF,?,00000034,?,?,?,?,?,?,?,?,?,?,16B3F121,?), ref: 00F677EB
    • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 00F6A4B6
      • Part of subcall function 00F79785: EnableWindow.USER32(?,?), ref: 00F79796
    • SendMessageA.USER32(?,00000158,00000000,?), ref: 00F6A4E2
    • SendMessageA.USER32(?,0000014E,00000001,00000000), ref: 00F6A4FC
    • SendMessageA.USER32(?,00000405,00000001,?), ref: 00F6A518
    • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 00F6A52A
    • SendMessageA.USER32(?,00000414,00000001,00000000), ref: 00F6A53C
      • Part of subcall function 00F79511: GetDlgItem.USER32(?,?), ref: 00F79522
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$Resource$CapsEnableFindHandleItemLoadLockModuleSizeofWindowwave
    • String ID:
    • API String ID: 1152401390-0
    • Opcode ID: b34757f05abda99e63fc34f47bb980eb66607dfe6b07e33c3f753fb3ca859308
    • Instruction ID: bce85ccde018ee57fd7bd44148b93d6648544cd13685ea6fa1a95696fc831135
    • Opcode Fuzzy Hash: b34757f05abda99e63fc34f47bb980eb66607dfe6b07e33c3f753fb3ca859308
    • Instruction Fuzzy Hash: C41160713907007AF635A634DC47FEE729A9FC4B00F018519B746AF1C5D9E9B9408A55
    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 00F8028E
    • GetParent.USER32(?), ref: 00F8029C
    • GetParent.USER32(?), ref: 00F802AF
    • GetLastActivePopup.USER32(?), ref: 00F802C0
    • IsWindowEnabled.USER32(?), ref: 00F802D4
    • EnableWindow.USER32(?,00000000), ref: 00F802E7
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
    • String ID:
    • API String ID: 670545878-0
    • Opcode ID: 94000e49f080cb04b7ae8b2db6c7e8a48616174aa13cb050c3b898b60cd78bd2
    • Instruction ID: 2b5a4ce3965fca8798ad6cb29a0921a5684d6160923bc315c82bc5c9990ffbae
    • Opcode Fuzzy Hash: 94000e49f080cb04b7ae8b2db6c7e8a48616174aa13cb050c3b898b60cd78bd2
    • Instruction Fuzzy Hash: F511BF32A452319BCBF236699C8CBAE7698AF55B70F950124EC40E7208DFB4CC08A3D4
    APIs
    • ClientToScreen.USER32(?,?), ref: 00F84391
    • GetDlgCtrlID.USER32(00000000), ref: 00F843A2
    • GetWindowLongA.USER32(00000000,000000F0), ref: 00F843B2
    • GetWindowRect.USER32(00000000,00000000), ref: 00F843D4
    • PtInRect.USER32(00000000,00000000,00000000), ref: 00F843E4
    • GetWindow.USER32(?,00000005), ref: 00F843F1
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Rect$ClientCtrlLongScreen
    • String ID:
    • API String ID: 1315500227-0
    • Opcode ID: b2369cc6227145e80bf06a7069db9f4fc1d0404663c7324446e7d9589b9c079d
    • Instruction ID: 00e53f5f35a7b751370255de431f6a94c175a7bc3b3fb0839c71a24fd6e34004
    • Opcode Fuzzy Hash: b2369cc6227145e80bf06a7069db9f4fc1d0404663c7324446e7d9589b9c079d
    • Instruction Fuzzy Hash: CC11863290151AABDB21EF54DC48BEE77B8FF54326F214055F851E2084DB78AA05EBA1
    APIs
    • GetFocus.USER32 ref: 00F844D5
    • GetParent.USER32(00000000), ref: 00F844FD
      • Part of subcall function 00F842C2: GetWindowLongA.USER32(?,000000F0), ref: 00F842E3
      • Part of subcall function 00F842C2: GetClassNameA.USER32(?,?,0000000A), ref: 00F842F8
      • Part of subcall function 00F842C2: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,combobox,000000FF), ref: 00F84312
    • GetWindowLongA.USER32(?,000000F0), ref: 00F84518
    • GetParent.USER32(?), ref: 00F84526
    • GetDesktopWindow.USER32 ref: 00F8452A
    • SendMessageA.USER32(00000000,0000014F,00000000,00000000), ref: 00F8453E
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$LongParent$ClassCompareDesktopFocusMessageNameSendString
    • String ID:
    • API String ID: 1233893325-0
    • Opcode ID: 5604237e17f5b984c9f5918a90345783cd4eb48487a24cbffec1176992ec78da
    • Instruction ID: 04c62a4e83b5de9a2bc48d827c11139673112cc4f43c4ac76003488701a2c296
    • Opcode Fuzzy Hash: 5604237e17f5b984c9f5918a90345783cd4eb48487a24cbffec1176992ec78da
    • Instruction Fuzzy Hash: 9301D632A4421227D73136399CC8FBE759C9B86B70F2C0124FA41AF189DF39ED01A760
    APIs
      • Part of subcall function 00F79606: GetWindowLongA.USER32(00000407,000000EC), ref: 00F79611
    • GetClientRect.USER32(?,?), ref: 00FCC540
    • GetAsyncKeyState.USER32(00000011), ref: 00FCC5E6
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AsyncClientLongRectStateWindow
    • String ID: '
    • API String ID: 304971295-1997036262
    • Opcode ID: 0c7b854f5dba6d281b9b0de695ba3b0a1dafc4e66c26ba1c6948aa09f5f8462e
    • Instruction ID: 63e6b020f024bcd0f8c5ae3c06cb771b7b461e64ec46544a5677d302b5d23d67
    • Opcode Fuzzy Hash: 0c7b854f5dba6d281b9b0de695ba3b0a1dafc4e66c26ba1c6948aa09f5f8462e
    • Instruction Fuzzy Hash: A6B15B30B006079BCB29DF64CAA6FBD77E1AF44310F14416EE54A9B290DB749D81EBC1
    APIs
    • GetCapture.USER32 ref: 00FBA397
    • ReleaseCapture.USER32 ref: 00FBA39D
    • GetCapture.USER32 ref: 00FBA3C2
    • ReleaseCapture.USER32 ref: 00FBA3C8
    • GetCapture.USER32 ref: 00FBA3D1
    • ReleaseCapture.USER32 ref: 00FBA3D7
      • Part of subcall function 00FB9D95: __EH_prolog3_GS.LIBCMT ref: 00FB9D9C
      • Part of subcall function 00FB9D95: IsRectEmpty.USER32(?), ref: 00FB9DB7
      • Part of subcall function 00FB9D95: InvertRect.USER32(?,?), ref: 00FB9DCD
      • Part of subcall function 00FB9D95: SetRectEmpty.USER32(?), ref: 00FB9DDB
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Capture$RectRelease$Empty$H_prolog3_Invert
    • String ID:
    • API String ID: 4148550730-0
    • Opcode ID: 5959ad1ed7fe12fd8922d9862b4d5c6a25cb600ca1e2ed39b639167c5f241131
    • Instruction ID: f1726547c0d368fcf641768de960cd826b8bd98ef1373fbb05c3a14e036f4e37
    • Opcode Fuzzy Hash: 5959ad1ed7fe12fd8922d9862b4d5c6a25cb600ca1e2ed39b639167c5f241131
    • Instruction Fuzzy Hash: 1F015632210710CBD731BB22DC98BAEB3E4FB54326F240539E1DA86190DAB66845EF52
    APIs
    • IsWindow.USER32(?), ref: 00FCE1AE
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00FCE1E9
    • OffsetRect.USER32(?,?,?), ref: 00FCE1F9
    • CopyRect.USER32(?,?), ref: 00FCE207
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$CopyInfoOffsetParametersSystemWindow
    • String ID: ,
    • API String ID: 401166719-3772416878
    • Opcode ID: 91e0eae3617b10636a649f1965c75ac98068bf48b26bb3107fc9a6d47f3ec678
    • Instruction ID: 2e8524e2a1e45341d5cd9a0da04a930464dfc114b79560dedd2d01ac036f31bb
    • Opcode Fuzzy Hash: 91e0eae3617b10636a649f1965c75ac98068bf48b26bb3107fc9a6d47f3ec678
    • Instruction Fuzzy Hash: 97213832A0020AABDB21EFE4DD89FEEBBB9FF48320F140059F545A7154DB75A900DB21
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID:
    • String ID: Edit
    • API String ID: 0-554135844
    • Opcode ID: 145b23012b0f1ebb6e12c37dbae80b8e5b64c432d16b6e37f7bb282b43798794
    • Instruction ID: 1774aa87c65e9af091c3a21dce5cde740f70d2540f2dd834ffaccee8343f3ccf
    • Opcode Fuzzy Hash: 145b23012b0f1ebb6e12c37dbae80b8e5b64c432d16b6e37f7bb282b43798794
    • Instruction Fuzzy Hash: F61182317442017ADA342A358C09B6ABBA8AB41761FA4C43BF58DD14A7DBE5D810F7D2
    APIs
    • GetModuleHandleA.KERNEL32(DWMAPI), ref: 00F90729
    • GetProcAddress.KERNEL32(00000000,DwmSetIconicThumbnail), ref: 00F90739
    • DeleteObject.GDI32(00000000), ref: 00F90773
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AddressDeleteHandleModuleObjectProc
    • String ID: DWMAPI$DwmSetIconicThumbnail
    • API String ID: 3128169092-3761315311
    • Opcode ID: 0aa2772f2d54050d27ac61091d2b6988b0f3f34354f7f69a350b9b9a11618139
    • Instruction ID: 785943888ebabf52462eabda73fc5f65ce2d197cfa28db4997b8a105af8a48c1
    • Opcode Fuzzy Hash: 0aa2772f2d54050d27ac61091d2b6988b0f3f34354f7f69a350b9b9a11618139
    • Instruction Fuzzy Hash: DB01A136600205BFEF106FB58C88E6E77ACAB44725B008129F94597241DEB8ED00DB61
    APIs
    • GetWindowRect.USER32(?,?), ref: 00FFC363
    • GetWindowRect.USER32(?,?), ref: 00FFC43B
    • InflateRect.USER32(?,00000000,?), ref: 00FFC461
    • GetWindowRect.USER32(?,?), ref: 00FFC516
    • GetWindowRect.USER32(?,?), ref: 00FFC621
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Window$Inflate
    • String ID:
    • API String ID: 1123775244-0
    • Opcode ID: a10062ea05347fdb60cfb0e6afe7e98eb0d38effd27eaa4fb39afb8ce4e0fd78
    • Instruction ID: ad286579f1f6568d1671aa5813a1e40951aeb7d42e6edf92dcb8f80bd93ed804
    • Opcode Fuzzy Hash: a10062ea05347fdb60cfb0e6afe7e98eb0d38effd27eaa4fb39afb8ce4e0fd78
    • Instruction Fuzzy Hash: B8E12C72E0021DDFCB14DFA8CA84ABEBBB5BF48310F144569E655E7264D770AD40EB90
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Empty$Client
    • String ID:
    • API String ID: 1457177775-0
    • Opcode ID: ec4d3cc15c44b0f7609da38ad94bb970da3167af46ed65bcb7596875e5219378
    • Instruction ID: 5d2a4987714852144dd1b8f90672f39d951fd4c47f18078d4cb8b9c4de5f21e7
    • Opcode Fuzzy Hash: ec4d3cc15c44b0f7609da38ad94bb970da3167af46ed65bcb7596875e5219378
    • Instruction Fuzzy Hash: 30D15A31D0060ACFDF15CF68C9806AEBBB2BF4A360F244559E915BB240DB75AD42DF90
    APIs
    • LockWindowUpdate.USER32(?), ref: 00FE8258
    • IsWindow.USER32(?), ref: 00FE827E
    • GetWindowRect.USER32(?,?), ref: 00FE82D9
    • CopyRect.USER32(?,?), ref: 00FE8408
    • LockWindowUpdate.USER32(00000000,?,00000000,00000000,?,00000000,00000000,00000000,?), ref: 00FE842D
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$LockRectUpdate$Copy
    • String ID:
    • API String ID: 2992910783-0
    • Opcode ID: b9f8a11a6a21c1c79c45d94e12424dfbca99e0c9bf1b0051d4f33a414bca30e2
    • Instruction ID: d5c584ce5cd26d0eea57edca1f67ca07de6f2f4625652ce2a69d353df97c15d6
    • Opcode Fuzzy Hash: b9f8a11a6a21c1c79c45d94e12424dfbca99e0c9bf1b0051d4f33a414bca30e2
    • Instruction Fuzzy Hash: 21711974A00648AFCB15EFA9C898DAEBBF9EF89700F10446DF846E3250CB755941CF60
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FC069D
    • GetClientRect.USER32(?,?), ref: 00FC0743
    • InflateRect.USER32(?,00000003,00000003), ref: 00FC0775
      • Part of subcall function 00FC4D01: __EH_prolog3_GS.LIBCMT ref: 00FC4D08
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3_Rect$ClientInflate
    • String ID:
    • API String ID: 2789979914-0
    • Opcode ID: 1d702613f1effdf87b1bee574f00c3964f6bccae63b3e6da2ee1de890e46bb50
    • Instruction ID: d3c02304783a507ae0b7f91a4c5ec4dd07824a2092430ec623ccfbb46c7d3004
    • Opcode Fuzzy Hash: 1d702613f1effdf87b1bee574f00c3964f6bccae63b3e6da2ee1de890e46bb50
    • Instruction Fuzzy Hash: F0515A71A0011AEFCF04DFA8CD86EEEB7B9BF48710F144119F556BB285DA74A901DB60
    APIs
    • GetWindowRect.USER32(?,?), ref: 00FFC1A8
    • EqualRect.USER32(?,?), ref: 00FFC1D3
    • BeginDeferWindowPos.USER32(?), ref: 00FFC1E0
    • EndDeferWindowPos.USER32(?), ref: 00FFC205
      • Part of subcall function 00FF6E80: GetWindowRect.USER32(?,?), ref: 00FF6E96
      • Part of subcall function 00FF6E80: GetParent.USER32(?), ref: 00FF6ED8
      • Part of subcall function 00FF6E80: GetParent.USER32(?), ref: 00FF6EE8
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    • GetWindowRect.USER32(?,?), ref: 00FFC2BA
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Rect$DeferParent$BeginEqualException@8H_prolog3Throw
    • String ID:
    • API String ID: 601628497-0
    • Opcode ID: c104d668cbac5349377efc599cca0cb71cb5c1cdb999b55ad532d0bc5189d8c0
    • Instruction ID: 8fd0442a866c578aa23e97bdd91444043f1453b7ac00b83314b574af31316922
    • Opcode Fuzzy Hash: c104d668cbac5349377efc599cca0cb71cb5c1cdb999b55ad532d0bc5189d8c0
    • Instruction Fuzzy Hash: 45512A71E0021D9FCB10DFE9C9849EEBBF5FF48710B24406AE645E7225DB34A941EBA0
    APIs
    • AppendMenuA.USER32(?,00000000,000005DC,16B3F121), ref: 00F66248
    • AppendMenuA.USER32(?,00000000,000005DD,16B3F121), ref: 00F66289
    • AppendMenuA.USER32(?,00000000,000005DE,16B3F121), ref: 00F662C7
    • AppendMenuA.USER32(?,00000000,000005DF,16B3F121), ref: 00F662ED
    • AppendMenuA.USER32(?,00000000,000005E0,16B3F121), ref: 00F66313
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AppendMenu
    • String ID:
    • API String ID: 3048259833-0
    • Opcode ID: 7137bcdee8016cc514e81fe900fcc0c76b91428a8cc66913d07144105295de88
    • Instruction ID: 05302d95ea7f089617ffc88225660f5d622d1b1f5acf9bad1aa54cfed4b6d846
    • Opcode Fuzzy Hash: 7137bcdee8016cc514e81fe900fcc0c76b91428a8cc66913d07144105295de88
    • Instruction Fuzzy Hash: 245180717006069BEB14DB64CC52FAFB3A8FF45760F148629A925E73D1EB74E801DB60
    APIs
    • GlobalLock.KERNEL32(?,16B3F121,00000000,00000000), ref: 00F8A3D7
    • lstrlenA.KERNEL32(?), ref: 00F8A421
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 00F8A43B
    • _wcslen.LIBCMT ref: 00F8A45F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ByteCharGlobalLockMultiWide_wcslenlstrlen
    • String ID:
    • API String ID: 4253822919-0
    • Opcode ID: 646ba61631b304b0e87b99785a6794dd8fbbd4cd43f0abf932b8e6de1a5de8f1
    • Instruction ID: 08c8a5fab6a1d8bdc3ed1f2d048bf01e70ebc9511b5bc9ded685894a8881d123
    • Opcode Fuzzy Hash: 646ba61631b304b0e87b99785a6794dd8fbbd4cd43f0abf932b8e6de1a5de8f1
    • Instruction Fuzzy Hash: C641C371900219DFDF14EFA4C889AEDBBB8FF04310F24812AE412EB199DB74A945DB51
    APIs
    • IsWindow.USER32(00000000), ref: 00FB06E9
    • ShowWindow.USER32(00000000,00000004), ref: 00FB071B
    • IsWindow.USER32(?), ref: 00FB0760
    • IsWindowVisible.USER32(?), ref: 00FB076B
    • ShowWindow.USER32(?,00000000), ref: 00FB07A6
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Show$Visible
    • String ID:
    • API String ID: 2757229004-0
    • Opcode ID: ee69bc3fd55b636483c14232ec3af496551e671b87ac1157f88374e88dd7bbb3
    • Instruction ID: 69faeca32de2f8f0456becca6841170fdde2d0d42b1514c59b1ae08853037e83
    • Opcode Fuzzy Hash: ee69bc3fd55b636483c14232ec3af496551e671b87ac1157f88374e88dd7bbb3
    • Instruction Fuzzy Hash: F731D2326002019BDB20AF62DC95BEBB7A8FF41760F344168E9869B141EF34F840EF60
    APIs
      • Part of subcall function 00F795EC: GetWindowLongA.USER32(?,000000F0), ref: 00F795F7
    • GetWindowRect.USER32(?,?), ref: 00FB2549
    • GetSystemMetrics.USER32(00000021), ref: 00FB2557
    • GetSystemMetrics.USER32(00000020), ref: 00FB255D
    • GetKeyState.USER32(00000002), ref: 00FB257D
    • InflateRect.USER32(?,00000000,00000000), ref: 00FB25B3
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MetricsRectSystemWindow$InflateLongState
    • String ID:
    • API String ID: 2406722796-0
    • Opcode ID: 10a6d80a41b24d2de0f1d9218e7354bbe62746852dcc6fbcb2f3b0edd84783c7
    • Instruction ID: e0f7068d1c20783de87f521292aec39eac454902b904f139597b39d3a0876575
    • Opcode Fuzzy Hash: 10a6d80a41b24d2de0f1d9218e7354bbe62746852dcc6fbcb2f3b0edd84783c7
    • Instruction Fuzzy Hash: CC31A172F001199BDB60DFB9C8A9AFE77A5FB483A0F184419D402DB190DE74DA40EF50
    APIs
    • __EH_prolog3.LIBCMT ref: 00FF8556
    • SendMessageA.USER32(?,00000420,00000001,?), ref: 00FF85EA
    • SendMessageA.USER32(?,00000420,00000001,?), ref: 00FF8601
    • _calloc.LIBCMT ref: 00FF861C
    • lstrcpyA.KERNEL32(00000000,00000010,?,00000004,00F9F507,?,?,00000002,?,?,00000000), ref: 00FF862F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$H_prolog3_calloclstrcpy
    • String ID:
    • API String ID: 3273239350-0
    • Opcode ID: b07080d2feb9e33896d44ecd325f55cbe43567d6a7a3e2e80cd83f7d57bdabbe
    • Instruction ID: e6d00c5c280890a8c2bc93978695eade16f499465b9460b99a9ce0a5d466e981
    • Opcode Fuzzy Hash: b07080d2feb9e33896d44ecd325f55cbe43567d6a7a3e2e80cd83f7d57bdabbe
    • Instruction Fuzzy Hash: 6841BDB2A00249AFDB14DF68CC45AAE77A8BF143A0F188219F965DB2A1CF34DD11DB54
    APIs
      • Part of subcall function 00FDF79D: SetRectEmpty.USER32(?), ref: 00FDF7B8
    • IsRectEmpty.USER32(?), ref: 00FE85C8
      • Part of subcall function 00F7E593: ScreenToClient.USER32(00000407,?), ref: 00F7E5A4
      • Part of subcall function 00F7E593: ScreenToClient.USER32(00000407,?), ref: 00F7E5B1
    • GetWindowRect.USER32(?,?), ref: 00FE8609
    • UnionRect.USER32(?,?,?), ref: 00FE8632
    • EqualRect.USER32(?,?), ref: 00FE8640
    • OffsetRect.USER32(?,?,?), ref: 00FE865C
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$ClientEmptyScreen$EqualOffsetUnionWindow
    • String ID:
    • API String ID: 2676815302-0
    • Opcode ID: 741c00e135ad834cf72e1a728a89635b61e840852cf9546439b64a34b9ad4607
    • Instruction ID: 9dbcb17cec1d3ceaf1c601fa23871f2275adde5e78ddbecc13e0b761a892da7d
    • Opcode Fuzzy Hash: 741c00e135ad834cf72e1a728a89635b61e840852cf9546439b64a34b9ad4607
    • Instruction Fuzzy Hash: 95419671A00209AFCB10DFE9C9848EEBBF9FF48300B10456AE555E3204DB75AE05DB61
    APIs
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00FA0127
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00FA0156
    • InflateRect.USER32(?,?,?), ref: 00FA01B8
    • InflateRect.USER32(?,00000001,00000001), ref: 00FA01D4
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: InflateRect
    • String ID:
    • API String ID: 2073123975-0
    • Opcode ID: 7287af8661f34c60f551dfd4e93b3f8d43e4946411edf06ec24c2ce866fecb39
    • Instruction ID: ade3086b446be6588deca8d3e758a3189b3e1b538497ecdd9fc26e6b724fd1d5
    • Opcode Fuzzy Hash: 7287af8661f34c60f551dfd4e93b3f8d43e4946411edf06ec24c2ce866fecb39
    • Instruction Fuzzy Hash: 5D314DB290421DABCF10EE94DC85DFA376DFB89360B140A16FA64D71D4DA39E910DB60
    APIs
    • __EH_prolog3.LIBCMT ref: 00FAC351
    • SendMessageA.USER32(?,0000007F,00000000,00000000), ref: 00FAC3CA
    • SendMessageA.USER32(?,00000080,00000000,00000000), ref: 00FAC3D7
    • SendMessageA.USER32(?,0000007F,00000001,00000000), ref: 00FAC3E2
    • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 00FAC3EF
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$H_prolog3
    • String ID:
    • API String ID: 1885053084-0
    • Opcode ID: 26ffb18577df1638e2bd4b02931b4423c80cd3c8a8330a92ad8ce73dbf0eee45
    • Instruction ID: 3a8abf6c791665c08a17c0ff867181911f949ea38da38093d49ee9c84b922d6a
    • Opcode Fuzzy Hash: 26ffb18577df1638e2bd4b02931b4423c80cd3c8a8330a92ad8ce73dbf0eee45
    • Instruction Fuzzy Hash: 06316971740201ABDF24AB30CCA6BBD3A65BF49750F044179F94A9B2D2CB74A840EB95
    APIs
    • GetParent.USER32(?), ref: 00FC4291
    • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 00FC4324
    • GetParent.USER32(?), ref: 00FC4330
    • GetWindowLongA.USER32(?,000000F4), ref: 00FC434A
    • SendMessageA.USER32(?,00000111,?), ref: 00FC435A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageParentSend$LongWindow
    • String ID:
    • API String ID: 2933145521-0
    • Opcode ID: 4e18fbea97ac601745cdc4c046b84c04b16fe28116f851db3365a021529503be
    • Instruction ID: d9ffbdfa01f46fec4b7f7fb84822dc961ba1c3c734e5a6f267dffabbad043114
    • Opcode Fuzzy Hash: 4e18fbea97ac601745cdc4c046b84c04b16fe28116f851db3365a021529503be
    • Instruction Fuzzy Hash: 92213632A04612BFEF21AB71CD52FAEBAE9FB84760F10442EF54AC7140D675AC40B750
    APIs
    • __EH_prolog3.LIBCMT ref: 00F8648F
    • CreateRectRgnIndirect.GDI32(?), ref: 00F864B1
      • Part of subcall function 00F7E508: SelectClipRgn.GDI32(?,00000000), ref: 00F7E52E
      • Part of subcall function 00F7E508: SelectClipRgn.GDI32(?,?), ref: 00F7E544
    • GetParent.USER32(?), ref: 00F864D1
    • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 00F86529
    • SendMessageA.USER32(?,00000014,?,00000000), ref: 00F86556
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClipSelect$CreateH_prolog3IndirectMessageParentPointsRectSendWindow
    • String ID:
    • API String ID: 3362736716-0
    • Opcode ID: eb180ac79c9e7fa5cce8635c01ffeeb83377333f3372e53ded17ecf3097e491f
    • Instruction ID: 4d33bc70c36357ba6da8a732ad6b423021f8fd539124f294791f942a5adda658
    • Opcode Fuzzy Hash: eb180ac79c9e7fa5cce8635c01ffeeb83377333f3372e53ded17ecf3097e491f
    • Instruction Fuzzy Hash: 1C314C71A0020ADFCF14EFA4CC549AEBBB5FF08310F108529F959EB254E7359A01EB90
    APIs
    • __EH_prolog3.LIBCMT ref: 00F765CC
    • GetTopWindow.USER32(?), ref: 00F765F1
    • GetDlgCtrlID.USER32(00000000), ref: 00F76603
    • SendMessageA.USER32(?,00000087,00000000,00000000), ref: 00F7665F
    • GetWindow.USER32(00000000,00000002), ref: 00F7669F
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$CtrlH_prolog3MessageSend
    • String ID:
    • API String ID: 849854284-0
    • Opcode ID: f217288ac2a772ba6b9892103ba6339a2e7b3a5e831f8fb842274c5c3093b23b
    • Instruction ID: 57c2dc954a10d1bb5982fe0f251c46908095bf0751a9cd362571adb723c499c1
    • Opcode Fuzzy Hash: f217288ac2a772ba6b9892103ba6339a2e7b3a5e831f8fb842274c5c3093b23b
    • Instruction Fuzzy Hash: 7B21A071D00615AADF25EBA0CC44EADB778BF65310F60825BF889E6194DB744E40EF52
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ParentRect$ClientFillPointsWindow
    • String ID:
    • API String ID: 3058756167-0
    • Opcode ID: bc84f8dba3e4080ac43ee2bd34892a02f317fbbe8bbd5ff26f9fc0fee5fb40f7
    • Instruction ID: 77418cb2d273cf48d5862fdf170566cebd43fc00cb357234624f3822dd643e19
    • Opcode Fuzzy Hash: bc84f8dba3e4080ac43ee2bd34892a02f317fbbe8bbd5ff26f9fc0fee5fb40f7
    • Instruction Fuzzy Hash: E2218E71900209EFCB10EFA4C8458AFBFB5FF49310B1044A9E985A7211DB75AE01DFA1
    APIs
    • lstrlenA.KERNEL32(00F81E21,?,?,?), ref: 00F841A6
    • _memset.LIBCMT ref: 00F841C3
    • GetWindowTextA.USER32(?,00000000,00000100), ref: 00F841DD
    • lstrcmpA.KERNEL32(00000000,00F81E21), ref: 00F841EF
    • SetWindowTextA.USER32(?,00F81E21), ref: 00F841FB
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
    • String ID:
    • API String ID: 4273134663-0
    • Opcode ID: 9d471a772307bcac5e30a61d9beea976c67733aec00d1a533d1234feb2a17041
    • Instruction ID: 12c9577c83fec78c684995bcb79c8bf46a3f66db49f2ff73d303b3206f06f8b5
    • Opcode Fuzzy Hash: 9d471a772307bcac5e30a61d9beea976c67733aec00d1a533d1234feb2a17041
    • Instruction Fuzzy Hash: 6F01D6B6A00216ABCB21BF649C88FDF77ACEB64314F1000A1F985D3145DA75AA8487A1
    APIs
    • PeekMessageA.USER32(?,?,00000367,00000367,00000003), ref: 00F6E496
    • PostMessageA.USER32(?,00000367,00000000,00000000), ref: 00F6E4AE
    • GetCapture.USER32 ref: 00F6E4B0
    • ReleaseCapture.USER32 ref: 00F6E4BB
    • PostMessageA.USER32(?,0000036A,00000000,00000000), ref: 00F6E4E9
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Message$CapturePost$PeekRelease
    • String ID:
    • API String ID: 1125932295-0
    • Opcode ID: 8fa4fc9bc61abef757cd019291f843c7ecf237a4d0d1727d272fcfa1e0fabd48
    • Instruction ID: 8a9b9c10b2a77725b6d7f27a18c8901c5c6f41f055069e4cf012f9b282f384fd
    • Opcode Fuzzy Hash: 8fa4fc9bc61abef757cd019291f843c7ecf237a4d0d1727d272fcfa1e0fabd48
    • Instruction Fuzzy Hash: E4018F35604600ABE7356B30DC4DF1B7AB8FB84B14F20852DF4CA92185EAB5A801D765
    APIs
    • ScreenToClient.USER32(?,?), ref: 00FD82B8
    • SendMessageA.USER32(?,00000366,00000000,?), ref: 00FD82D4
    • ClientToScreen.USER32(?,?), ref: 00FD82E1
    • GetWindowLongA.USER32(?,000000F0), ref: 00FD82EA
    • GetParent.USER32(?), ref: 00FD82F8
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClientScreen$LongMessageParentSendWindow
    • String ID:
    • API String ID: 4240056119-0
    • Opcode ID: 98c518d4cb0a32b1d234cfa999affbd840c29b9fec47d30301332af34e746054
    • Instruction ID: 1c890e87f8d83c24236dcd1768f30802219d09dc3188e3f3732c38e0a49a3dbb
    • Opcode Fuzzy Hash: 98c518d4cb0a32b1d234cfa999affbd840c29b9fec47d30301332af34e746054
    • Instruction Fuzzy Hash: 7AF0F937504924B7D3220E149C08BAF379DEF81BB1F244212FDA5C2288DF75DA01D7A4
    APIs
    • __getptd.LIBCMT ref: 0106A328
      • Part of subcall function 010688F2: __getptd_noexit.LIBCMT ref: 010688F5
      • Part of subcall function 010688F2: __amsg_exit.LIBCMT ref: 01068902
    • __getptd.LIBCMT ref: 0106A33F
    • __amsg_exit.LIBCMT ref: 0106A34D
    • __lock.LIBCMT ref: 0106A35D
    • __updatetlocinfoEx_nolock.LIBCMT ref: 0106A371
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: 9a02e6cd392ce60cb1faa9754de8f2a8bc3deb2ed02adbba62af3d3a500f7460
    • Instruction ID: 1ab7fdc5efc6d4244dc61dd8c3331aee7b51d64566c0ae4d6d9641733d908399
    • Opcode Fuzzy Hash: 9a02e6cd392ce60cb1faa9754de8f2a8bc3deb2ed02adbba62af3d3a500f7460
    • Instruction Fuzzy Hash: 0AF09032F44322DBEB61BB6C980178D37D8AF14720F158159F5C4BB2C1DBA955408A5A
    APIs
      • Part of subcall function 00F67BB0: GetModuleHandleA.KERNEL32(StretchRes,?,?,?,00F6597D,?,Trig,16B3F121,?,?,00000000,?), ref: 00F67BC2
      • Part of subcall function 00F67BB0: FindResourceA.KERNEL32(00000000,16B3F121,?), ref: 00F67BD9
      • Part of subcall function 00F67BB0: SizeofResource.KERNEL32(00000000,00000000,?,00F6597D,?,Trig,16B3F121,?,?,00000000,?), ref: 00F67BE7
      • Part of subcall function 00F67BB0: LoadResource.KERNEL32(00000000,00000000,?,00F6597D,?,Trig,16B3F121,?,?,00000000,?), ref: 00F67BF2
    • _memcpy_s.LIBCMT ref: 00F665A6
    • AppendMenuA.USER32(?,00000000,-000003E8,?), ref: 00F665D6
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Resource$AppendFindHandleLoadMenuModuleSizeof_memcpy_s
    • String ID: STR#
    • API String ID: 3993332125-3114514328
    • Opcode ID: 4576765f8e8b4c400d4b32c9b8a690b3186b3f1c6e250edfe7ec765c59d818aa
    • Instruction ID: c08cc5821d6d5f70623d37b0807ab6f75a881505e5e82e2f1ae07ac09d49a839
    • Opcode Fuzzy Hash: 4576765f8e8b4c400d4b32c9b8a690b3186b3f1c6e250edfe7ec765c59d818aa
    • Instruction Fuzzy Hash: E3510672A046159FCB14EBA8CD51BAEF7F8FF54320F14426AE816E7281DB359D00DBA0
    APIs
    • GetModuleHandleA.KERNEL32(00000000,?,00000104), ref: 00F646C5
    • GetModuleFileNameA.KERNEL32(00000000), ref: 00F646CC
    • __wsplitpath.LIBCMT ref: 00F646EB
      • Part of subcall function 01061234: __splitpath_helper.LIBCMT ref: 01061276
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Module$FileHandleName__splitpath_helper__wsplitpath
    • String ID: Stretch.exe
    • API String ID: 1359774396-3639437320
    • Opcode ID: ee3b3de9a874dfacea4b9a7169a220c39523b0824040651d01ad421b29dd0a61
    • Instruction ID: 1b01d0205624b223eb98aaf487d96d896268b569689105a3d3739cf90a01150c
    • Opcode Fuzzy Hash: ee3b3de9a874dfacea4b9a7169a220c39523b0824040651d01ad421b29dd0a61
    • Instruction Fuzzy Hash: D63109719042099BCB24DF68D8A8BEA7BF9EB55300F1081E5E9C5CB244DF71AD88CB90
    APIs
    • FillRect.USER32(?,?), ref: 00FA232C
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00FA2363
    • DrawEdge.USER32(?,?,00000000,0000000F), ref: 00FA2383
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$DrawEdgeFillInflate
    • String ID: iii
    • API String ID: 785442924-940974255
    • Opcode ID: b3337c069d5fa2fcb6b6ac8758de9d359a0735fe59d6dd42af35bf15662493bc
    • Instruction ID: 47e58ea2964c6d411db51018c9aea5bfbc3e596ddb1db4e63511f8c95fc550fa
    • Opcode Fuzzy Hash: b3337c069d5fa2fcb6b6ac8758de9d359a0735fe59d6dd42af35bf15662493bc
    • Instruction Fuzzy Hash: 67114CB250020DAFCF10DFA4DD849EF77B9FB08324B104565B955EB195D735EA05CB60
    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 00F842E3
    • GetClassNameA.USER32(?,?,0000000A), ref: 00F842F8
    • CompareStringA.KERNEL32(00000409,00000001,?,000000FF,combobox,000000FF), ref: 00F84312
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClassCompareLongNameStringWindow
    • String ID: combobox
    • API String ID: 1414938635-2240613097
    • Opcode ID: 5d454ac3e5e1b890658c6f15157f4a32dac28591eecb2573f01e8a6763dc7718
    • Instruction ID: 89a57e59a86f2e32966e62aad5df8ac4b50211870dda53c6ff58e9919dde468c
    • Opcode Fuzzy Hash: 5d454ac3e5e1b890658c6f15157f4a32dac28591eecb2573f01e8a6763dc7718
    • Instruction Fuzzy Hash: 54F0F432658229AFCB20EF68CC01EBE77A8EB15330B600744F5B1E60C4DA34A9019795
    APIs
    • GetModuleHandleA.KERNEL32(Advapi32.dll), ref: 00F805D3
    • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedA), ref: 00F805E3
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: Advapi32.dll$RegCreateKeyTransactedA
    • API String ID: 1646373207-1184998024
    • Opcode ID: 2e79c59ab9140be2331eec6577cd29de02bda4aca836abb198b629566618487b
    • Instruction ID: 266404578337787f4679739bf8af2d3f183b567dec9953bf3d78e22d7a85068d
    • Opcode Fuzzy Hash: 2e79c59ab9140be2331eec6577cd29de02bda4aca836abb198b629566618487b
    • Instruction Fuzzy Hash: 1DF03C32504109FBCF222E959C04FDA3BA6EB48761F144419FA9495061EF76D8B0EB54
    APIs
    • GetModuleHandleA.KERNEL32(Advapi32.dll), ref: 00F8057A
    • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedA), ref: 00F8058A
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: Advapi32.dll$RegOpenKeyTransactedA
    • API String ID: 1646373207-496252237
    • Opcode ID: 4f5268366b0d7ddcf95e2dedaf8201850795f732d277ba8209088995a1fdc1aa
    • Instruction ID: 0acf55e534fc61db4f0c6184011f663f72f5860626ad576e2f4021df1db35a9d
    • Opcode Fuzzy Hash: 4f5268366b0d7ddcf95e2dedaf8201850795f732d277ba8209088995a1fdc1aa
    • Instruction Fuzzy Hash: BEF09A32504204AFCB212EA59C08BDA3BA9AB08761F184429FA9099050CF72E460EFA0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FD43C7
    • GetWindowRect.USER32(?,?), ref: 00FD45BF
    • GetParent.USER32(?), ref: 00FD4643
    • GetParent.USER32(?), ref: 00FD4937
      • Part of subcall function 00FD9DE3: GetParent.USER32(?), ref: 00FD9E14
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Parent$H_prolog3_RectWindow
    • String ID:
    • API String ID: 3969657074-0
    • Opcode ID: 6e3f42987e514187aed08a80b3a09b3dbbe12cb27761007c4ec26aa00e8a6c42
    • Instruction ID: 1f43d2cf0d15d71bd49c95a8ef1f392ec5533b5881afeb884c18416a86d4526f
    • Opcode Fuzzy Hash: 6e3f42987e514187aed08a80b3a09b3dbbe12cb27761007c4ec26aa00e8a6c42
    • Instruction Fuzzy Hash: 74122B70A01208AFCF15EFA4C899BEDBBF6BF48310F18412AF556E7291DB385945EB11
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Empty$StateWindow
    • String ID:
    • API String ID: 2684165152-0
    • Opcode ID: dce14d91831534841277374a8add03092f44d89d43d8ea8e331f15f12869701c
    • Instruction ID: 73a7eb3bac753e94474e176e91abb76d3ce53e7e9d1b9b7a64023ccb305857e5
    • Opcode Fuzzy Hash: dce14d91831534841277374a8add03092f44d89d43d8ea8e331f15f12869701c
    • Instruction Fuzzy Hash: 63917D71A002059FDF15DFA4D885AEEBBB6EF49310F148169F905EB251DB35A840EFA0
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 010625E7
      • Part of subcall function 01060E98: __getptd.LIBCMT ref: 01060EAB
      • Part of subcall function 010634C9: __getptd_noexit.LIBCMT ref: 010634C9
    • __stricmp_l.LIBCMT ref: 01062654
      • Part of subcall function 0106CDA7: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0106CDB6
    • ___crtLCMapStringA.LIBCMT ref: 010626AA
    • ___crtLCMapStringA.LIBCMT ref: 0106272B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Locale$StringUpdateUpdate::____crt$__getptd__getptd_noexit__stricmp_l
    • String ID:
    • API String ID: 2544346105-0
    • Opcode ID: f37dd99c08fea3814a6839d76684f167350d2c50d7a1fa2c2ed522c61107d35c
    • Instruction ID: 26fc53ebb56f4caacbf10ac9315bc95c315d830d307d94d2cae08d304bf6587d
    • Opcode Fuzzy Hash: f37dd99c08fea3814a6839d76684f167350d2c50d7a1fa2c2ed522c61107d35c
    • Instruction Fuzzy Hash: DC51F570904299ABDF269B68C484FBD7BF8BB05328F1881D9E1E15B1D2C7388E41CB50
    APIs
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 00FC81CD
    • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 00FC8213
    • RedrawWindow.USER32(?,00000000,00000000,00000185,?,?,00FCF844,?), ref: 00FC8223
    • IsWindowVisible.USER32(?), ref: 00FC82C8
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSendWindow$RedrawVisible
    • String ID:
    • API String ID: 2376333906-0
    • Opcode ID: fff9659935c960690c07d2d41fe0c2b9e6320a81e3263acd54987a25c262f29d
    • Instruction ID: 7b92748abf435c48bc8b3e9149ff731fef2ea32a1ef295790b79d77940a9591d
    • Opcode Fuzzy Hash: fff9659935c960690c07d2d41fe0c2b9e6320a81e3263acd54987a25c262f29d
    • Instruction Fuzzy Hash: FA51B230A00A01AFD7219F64CE8EEAA77F6FF85750B24456DF1468B195DB31EC41EB10
    APIs
    • __EH_prolog3.LIBCMT ref: 0103E276
    • SendMessageA.USER32(?,00000146,00000000,00000000), ref: 0103E3DD
    • SendMessageA.USER32(?,00000150,?,00000000), ref: 0103E429
    • SendMessageA.USER32(?,00000146,00000000,00000000), ref: 0103E45B
      • Part of subcall function 00F7B69B: __EH_prolog3_GS.LIBCMT ref: 00F7B6A5
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$H_prolog3H_prolog3_
    • String ID:
    • API String ID: 1270747201-0
    • Opcode ID: 21c5f8f0919b595b7bd341e2ccb9ce3244c58340c5cd76f5ca146e3a4b1499ae
    • Instruction ID: 30fd2016aa2a651cd86099a2e4b876feff28a252367911c602840dcd7d09ee6a
    • Opcode Fuzzy Hash: 21c5f8f0919b595b7bd341e2ccb9ce3244c58340c5cd76f5ca146e3a4b1499ae
    • Instruction Fuzzy Hash: 1E512B312007049BDB25EF74CC85BEAB7E5BF48300F10892DA69B972A2CB38A944DB51
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FA6375
    • InflateRect.USER32(?,000000FF,00000000), ref: 00FA639C
    • InflateRect.USER32(?,000000FF,000000FE), ref: 00FA63BA
    • FillRect.USER32(?,?,000000FF), ref: 00FA63D7
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Rect$Inflate$FillH_prolog3_
    • String ID:
    • API String ID: 3515757206-0
    • Opcode ID: 17cdad272751abe7215f038103e1445d78c1d45bbb7e089a30f5df0f789972f3
    • Instruction ID: 6b137675a757d6c28fdc6884acf55c67695828eccfef1314b3a55045282e3420
    • Opcode Fuzzy Hash: 17cdad272751abe7215f038103e1445d78c1d45bbb7e089a30f5df0f789972f3
    • Instruction Fuzzy Hash: 4D514B71A0010DAFCF11EF94CC81CEE7BBAFF49324B18422AF855A2191DA39DD55EB61
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FD05DB
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
      • Part of subcall function 00F84099: __EH_prolog3_catch.LIBCMT ref: 00F840A0
    • GetWindowRect.USER32(?,?), ref: 00FD06CF
    • GetSystemMetrics.USER32(00000010), ref: 00FD06DD
    • GetSystemMetrics.USER32(00000011), ref: 00FD06E8
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MetricsSystem$Exception@8H_prolog3H_prolog3_H_prolog3_catchRectThrowWindow
    • String ID:
    • API String ID: 3575448974-0
    • Opcode ID: f199ad929b929db507422722166e51bf2444ac81d05d427ce90df459c9020826
    • Instruction ID: c85504c69730cd0d76b7152dd62e1c2d8c6da8eaabcfff518d89d0f7052a95b2
    • Opcode Fuzzy Hash: f199ad929b929db507422722166e51bf2444ac81d05d427ce90df459c9020826
    • Instruction Fuzzy Hash: D9415871A006099FCB14EFA8CC85AEEBBF6BF48300F15457AF546AB291CB74A904DB50
    APIs
    • GetCurrentObject.GDI32(?,00000007), ref: 00F6C721
    • GetObjectA.GDI32(?,00000018,?), ref: 00F6C737
    • CreateBitmap.GDI32(?,00000000,00000001,00000001,00000000), ref: 00F6C76D
    • BitBlt.GDI32(00000002,00000000,00000000,?,00000000,00000002,00000000,00000000,00330008), ref: 00F6C7DF
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Object$BitmapCreateCurrent
    • String ID:
    • API String ID: 1536583575-0
    • Opcode ID: 8108768dc794c55c201864dff1dc5862979d1ccaa8a9da9cad62c914b8609cc3
    • Instruction ID: 5f5a9677234507dacb353cb922de37fb448a5d4cfb1373be0d0656571cdf483b
    • Opcode Fuzzy Hash: 8108768dc794c55c201864dff1dc5862979d1ccaa8a9da9cad62c914b8609cc3
    • Instruction Fuzzy Hash: E3416C75B00204AFDB10DFA8CC81F6AB3A9EF4C710F208159FA4997381DA78E9018BA0
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: EmptyRect
    • String ID:
    • API String ID: 2270935405-0
    • Opcode ID: 2c0763ef2e6a5ea8da90bcf45d3b0cd056d5539970ed52c968e0b8419000588d
    • Instruction ID: 42caf14caf33cd042ae9ff2ee84be31b91ad7333dd526f12161949230ec3bb88
    • Opcode Fuzzy Hash: 2c0763ef2e6a5ea8da90bcf45d3b0cd056d5539970ed52c968e0b8419000588d
    • Instruction Fuzzy Hash: D9519EB1805B858EC360DF3AC681AE6FAE8FF94350F14492FD0EAD2265DBB46441DF51
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00F70237
    • GetDlgCtrlID.USER32(?), ref: 00F702A0
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00000050,00000000,0000010C), ref: 00F70320
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000213), ref: 00F7035C
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ByteCharCtrlException@8H_prolog3H_prolog3_MultiThrowWideWindow
    • String ID:
    • API String ID: 1933732581-0
    • Opcode ID: 6a1ac7f6f65f6bd87d1bc0dd07d8ead5484aec485b5b377d747cb7474dbb9727
    • Instruction ID: e229639069ad2d4abf12ea93a55d38e93b7e5487f02d5074bcf032b0032ce499
    • Opcode Fuzzy Hash: 6a1ac7f6f65f6bd87d1bc0dd07d8ead5484aec485b5b377d747cb7474dbb9727
    • Instruction Fuzzy Hash: E431EA32D00249DBCF74AF74CC96BEE7268AF14320F14866EF65AE61C1CE749D80DA12
    APIs
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 00FE2623
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000014), ref: 00FE2659
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00FE2663
    • UpdateWindow.USER32(?), ref: 00FE266A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$InvalidateRectUpdate
    • String ID:
    • API String ID: 1651931182-0
    • Opcode ID: a227a3802a2b9a2f6e36ad212d611ae696bdbb5885c6c9fd50eaf52280eb8910
    • Instruction ID: 1f877c7d58ae23e4a08cccf772ee4be1a2dad9cd889ad2f30c75015ec8645831
    • Opcode Fuzzy Hash: a227a3802a2b9a2f6e36ad212d611ae696bdbb5885c6c9fd50eaf52280eb8910
    • Instruction Fuzzy Hash: CA318231940744EFCFB2CF66C9889AAB7BDFB84321F244A5EE59682115F7709980EF10
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: EmptyRect$CursorState
    • String ID:
    • API String ID: 2369637639-0
    • Opcode ID: a0b2f28e3ab24977ed48bffbcc024ddedfe338b7787d987610ae4c56caed3301
    • Instruction ID: 4508b298832989f4b5721957bb3280690637601d5333a55c9a2d966226814ee5
    • Opcode Fuzzy Hash: a0b2f28e3ab24977ed48bffbcc024ddedfe338b7787d987610ae4c56caed3301
    • Instruction Fuzzy Hash: CB2100B1E0021DAFCF11DFE5C9849EFBBBDFB49B51B10042AE141E2104DBB59A46DBA1
    APIs
      • Part of subcall function 00F795EC: GetWindowLongA.USER32(?,000000F0), ref: 00F795F7
    • GetForegroundWindow.USER32 ref: 00FB242E
    • GetLastActivePopup.USER32(?), ref: 00FB2452
    • SendMessageA.USER32(?,0000036D,00000040,00000000), ref: 00FB246A
    • SendMessageA.USER32(?,0000036D,00000000,00000000), ref: 00FB248F
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSendWindow$ActiveException@8ForegroundH_prolog3LastLongPopupThrow
    • String ID:
    • API String ID: 2019557511-0
    • Opcode ID: 4bdea9f596a0465dca344b1fd343d6a57ec1e5f567bc17231ace6b882838bed0
    • Instruction ID: 6890bb224791860861647999d5a23e29cb45ebd8ae30ecaf9556dd1ffbb6bc0f
    • Opcode Fuzzy Hash: 4bdea9f596a0465dca344b1fd343d6a57ec1e5f567bc17231ace6b882838bed0
    • Instruction Fuzzy Hash: 81110672B10101EBDB11EBB6DC05FAE3AACEB44750F10403AF645D3062EAB8DD00EB51
    APIs
      • Part of subcall function 00F7953B: GetDlgItem.USER32(00000000,?), ref: 00F7954C
    • GetWindowLongA.USER32(?,000000F0), ref: 00F82116
    • GetWindowTextLengthA.USER32(?), ref: 00F82143
    • GetWindowTextA.USER32(?,00000000,00000100), ref: 00F82172
    • SendMessageA.USER32(?,0000014D,000000FF,?), ref: 00F82193
      • Part of subcall function 00F8417A: lstrlenA.KERNEL32(00F81E21,?,?,?), ref: 00F841A6
      • Part of subcall function 00F8417A: _memset.LIBCMT ref: 00F841C3
      • Part of subcall function 00F8417A: GetWindowTextA.USER32(?,00000000,00000100), ref: 00F841DD
      • Part of subcall function 00F8417A: lstrcmpA.KERNEL32(00000000,00F81E21), ref: 00F841EF
      • Part of subcall function 00F8417A: SetWindowTextA.USER32(?,00F81E21), ref: 00F841FB
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Text$ItemLengthLongMessageSend_memsetlstrcmplstrlen
    • String ID:
    • API String ID: 205973220-0
    • Opcode ID: ae68fbfe1482e9e2ccb3744ba804276157ac920d41ebf484a00c874a0bcb7cc9
    • Instruction ID: 0052f2396ffd9fd3e95ac7c09f03a5cce90c09a17b5ab00bad1e7d99c44f14aa
    • Opcode Fuzzy Hash: ae68fbfe1482e9e2ccb3744ba804276157ac920d41ebf484a00c874a0bcb7cc9
    • Instruction Fuzzy Hash: A7119031104209BBCF21AF54DC49EED7B66BF44370F244219FAA55A1E4CB35A991FB40
    APIs
    • FindResourceA.KERNEL32(?,00000000,00000005), ref: 00F7C565
    • LoadResource.KERNEL32(?,00000000), ref: 00F7C56D
    • LockResource.KERNEL32(00000000), ref: 00F7C57F
    • FreeResource.KERNEL32(00000000), ref: 00F7C5CD
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Resource$FindFreeLoadLock
    • String ID:
    • API String ID: 1078018258-0
    • Opcode ID: 29a2ea24e8d65f253a2da567acecb2c6375896b10b26d987c3aa387c70c3cd3b
    • Instruction ID: e5c41f4a70e3feb92962be8af15409fa8a6dad29c19dbe80226fc2961248fc36
    • Opcode Fuzzy Hash: 29a2ea24e8d65f253a2da567acecb2c6375896b10b26d987c3aa387c70c3cd3b
    • Instruction Fuzzy Hash: 0B11D036900611EBD7308F65C848A7AB7B4FF44321F18C06EE99653650E776ED44E7D1
    APIs
    • GetCursorPos.USER32(00000000), ref: 00FF7357
      • Part of subcall function 00FF6E80: GetWindowRect.USER32(?,?), ref: 00FF6E96
      • Part of subcall function 00FF6E80: GetParent.USER32(?), ref: 00FF6ED8
      • Part of subcall function 00FF6E80: GetParent.USER32(?), ref: 00FF6EE8
    • ScreenToClient.USER32(?,?), ref: 00FF737F
    • SetCapture.USER32(?), ref: 00FF739F
    • GetWindowRect.USER32(?,?), ref: 00FF73DA
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ParentRectWindow$CaptureClientCursorScreen
    • String ID:
    • API String ID: 3234571238-0
    • Opcode ID: 985b61c336f34eba5666db183d80b5c4907f5911dce63a4f20858b32fe72a8e0
    • Instruction ID: 1622003f6a4d52e1b1391d6399feabeeb0cc6cce39dde49ca4d4f1a85228f1d8
    • Opcode Fuzzy Hash: 985b61c336f34eba5666db183d80b5c4907f5911dce63a4f20858b32fe72a8e0
    • Instruction Fuzzy Hash: F921A971504708EFDB21EF64C848BEEBBF8FF48315F100468E98A87251CB7AAA40DB50
    APIs
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$Destroy
    • String ID:
    • API String ID: 3707531092-0
    • Opcode ID: aef26c20fa660394acb3f0609c88453a111fdefd3e70908f6294ed47bb0a004b
    • Instruction ID: b4ed143e3fe66ef50af4839183164321724d640340290d60611dc78a8a9ba3d9
    • Opcode Fuzzy Hash: aef26c20fa660394acb3f0609c88453a111fdefd3e70908f6294ed47bb0a004b
    • Instruction Fuzzy Hash: E9018471604600AFEB215B24DC84BAAFBB5FF413A5F14421AE55983114DF75AC52EB60
    APIs
    • GetTopWindow.USER32(?), ref: 00F76457
    • GetTopWindow.USER32(00000000), ref: 00F76496
    • GetWindow.USER32(00000000,00000002), ref: 00F764B4
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window
    • String ID:
    • API String ID: 2353593579-0
    • Opcode ID: 0bd8694a8b6480b7322405ce00e9db437cca6382e4dc5e04e849dfe05d4a33ea
    • Instruction ID: 7933ffe97fba358ab8be67d0990397ca8a849d82cec600b44bb7484509fac906
    • Opcode Fuzzy Hash: 0bd8694a8b6480b7322405ce00e9db437cca6382e4dc5e04e849dfe05d4a33ea
    • Instruction Fuzzy Hash: 2D01ED3240091ABBCF239F95DC05E9E3A66AF49760F14C012FA5891065C73AC971FBA2
    APIs
    • _free.LIBCMT ref: 00F80529
      • Part of subcall function 0106259F: HeapFree.KERNEL32(00000000,00000000,?,010688E3,00000000,?,00000000,010634CE,01062D42,00000000,?,00F6DBF4,00F7B459,00000000,?,00F71496), ref: 010625B5
      • Part of subcall function 0106259F: GetLastError.KERNEL32(00000000,?,010688E3,00000000,?,00000000,010634CE,01062D42,00000000,?,00F6DBF4,00F7B459,00000000,?,00F71496,0000000C), ref: 010625C7
    • __strdup.LIBCMT ref: 00F80531
    • _free.LIBCMT ref: 00F8053C
    • __strdup.LIBCMT ref: 00F80544
      • Part of subcall function 0106511A: _strlen.LIBCMT ref: 01065130
      • Part of subcall function 0106511A: _malloc.LIBCMT ref: 01065139
      • Part of subcall function 0106511A: _strcpy_s.LIBCMT ref: 0106514B
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: __strdup_free$ErrorFreeHeapLast_malloc_strcpy_s_strlen
    • String ID:
    • API String ID: 2371051941-0
    • Opcode ID: f99d5ce489f6bdc17b7150484c8fec20e443602bf90e5db001834617e8a69c53
    • Instruction ID: 55256d29d69fda6904a6894ac892e99f9836952c32d9d4aa975d19f7809990f1
    • Opcode Fuzzy Hash: f99d5ce489f6bdc17b7150484c8fec20e443602bf90e5db001834617e8a69c53
    • Instruction Fuzzy Hash: FBE01272810B45EFC7317F75CC01887BF9DEF64250B004C6AF9C657624DAB2A9609BC0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00FA40BA
    • InflateRect.USER32(?,000000FD,000000FD), ref: 00FA4110
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3_InflateRect
    • String ID: %d%%
    • API String ID: 3173815319-1518462796
    • Opcode ID: 949de80fbf5e752a121638fb19de2d00d937fdd5e2b752d0619d0d066e42096f
    • Instruction ID: 9a9a756c851b08c1373c0e2320f2c1f9924c986753dca30a1c97f817d741edf1
    • Opcode Fuzzy Hash: 949de80fbf5e752a121638fb19de2d00d937fdd5e2b752d0619d0d066e42096f
    • Instruction Fuzzy Hash: 94318A72A002289FCF15DFA4CC84DEEB7B9FF9A710B154559F901AB255CA70ED40DBA0
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00F8C3AD
    • CoCreateGuid.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000028), ref: 00F8C3FA
      • Part of subcall function 00F639B0: _memcpy_s.LIBCMT ref: 00F63A49
      • Part of subcall function 00F639B0: _strnlen.LIBCMT ref: 00F639E8
    Strings
    • %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X, xrefs: 00F8C446
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CreateGuidH_prolog3__memcpy_s_strnlen
    • String ID: %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X
    • API String ID: 2536680395-1017209998
    • Opcode ID: 13e8da5adabfe0263b51aafbd9d235d41e7ca37a312d716f7122d095c6a7f14e
    • Instruction ID: e07c39c048416d32de6cbbb5809573ccdc3c55b12813400f09265f1ebbd6a2de
    • Opcode Fuzzy Hash: 13e8da5adabfe0263b51aafbd9d235d41e7ca37a312d716f7122d095c6a7f14e
    • Instruction Fuzzy Hash: 86318B72D04159AFCB01EBE4CC51AFEBBB9AF49300F084059F581B7282CA7C9A05AB70
    APIs
    • __EH_prolog3.LIBCMT ref: 00FC20DF
      • Part of subcall function 00F89998: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 00F899BB
      • Part of subcall function 00FB5EED: __EH_prolog3.LIBCMT ref: 00FB5EF4
      • Part of subcall function 00FB5F2A: __EH_prolog3.LIBCMT ref: 00FB5F31
      • Part of subcall function 00FB5F2A: __fassign.LIBCMT ref: 00FB6014
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: H_prolog3$ByteCharMultiWide__fassign
    • String ID: ...$MFCEditBrowse_Mode
    • API String ID: 1708987901-1707052652
    • Opcode ID: 258b89ef9eec3ff80f1c0b8130f08e7281b19fec3383b263a7d0ba4c0358df19
    • Instruction ID: 31c47816d2d2cc38e21049c5ce726d19e22c637a59fa61afb994dfbe18586e1d
    • Opcode Fuzzy Hash: 258b89ef9eec3ff80f1c0b8130f08e7281b19fec3383b263a7d0ba4c0358df19
    • Instruction Fuzzy Hash: E4218E7190050BBACF44FBA18E96FFEB268FF10314F58461DB151A6182DE784A05B622
    APIs
    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00FB817B
    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00FB818D
      • Part of subcall function 00F72127: __CxxThrowException@8.LIBCMT ref: 00F7213D
      • Part of subcall function 00F72127: __EH_prolog3.LIBCMT ref: 00F7214A
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: MessageSend$Exception@8H_prolog3Throw
    • String ID: N
    • API String ID: 2952110909-1130791706
    • Opcode ID: 6d8109a740f89478bd7ed829ad3584a2b333f1cb078a094abd306a39b0c43beb
    • Instruction ID: b9b27d48a759e22ac19d5181f1f65249999f9840ffdfcb836a7002f7e21cf038
    • Opcode Fuzzy Hash: 6d8109a740f89478bd7ed829ad3584a2b333f1cb078a094abd306a39b0c43beb
    • Instruction Fuzzy Hash: 4E11E535700705AFDB219E6ACC40BDAB7ADBF943A1F104129F6595A2A1DF70DC12EB90
    APIs
    • GetForegroundWindow.USER32 ref: 00F620F0
    • GetClassNameA.USER32(00000000,?,00000032), ref: 00F620FD
    Strings
    • WindowsScreenSaverClass, xrefs: 00F62103
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClassForegroundNameWindow
    • String ID: WindowsScreenSaverClass
    • API String ID: 2583640211-352026012
    • Opcode ID: ee2475c5ae1cbb473b8379799170dc799bc31161736769c6e4aac40e1a3a7003
    • Instruction ID: 10d99147ec7074e21611cf830c370da5cdfc4bc217555d473df833b243f1dc87
    • Opcode Fuzzy Hash: ee2475c5ae1cbb473b8379799170dc799bc31161736769c6e4aac40e1a3a7003
    • Instruction Fuzzy Hash: 00F04C31E1C2485BCB149F749DD66B97BAB9B17210B844598EAC1CB281EF33D80CD700
    APIs
    • __EH_prolog3.LIBCMT ref: 00FF40F5
    • RegisterClipboardFormatA.USER32(00000010), ref: 00FF413E
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: ClipboardFormatH_prolog3Register
    • String ID: ToolbarButton%p
    • API String ID: 1070914459-899657487
    • Opcode ID: 472c4bf30c6567fcafb937420aa0166fee8753f1cf5080318fe0bfa55e06a5ff
    • Instruction ID: 8375eea1af4a9b2bafc5abc3b93b6b2805388a0a261257de6e47141f4dfadf90
    • Opcode Fuzzy Hash: 472c4bf30c6567fcafb937420aa0166fee8753f1cf5080318fe0bfa55e06a5ff
    • Instruction Fuzzy Hash: C4F0C231C012098ACF20FBA4DC017EE7374BF20324F084419F9A4A7295DBBC6584DB95
    APIs
    • FindWindowA.USER32(StretchWareAppClass,00000000), ref: 00F62078
    • GetForegroundWindow.USER32(00000000,?,?,?,00F6173C), ref: 00F6208A
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: Window$FindForeground
    • String ID: StretchWareAppClass
    • API String ID: 3863363130-3943464107
    • Opcode ID: 9404e5c1ca9ccec25542ca09cccd18e531edb4b20a91d9b1448960ad4e0964ef
    • Instruction ID: 4d2b15eb131b5a75556e2949fd57094929f0c34cf13e7b7cd34ea757cde51d3f
    • Opcode Fuzzy Hash: 9404e5c1ca9ccec25542ca09cccd18e531edb4b20a91d9b1448960ad4e0964ef
    • Instruction Fuzzy Hash: CAD05E3395A93176DA7037F47C09B8E76884B00B61F554016F989DA10AD85D8CC192D1
    APIs
    • InterlockedExchange.KERNEL32(010D78D4,00000000), ref: 00F8E11F
    • CreateCompatibleDC.GDI32(00000000), ref: 00F8E133
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.3342305660.0000000000F61000.00000020.00000001.01000000.00000008.sdmp, Offset: 00F60000, based on PE: true
    • Associated: 0000000B.00000002.3342267832.0000000000F60000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342482580.0000000001087000.00000002.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342554920.00000000010CB000.00000004.00000001.01000000.00000008.sdmpDownload File
    • Associated: 0000000B.00000002.3342588557.00000000010D9000.00000002.00000001.01000000.00000008.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_f60000_StchCtrl.jbxd
    Similarity
    • API ID: CompatibleCreateExchangeInterlocked
    • String ID: @Ls Fs
    • API String ID: 1770991917-1589975592
    • Opcode ID: c51a721fd6d555dddb42a0d2d1c80427a880e6e6fea0b5ab16e6ee178ce17f36
    • Instruction ID: f257f41348a3e799174b8952ed591ef6b8250ea975efa8e53fb5236fa2b368f9
    • Opcode Fuzzy Hash: c51a721fd6d555dddb42a0d2d1c80427a880e6e6fea0b5ab16e6ee178ce17f36
    • Instruction Fuzzy Hash: 36D0A732B001106AE730251AAC0CBCF3908DBD1230B261035F48AD2008C6799C424261